<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<feed xmlns="http://www.w3.org/2005/Atom">

  <title>Planet Debian Derivatives</title>
  <link rel="self" href="https://planet.debian.org/deriv/atom.xml"/>
  <link href="https://planet.debian.org/deriv/"/>
  <id>https://planet.debian.org/deriv/atom.xml</id>
  <updated>2026-03-14T20:31:13+00:00</updated>
  <generator uri="http://intertwingly.net/code/venus/">http://intertwingly.net/code/venus/</generator>


  <entry xml:lang="en">
	<title type="html" xml:lang="es">Ubuntu en Modo Congelado Cambios que desaparecen al reiniciar</title>
	<link href="https://sinfallas.wordpress.com/2026/03/14/ubuntu-en-modo-congelado-cambios-que-desaparecen-al-reiniciar/"/>
	<id>http://sinfallas.wordpress.com/?p=5355</id>
	<updated>2026-03-14T17:13:18+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="es">&lt;figure class=&quot;wp-block-embed is-type-rich is-provider-gestor-del-servicio wp-block-embed-gestor-del-servicio wp-embed-aspect-16-9 wp-has-aspect-ratio&quot;&gt;&lt;div class=&quot;wp-block-embed__wrapper&quot;&gt;

&lt;/div&gt;&lt;/figure&gt;</content>
	<author>
	  <name>Jesus Palencia</name>
	   <uri>https://sinfallas.wordpress.com</uri> 
	</author>
	<source>
	  <title type="html">El Blog de Sinfallas</title>
	  <subtitle type="html">Un chupanibre oculto entre la humanidad...</subtitle>
	  <link rel="self" href="https://sinfallas.wordpress.com/feed/"/>
	  <id>https://sinfallas.wordpress.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 告别熬夜憋稿！UOS AI 写作重磅上线，每个字都长在需求上</title>
	<link href="https://www.deepin.org/en/uos-ai-2-13-600/"/>
	<id>https://www.deepin.org/?p=38472</id>
	<updated>2026-03-13T02:58:41+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Fedora 42 approaching end of life</title>
	<link href="https://www.qubes-os.org/news/2026/03/13/fedora-42-approaching-end-of-life/"/>
	<id>https://www.qubes-os.org/news/2026/03/13/fedora-42-approaching-end-of-life/</id>
	<updated>2026-03-13T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;Fedora 42 is currently &lt;a href=&quot;https://fedorapeople.org/groups/schedule/f-42/f-42-key-tasks.html&quot;&gt;scheduled&lt;/a&gt; to reach &lt;a href=&quot;https://fedoraproject.org/wiki/End_of_life&quot;&gt;end of life (EOL)&lt;/a&gt; on 2026-05-13 (two months from the date of this announcement). Please upgrade all of your Fedora templates and standalones by that date. For more information, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html#upgrading-to-avoid-eol&quot;&gt;Upgrading to avoid EOL&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;There are two ways to upgrade a template to a new Fedora release:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html#installing&quot;&gt;Install a new template to replace an existing one.&lt;/a&gt; This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/templates.html#switching&quot;&gt;switch everything that was set to the old template to the new template&lt;/a&gt;. If you choose to modify your template, you may wish to write those modifications down so that you remember what to redo on each fresh install. To see a log of package manager actions, open a terminal in the old Fedora template and use the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dnf history&lt;/code&gt; command.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Advanced:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora-upgrade.html&quot;&gt;Perform an in-place upgrade of an existing Fedora template.&lt;/a&gt; This option will preserve any modifications you’ve made to the template, but it may be more complicated for less experienced users.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Please note that no user action is required regarding the OS version in dom0 (see our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#note-on-dom0-and-eol&quot;&gt;note on dom0 and EOL&lt;/a&gt;).&lt;/p&gt;</content>
	<author>
	  <name>Qubes</name>
	   <uri>https://www.qubes-os.org/</uri> 
	</author>
	<source>
	  <title type="html">Qubes OS</title>
	  <subtitle type="html">Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.</subtitle>
	  <link rel="self" href="https://www.qubes-os.org/feed.xml"/>
	  <id>https://www.qubes-os.org/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Qubes Canary 046</title>
	<link href="https://www.qubes-os.org/news/2026/03/13/canary-046/"/>
	<id>https://www.qubes-os.org/news/2026/03/13/canary-046/</id>
	<updated>2026-03-13T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;We have published &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/99de73321da9a2ce56a5d319bb1657fb30657fd5/canaries/canary-046-2026.txt&quot;&gt;Qubes Canary 046&lt;/a&gt;. The text of this canary and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this canary, please see the end of this announcement.&lt;/p&gt;

&lt;h2 id=&quot;qubes-canary-046&quot;&gt;Qubes Canary 046&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;
                    ---===[ Qubes Canary 046 ]===---


Statements
-----------

The Qubes security team members who have digitally signed this file [1]
state the following:

1. The date of issue of this canary is March 12, 2026.

2. There have been 109 Qubes security bulletins published so far.

3. The Qubes Master Signing Key fingerprint is:

       427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494

4. No warrants have ever been served to us with regard to the Qubes OS
   Project (e.g. to hand out the private signing keys or to introduce
   backdoors).

5. We plan to publish the next of these canary statements in the first
   fourteen days of June 2026. Special note should be taken if no new
   canary is published by that time or if the list of statements changes
   without plausible explanation.


Special announcements
----------------------

None.


Disclaimers and notes
----------------------

We would like to remind you that Qubes OS has been designed under the
assumption that all relevant infrastructure is permanently compromised.
This means that we assume NO trust in any of the servers or services
which host or provide any Qubes-related data, in particular, software
updates, source code repositories, and Qubes ISO downloads.

This canary scheme is not infallible. Although signing the declaration
makes it very difficult for a third party to produce arbitrary
declarations, it does not prevent them from using force or other means,
like blackmail or compromising the signers&#39; laptops, to coerce us to
produce false declarations.

The proof of freshness provided below serves to demonstrate that this
canary could not have been created prior to the date stated. It shows
that a series of canaries was not created in advance.

This declaration is merely a best effort and is provided without any
guarantee or warranty. It is not legally binding in any way to anybody.
None of the signers should be ever held legally responsible for any of
the statements made here.


Proof of freshness
-------------------

Thu, 12 Mar 2026 11:22:20 +0000

Source: DER SPIEGEL - International (https://www.spiegel.de/international/index.rss)
Insta, TikTok and Co.: Is Australia&#39;s Social Media Ban for Children Actually Working?
&quot;Reckless, Suicidal Race&quot;: The Deadly Threat Posed by Artificial Intelligence
Portrait of a City after Four Years of War: The Courage of Kyiv
U.S. Historian Robert Kagan: &quot;We Are Watching a Country Fall Under Dictatorship Almost Without Resistance&quot;
Nord Stream: How Early Did the CIA Know about the Pipeline Attack?

Source: NYT &amp;gt; World News (https://rss.nytimes.com/services/xml/rss/nyt/World.xml)
Iran War Live Updates: Iraq Closes Oil Terminals Amid Growing Disruption to Global Supplies
Trump’s Iran War Is Causing Problems For His Ally in Italy, Giorgia Meloni
How Russia’s Scorched-Earth Attacks Put Ukraine’s Power Grid Near Collapse
China Wants Its Ethnic Minorities to Blend In. Now It’s the Law.
At China’s Big Political Meeting, a Rare Debate About Inequality

Source: BBC News (https://feeds.bbci.co.uk/news/world/rss.xml)
China approves &#39;ethnic unity&#39; law requiring minorities to learn Mandarin
Epstein used modelling agent to recruit girls, Brazilian women tell BBC
War in Ukraine spills into Hungarian election campaign
Noma head chef resigns from restaurant amid abuse allegations
Hozier, Jessie Buckley and Bruce Springsteen record Shane MacGowan tribute album

Source: Blockchain.info
000000000000000000017245ca11dddd962050ba2ce7fb38f0ab6a10d4a9cf00


Footnotes
----------

[1] This file should be signed in two ways: (1) via detached PGP
signatures by each of the signers, distributed together with this canary
in the qubes-secpack.git repo, and (2) via digital signatures on the
corresponding qubes-secpack.git repo tags. [2]

[2] Don&#39;t just trust the contents of this file blindly! Verify the
digital signatures! Instructions for doing so are documented here:
https://www.qubes-os.org/security/pack/

--
The Qubes Security Team
https://www.qubes-os.org/security/

&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/99de73321da9a2ce56a5d319bb1657fb30657fd5/canaries/canary-046-2026.txt&quot;&gt;canary-046-2026.txt&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;marek-marczykowski-góreckis-pgp-signature&quot;&gt;&lt;a href=&quot;https://www.qubes-os.org/team/#marek-marczykowski-górecki&quot;&gt;Marek Marczykowski-Górecki&lt;/a&gt;’s PGP signature&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;-----BEGIN PGP SIGNATURE-----
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=7wSH
-----END PGP SIGNATURE-----
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/99de73321da9a2ce56a5d319bb1657fb30657fd5/canaries/canary-046-2026.txt.sig.marmarek&quot;&gt;canary-046-2026.txt.sig.marmarek&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;simon-gaiser-aka-hw42s-pgp-signature&quot;&gt;&lt;a href=&quot;https://www.qubes-os.org/team/#simon-gaiser-aka-hw42&quot;&gt;Simon Gaiser (aka HW42)&lt;/a&gt;’s PGP signature&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;-----BEGIN PGP SIGNATURE-----
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=DV9o
-----END PGP SIGNATURE-----
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/99de73321da9a2ce56a5d319bb1657fb30657fd5/canaries/canary-046-2026.txt.sig.simon&quot;&gt;canary-046-2026.txt.sig.simon&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;what-is-the-purpose-of-this-announcement&quot;&gt;What is the purpose of this announcement?&lt;/h2&gt;

&lt;p&gt;The purpose of this announcement is to inform the Qubes community that a new Qubes canary has been published.&lt;/p&gt;

&lt;h2 id=&quot;what-is-a-qubes-canary&quot;&gt;What is a Qubes canary?&lt;/h2&gt;

&lt;p&gt;A &lt;a href=&quot;https://www.qubes-os.org/security/canary/&quot;&gt;Qubes canary&lt;/a&gt; is a security announcement periodically issued by the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security.html#qubes-security-team&quot;&gt;Qubes security team&lt;/a&gt; consisting of several statements to the effect that the signers of the canary have not been compromised. The idea is that, as long as signed canaries including such statements continue to be published, all is well. However, if the canaries should suddenly cease, if one or more signers begin declining to sign them, or if the included statements change significantly without plausible explanation, then this may indicate that something has gone wrong.&lt;/p&gt;

&lt;p&gt;The name originates from the practice in which miners would bring caged canaries into coal mines. If the level of methane gas in the mine reached a dangerous level, the canary would die, indicating to miners that they should evacuate. (See the &lt;a href=&quot;https://en.wikipedia.org/wiki/Warrant_canary&quot;&gt;Wikipedia article on warrant canaries&lt;/a&gt; for more information, but bear in mind that Qubes Canaries are not strictly limited to legal warrants.)&lt;/p&gt;

&lt;h2 id=&quot;why-should-i-care-about-canaries&quot;&gt;Why should I care about canaries?&lt;/h2&gt;

&lt;p&gt;Canaries provide an important indication about the security status of the project. If the canary is healthy, it’s a strong sign that things are running normally. However, if the canary is unhealthy, it could mean that the project or its members are being coerced in some way.&lt;/p&gt;

&lt;h2 id=&quot;what-are-some-signs-of-an-unhealthy-canary&quot;&gt;What are some signs of an unhealthy canary?&lt;/h2&gt;

&lt;p&gt;Here is a non-exhaustive list of examples:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Dead canary.&lt;/strong&gt; In each canary, we state a window of time during which you should expect the next canary to be published. If no canary is published within that window of time and no good explanation is provided for missing the deadline, then the canary has died.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Missing statement(s).&lt;/strong&gt; Canaries include a set of numbered statements at the top. These statements are generally the same across canaries, except for specific numbers and dates that have changed since the previous canary. If an important statement was present in older canaries but suddenly goes missing from new canaries with no correction or explanation, then this may be an indication that the signers can no longer truthfully make that statement.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Missing signature(s).&lt;/strong&gt; Qubes canaries are signed by the members of the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security.html#qubes-security-team&quot;&gt;Qubes security team&lt;/a&gt; (see below). If one of them has been signing all canaries but suddenly and permanently stops signing new canaries without any explanation, then this may indicate that this person is under duress or can no longer truthfully sign the statements contained in the canary.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;does-every-unexpected-or-unusual-occurrence-related-to-a-canary-indicate-something-bad&quot;&gt;Does every unexpected or unusual occurrence related to a canary indicate something bad?&lt;/h2&gt;

&lt;p&gt;No, there are many canary-related possibilities that should &lt;em&gt;not&lt;/em&gt; worry you. Here is a non-exhaustive list of examples:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Unusual reposts.&lt;/strong&gt; The only canaries that matter are the ones that are validly signed in the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security-pack.html&quot;&gt;Qubes security pack (qubes-secpack)&lt;/a&gt;. Reposts of canaries (like the one in this announcement) do not have any authority (except insofar as they reproduce validly-signed text from the qubes-secpack). If the actual canary in the qubes-secpack is healthy, but reposts are late, absent, or modified on the website, mailing lists, forum, or social media platforms, you should not be concerned about the canary.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Last-minute signature(s).&lt;/strong&gt; If the canary is signed at the last minute but before the deadline, that’s okay. (People get busy and procrastinate sometimes.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Signatures at different times.&lt;/strong&gt; If one signature is earlier or later than the other, but both are present within a reasonable period of time, that’s okay. (For example, sometimes one signer is out of town, but we try to plan the deadlines around this.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Permitted changes.&lt;/strong&gt; If something about a canary changes without violating any of the statements in prior canaries, that’s okay. (For example, canaries are usually scheduled for the first fourteen days of a given month, but there’s no rule that says they have to be.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Unusual but planned changes.&lt;/strong&gt; If something unusual happens, but it was announced in advance, and the appropriate statements are signed, that’s okay (e.g., when Joanna left the security team and Simon joined it).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In general, it would not be realistic for an organization to exist that never changed, had zero turnover, and never made mistakes. Therefore, it would be reasonable to expect such events to occur periodically, and it would be unreasonable to regard &lt;em&gt;every&lt;/em&gt; unusual or unexpected canary-related event as a sign of compromise. For example, if something usual happens with a canary, and we say it was a mistake and correct it (with valid signatures), you will have to decide for yourself whether it’s more likely that it really was just a mistake or that something is wrong and that this is how we chose to send you a subtle signal about it. This will require you to think carefully about which among many possible scenarios is most likely given the evidence available to you. Since this is fundamentally a matter of judgment, canaries are ultimately a &lt;em&gt;social&lt;/em&gt; scheme, not a technical one.&lt;/p&gt;

&lt;h2 id=&quot;what-are-the-pgp-signatures-that-accompany-canaries&quot;&gt;What are the PGP signatures that accompany canaries?&lt;/h2&gt;

&lt;p&gt;A &lt;a href=&quot;https://en.wikipedia.org/wiki/Pretty_Good_Privacy&quot;&gt;PGP&lt;/a&gt; signature is a cryptographic &lt;a href=&quot;https://en.wikipedia.org/wiki/Digital_signature&quot;&gt;digital signature&lt;/a&gt; made in accordance with the &lt;a href=&quot;https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP&quot;&gt;OpenPGP&lt;/a&gt; standard. PGP signatures can be cryptographically verified with programs like &lt;a href=&quot;https://en.wikipedia.org/wiki/GNU_Privacy_Guard&quot;&gt;GNU Privacy Guard (GPG)&lt;/a&gt;. The Qubes security team cryptographically signs all canaries so that Qubes users have a reliable way to check whether canaries are genuine. The only way to be certain that a canary is authentic is by verifying its PGP signatures.&lt;/p&gt;

&lt;h2 id=&quot;why-should-i-care-whether-a-canary-is-authentic&quot;&gt;Why should I care whether a canary is authentic?&lt;/h2&gt;

&lt;p&gt;If you fail to notice that a canary is unhealthy or has died, you may continue to trust the Qubes security team even after they have signaled via the canary (or lack thereof) that they been compromised or coerced.&lt;/p&gt;

&lt;p&gt;Alternatively, an adversary could fabricate a canary in an attempt to deceive the public. Such a canary would not be validly signed, but users who neglect to check the signatures on the fake canary would not be aware of this, so they may mistakenly believe it to be genuine, especially if it closely mimics the language of authentic canaries. Such falsified canaries could include manipulated text designed to sow fear, uncertainty, and doubt about the security of Qubes OS or the status of the Qubes OS Project.&lt;/p&gt;

&lt;h2 id=&quot;how-do-i-verify-the-pgp-signatures-on-a-canary&quot;&gt;How do I verify the PGP signatures on a canary?&lt;/h2&gt;

&lt;p&gt;The following command-line instructions assume a Linux system with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;git&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg&lt;/code&gt; installed. (For Windows and Mac options, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#openpgp-software&quot;&gt;OpenPGP software&lt;/a&gt;.)&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Obtain the Qubes Master Signing Key (QMSK), e.g.:&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--fetch-keys&lt;/span&gt; https://keys.qubes-os.org/keys/qubes-master-signing-key.asc
&lt;span class=&quot;go&quot;&gt;gpg: directory &#39;/home/user/.gnupg&#39; created
gpg: keybox &#39;/home/user/.gnupg/pubring.kbx&#39; created
gpg: requesting key from &#39;https://keys.qubes-os.org/keys/qubes-master-signing-key.asc&#39;
gpg: /home/user/.gnupg/trustdb.gpg: trustdb created
gpg: key DDFA1A3E36879494: public key &quot;Qubes Master Signing Key&quot; imported
gpg: Total number processed: 1
gpg:               imported: 1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;(For more ways to obtain the QMSK, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-import-and-authenticate-the-qubes-master-signing-key&quot;&gt;How to import and authenticate the Qubes Master Signing Key&lt;/a&gt;.)&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;View the fingerprint of the PGP key you just imported. (Note: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg&amp;gt;&lt;/code&gt; indicates a prompt inside of the GnuPG program. Type what appears after it when prompted.)&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--edit-key&lt;/span&gt; 0x427F11FD0FAA4B080123F01CDDFA1A3E36879494
&lt;span class=&quot;gp&quot;&gt;gpg (GnuPG) 2.2.27;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;Copyright &lt;span class=&quot;o&quot;&gt;(&lt;/span&gt;C&lt;span class=&quot;o&quot;&gt;)&lt;/span&gt; 2021 Free Software Foundation, Inc.
&lt;span class=&quot;go&quot;&gt;This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
   
   
pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: unknown       validity: unknown
[ unknown] (1). Qubes Master Signing Key
   
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;fpr
&lt;span class=&quot;go&quot;&gt;pub   rsa4096/DDFA1A3E36879494 2010-04-01 Qubes Master Signing Key
 Primary key fingerprint: 427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt; At this point, you still don’t know whether the key you just imported is the genuine QMSK or a forgery. In order for this entire procedure to provide meaningful security benefits, you &lt;em&gt;must&lt;/em&gt; authenticate the QMSK out-of-band. &lt;strong&gt;Do not skip this step!&lt;/strong&gt; The standard method is to obtain the QMSK fingerprint from &lt;em&gt;multiple independent sources in several different ways&lt;/em&gt; and check to see whether they match the key you just imported. For more information, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-import-and-authenticate-the-qubes-master-signing-key&quot;&gt;How to import and authenticate the Qubes Master Signing Key&lt;/a&gt;.&lt;/p&gt;

    &lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; After you have authenticated the QMSK out-of-band to your satisfaction, record the QMSK fingerprint in a safe place (or several) so that you don’t have to repeat this step in the future.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Once you are satisfied that you have the genuine QMSK, set its trust level to 5 (“ultimate”), then quit GnuPG with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;q&lt;/code&gt;.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;trust
&lt;span class=&quot;go&quot;&gt;pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: unknown       validity: unknown
[ unknown] (1). Qubes Master Signing Key
   
Please decide how far you trust this user to correctly verify other users&#39; keys
(by looking at passports, checking fingerprints from different sources, etc.)
   
  1 = I don&#39;t know or won&#39;t say
  2 = I do NOT trust
  3 = I trust marginally
  4 = I trust fully
  5 = I trust ultimately
  m = back to the main menu
   
Your decision? 5
Do you really want to set this key to ultimate trust? (y/N) y
   
pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: ultimate      validity: unknown
[ unknown] (1). Qubes Master Signing Key
Please note that the shown key validity is not necessarily correct
unless you restart the program.
   
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;q
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Use Git to clone the qubes-secpack repo.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;git clone https://github.com/QubesOS/qubes-secpack.git
&lt;span class=&quot;go&quot;&gt;Cloning into &#39;qubes-secpack&#39;...
remote: Enumerating objects: 4065, done.
remote: Counting objects: 100% (1474/1474), done.
remote: Compressing objects: 100% (742/742), done.
remote: Total 4065 (delta 743), reused 1413 (delta 731), pack-reused 2591
Receiving objects: 100% (4065/4065), 1.64 MiB | 2.53 MiB/s, done.
Resolving deltas: 100% (1910/1910), done.
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Import the included PGP keys. (See our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security-pack.html#pgp-key-policies&quot;&gt;PGP key policies&lt;/a&gt; for important information about these keys.)&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--import&lt;/span&gt; qubes-secpack/keys/&lt;span class=&quot;k&quot;&gt;*&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;*&lt;/span&gt;
&lt;span class=&quot;go&quot;&gt;gpg: key 063938BA42CFA724: public key &quot;Marek Marczykowski-Górecki (Qubes OS signing key)&quot; imported
gpg: qubes-secpack/keys/core-devs/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key 8C05216CE09C093C: 1 signature not checked due to a missing key
gpg: key 8C05216CE09C093C: public key &quot;HW42 (Qubes Signing Key)&quot; imported
gpg: key DA0434BC706E1FCF: public key &quot;Simon Gaiser (Qubes OS signing key)&quot; imported
gpg: key 8CE137352A019A17: 2 signatures not checked due to missing keys
gpg: key 8CE137352A019A17: public key &quot;Andrew David Wong (Qubes Documentation Signing Key)&quot; imported
gpg: key AAA743B42FBC07A9: public key &quot;Brennan Novak (Qubes Website &amp;amp; Documentation Signing)&quot; imported
gpg: key B6A0BB95CA74A5C3: public key &quot;Joanna Rutkowska (Qubes Documentation Signing Key)&quot; imported
gpg: key F32894BE9684938A: public key &quot;Marek Marczykowski-Górecki (Qubes Documentation Signing Key)&quot; imported
gpg: key 6E7A27B909DAFB92: public key &quot;Hakisho Nukama (Qubes Documentation Signing Key)&quot; imported
gpg: key 485C7504F27D0A72: 1 signature not checked due to a missing key
gpg: key 485C7504F27D0A72: public key &quot;Sven Semmler (Qubes Documentation Signing Key)&quot; imported
gpg: key BB52274595B71262: public key &quot;unman (Qubes Documentation Signing Key)&quot; imported
gpg: key DC2F3678D272F2A8: 1 signature not checked due to a missing key
gpg: key DC2F3678D272F2A8: public key &quot;Wojtek Porczyk (Qubes OS documentation signing key)&quot; imported
gpg: key FD64F4F9E9720C4D: 1 signature not checked due to a missing key
gpg: key FD64F4F9E9720C4D: public key &quot;Zrubi (Qubes Documentation Signing Key)&quot; imported
gpg: key DDFA1A3E36879494: &quot;Qubes Master Signing Key&quot; not changed
gpg: key 1848792F9E2795E9: public key &quot;Qubes OS Release 4 Signing Key&quot; imported
gpg: qubes-secpack/keys/release-keys/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key D655A4F21830E06A: public key &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; imported
gpg: key ACC2602F3F48CB21: public key &quot;Qubes OS Security Team&quot; imported
gpg: qubes-secpack/keys/security-team/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key 4AC18DE1112E1490: public key &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; imported
gpg: Total number processed: 17
gpg:               imported: 16
gpg:              unchanged: 1
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   1  signed:   6  trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: depth: 1  valid:   6  signed:   0  trust: 6-, 0q, 0n, 0m, 0f, 0u
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Verify signed Git tags.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd &lt;/span&gt;qubes-secpack/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;git tag &lt;span class=&quot;nt&quot;&gt;-v&lt;/span&gt; &lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;git describe&lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;
&lt;span class=&quot;go&quot;&gt;object 266e14a6fae57c9a91362c9ac784d3a891f4d351
type commit
tag marmarek_sec_266e14a6
tagger Marek Marczykowski-Górecki 1677757924 +0100
   
Tag for commit 266e14a6fae57c9a91362c9ac784d3a891f4d351
gpg: Signature made Thu 02 Mar 2023 03:52:04 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;The exact output will differ, but the final line should always start with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg: Good signature from...&lt;/code&gt; followed by an appropriate key. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;[full]&lt;/code&gt; indicates full trust, which this key inherits in virtue of being validly signed by the QMSK.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Verify PGP signatures, e.g.:&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd &lt;/span&gt;QSBs/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; qsb-087-2022.txt.sig.marmarek qsb-087-2022.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Wed 23 Nov 2022 04:05:51 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; qsb-087-2022.txt.sig.simon qsb-087-2022.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Wed 23 Nov 2022 03:50:42 AM PST
gpg:                using RSA key EA18E7F040C41DDAEFE9AA0F4AC18DE1112E1490
gpg: Good signature from &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd&lt;/span&gt; ../canaries/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; canary-034-2023.txt.sig.marmarek canary-034-2023.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Thu 02 Mar 2023 03:51:48 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; canary-034-2023.txt.sig.simon canary-034-2023.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Thu 02 Mar 2023 01:47:52 AM PST
gpg:                using RSA key EA18E7F040C41DDAEFE9AA0F4AC18DE1112E1490
gpg: Good signature from &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; [full]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;Again, the exact output will differ, but the final line of output from each &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg --verify&lt;/code&gt; command should always start with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg: Good signature from...&lt;/code&gt; followed by an appropriate key.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For this announcement (Qubes Canary 046), the commands are:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;$ gpg --verify canary-046-2026.txt.sig.marmarek canary-046-2026.txt
$ gpg --verify canary-046-2026.txt.sig.simon canary-046-2026.txt
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;You can also verify the signatures directly from this announcement in addition to or instead of verifying the files from the qubes-secpack. Simply copy and paste the Qubes Canary 046 text into a plain text file and do the same for both signature files. Then, perform the same authentication steps as listed above, substituting the filenames above with the names of the files you just created.&lt;/p&gt;</content>
	<author>
	  <name>Qubes</name>
	   <uri>https://www.qubes-os.org/</uri> 
	</author>
	<source>
	  <title type="html">Qubes OS</title>
	  <subtitle type="html">Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.</subtitle>
	  <link rel="self" href="https://www.qubes-os.org/feed.xml"/>
	  <id>https://www.qubes-os.org/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">OWASP CRS and Fail Fast: Improving Attack Detection in WAFs and Reverse Proxies</title>
	<link href="https://www.skudonet.com/blog/owasp-crs-and-fail-fast-improving-attack-detection-in-wafs-and-reverse-proxies/"/>
	<id>https://www.skudonet.com/?p=76861</id>
	<updated>2026-03-12T17:23:03+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In web application security, &lt;/span&gt;&lt;b&gt;detecting attacks as early as possible is critical&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; Every millisecond that a malicious request travels through an infrastructure increases backend exposure and consumes unnecessary resources.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Web Application Firewalls (WAFs) based on the &lt;/span&gt;&lt;b&gt;OWASP Core Rule Set (CRS)&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; have become one of the most widely used mechanisms to protect applications against attacks such as:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;SQL Injection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Command Injection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Path Traversal&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Remote Code Execution&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Cross-Site Scripting (XSS)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;However, when these rules are integrated into &lt;/span&gt;&lt;b&gt;modern high-performance reverse proxies&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, a limitation appears due to the historical processing model inherited from &lt;/span&gt;&lt;b&gt;ModSecurity&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In this article we will analyze:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;how the OWASP CRS inspection pipeline works&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;what issue appears in modern reverse proxies&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;how applying the &lt;/span&gt;&lt;b&gt;fail fast principle&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; can improve security&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;We will also explain how &lt;/span&gt;&lt;b&gt;SKUDONET has implemented this approach to stop attacks as early as possible in the WAF data path&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In perimeter security, &lt;/span&gt;&lt;b&gt;stopping an attack one step earlier in the data flow can make a critical difference&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why OWASP CRS Remains the Standard for WAF Protection&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The &lt;/span&gt;&lt;a href=&quot;https://github.com/coreruleset/coreruleset&quot; rel=&quot;noopener nofollow&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;OWASP Core Rule Set (CRS)&lt;/b&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; is one of the most widely used rule sets for Web Application Firewalls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;It is built on &lt;/span&gt;&lt;b&gt;ModSecurity&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; and provides predefined rules designed to detect patterns associated with common vulnerabilities, particularly those included in the &lt;/span&gt;&lt;b&gt;OWASP Top 10&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Among the threats it can detect are:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;SQL injection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Cross-site scripting&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Remote command execution&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Path traversal&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;protocol anomalies&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;malicious bots&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The goal of OWASP CRS is to &lt;/span&gt;&lt;b&gt;analyze every HTTP request before it reaches the backend&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, blocking malicious patterns through an &lt;/span&gt;&lt;b&gt;anomaly scoring system&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This model has proven effective for years, but it was designed at a time when most proxies &lt;/span&gt;&lt;b&gt;did not operate in high-performance streaming mode&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;How the OWASP CRS Inspection Pipeline Works &lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;The ModSecurity Phase Model&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;OWASP CRS follows the &lt;/span&gt;&lt;b&gt;ModSecurity inspection model&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, which divides the analysis of an HTTP request into several phases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Simplified pipeline:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-1-Como-funciona-el-pipeline-de-inspeccion-de-OWASP-CRS-1.jpg&quot;&gt;&lt;img alt=&quot;pipeline-de-inspección-de-OWASP-CRS&quot; class=&quot;borde-negro alignnone wp-image-76886 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-1-Como-funciona-el-pipeline-de-inspeccion-de-OWASP-CRS-1.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Each phase analyzes a different part of the traffic.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Phase 1&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Analyzes information available immediately:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;HTTP headers&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;URI&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;query string&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;request metadata&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Phase 2&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Analyzes the full content of the request:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;request body&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;POST parameters&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;JSON&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;XML&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;complex payloads&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This approach works well for deep inspection, but it introduces an important consequence.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;A Subtle Issue in OWASP CRS&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Within OWASP CRS there are rules that analyze variables available &lt;/span&gt;&lt;b&gt;from the very beginning of the request&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, such as:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;ARGS_GET&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;REQUEST_URI&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;QUERY_STRING&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;However, many of these rules &lt;/span&gt;&lt;b&gt;are executed in Phase 2&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This means that a request such as:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;GET /login.php?user=admin’ OR ‘1’=’1 HTTP/1.1&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Host: example.com&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;contains a &lt;/span&gt;&lt;b&gt;SQL injection clearly visible in the URL&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, yet it may not be evaluated until &lt;/span&gt;&lt;b&gt;Phase 2&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;From a security perspective, this raises an obvious question:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;If the attack is already detectable in Phase 1, why wait until Phase 2 to block it?&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Security Principle: Fail Fast&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In system architecture there is a fundamental principle:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fail Fast&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;A system should &lt;/span&gt;&lt;b&gt;detect invalid conditions as early as possible in the execution flow&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Applied to a WAF, this means:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;An attack should be stopped as soon as it becomes detectable.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Not later.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;How Modern High-Performance Reverse Proxies Work&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Modern reverse proxies are designed to reduce:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;latency&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;memory consumption&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;buffering&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;To achieve this, many proxies operate in &lt;/span&gt;&lt;b&gt;streaming mode&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;An efficient proxy may process a request in the following way:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Receive HTTP headers&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Analyze them&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Immediately forward them to the backend&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Later receive the request body&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Analyze and forward it&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Simplified flow:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-2-Como-funcionan-los-proxies-inversos-modernos-de-alto-rendimiento.jpg&quot;&gt;&lt;img alt=&quot;REVERSE PROXY HIGH-PERFORMANCE PROCESSING PIPELINE&quot; class=&quot;borde-negro alignnone wp-image-76872 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-2-Como-funcionan-los-proxies-inversos-modernos-de-alto-rendimiento.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;But when combined with OWASP CRS, a problem appears.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Conflict Between High-Performance Proxies and OWASP CRS&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;If the proxy operates in streaming mode while OWASP CRS follows its traditional model:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;b&gt;WAF Phase 1 executes&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; (but the full evaluation is completed in Phase 2)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Headers are forwarded to the backend&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The request body arrives later&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;b&gt;WAF Phase 2 executes&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;,&lt;/span&gt; (completing the evaluation started in Phase 1).&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The body is forwarded to the backend&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This means the backend may receive part of the request &lt;/span&gt;&lt;b&gt;before the WAF has made the final decision&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;From a security perspective, this is &lt;/span&gt;&lt;b&gt;suboptimal&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Architecture Comparison: Traditional Pipeline vs Fail Fast&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;High-Performance Proxy with Traditional CRS &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-3-Pipeline-tradicional-con-CRS.jpg&quot;&gt;&lt;img alt=&quot;TRADITIONAL WAF PIPELINE &quot; class=&quot;borde-negro alignnone wp-image-76873 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-3-Pipeline-tradicional-con-CRS.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Result:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;the backend has already received traffic&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;part of the attack has already progressed through the infrastructure&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Fail Fast Pipeline &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-4-Pipeline-con-enfoque-Fail-Fast.jpg&quot;&gt;&lt;img alt=&quot;SKUDONET FAIL FAST WAF &quot; class=&quot;borde-negro alignnone wp-image-76874 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-4-Pipeline-con-enfoque-Fail-Fast.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In this model, the attack is stopped &lt;/span&gt;&lt;b&gt;at the earliest possible point in the data path&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Applying the SKUDONET Fail Fast Approach to the WAF&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;To address this problem, &lt;/span&gt;&lt;b&gt;SKUDONET implemented an approach based on the fail fast principle&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The idea is simple:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;If an attack can be detected in Phase 1, it should be evaluated in Phase 1.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This requires partially reorganizing the logic of OWASP CRS rules.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Technical Example: CRS Rules That Can Be Evaluated Earlier&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;A simplified CRS rule example might look like this:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;SecRule ARGS_GET “@detectSQLi” \&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;“id:942100,\&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;phase:2,\&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;block,\&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;msg:’SQL Injection Attack Detected&#39;”&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Here we see the key issue:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;phase:2&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Even if the attack pattern appears in the URL, the rule may execute later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Conceptually, an early detection could be evaluated like this:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;SecRule REQUEST_URI “@detectSQLi” \&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;“id:942100,\&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;phase:1,\&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;block”&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This allows attacks to be detected &lt;/span&gt;&lt;b&gt;before the traffic progresses through the processing pipeline&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Want to see how this works in practice?&lt;/p&gt;
&lt;p&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;Try the SKUDONET WAF Demo&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;b&gt;Early Evaluation (Phase 1) &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;At this stage the WAF analyzes elements available from the start of the request:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;headers&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;URL&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;query string&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Examples of early detection include:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;SQL injection in the URL&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;command injection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;path traversal&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;header anomalies&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Simplified flow:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-5-Evaluacion-temprana-fase-1.jpg&quot;&gt;&lt;img alt=&quot;SKUDONET WAF PHASE 1&quot; class=&quot;borde-negro alignnone wp-image-76875 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-5-Evaluacion-temprana-fase-1.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;If the attack is detected here, &lt;/span&gt;&lt;b&gt;the request never reaches the backend&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Deep Evaluation (Phase 2) &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;When the body arrives, the second inspection phase runs:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-6-Evaluacion-profunda-fase-2.jpg&quot;&gt;&lt;img alt=&quot;SKUDONET WAF PHASE 2&quot; class=&quot;borde-negro alignnone wp-image-76876 size-full&quot; height=&quot;787&quot; src=&quot;https://www.skudonet.com/wp-content/uploads/2026/03/Grafico-6-Evaluacion-profunda-fase-2.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This phase enables the detection of &lt;/span&gt;&lt;b&gt;more complex attack patterns&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;OWASP CRS remains one of the most important tools for protecting web applications.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;However, when deployed in &lt;/span&gt;&lt;b&gt;modern high-performance architectures&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, the traditional phase model may introduce certain limitations, particularly in environments where reverse proxies operate in streaming mode.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The &lt;/span&gt;&lt;b&gt;fail fast principle&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; offers a clear solution:&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; detect attacks as early as possible in the processing flow and block them before they progress through the infrastructure.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;This approach allows organizations to:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;identify threats in early stages of the request&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;reduce backend exposure&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;improve the overall efficiency of the security system&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In modern infrastructures, &lt;/span&gt;&lt;b&gt;every millisecond matters&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; And in perimeter security, &lt;/span&gt;&lt;b&gt;stopping an attack one step earlier can make all the difference&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Platforms like &lt;/span&gt;&lt;b&gt;SKUDONET apply this fail fast approach directly within the reverse proxy pipeline&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, allowing attacks to be stopped as early as possible in the WAF data path.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;FAQ&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;What is fail fast in cybersecurity?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Fail fast is a design principle where systems detect invalid or malicious conditions as early as possible. In WAF architectures, this means identifying and blocking malicious requests at the earliest stage of the inspection pipeline.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What is OWASP CRS?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;OWASP Core Rule Set (CRS) is a collection of security rules used by Web Application Firewalls to detect common web attacks such as SQL injection, cross-site scripting (XSS), and command injection.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Why can OWASP CRS delay attack detection?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Some OWASP CRS rules analyze request parameters during Phase 2 of the ModSecurity inspection model, even when malicious patterns may already be visible earlier in the request lifecycle.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Why is the fail fast principle important for reverse proxies?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;High-performance reverse proxies often forward HTTP headers to the backend before the full request body is received. Detecting attacks early prevents malicious requests from reaching backend services and reduces unnecessary resource consumption.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What role does a WAF play in an ADC?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In modern Application Delivery Controllers (ADC), the Web Application Firewall is integrated directly into the Layer-7 proxy pipeline, allowing malicious traffic to be inspected and blocked before it reaches application servers.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;See Fail Fast WAF Protection in Action&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;If you want to see how the fail fast approach works in a real reverse proxy environment, you can test the SKUDONET platform.&lt;/p&gt;
&lt;p&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;Start the SKUDONET Demo&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;</content>
	<author>
	  <name>Isabel Perez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">deepin App Store Upgraded!</title>
	<link href="https://www.deepin.org/en/app-store-9-0-3/"/>
	<id>https://www.deepin.org/?p=38457</id>
	<updated>2026-03-12T02:54:12+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">deepin, a prominent open-source operating system recognized globally with an impressive ranking on DistroWatch, consistently focuses on optimizing the desktop experience. Recently, the official App Store has completed a new round of upgrades. This all-in-one application management platform now features over 100,000 commonly used applications spanning scenarios like office work, daily life, and entertainment. These officially verified, reliable resources comprehensively meet the needs of both individual and enterprise users, ensuring safety and peace of mind. This upgrade focuses on practical features, visual experience, and bug fixes. It delivers comprehensive enhancements across operational experience, ecosystem integration, interface layout, and management efficiency, ...&lt;a href=&quot;https://www.deepin.org/en/app-store-9-0-3/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Greenbone’s OPENVAS SCAN Now Covers Red Hat 10 and Rocky Linux 10 Security Advisories!</title>
	<link href="https://www.greenbone.net/en/blog/openvas-detects-rhel-10-and-rocky-linux-10/"/>
	<id>https://www.greenbone.net/?p=65150</id>
	<updated>2026-03-11T13:38:15+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Operating system (OS) security updates are critical for maintaining a strong enterprise security posture. OS vulnerabilities in on-prem and cloud assets, fleets of staff workstations, development environments, container hosts, virtualization platforms, and edge infrastructure may offer an attacker the initial access they need to execute a costly cyber attack. Linux, especially Red Hat Enterprise Linux […]</content>
	<author>
	  <name>Greenbone AG</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">MWC Barcelona 2026 Recap: Driving the Future of Open Networking</title>
	<link href="https://blog.vyos.io/mwc-barcelona-2026-recap"/>
	<id>https://blog.vyos.io/mwc-barcelona-2026-recap</id>
	<updated>2026-03-11T10:09:44+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;hs-featured-image-wrapper&quot;&gt; 
 &lt;a class=&quot;hs-featured-image-link&quot; href=&quot;https://blog.vyos.io/mwc-barcelona-2026-recap&quot; title=&quot;&quot;&gt; &lt;img alt=&quot;VyOS Networks ar MWC Barcelona 2026&quot; class=&quot;hs-featured-image&quot; src=&quot;https://blog.vyos.io/hubfs/1772643601293.jpg&quot; style=&quot;width: auto !important; float: left; margin: 0 15px 15px 0;&quot; /&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Another &lt;a href=&quot;https://vyos.io/mwc2026?utm_content=366963591&amp;amp;utm_medium=social&amp;amp;utm_source=linkedin&amp;amp;hss_channel=lcp-11041071&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;MWC Barcelona&lt;/span&gt;&lt;/a&gt; has come to an end, and what a strong week it was for &lt;span style=&quot;font-weight: bold;&quot;&gt;VyOS Networks. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;We were proud to be part of one of the most important global gatherings in telecom, cloud, and infrastructure, where we met with customers, partners, and industry leaders navigating familiar challenges: &lt;strong&gt;vendor lock-in&lt;/strong&gt;, &lt;strong&gt;licensing complexity&lt;/strong&gt;, fragmented tooling, and growing &lt;strong&gt;performance demands across cloud, edge, and on-prem environments&lt;/strong&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;That is exactly where VyOS continues to stand out.&lt;/strong&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/h2&gt;</content>
	<author>
	  <name>Gizem Yigit</name>
	   <email>g.yigit@vyos.io</email> 
	</author>
	<source>
	  <title type="html">VyOS - Blog</title>
	  <subtitle type="html">VyOS Platform Project news and updates 
All about development and project life in  our blog</subtitle>
	  <link rel="self" href="https://blog.vyos.io/rss.xml"/>
	  <id>https://blog.vyos.io</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 微信终于支持聊天记录导入导出，deepin 应用商店直接更</title>
	<link href="https://www.deepin.org/en/wechat-v4-1-1/"/>
	<id>https://www.deepin.org/?p=38445</id>
	<updated>2026-03-11T02:23:13+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">VyOS Project March 2026 Update</title>
	<link href="https://blog.vyos.io/vyos-project-march-2026-update"/>
	<id>https://blog.vyos.io/vyos-project-march-2026-update</id>
	<updated>2026-03-10T13:11:57+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;hs-featured-image-wrapper&quot;&gt; 
 &lt;a class=&quot;hs-featured-image-link&quot; href=&quot;https://blog.vyos.io/vyos-project-march-2026-update&quot; title=&quot;&quot;&gt; &lt;img alt=&quot;VyOS Product Update March 2026&quot; class=&quot;hs-featured-image&quot; src=&quot;https://blog.vyos.io/hubfs/vyos_mothly_update_march2026_blogpost.png&quot; style=&quot;width: auto !important; float: left; margin: 0 15px 15px 0;&quot; /&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! The somewhat belated development update that covers changes in the VyOS rolling release in February is finally here. A lot of our attention in February went to VyOS Stream 2026.02, promoting VyOS at MWC Barcelona 2026, and the ongoing work on VyOS 1.5.0. However, there are quite a few updates in rolling that are worth a mention, including support for background operations in the HTTP API, multiple VPP CLI design improvements, and a whole bunch of bug fixes.&lt;/p&gt;</content>
	<author>
	  <name>Daniil Baturin</name>
	   <email>daniil@sentrium.io</email> 
	</author>
	<source>
	  <title type="html">VyOS - Blog</title>
	  <subtitle type="html">VyOS Platform Project news and updates 
All about development and project life in  our blog</subtitle>
	  <link rel="self" href="https://blog.vyos.io/rss.xml"/>
	  <id>https://blog.vyos.io</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">R_evolution: a small webapp to explain Human Evolution</title>
	<link href="https://arc-team-open-research.blogspot.com/2026/03/revolution-small-webapp-to-explain.html"/>
	<id>tag:blogger.com,1999:blog-4458817758216594734.post-3300867034959183040</id>
	<updated>2026-03-09T16:14:25+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p style=&quot;text-align: justify;&quot;&gt; In 2023 I was invited to give a lecture on human evolution at our local high school (&lt;a href=&quot;https://liceorussell.eu/&quot;&gt;&lt;b&gt;Liceo Bertrand Russell&lt;/b&gt;&lt;/a&gt;). In that occasion I developed a digital presentation with the open source tool &lt;b&gt;&lt;a href=&quot;https://impress.js.org/#/bored&quot;&gt;impress.js&lt;/a&gt;&lt;/b&gt; and &lt;b&gt;&lt;a href=&quot;https://github.com/mahendrasengar/Strut&quot;&gt;Strut&lt;/a&gt;, &lt;/b&gt;using the open material of the exhibition &lt;b&gt;&quot;&lt;a href=&quot;https://arc-team-open-research.blogspot.com/2014/03/facce-i-molti-volti-della-storia-umana.html&quot;&gt;Facce. I molti volti della storia umana&lt;/a&gt;&quot;&lt;/b&gt; and integrating a webapp done with &lt;b&gt;&lt;a href=&quot;https://cartodb.github.io/odyssey.js/&quot;&gt;Odyssey.js&lt;/a&gt;, &lt;/b&gt;o create an interactive journey through hominid fossils, linking their 
geographical locations with the forensic facial reconstructions we 
realized at Arc-Team.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Fast forward to today: I had to give the same lesson, so I decided to dust off that old project, but as often happens with &quot;vintage&quot; web code, it was broken.&lt;/p&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;The Power of Open Source AI&lt;/h3&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;To bring the project back to life, I experimented with &lt;a href=&quot;https://opencode.ai/&quot;&gt;&lt;b&gt;OpenCode&lt;/b&gt;&lt;/a&gt;, an Open Source AI application. The process was surprisingly smooth; the AI helped me refactor the legacy code and fix the dependencies that had broken over the years.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This sparked an idea: why keep this resource on a local drive when it can still serve a purpose?&lt;/p&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;Introducing &quot;r_evolution&quot;&lt;/h3&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;I’ve created a new GitHub repository called &lt;b&gt;r_evolution&lt;/b&gt;. It’s a simple, functional web app where you can explore the map of human evolution and see the facial reconstructions of our ancestors.&lt;/p&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Live Demo:&lt;/b&gt; &lt;a class=&quot;ng-star-inserted&quot; href=&quot;https://lucaarcteam.github.io/r_evolution/r_evolution.html&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;https://lucaarcteam.github.io/r_evolution/r_evolution.html&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Source Code:&lt;/b&gt; &lt;a href=&quot;https://github.com/lucaarcteam/r_evolution&quot;&gt;&lt;span&gt;Check it out on GitHub&lt;/span&gt;&lt;/a&gt; (feel free to fork!)&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;A Call for Collaboration&lt;/h3&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Currently, the app is in &lt;b&gt;Italian&lt;/b&gt;, as it was born for a local context. However, in the spirit of Open Research, I would love for the community to help:&lt;/p&gt;&lt;ol start=&quot;1&quot; style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Translate&lt;/b&gt; the content into English (or other languages).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Update&lt;/b&gt; the data with newer fossil discoveries.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Improve&lt;/b&gt; the code for better mobile compatibility.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;It was great to see students engaging with these reconstructions once again. It’s a reminder that Open Source isn&#39;t just about the tools we use today, but about the &quot;&lt;b&gt;digital stratigraphy&lt;/b&gt;&quot; we leave behind—and how easy it is to revive it when the foundations are open.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Stay Open and have a nice day!&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIMoDABLq0UClBChjPzchSkdRUpqRceGlumW-uX8ZNgEnqwGiNGdGfuAdZz6Ghq07YFG5MqRvxY8MlH7jYsnCvu4GHahbdn3EknQqgXVm1tGzlcmDDRT-KJdnTZLFdmXrnYnJhGMOMIOzjamCSSIadgxkUmDQxxLwvqpOG3r3SIcsGad3DUqhDiXMT49g/s2560/odyssey_arc-team_r_evolution_webapp.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIMoDABLq0UClBChjPzchSkdRUpqRceGlumW-uX8ZNgEnqwGiNGdGfuAdZz6Ghq07YFG5MqRvxY8MlH7jYsnCvu4GHahbdn3EknQqgXVm1tGzlcmDDRT-KJdnTZLFdmXrnYnJhGMOMIOzjamCSSIadgxkUmDQxxLwvqpOG3r3SIcsGad3DUqhDiXMT49g/w509-h300/odyssey_arc-team_r_evolution_webapp.png&quot; width=&quot;509&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;The r_evolution webapp&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt; &lt;p&gt;&lt;/p&gt;</content>
	<author>
	  <name>Luca Bezzi</name>
	   <email>noreply@blogger.com</email> 
	</author>
	<source>
	  <title type="html">ATOR</title>
	  <subtitle type="html">ATOR (Arc-Team Open Research). 
The blog spreads tests, problems and results of Arc-Team research in archaeology, following the guidelines of the OpArc (Open Archaeology) project.</subtitle>
	  <link rel="self" href="https://www.blogger.com/feeds/4458817758216594734/posts/default"/>
	  <id>tag:blogger.com,1999:blog-4458817758216594734</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">February 2026 Threat Report: A River of Perpetual Risk</title>
	<link href="https://www.greenbone.net/en/blog/february-2026-threat-report/"/>
	<id>https://www.greenbone.net/?p=64907</id>
	<updated>2026-03-09T11:23:11+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">February 2026’s cyber security headlines were dominated by the sudden emerging risk of CVE-2026-20127, a critical-severity vulnerability in Cisco Catalyst SD-WAN. However, this month, other high-risk vulnerabilities impacting widely deployed enterprise software also opened new gaps for attackers to exploit. To effectively defend IT infrastructure, security teams need granular visibility, reliable threat intelligence for prioritization, […]</content>
	<author>
	  <name>Joseph Lee</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">ElectronMail</title>
	<link href="https://sparkylinux.org/electronmail/"/>
	<id>https://sparkylinux.org/?p=14033</id>
	<updated>2026-03-05T16:20:06+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;There is a new application available for Sparkers: ElectronMail What is ElectronMail? Features: – Open Source – Reproducible builds – Cross platform – Full-text search – JavaScript-based/unlimited messages filtering – Offline access to the email messages – Multi accounts support – Automatic login into the app – Automatic login into the email accounts – Persistent email account…&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://sparkylinux.org/electronmail/&quot; rel=&quot;nofollow&quot;&gt;Source&lt;/a&gt;&lt;/p&gt;</content>
	<author>
	  <name>pavroo</name>
	   <uri>https://sparkylinux.org</uri> 
	</author>
	<source>
	  <title type="html">SparkyLinux</title>
	  <subtitle type="html">SparkyLinux project page</subtitle>
	  <link rel="self" href="https://sparkylinux.org/feed/"/>
	  <id>https://sparkylinux.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">deepin Community Monthly Report for February 2026</title>
	<link href="https://www.deepin.org/en/deepin-community-monthly-report-2026-2/"/>
	<id>https://www.deepin.org/?p=38407</id>
	<updated>2026-03-05T06:24:47+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Learn more about deepin details, historical versions, user reviews, etc.: https://distrowatch.com/table.php?distribution=deepin I. February Community Data Overview II. Community Products 1. deepin 25.0.12 Internal Testing Launched: File Manager Enhancements, Multi-Screen &amp;amp; Audio Issues Fixed In February, the deepin 25 internal test version 25.0.12 was released, focusing on expanding file manager functionality and optimizing system stability: File Manager Efficiency Upgrade: Supports right-click to pin top tabs, allowing important directories to remain permanently accessible; when previewing images, the sidebar supports drag-and-drop enlargement, making viewing images more efficient for work. Email Function Enhancement: Added email printing feature to meet daily office needs. High-Frequency Issue Fixes: Resolved issues such ...&lt;a href=&quot;https://www.deepin.org/en/deepin-community-monthly-report-2026-2/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) UOS AI / OpenClaw 都能用！社区大神整活，玲珑商店 Skill 来了！</title>
	<link href="https://www.deepin.org/en/linglong-store-skill/"/>
	<id>https://www.deepin.org/?p=38389</id>
	<updated>2026-03-03T02:19:51+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Emergency Patch: CVE-2026-20127 in Cisco Catalyst SD-WAN Actively Exploited Against Critical Infrastructure</title>
	<link href="https://www.greenbone.net/en/blog/emergency-patch-cve-2026-20127-in-cisco-catalyst-sd-wan-actively-exploited-against-critical-infrastructure/"/>
	<id>https://www.greenbone.net/?p=64366</id>
	<updated>2026-03-02T13:47:06+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">! Update March 6, 2026 New Actively Exploited Flaws in Cisco Catalyst SD-WAN Of the five additional vulnerabilities affecting Catalyst SD-WAN that were disclosed in a second security report the same day, CVE-2026-20128 CVSS 7.5 and CVE-2026-20122 CVSS 5.4 are now reported by Cisco as actively exploited in the wild. No PoCs for either CVE […]</content>
	<author>
	  <name>Joseph Lee</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Sparky news 2026/02</title>
	<link href="https://sparkylinux.org/sparky-news-2026-02/"/>
	<id>https://sparkylinux.org/?p=14028</id>
	<updated>2026-03-01T15:43:58+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;The 2nd monthly Sparky project and donate report of the 2026: – Linux kernel updated up to 6.19.5, 6.18.15-LTS, 6.12.74-LTS, 6.6.127-LTS – Sparky 8.2 Seven Sisters released – added Linux kernel 6.18 LTS to sparky repos; 6.6 LTS will be not updated any more Many thanks to all of you for supporting our open-source projects. Your donations help keeping them and us alive. Don’t forget to send…&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://sparkylinux.org/sparky-news-2026-02/&quot; rel=&quot;nofollow&quot;&gt;Source&lt;/a&gt;&lt;/p&gt;</content>
	<author>
	  <name>pavroo</name>
	   <uri>https://sparkylinux.org</uri> 
	</author>
	<source>
	  <title type="html">SparkyLinux</title>
	  <subtitle type="html">SparkyLinux project page</subtitle>
	  <link rel="self" href="https://sparkylinux.org/feed/"/>
	  <id>https://sparkylinux.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">[STABLE RELEASE] Bunsenlabs Carbon Official ISOs</title>
	<link href="https://forums.bunsenlabs.org/viewtopic.php?id=9711"/>
	<id>https://www.bunsenlabs.org/feed/news/2508b1a8-4f34-5477-864f-886ee294020d</id>
	<updated>2026-02-27T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;postmsg&quot;&gt;
 &lt;p&gt;
  The BunsenLabs team are happy to announce our latest release, BunsenLabs Carbon.
 &lt;/p&gt;
 &lt;p&gt;
  Based on Debian Trixie, Carbon has had many improvements, including a new desktop appearance and assistance (coming soon) for users who want to experiment with Wayland.
 &lt;/p&gt;
 &lt;p&gt;
  &lt;em&gt;
   If you have liked BL in the past, you&#39;re going to love this.
  &lt;/em&gt;
 &lt;/p&gt;
 &lt;p&gt;
  There is much more detail in the Release Notes:
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?id=9675&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic.php?id=9675
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  Downloads are available from the BunsenLabs website:
  &lt;a href=&quot;https://www.bunsenlabs.org/installation.html&quot; rel=&quot;nofollow&quot;&gt;
   https://www.bunsenlabs.org/installation.html
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  A big
  &lt;strong&gt;
   thank you
  &lt;/strong&gt;
  to all the community members who contributed feedback, suggestions and code!
 &lt;/p&gt;
 &lt;p&gt;
  &lt;em&gt;
   The BunsenLabs Team
  &lt;/em&gt;
 &lt;/p&gt;
&lt;/div&gt;</content>
	<author>
	  <name>BunsenLabs Linux</name>
	   <uri>https://forums.bunsenlabs.org/viewforum.php?id=12</uri> 
	</author>
	<source>
	  <title type="html">BunsenLabs Linux News</title>
	  
	  <link rel="self" href="https://www.bunsenlabs.org/feed/news/atom"/>
	  <id>https://www.bunsenlabs.org/feed/news/684cbf76-7ebc-5242-9b5c-f18edf49cc9d</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Tails 7.5</title>
	<link href="https://tails.net/news/version_7.5/"/>
	<id>https://tails.net/news/version_7.5/</id>
	<updated>2026-02-26T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;h1 id=&quot;changes&quot;&gt;Changes and updates&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href=&quot;https://blog.torproject.org/new-release-tor-browser-1507/&quot;&gt;15.0.7&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Simplify the home page of &lt;em&gt;Tor Browser&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://tails.net/news/version_7.5/home.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;screenshot&quot; height=&quot;609&quot; src=&quot;https://tails.net/news/version_7.5/home.png&quot; width=&quot;861&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Tor&lt;/em&gt; client to 0.4.9.5.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href=&quot;https://www.thunderbird.net/en-US/thunderbird/140.7.1esr/releasenotes/&quot;&gt;140.7.1&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Install &lt;em&gt;Thunderbird&lt;/em&gt; as additional software to improve its security, if you
have both the &lt;a href=&quot;https://tails.net/doc/persistent_storage/configure/index.en.html#thunderbird&quot;&gt;Thunderbird Email
Client&lt;/a&gt; and &lt;a href=&quot;https://tails.net/doc/persistent_storage/configure/index.en.html#additional_software&quot;&gt;Additional
Software&lt;/a&gt; features of the
Persistent Storage turned on.&lt;/p&gt;

&lt;p&gt;Until Tails 7.5, a new version of &lt;em&gt;Thunderbird&lt;/em&gt; was released by Mozilla only a
few days after we released a new version of Tails. As a consequence, the
version of &lt;em&gt;Thunderbird&lt;/em&gt; in Tails was almost always outdated, with known
security vulnerabilities.&lt;/p&gt;

&lt;p&gt;By &lt;a href=&quot;https://tails.net/doc/anonymous_internet/thunderbird/additional_software/index.en.html&quot;&gt;installing &lt;em&gt;Thunderbird&lt;/em&gt; as additional software&lt;/a&gt;, the latest version
of &lt;em&gt;Thunderbird&lt;/em&gt; is installed automatically from your Persistent Storage each
time you start Tails.&lt;/p&gt;

&lt;p&gt;If the &lt;strong&gt;Thunderbird Migration&lt;/strong&gt; dialog below appears when you start
&lt;em&gt;Thunderbird&lt;/em&gt;, it means that Tails successfully installed &lt;em&gt;Thunderbird&lt;/em&gt; as
additional software.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://tails.net/doc/anonymous_internet/thunderbird/additional_software/success.png&quot;&gt;&lt;img alt=&quot;Thunderbird Migration: Tails installed Thunderbird as additional software to improve its security.&quot; class=&quot;screenshot&quot; height=&quot;533&quot; src=&quot;https://tails.net/doc/anonymous_internet/thunderbird/additional_software/success.png&quot; width=&quot;372&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Include the language pack for Mexican Spanish in &lt;em&gt;Thunderbird&lt;/em&gt; in addition to
the language pack for Spanish from Spain.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For more details, read our &lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog&quot;&gt;changelog&lt;/a&gt;.&lt;/p&gt;

&lt;h1 id=&quot;get&quot;&gt;Get Tails 7.5&lt;/h1&gt;


&lt;h2&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.5.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an
automatic upgrade, please try to do a &lt;a href=&quot;https://tails.net/doc/upgrade/index.en.html#manual&quot;&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;To install Tails 7.5 on a new USB stick&lt;/h2&gt;

&lt;p&gt;Follow our installation instructions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/windows/index.en.html&quot;&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/mac/index.en.html&quot;&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/linux/index.en.html&quot;&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/expert/index.en.html&quot;&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;caution&quot;&gt;&lt;p&gt;The Persistent Storage on the USB stick will be lost if
you install instead of upgrading.&lt;/p&gt;&lt;/div&gt;


&lt;h2&gt;To download only&lt;/h2&gt;

&lt;p&gt;If you don&#39;t need installation or upgrade instructions, you can download
Tails 7.5 directly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download/index.en.html&quot;&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download-iso/index.en.html&quot;&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
	<author>
	  <name>Tails</name>
	   <uri>https://tails.net/news/index.en.html</uri> 
	</author>
	<source>
	  <title type="html">Tails - News</title>
	  <subtitle type="html">Tails</subtitle>
	  <link rel="self" href="https://tails.net/news/index.en.rss"/>
	  <id>https://tails.net/news/index.en.html</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">VyOS Stream 2026.02 is available for download</title>
	<link href="https://blog.vyos.io/vyos-stream-2026.02-is-available-for-download"/>
	<id>https://blog.vyos.io/vyos-stream-2026.02-is-available-for-download</id>
	<updated>2026-02-25T12:32:59+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;hs-featured-image-wrapper&quot;&gt; 
 &lt;a class=&quot;hs-featured-image-link&quot; href=&quot;https://blog.vyos.io/vyos-stream-2026.02-is-available-for-download&quot; title=&quot;&quot;&gt; &lt;img alt=&quot;VyOS Stream 2026.02 - Technology Preview&quot; class=&quot;hs-featured-image&quot; src=&quot;https://blog.vyos.io/hubfs/vyos_stream_2026.02_blog_post%20(Light).png&quot; style=&quot;width: auto !important; float: left; margin: 0 15px 15px 0;&quot; /&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS Stream 2026.02 is available for download now. It features multiple backports from the rolling release, including TLS support for syslog, NAT66 source groups, IPFIX support in VPP, FRR and VPP updates, and over fifty bug fixes. It also makes the VPP configuration subsystem use DPDK as the default driver for NICs that support it and fall back to XDP automatically if needed — there is no need to and no option to configure the driver by hand anymore.&lt;/p&gt;</content>
	<author>
	  <name>Daniil Baturin</name>
	   <email>daniil@sentrium.io</email> 
	</author>
	<source>
	  <title type="html">VyOS - Blog</title>
	  <subtitle type="html">VyOS Platform Project news and updates 
All about development and project life in  our blog</subtitle>
	  <link rel="self" href="https://blog.vyos.io/rss.xml"/>
	  <id>https://blog.vyos.io</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Stable Clonezilla live 3.3.1-35 Released</title>
	<link href="https://sourceforge.net/p/clonezilla/news/2026/02/stable-clonezilla-live-331-35-released/"/>
	<id>https://sourceforge.net4457f6c10b6b45c4d2b0c35f1e29f4e8bbb5e222</id>
	<updated>2026-02-24T11:36:15+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;markdown_content&quot;&gt;&lt;h1 id=&quot;h-this-release-of-clonezilla-live-331-35-includes-major-enhancements-and-bug-fixes&quot;&gt;This release of Clonezilla live (3.3.1-35) includes major enhancements and bug fixes.&lt;/h1&gt;
&lt;h2 id=&quot;h-enhancements-and-changes-since-330-33&quot;&gt;ENHANCEMENTS AND CHANGES SINCE 3.3.0-33&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The underlying GNU/Linux operating system was upgraded. This release is based on the Debian Sid repository (as of 2026/Feb/20).&lt;/li&gt;
&lt;li&gt;The Linux kernel was updated to 6.18.9-1.&lt;/li&gt;
&lt;li&gt;Partclone was updated to 0.3.45.&lt;/li&gt;
&lt;li&gt;Implemented mechanisms for cloning 4kn disks to 512n/e disks and 512n/e disks to 4kn disks. Thanks to john (zx1100e1).&lt;/li&gt;
&lt;li&gt;Improved functions do_ntfs_512to4k_fix and do_ntfs_4kto512_fix by updating Total Sectors (Offset 40) for NTFS.&lt;/li&gt;
&lt;li&gt;Added a new program, ocs-pt-512-4k-convert, to convert 512B to 4kn partition tables.&lt;/li&gt;
&lt;li&gt;Rewrote ocs-expand-gpt-pt to be more robust, including 512B to 4kn conversion if mismatched sectors are detected.&lt;/li&gt;
&lt;li&gt;Added a mechanism to change the master key from a LUKS header. Thanks to nbergont for the contribution.&lt;/li&gt;
&lt;li&gt;Rewrote ocs-get-nic-fw-lst to retrieve firmware lists directly from Linux kernel modules.&lt;/li&gt;
&lt;li&gt;Added two more info files in image dir: fdisk.list and blkdev.json. Thanks to arij for the suggestion.&lt;/li&gt;
&lt;li&gt;Included makeboot64.cmd instead of makeboot64.bat in the live system. Thanks to Tom Hoar.&lt;/li&gt;
&lt;li&gt;Improved BitLocker support: partitions now work on the clone server (ocs-onthefly), and the system now prompts for passwords again if entered incorrectly. Thanks to Marcos Diez.&lt;/li&gt;
&lt;li&gt;Enabled the &quot;-edio&quot; (Direct I/O) option in the TUI by default.&lt;/li&gt;
&lt;li&gt;Restricted the &quot;-smtd&quot; and &quot;-smmcb&quot; options enabled by default to non-x86-64 machines.&lt;/li&gt;
&lt;li&gt;Added the &#39;lsb-release&#39; package to the live system.&lt;/li&gt;
&lt;li&gt;The time synchronization mechanism can now be disabled if ocs_time_sync=&quot;no&quot; is assigned in the boot parameters.&lt;/li&gt;
&lt;li&gt;Updated Brazilian Portuguese translation. Thanks to Rafael Fontenelle.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;h-bug-fixes&quot;&gt;BUG FIXES&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue in function udp_send_part_img_or_dev where multicast sending from raw devices failed for partitions with unknown filesystems; it now utilizes partclone.dd.&lt;/li&gt;
&lt;li&gt;Fixed a bug where ocs-get-dev-info failed to identify extended partitions on MBR disks.&lt;/li&gt;
&lt;li&gt;Removed extra LVM and LUKS information in dev-fs.list that previously caused partition order errors and failed network clones via ocs-onthefly. Thanks to kokutou kiritsugu for reporting this.&lt;/li&gt;
&lt;li&gt;Resolved a bug related to restoring MTD/eMMC devices.&lt;/li&gt;
&lt;li&gt;Appended &#39;--rescue&#39; to partclone options to bypass mtdblock read errors.&lt;/li&gt;
&lt;li&gt;Fixed a bug where ocs-sr could not find devices using a PTUUID.&lt;/li&gt;
&lt;li&gt;Updated ocs-live-run-menu to set the TERM as fbterm so box-drawing characters display correctly. Thanks to ottokang for identifying this.&lt;/li&gt;
&lt;li&gt;Improved ocs-blk-dev-info efficiency and removed double quotation marks from model and serial outputs to prevent menu breakage. Thanks to pete-15.&lt;/li&gt;
&lt;li&gt;Updated ocs-cvt-dev to avoid name collisions during the conversion process.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</content>
	<author>
	  <name>Steven Shiau</name>
	   <uri>https://sourceforge.net/p/clonezilla/news/</uri> 
	</author>
	<source>
	  <title type="html">Recent posts to news</title>
	  <subtitle type="html">Recent posts to news</subtitle>
	  <link rel="self" href="https://sourceforge.net/p/clonezilla/news/feed.rss"/>
	  <id>https://sourceforge.net/p/clonezilla/news/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Nubus for Kubernetes 1.17: Release Highlights</title>
	<link href="https://www.univention.com/blog-en/2026/02/nubus-for-kubernetes-1-17-release/"/>
	<id>https://www.univention.de/?p=85642</id>
	<updated>2026-02-23T15:04:19+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;div class=&quot;wpb-content-wrapper&quot;&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;With this blog post, I am starting a new series in which I present the updates of the roughly monthly &lt;strong&gt;Nubus for Kubernetes releases&lt;/strong&gt;. We begin with a look back at version &lt;strong&gt;1.17&lt;/strong&gt;, which was released at the end of January and brings many improvements for Nubus operators – including the new &lt;strong&gt;Structured Logging&lt;/strong&gt; format for Kubernetes.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Structured Logging&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Since version 1.17, &lt;strong&gt;Nubus for Kubernetes&lt;/strong&gt; offers a new output format for log entries: &lt;strong&gt;Structured Logging&lt;/strong&gt;. This uses the open standard &lt;a href=&quot;https://brandur.org/logfmt&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;logfmt&lt;/strong&gt; &lt;/a&gt;and generates log outputs that are easy to process both for humans and log analysis tools.&lt;/p&gt;
&lt;p&gt;This makes &lt;strong&gt;auditing&lt;/strong&gt; and &lt;strong&gt;monitoring&lt;/strong&gt; in well-known log analysis tools such as the &lt;a href=&quot;https://www.elastic.co/de/elastic-stack&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;ELK Stack&lt;/strong&gt;&lt;/a&gt; or &lt;a href=&quot;https://grafana.com/oss/loki/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Grafana Loki&lt;/strong&gt;&lt;/a&gt; significantly easier. Nubus sends the log entries directly to these or other analysis tools available in the data center, where they can be evaluated together with information from other software solutions.&lt;/p&gt;
&lt;p&gt;Details on the log format can be found in the &lt;a href=&quot;https://docs.software-univention.de/nubus-kubernetes-operation/1.x/en/configuration/logging.html#conf-logging-structured&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;release notes&lt;/strong&gt;&lt;/a&gt; and will also be documented in the &lt;strong&gt;Nubus Manual&lt;/strong&gt; in the future.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Moving Away from ingress-nginx&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;The &lt;a href=&quot;https://kubernetes.io/docs/concepts/services-networking/ingress/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Ingress&lt;/strong&gt; &lt;/a&gt;in a Kubernetes cluster is responsible for managing external access to the services running inside. It primarily acts as a reverse proxy for HTTP connections and for HTTPS encryption. This Kubernetes component is also modular, allowing operators to choose between different implementations.&lt;/p&gt;
&lt;p&gt;Currently, Nubus for Kubernetes in the delivered &lt;strong&gt;Helm charts&lt;/strong&gt; only supports the &lt;a href=&quot;https://github.com/kubernetes/ingress-nginx&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;ingress-nginx&lt;/strong&gt;&lt;/a&gt; implementation. This was long the standard but recently an end of it’s maintenance has been announced. Therefore, operators are forced to switch to other Ingress solutions.&lt;/p&gt;
&lt;p&gt;With version 1.17, the dependency on &lt;strong&gt;ingress-nginx&lt;/strong&gt; has been reduced, enabling the use of other implementations in the future. With the upcoming release 1.18 all dependencies will be removed and Nubus will be tested with &lt;strong&gt;traefik&lt;/strong&gt; and &lt;strong&gt;HA-Proxy&lt;/strong&gt; Ingress.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  UDM and Provisioning Move Closer Together&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;The &lt;strong&gt;Provisioning&lt;/strong&gt; component of &lt;strong&gt;Univention Nubus&lt;/strong&gt; ensures that changes from the &lt;strong&gt;Univention Directory Manager (UDM)&lt;/strong&gt;, such as new users or groups, are passed on to other systems. Previously, provisioning used its own library, the so-called &lt;strong&gt;Transformer&lt;/strong&gt;, to convert data from the directory service into the Nubus data model.&lt;/p&gt;
&lt;p&gt;In version 1.17, this functionality was integrated directly into the &lt;strong&gt;UDM REST API&lt;/strong&gt;. This means that the data model is now consistent throughout, complexity is reduced, and errors caused by different implementations are avoided. For operators, this means more reliable processes with less maintenance effort.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Updates, Updates, Updates&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;With each release of the &lt;strong&gt;Nubus for Kubernetes container images&lt;/strong&gt;, the underlying open-source software is also updated. Version 1.17 therefore brings numerous small &lt;strong&gt;bug fixes&lt;/strong&gt; and &lt;strong&gt;security updates&lt;/strong&gt;. All details can be found in the &lt;a href=&quot;https://docs.software-univention.de/nubus-kubernetes-release-notes/1.x/en/1.17.html#v1-17-0&quot;&gt;&lt;strong&gt;release notes&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Der Beitrag &lt;a href=&quot;https://www.univention.com/blog-en/2026/02/nubus-for-kubernetes-1-17-release/&quot;&gt;Nubus for Kubernetes 1.17: Release Highlights&lt;/a&gt; erschien zuerst auf &lt;a href=&quot;https://www.univention.com&quot;&gt;Univention&lt;/a&gt;.&lt;/p&gt;</content>
	<author>
	  <name>Ingo Steuwer</name>
	   <uri>https://www.univention.com/news/blog-en/</uri> 
	</author>
	<source>
	  <title type="html">Univention Blog - the Corporate Blog of Univention</title>
	  <subtitle type="html">be open.</subtitle>
	  <link rel="self" href="https://www.univention.com/news/blog-en/feed/"/>
	  <id>https://www.univention.com/news/blog-en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="tr">HackMetu’26, Pardus ve Siber Güvenlik Temasıyla  ODTÜ’de Gerçekleştirildi</title>
	<link href="https://pardus.org.tr/hackmetu26-pardus-ve-siber-guvenlik-temasiyla-odtude-gerceklestirildi/"/>
	<id>https://pardus.org.tr/?p=25915</id>
	<updated>2026-02-23T07:09:46+00:00</updated>
	<summary type="html" xml:lang="tr"></summary>
	<content type="html" xml:lang="en">HackMetu’26’da genç mühendislerle birlikte üretmenin heyecanını yaşadık. 

21–22 Şubat 2026 tarihlerinde IEEE ODTÜ Öğrenci Kolu tarafından organize edilen etkinlik; #Pardus Projesi ve TBD Genç Ankara paydaşlığında gerçekleştirildi. 24 saatlik hackathon süresince genç geliştiriciler, Pardus ve Merkezi Yönetim Sistemlerini siber güvenlik perspektifiyle ele alarak uygulanabilir çözümler geliştirdi.</content>
	<author>
	  <name>Hace İbrahim Özbal</name>
	   <uri>https://pardus.org.tr</uri> 
	</author>
	<source>
	  <title type="html">Pardus – TÜBİTAK</title>
	  <subtitle type="html">Teknolojiyi Özgürleştirin Pardus ile Geleceğe Adım Atın</subtitle>
	  <link rel="self" href="https://pardus.org.tr/feed/"/>
	  <id>https://pardus.org.tr</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Sovereign IT with Open Source: How to Build Your Own Modular Application Stack</title>
	<link href="https://www.univention.com/blog-en/2026/02/sovereign-it-open-source-modular-application-stack-iam/"/>
	<id>https://www.univention.de/?p=85622</id>
	<updated>2026-02-20T07:09:18+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;div class=&quot;wpb-content-wrapper&quot;&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Digital independence begins with IT architecture: organizations that want to operate IT services sovereignly need open standards, centralized identity management, and full control over users, roles, and access. This article describes how IAM becomes the solid foundation of a modular application stack – flexible, secure, future-proof, and easier than you might think.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;
	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Digital sovereignty is more than an internet hype or marketing slogan. It determines whether organizations can shape their processes themselves – or remain dependent on vendors, licensing models, and proprietary interfaces. The good news: by relying on open standards and open source, a wide variety of IT services can be seamlessly integrated – from file servers to specialized applications –&lt;strong&gt; allowing the step-by-step construction of a software stack optimized for one’s own needs&lt;/strong&gt;, benefiting from its modularity and gaining independence from hyperscaler services.&lt;/p&gt;
&lt;p&gt;For applications and services to work smoothly together, a connecting element is required: an &lt;a href=&quot;https://www.univention.com/blog-en/2025/07/iam-explained/&quot;&gt;&lt;strong&gt;Identity &amp;amp; Access Management (IAM)&lt;/strong&gt;&lt;/a&gt; system that handles the integration and management of users, roles, and permissions – securely linking all applications and enabling cross-application data flows. Such an IAM manages user identities, regulates access rights, and allows the automation of entire process chains.&lt;br /&gt;
&lt;strong&gt;In short: without IAM, there is no application stack – at least not one that remains controllable in the long term.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Below, I will introduce central building blocks for a technically sound implementation of an open IAM and show which standards have proven effective and which architectural decisions make the difference – from single sign-on with OpenID Connect or SAML, single logout via frontend or backchannel logout, user lifecycle management with SCIM, a single source of truth for roles and contextual control of permission assignment, automation and deployment with Kubernetes &amp;amp; Helm, to provisioning.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  IAM as the Foundation of a Sovereign Application Stack&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Organizations that want to operate an application stack themselves need more than containers, computing resources, and a colorful mix of (open-source) components. The challenge lies in a well-thought-out architecture: &lt;strong&gt;how do all services interact cleanly – and how is the overview of access, roles, and data flows maintained?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is exactly where Identity &amp;amp; Access Management (IAM) comes into play. As versatile as modern applications are, without centralized identity and access management, shadow identities, fragmented roles, and security gaps arise. Without overarching IAM, organizations sooner or later face the same problems as with traditional silo solutions: login credentials circulate via email, former employees retain unintended access to sensitive data, and no one really knows who has which rights. An open IAM solves these problems based on established protocols and interfaces.&lt;/p&gt;
&lt;p&gt;A solid foundation alone does not yet make a secure house. The right building blocks are also needed – starting with authentication.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_85625&quot; style=&quot;width: 760px;&quot;&gt;&lt;a href=&quot;https://www.univention.de/wp-content/uploads/2026/02/Univention_INFOGRAFIK_Integration_IAM_EN_2_RGB-1.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;image-no-border wp-image-85625&quot; height=&quot;408&quot; src=&quot;https://www.univention.de/wp-content/uploads/2026/02/Univention_INFOGRAFIK_Integration_IAM_EN_2_RGB-1-1000x545.png&quot; width=&quot;750&quot; /&gt;&lt;/a&gt;&lt;p class=&quot;wp-caption-text&quot; id=&quot;caption-attachment-85625&quot;&gt;Diagram 1: Modular infrastructures managed centrally via a central Identity &amp;amp; Access Management with standardized interfaces&lt;/p&gt;&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Building Block 1: Single Sign-on and Single Logout&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;A modern application stack often includes services such as file storage, webmail, video conferencing, office and project management software, or industry-specific applications. To prevent login from becoming increasingly complex and time-consuming for users across these applications, a central authentication mechanism is needed: &lt;a href=&quot;https://www.univention.com/blog-en/2021/08/how-does-single-sign-on-work-with-saml-and-openidconnect/&quot;&gt;single sign-on&lt;/a&gt; (SSO).&lt;/p&gt;
&lt;p&gt;With SSO, users log in once and gain access to all connected services. Authentication is carried out using protocols such as OpenID Connect (OIDC) or &lt;a href=&quot;https://www.univention.com/blog-en/2019/06/brief-introduction-saml-a-secure-comfortable-web-access/&quot;&gt;SAML&lt;/a&gt;. Both are widely adopted &lt;a href=&quot;https://www.univention.com/products/functions/open-interfaces/&quot;&gt;open standards&lt;/a&gt; supported by almost all modern web applications.&lt;/p&gt;
&lt;p&gt;SSO is convenient – but it only solves half the problem. While logging in usually works smoothly, logging out often falls short. Single logout (SLO) means that logging out once also closes all sessions in the connected services. In practice, this step is often overlooked – with consequences for security and data protection. Logging out of the email client does not automatically terminate sessions in the video conference service, file storage, or project platform – a potential avenue for misuse.&lt;/p&gt;
&lt;p&gt;Depending on the protocol used, different single logout methods exist – for example, frontend logout, where the browser actively terminates all sessions, or backchannel logout, where the IAM communicates directly with connected services. Which method is possible depends on the capabilities of the respective application and the care taken in technical integration.&lt;/p&gt;
&lt;p&gt;Reality shows: while SSO is often quickly hailed as a success, SLO is the real challenge. A missing logout mechanism may seem harmless, but it can become a security risk – especially with sensitive data or public workstations.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Building Block 2: User Lifecycle Management&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Single sign-on enables convenient access to IT services, but what happens before and after? Proper user account management requires monitoring the entire lifecycle of identities: from creating new users or groups, through changes, to deletion. This is what user lifecycle management is about.&lt;/p&gt;
&lt;p&gt;Many systems rely solely on the login event: an account is automatically created when someone logs in for the first time. This may suffice for simple scenarios – but for controlled, traceable IT management, this model is insufficient. What happens if someone never logs in? Or if a person leaves the organization?&lt;/p&gt;
&lt;p&gt;Without centralized event control, shadow identities – accounts existing in the system but no longer linked to a person – emerge quickly. Rights and group memberships are difficult to synchronize, too. Losing oversight is not just an organizational issue but also a data protection and security problem.&lt;/p&gt;
&lt;p&gt;For technical implementation, several approaches exist:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Via APIs&lt;/strong&gt; – whether open or proprietary – data can often be written directly to target systems. This offers flexibility but usually comes with high integration effort and low reusability.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Directory services&lt;/strong&gt; (e.g., LDAP-based) can serve as a shared source for user and group data but generally only work with systems that actively access them.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;System for Cross-domain Identity Management &lt;/strong&gt;(&lt;a href=&quot;https://scim.cloud/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;SCIM&lt;/a&gt;) is an open standard for provisioning identity data. It allows events like account creation, name changes, or deletion to be transmitted automatically and standardized between systems – including groups and permissions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Comprehensive user lifecycle management with SCIM or a comparable mechanism is not only more convenient but also safer. It prevents data remnants, reduces errors, and allows identities to be managed consistently across system boundaries – regardless of the size or heterogeneity of the stack.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;If you would like to explore the topic of User Lifecycle Management in more depth and learn how our &lt;strong&gt;IAM solution Nubus&lt;/strong&gt; enhances security, efficiency, and compliance in schools and enterprises, you can find further insights in this article: &lt;a href=&quot;https://www.univention.com/blog-en/2025/10/user-lifecycle-management-nubus/&quot;&gt;https://www.univention.com/blog-en/2025/10/user-lifecycle-management-nubus/&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_85631&quot; style=&quot;width: 710px;&quot;&gt;&lt;a href=&quot;https://www.univention.de/wp-content/uploads/2026/02/Univention-Nubus-Schaugrafik-EN-1.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;image-no-border wp-image-85631&quot; height=&quot;372&quot; src=&quot;https://www.univention.de/wp-content/uploads/2026/02/Univention-Nubus-Schaugrafik-EN-1-1000x531.png&quot; width=&quot;700&quot; /&gt;&lt;/a&gt;&lt;p class=&quot;wp-caption-text&quot; id=&quot;caption-attachment-85631&quot;&gt;Diagram 2: Manage digital identities centrally with Nubus and provide them across applications&lt;/p&gt;&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Building Block 3: Permissions and Roles&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Access alone is not enough – equally important is the question: &lt;strong&gt;what is a user allowed to do within an application? An open IAM must not only manage identities but also assign and control permissions in a differentiated manner.&lt;/strong&gt; Groups, roles, and permissions must be represented so they can be automatically transferred to different applications. Many IAM systems rely on role models assigning certain rights to user groups – e.g., “teacher,” “employee,” “project manager,” or “admin.”&lt;/p&gt;
&lt;p&gt;Technically, there are two common approaches:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;OIDC&lt;/strong&gt; allows roles and permissions to be included in claims, which contain information such as groups, role names, or attributes – e.g., role=project-admin. This works well but requires IAM and applications to agree on what each term means. It is not standardized.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SCIM&lt;/strong&gt; goes a step further: it explicitly defines how entitlements and roles can be provisioned. Groups and rights can be transferred and kept consistent across systems – provided the target application fully supports SCIM. Like OIDC, IAM and applications must agree on the meaning of entitlements.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In practice, limits are quickly reached. Many applications interpret claims differently or ignore entitlements entirely. To be safe, a clear architectural decision is required: there must be a leading instance where users, roles, and permissions are managed – a single source of truth. &lt;strong&gt;An IAM ideally fulfills this role: storing rights centrally, synchronizing them with other systems, and remaining independent of specific applications.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In addition to static role-based permissions, contextual control is gaining importance: who can access what, when, where, and from which device – modern IAM systems can represent these conditions in a granular manner. This results in a permissions model that is not only differentiated but flexible enough for hybrid scenarios.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Automation and Deployment with Kubernetes &amp;amp; Helm&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Organizations that want to reliably operate open components like IAM, directory services, office applications, or file storage need a platform that enables repeatable deployments, updates, and integrations – even in running operations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.univention.com/blog-en/2025/05/kubernetes-explained/&quot;&gt;Kubernetes&lt;/a&gt; &lt;/strong&gt;has become the standard in many organizations for operating containerized applications scalably and resiliently. Combined with the &lt;a href=&quot;https://helm.sh/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Helm&lt;/a&gt; package manager, complex setups like an IAM with associated services can be described declaratively, installed automatically, and reproduced as needed – e.g., in test, integration, and production environments.&lt;/p&gt;
&lt;p&gt;In self-built application stacks, this is essential: without automated deployment, releases quickly become confusing, configurations inconsistent, and extensions risky. Kubernetes and Helm provide structure and make it easier to operate IAM modularly, update it regularly, and integrate it traceably. Prerequisite for this repeatability is a consistent continuous delivery approach. Only when builds, tests, and deployments are standardized and automated can the quality of the overall system be reliably ensured – across many components.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Secure Integration of Existing Systems&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Many organizations already have established infrastructures – e.g., a &lt;strong&gt;central Active Directory&lt;/strong&gt; &lt;strong&gt;for user management&lt;/strong&gt;. Achieving digital sovereignty does not require starting from scratch; existing systems can be cleverly integrated.&lt;/p&gt;
&lt;p&gt;When introducing an open IAM, it is often sensible to include existing directories initially and import or synchronize identity data from them. In hybrid scenarios, the new IAM can become the leading system or run in parallel to the existing directory, gradually replacing it step by step.&lt;/p&gt;
&lt;p&gt;Technically, several options exist: manual exports can be implemented quickly but are error-prone and unsustainable. Better are connections via LDAP, SCIM, or API, where changes in user data are retrieved automatically or event-driven. Crucial is that processes like onboarding, role assignment, and offboarding work seamlessly – regardless of where the data is maintained.&lt;/p&gt;
&lt;p&gt;In practice, a gradual transition is often advisable: existing systems remain initially, while new components are integrated and tested according to standards. This allows a controlled change – without loss of functionality but with growing control.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Open Source in Practice: Examples of Sovereign IT&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;A modular application stack consists of more than individual services – the interaction between them is decisive.&lt;strong&gt; Only when identities, roles, applications, and data flows are integrated via open standards does an architecture emerge that can be operated independently, adapted, and sustainably maintained.&lt;/strong&gt; That this is practicable even in very large environments is demonstrated by the project openDesk, promoted by the Zentrum für Digitale Souveränität.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.opendesk.eu/en&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;openDesk&lt;/a&gt; relies on a combination of proven open-source components: &lt;a href=&quot;https://www.open-xchange.com/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Open-Xchange&lt;/a&gt; for email and calendar, &lt;a href=&quot;https://nextcloud.com/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Nextcloud&lt;/a&gt; for files, &lt;a href=&quot;https://www.collaboraonline.com/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Collabora&lt;/a&gt; for online document editing, &lt;a href=&quot;https://element.io/en&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Element&lt;/a&gt; for messaging, &lt;a href=&quot;https://www.openproject.org/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;OpenProject&lt;/a&gt; for project management – and the IAM &lt;a href=&quot;https://www.univention.com/products/nubus/&quot;&gt;Nubus&lt;/a&gt; from Univention GmbH, which as a central link enables the technical interaction of the components and convenient access to all services via a modern portal. The modular setup works – for example at the &lt;a href=&quot;https://www.zendis.de/en/newsroom/press/zendis-and-rki-conclude-contract-on-the-use-of-opendesk-for-the-ogd-platform-agora&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Robert Koch-Institut&lt;/a&gt; and in the &lt;a href=&quot;https://www.digitale-verwaltung.de/Webs/DV/EN/home/home-node.html&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Bundestag administration&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.univention.com/products/nubus/&quot;&gt;Nubus&lt;/a&gt; demonstrates the important role an open IAM can play: it not only manages identities but also centrally controls access rights and provides this information via open interfaces.&lt;/strong&gt; An example is the ambitious &lt;a href=&quot;https://www.schleswig-holstein.de/DE/landesregierung/themen/digitalisierung/linux-plus1/Service/Downloads/_dateien/open-source-strategie.pdf?__blob=publicationFile&amp;amp;v=3&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;open-source project&lt;/a&gt; of the state of &lt;a href=&quot;https://www.heise.de/hintergrund/Von-Microsoft-zu-Open-Source-Wie-Schleswig-Holstein-den-Wechsel-schaffen-will-10279400.html&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Schleswig-Holstein&lt;/a&gt;, which is currently building a new statewide directory service with Nubus. This will eventually replace the previous Active Directory environment and enable secure access to specialized applications, devices, and central IT systems – role-based, data protection compliant, and fully under local control.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div id=&quot;meta-origin&quot;&gt;
&lt;div class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_85632&quot; style=&quot;width: 760px;&quot;&gt;&lt;a href=&quot;https://www.univention.de/wp-content/uploads/2026/02/opendesk-EN.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;image-no-border wp-image-85632&quot; height=&quot;422&quot; src=&quot;https://www.univention.de/wp-content/uploads/2026/02/opendesk-EN-1000x563.png&quot; width=&quot;750&quot; /&gt;&lt;/a&gt;&lt;p class=&quot;wp-caption-text&quot; id=&quot;caption-attachment-85632&quot;&gt;Diagram 3: Modular infrastructures illustrated using the openDesk case study&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;To get started with a sovereign cloud infrastructure using Nubus as IAM, pre-configured &lt;a href=&quot;https://www.univention.com/products/functions/integrations/&quot;&gt;integrations&lt;/a&gt; are helpful. For example, the &lt;a href=&quot;https://www.univention.com/products/functions/ad-integration/&quot;&gt;Active Directory connection&lt;/a&gt; allows an open IAM to synchronize with an existing AD – including accounts, groups, and passwords. There are also ready-made integration packages for complete applications such as Nextcloud or Open-Xchange, which make connecting third-party software to Nubus particularly easy. Further packages are being developed and gradually released. Connector tools for Google Workspace, Apple School Manager, or Microsoft 365 also support single sign-on to these cloud services. These tools facilitate a smooth transition to open, controllable architectures – without having to replace everything immediately.&lt;/p&gt;
&lt;p&gt;These projects show: digital sovereignty is not an abstract goal but can be concretely implemented with open source – step by step, traceably, and sustainably.&lt;/p&gt;
&lt;/div&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;uni-section uni-section--pt-0 uni-section--pb-8 &quot;&gt;&lt;div class=&quot;uni-container uni-container--sm&quot;&gt;&lt;div class=&quot;vc_row wpb_row vc_row-fluid&quot;&gt;&lt;div class=&quot;wpb_column vc_column_container vc_col-sm-12&quot;&gt;&lt;div class=&quot;vc_column-inner&quot;&gt;&lt;div class=&quot;wpb_wrapper&quot;&gt;

&lt;h2&gt;
  Conclusion: IAM as the Key to Digital Sovereignty&lt;/h2&gt;


	&lt;div class=&quot;wpb_text_column wpb_content_element&quot;&gt;
		&lt;div class=&quot;wpb_wrapper&quot;&gt;
			&lt;div id=&quot;meta-origin&quot;&gt;
&lt;p&gt;Digital sovereignty is not created by a product label but by an architecture that remains open, controllable, and adaptable. Organizations that want to operate IT services themselves or integrate them into existing structures need an IAM that grows with them – from authentication through roles and permissions to full automation.&lt;/p&gt;
&lt;p&gt;Many organizations build their own IAM systems from LDAP, scripts, and database reconciliations in hopes of maximum flexibility. Such homemade solutions quickly hit limits: lack of logging, poor scalability, security risks. Using an established open-source IAM, by contrast, offers tested standards, community support, and extensibility – without technical debt.&lt;/p&gt;
&lt;p&gt;A sovereign IT stack needs more than containers and services. Only with a central IAM can identities, roles, and access rights be reliably managed – across all applications. It is the connecting element that turns individual parts into a functional whole: interoperable, controllable, and sustainably maintainable.&lt;/p&gt;
&lt;p&gt;This article has already been published in &lt;em&gt;Informatik Aktuell&lt;/em&gt; and can be viewed &lt;a href=&quot;https://www.informatik-aktuell.de/betrieb/sicherheit/souveraene-it-mit-open-source-so-gelingt-der-eigene-modulare-anwendungs-stack.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Do you want to ensure your digital operational capability even in emergency situations and keep critical IT services running reliably?&lt;br /&gt;
With “&lt;strong&gt;Nubus for Business Continuity&lt;/strong&gt;”, a prepared, parallel IAM runs in standby mode, ready to take over immediately in a crisis and maintain access to applications, systems, and data. Learn how a sovereign IAM strategy can help you reduce risks and strengthen your IT resilience here: &lt;a href=&quot;https://www.univention.com/solutions/nubus-for-business-continuity/&quot;&gt;https://www.univention.com/solutions/nubus-for-business-continuity/&lt;/a&gt;&lt;/p&gt;

		&lt;/div&gt;
	&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Der Beitrag &lt;a href=&quot;https://www.univention.com/blog-en/2026/02/sovereign-it-open-source-modular-application-stack-iam/&quot;&gt;Sovereign IT with Open Source: How to Build Your Own Modular Application Stack&lt;/a&gt; erschien zuerst auf &lt;a href=&quot;https://www.univention.com&quot;&gt;Univention&lt;/a&gt;.&lt;/p&gt;</content>
	<author>
	  <name>Ingo Steuwer</name>
	   <uri>https://www.univention.com/news/blog-en/</uri> 
	</author>
	<source>
	  <title type="html">Univention Blog - the Corporate Blog of Univention</title>
	  <subtitle type="html">be open.</subtitle>
	  <link rel="self" href="https://www.univention.com/news/blog-en/feed/"/>
	  <id>https://www.univention.com/news/blog-en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Privacy Under Siege</title>
	<link href="https://puri.sm/posts/privacy-under-siege/"/>
	<id>https://puri.sm/?p=85191</id>
	<updated>2026-02-18T16:55:58+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;Surveillance, Breaches, and Gaps in the Law It has become clear that privacy risks are not isolated incidents. They are part of a larger pattern.  Major organizations continue to experience large scale data breaches. Brightspeed recently suffered a breach affecting around one million customers. Brightspeed opened an internal cybersecurity investigation in early January this year, after Crimson […]&lt;/p&gt;
&lt;p&gt;The post &lt;a href=&quot;https://puri.sm/posts/privacy-under-siege/&quot; rel=&quot;nofollow&quot;&gt;Privacy Under Siege&lt;/a&gt; appeared first on &lt;a href=&quot;https://puri.sm/&quot; rel=&quot;nofollow&quot;&gt;Purism&lt;/a&gt;.&lt;/p&gt;</content>
	<author>
	  <name>Purism</name>
	   <uri>https://puri.sm/</uri> 
	</author>
	<source>
	  <title type="html">Purism</title>
	  <subtitle type="html">High-quality computers that protect your freedom and privacy</subtitle>
	  <link rel="self" href="https://puri.sm/feed/"/>
	  <id>https://puri.sm/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Sparky 8.2</title>
	<link href="https://sparkylinux.org/sparky-8-2/"/>
	<id>https://sparkylinux.org/?p=14020</id>
	<updated>2026-02-16T13:52:30+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;There is the second update available for Sparky 8 – 8.2. This is a quarterly update of the Sparky 8 “Seven Sisters” stable release. Sparky 8 is based on and fully compatible with Debian 13 “Trixie”. Main changes: – All packages updated from the stable Debian and Sparky repositories as of February 14, 2026. – Linux kernel: 6.12.69-LTS (6.19.1, 6.12.72 LTS, 6.6.125-LTS in sparky repositories) …&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://sparkylinux.org/sparky-8-2/&quot; rel=&quot;nofollow&quot;&gt;Source&lt;/a&gt;&lt;/p&gt;</content>
	<author>
	  <name>pavroo</name>
	   <uri>https://sparkylinux.org</uri> 
	</author>
	<source>
	  <title type="html">SparkyLinux</title>
	  <subtitle type="html">SparkyLinux project page</subtitle>
	  <link rel="self" href="https://sparkylinux.org/feed/"/>
	  <id>https://sparkylinux.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 你的 AI 还在&quot;嘴炮&quot;，别人的 AI 已经开始&quot;干活&quot;了</title>
	<link href="https://www.deepin.org/en/uos-ai-2-12-601/"/>
	<id>https://www.deepin.org/?p=38353</id>
	<updated>2026-02-14T09:06:28+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="tr">Mustafa Akgül Özgür Yazılım 2026 Kış Kampı Tamamlandı</title>
	<link href="https://pardus.org.tr/mustafa-akgul-ozgur-yazilim-2026-kis-kampi-tamamlandi/"/>
	<id>https://pardus.org.tr/?p=25894</id>
	<updated>2026-02-13T07:35:13+00:00</updated>
	<summary type="html" xml:lang="tr"></summary>
	<content type="html" xml:lang="en">Afyon Kocatepe Üniversitesi ev sahipliğinde Linux Kullanıcıları Derneği (LKD) koordinasyonunda 4–8 Şubat 2026 tarihleri arasında düzenlenen Mustafa Akgül Özgür Yazılım 2026 Kış Kampı, özgür yazılım ve açık kaynak teknolojiler alanında önemli bir buluşma noktası oldu.</content>
	<author>
	  <name>Hace İbrahim Özbal</name>
	   <uri>https://pardus.org.tr</uri> 
	</author>
	<source>
	  <title type="html">Pardus – TÜBİTAK</title>
	  <subtitle type="html">Teknolojiyi Özgürleştirin Pardus ile Geleceğe Adım Atın</subtitle>
	  <link rel="self" href="https://pardus.org.tr/feed/"/>
	  <id>https://pardus.org.tr</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 玲珑商店社区版 2.0 时代开启 ！支持十余款发行版玲珑环境自动安装</title>
	<link href="https://www.deepin.org/en/linyaps-app-store-2-1-1/"/>
	<id>https://www.deepin.org/?p=38334</id>
	<updated>2026-02-13T02:23:14+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">32 bit support will end with BunsenLabs Boron</title>
	<link href="https://forums.bunsenlabs.org/viewtopic.php?id=9690"/>
	<id>https://www.bunsenlabs.org/feed/news/1bbe6416-b42a-5b6d-b2a2-baa52f67074a</id>
	<updated>2026-02-13T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;postmsg&quot;&gt;
 &lt;p&gt;
  Debian - on which BunsenLabs is based - have dropped 32 bit kernels, installers and iso images from the current stable Trixie release.
 &lt;/p&gt;
 &lt;p&gt;
  BunsenLabs will be forced to do likewise, and the upcoming Carbon release will have no 32 bit iso images, or 32bit package repositories.
 &lt;/p&gt;
 &lt;p&gt;
  Users with 32 bit machines can continue to use BunsenLabs Boron for as long as Debian Long Term Support for Bookworm continues, which is expected to be until June 30, 2028:
  &lt;br /&gt;
  &lt;a href=&quot;https://wiki.debian.org/LTS&quot; rel=&quot;nofollow&quot;&gt;
   https://wiki.debian.org/LTS
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  Previous discussion:
  &lt;br /&gt;
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=140748#p140748&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 48#p140748
  &lt;/a&gt;
 &lt;/p&gt;
&lt;/div&gt;</content>
	<author>
	  <name>BunsenLabs Linux</name>
	   <uri>https://forums.bunsenlabs.org/viewforum.php?id=12</uri> 
	</author>
	<source>
	  <title type="html">BunsenLabs Linux News</title>
	  
	  <link rel="self" href="https://www.bunsenlabs.org/feed/news/atom"/>
	  <id>https://www.bunsenlabs.org/feed/news/684cbf76-7ebc-5242-9b5c-f18edf49cc9d</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">January 2026 Threat Report: Off to a Raucous Start – Part 2</title>
	<link href="https://www.greenbone.net/en/blog/january-2026-threat-report-off-to-a-raucous-start-part-2/"/>
	<id>https://www.greenbone.net/?p=63639</id>
	<updated>2026-02-11T10:20:56+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">So far, 2026 is off to a raucous start. With so much activity in the software vulnerability landscape it’s easy to understand the concerns of global executives discussed in Part 1 of the January 2026 Threat Report. This volatility also highlights the value of Greenbone’s industry-leading detection coverage. In Part 2 of the January Threat […]</content>
	<author>
	  <name>Joseph Lee</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) Wine 应用适配新突破！3ds Max、WPS PDF 适配上线</title>
	<link href="https://www.deepin.org/en/deepin-wine-v3-4-3/"/>
	<id>https://www.deepin.org/?p=38319</id>
	<updated>2026-02-11T02:34:03+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Tails 7.4.2</title>
	<link href="https://tails.net/news/version_7.4.2/"/>
	<id>https://tails.net/news/version_7.4.2/</id>
	<updated>2026-02-11T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;This release is an emergency release to fix critical security
vulnerabilities in the &lt;em&gt;Linux&lt;/em&gt; kernel.&lt;/p&gt;

&lt;h1 id=&quot;changes&quot;&gt;Changes and updates&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Linux&lt;/em&gt; kernel to 6.12.69, which fixes &lt;a href=&quot;https://lists.debian.org/debian-security-announce/2026/msg00035.html&quot;&gt;DSA
6126-1&lt;/a&gt;,
multiple security vulnerabilities that could allow an application in Tails to
gain administration privileges.&lt;/p&gt;

&lt;p&gt;For example, if an attacker was able to exploit other unknown security
vulnerabilities in an application included in Tails, they might then use DSA
6126-1 to take full control of your Tails and deanonymize you.&lt;/p&gt;

&lt;div class=&quot;attack&quot;&gt;

&lt;p&gt;This attack is very unlikely, but could be performed by a strong attacker,
such as a government or a hacking firm. We are not aware of this attack being
used in practice.&lt;/p&gt;

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href=&quot;https://www.thunderbird.net/en-US/thunderbird/140.7.1esr/releasenotes/&quot;&gt;140.7.1&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h1 id=&quot;fixes&quot;&gt;Fixed problems&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Fix opening the Wi-Fi settings from the &lt;em&gt;Tor Connection&lt;/em&gt; assistant.
(&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/18587&quot;&gt;#18587&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fix reopening &lt;em&gt;Electrum&lt;/em&gt; when it was not closed cleanly. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21390&quot;&gt;#21390&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fix applying the language saved to the USB stick in the Welcome Screen.
(&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21383&quot;&gt;#21383&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For more details, read our &lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog&quot;&gt;changelog&lt;/a&gt;.&lt;/p&gt;

&lt;h1 id=&quot;get&quot;&gt;Get Tails 7.4.2&lt;/h1&gt;


&lt;h2&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.4.2.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an
automatic upgrade, please try to do a &lt;a href=&quot;https://tails.net/doc/upgrade/index.en.html#manual&quot;&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;To install Tails 7.4.2 on a new USB stick&lt;/h2&gt;

&lt;p&gt;Follow our installation instructions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/windows/index.en.html&quot;&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/mac/index.en.html&quot;&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/linux/index.en.html&quot;&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/expert/index.en.html&quot;&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;caution&quot;&gt;&lt;p&gt;The Persistent Storage on the USB stick will be lost if
you install instead of upgrading.&lt;/p&gt;&lt;/div&gt;


&lt;h2&gt;To download only&lt;/h2&gt;

&lt;p&gt;If you don&#39;t need installation or upgrade instructions, you can download
Tails 7.4.2 directly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download/index.en.html&quot;&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download-iso/index.en.html&quot;&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
	<author>
	  <name>Tails</name>
	   <uri>https://tails.net/news/index.en.html</uri> 
	</author>
	<source>
	  <title type="html">Tails - News</title>
	  <subtitle type="html">Tails</subtitle>
	  <link rel="self" href="https://tails.net/news/index.en.rss"/>
	  <id>https://tails.net/news/index.en.html</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Fedora 43 templates available for Qubes OS 4.3</title>
	<link href="https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/"/>
	<id>https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/</id>
	<updated>2026-02-06T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;The following new &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html&quot;&gt;Fedora 43 templates&lt;/a&gt; are now available for Qubes OS 4.3:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43-xfce&lt;/code&gt; (default Fedora template with the &lt;a href=&quot;https://xfce.org/&quot;&gt;Xfce&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43&lt;/code&gt; (alternative Fedora template with the &lt;a href=&quot;https://www.gnome.org/&quot;&gt;GNOME&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43-minimal&lt;/code&gt; (&lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/minimal-templates.html&quot;&gt;minimal template&lt;/a&gt; for advanced users)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Fedora 43 template availability for Qubes OS 4.2 will be announced separately.&lt;/p&gt;

&lt;p&gt;There are two ways to upgrade a template to a new Fedora release:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html#installing&quot;&gt;Install a fresh template to replace an existing one.&lt;/a&gt; This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/templates.html#switching&quot;&gt;switch everything that was set to the old template to the new template&lt;/a&gt;. If you choose to modify your template, you may wish to write those modifications down so that you remember what to redo on each fresh install. To see a log of package manager actions, open a terminal in the template and use the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dnf history&lt;/code&gt; command.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Advanced:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora-upgrade.html&quot;&gt;Perform an in-place upgrade of an existing Fedora template.&lt;/a&gt; This option will preserve any modifications you’ve made to the template, but it may be more complicated for less experienced users.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; No user action is required regarding the OS version in dom0 (see our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#note-on-dom0-and-eol&quot;&gt;note on dom0 and EOL&lt;/a&gt;).&lt;/p&gt;</content>
	<author>
	  <name>Qubes</name>
	   <uri>https://www.qubes-os.org/</uri> 
	</author>
	<source>
	  <title type="html">Qubes OS</title>
	  <subtitle type="html">Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.</subtitle>
	  <link rel="self" href="https://www.qubes-os.org/feed.xml"/>
	  <id>https://www.qubes-os.org/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">deepin Community Monthly Report for January 2026</title>
	<link href="https://www.deepin.org/en/deepin-community-monthly-report-2026-1/"/>
	<id>https://www.deepin.org/?p=38301</id>
	<updated>2026-02-05T10:14:06+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Learn more about deepin details, historical versions, user reviews, etc.: https://distrowatch.com/table.php?distribution=deepin I. Overview of Community Data for January 2026 II. Community Products 2.1 Release of deepin 25.0.10 Version Image: Comprehensive Optimization of Installation Experience and System Interaction In January 2026, deepin officially released the deepin 25.0.10 system image, focusing on experience upgrades for the installation process, file management, and system interaction. Optimized System Installation Experience: Enhanced data formatting prompts during full-disk installation, supporting the retention of user data and reuse of original account configurations, simplifying system migration and upgrade processes. Improved File Manager Efficiency: Added features such as automatic scrolling during file drag-and-drop, ...&lt;a href=&quot;https://www.deepin.org/en/deepin-community-monthly-report-2026-1/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">January 2026 Threat Report: Off to a Raucous Start</title>
	<link href="https://www.greenbone.net/en/blog/january-2026-threat-report-off-to-a-raucous-start/"/>
	<id>https://www.greenbone.net/?p=63325</id>
	<updated>2026-02-05T07:04:27+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">So far, 2026 is off to a raucous start. The number of critical severity vulnerabilities impacting widely deployed software is staggering. Defenders need to scan widely and scan often to detect new threats in their infrastructure and prioritize mitigation efforts based on the potential impact to business operations, privacy regulations, and other compliance responsibilities. Defenders […]</content>
	<author>
	  <name>Joseph Lee</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Sim Swap Attacks Surging</title>
	<link href="https://puri.sm/posts/sim-swap-attacks-surging/"/>
	<id>https://puri.sm/?p=84947</id>
	<updated>2026-02-04T18:26:59+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;SIM swap attacks are skyrocketing. A SIM Swap attack is when cybercriminals hijack mobile numbers by convincing carriers to transfer a victim’s phone number to a SIM card they control. Once successful, attackers intercept text-based authentication codes, unlocking access to cryptocurrency wallets, banking apps, and social media accounts.&lt;/p&gt;
&lt;p&gt;The post &lt;a href=&quot;https://puri.sm/posts/sim-swap-attacks-surging/&quot; rel=&quot;nofollow&quot;&gt;Sim Swap Attacks Surging&lt;/a&gt; appeared first on &lt;a href=&quot;https://puri.sm/&quot; rel=&quot;nofollow&quot;&gt;Purism&lt;/a&gt;.&lt;/p&gt;</content>
	<author>
	  <name>Purism</name>
	   <uri>https://puri.sm/</uri> 
	</author>
	<source>
	  <title type="html">Purism</title>
	  <subtitle type="html">High-quality computers that protect your freedom and privacy</subtitle>
	  <link rel="self" href="https://puri.sm/feed/"/>
	  <id>https://puri.sm/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">When Open Source Infrastructure Stops Being Easy to Operate</title>
	<link href="https://www.skudonet.com/blog/open-source-infrastructure/"/>
	<id>https://www.skudonet.com/?p=76603</id>
	<updated>2026-02-04T13:18:27+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;Open Source infrastructure is often a deliberate and well-reasoned choice. It offers transparency, control and a level of flexibility that fits well with how many engineering teams like to build and operate systems. Deploying an open source load balancer or reverse proxy is usually a conscious decision, backed by solid documentation, community knowledge and proven behavior in production.&lt;/p&gt;
&lt;p&gt;In most cases, it performs exactly as expected. Configuration is understandable, behavior is predictable and the system feels under control.&lt;/p&gt;
&lt;p&gt;The challenge does not appear at deployment time. It emerges later, as traffic increases, environments expand and the same platform has to support more services, more changes and more operators. Configuration grows, operational tasks multiply and the margin for error narrows. Changes that were once straightforward start requiring coordination, validation and caution.&lt;/p&gt;
&lt;p&gt;At that stage, the problem is not the software itself. The difficulty lies in operating open source infrastructure reliably as the system grows and operational demands increase.&lt;/p&gt;
&lt;h2&gt;An open-source load balancer in a growing environment&lt;/h2&gt;
&lt;p&gt;At this stage, most teams know the technology well. They trust Open Source and often run mature projects like HAProxy, NGINX, Apache, or even the SKUDONET Community Edition. These tools are proven, fast and predictable, and they give administrators full control over how traffic is handled.&lt;br /&gt;
As the environment grows, friction starts to appear:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A single configuration evolves into multiple files spread across environments&lt;/li&gt;
&lt;li&gt;Changes require coordination across teams and systems&lt;/li&gt;
&lt;li&gt;Visibility relies on logs that are not always centralized or easy to correlate&lt;/li&gt;
&lt;li&gt;Updates and patches must be planned, tested and rolled out manually&lt;/li&gt;
&lt;li&gt;High-availability setups work, but upgrading them without disruption becomes increasingly difficult&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Security adds more pressure. Rules, ACLs or WAF logic exist, but tuning them safely takes effort. When something goes wrong, it is not always clear whether the issue comes from configuration, traffic patterns or the infrastructure itself.&lt;/p&gt;
&lt;p&gt;None of this breaks the system. But it slows it down operationally. The load balancer still works, yet running it demands more time, more care and more experience than before. This is usually when teams start questioning whether relying only on community tooling is still the right model for their current scale.&lt;/p&gt;
&lt;h2&gt;The natural next step: teams start looking beyond community tools&lt;/h2&gt;
&lt;p&gt;When this point is reached, teams know what is not working and they start by looking around the ecosystem they already trust. Users of HAProxy, NGINX or Apache usually do not want to replace their stack. Instead, they evaluate the commercial or enterprise options built around the same technologies, expecting easier operation, better visibility and safer upgrades.&lt;br /&gt;
These editions typically promise:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;centralized management&lt;/li&gt;
&lt;li&gt;technical support&lt;/li&gt;
&lt;li&gt;safer update and upgrade processes&lt;/li&gt;
&lt;li&gt;additional security capabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The problem is that this promise does not always translate into simpler operations. Some enterprise versions keep much of the same operational complexity as the community tools, with configuration-heavy workflows and limited abstraction. Others introduce pricing models that grow quickly with traffic and environments, or platforms that are technically powerful but harder to operate on a daily basis.&lt;/p&gt;
&lt;h2&gt;SKUDONET Enterprise as the natural evolution from Open Source&lt;/h2&gt;
&lt;p&gt;SKUDONET Enterprise is designed to remove the operational friction that appears when Open Source infrastructure grows.&lt;/p&gt;
&lt;p&gt;Configuration, traffic control and visibility are handled from a single plane, instead of being spread across files, nodes and environments. This reduces the effort required to introduce changes and lowers the operational risk.&lt;/p&gt;
&lt;p&gt;In practice, this translates into:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and visibility&lt;/strong&gt;, without losing control over traffic behavior or routing logic&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simpler operations&lt;/strong&gt;, where updates, high availability and scaling do not rely on complex or fragile maintenance workflows&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security that remains manageable&lt;/strong&gt;, with clear insight into how rules behave and how traffic is affected&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operational continuity&lt;/strong&gt;, even as environments, traffic volume and teams evolve&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;High availability, updates and maintenance&lt;/strong&gt; are treated as part of the platform, not as separate projects that require careful coordination. Routine tasks no longer depend on manual processes or deep system-specific knowledge to be executed safely.&lt;/p&gt;
&lt;p&gt;Integration remains straightforward. Existing architectures and deployment models stay in place, allowing teams to add &lt;strong&gt;Enterprise capabilities&lt;/strong&gt; without redesigning their stack or introducing heavy control layers.&lt;/p&gt;
&lt;p&gt;Pricing stays predictable as environments scale, &lt;strong&gt;avoiding the cost escalation and licensing complexity&lt;/strong&gt; commonly associated with traditional commercial editions.&lt;br /&gt;
The result is a platform that preserves the technical foundations teams trust, while making infrastructure easier to operate, easier to maintain and easier to scale.&lt;/p&gt;
&lt;p&gt;If you want to evaluate how this approach works in practice, you can try &lt;strong&gt;SKUDONET Enterprise with a 30-day demo&lt;/strong&gt; and validate the fit in your own environment.&lt;/p&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-top: 30px;&quot;&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;TRY ENTERPRISE DEMO&lt;/a&gt;&lt;/div&gt;</content>
	<author>
	  <name>Nieves Álvarez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 先进生产力：在 deepin 25 上装 OpenClaw 接飞书</title>
	<link href="https://www.deepin.org/en/deepin-25-openclaw-feishu/"/>
	<id>https://www.deepin.org/?p=38280</id>
	<updated>2026-02-04T10:05:58+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">BunsenLabs Carbon Release Candidate 3 iso available</title>
	<link href="https://forums.bunsenlabs.org/viewtopic.php?id=9682"/>
	<id>https://www.bunsenlabs.org/feed/news/22f7f2cb-3154-5673-a2a8-0c4129ae58cb</id>
	<updated>2026-02-03T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;postmsg&quot;&gt;
 &lt;p&gt;
  BunsenLabs Carbon Release Candidate 3 iso is available here:
  &lt;a href=&quot;https://sourceforge.net/projects/bunsenlabs-releases/files/isos/carbon-rc3-260202-amd64.hybrid.iso&quot; rel=&quot;nofollow&quot;&gt;
   https://sourceforge.net/projects/bunsen … hybrid.iso
  &lt;/a&gt;
  &lt;a href=&quot;https://sourceforge.net/projects/bunsenlabs-releases/files/isos/carbon-rc3-260202-amd64.hybrid.iso.sha256&quot; rel=&quot;nofollow&quot;&gt;
   https://sourceforge.net/projects/bunsen … iso.sha256
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  sha256 sum: 47de769531fc0c99d9e0fa4b095ff280919684e5baae29fe264b9970e962a45f
 &lt;/p&gt;
 &lt;p&gt;
  Unless unexpected bugs come up, this should be the same as the Official Release of Bunsenlabs Carbon.
 &lt;/p&gt;
 &lt;p&gt;
  If you do find a new bug related to the Carbon RC3 iso, please post it in the
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewforum.php?id=14&quot; rel=&quot;nofollow&quot;&gt;
   Bug Reports
  &lt;/a&gt;
  section, adding a tag [Carbon RC3].
 &lt;/p&gt;
&lt;/div&gt;</content>
	<author>
	  <name>BunsenLabs Linux</name>
	   <uri>https://forums.bunsenlabs.org/viewforum.php?id=12</uri> 
	</author>
	<source>
	  <title type="html">BunsenLabs Linux News</title>
	  
	  <link rel="self" href="https://www.bunsenlabs.org/feed/news/atom"/>
	  <id>https://www.bunsenlabs.org/feed/news/684cbf76-7ebc-5242-9b5c-f18edf49cc9d</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Sparky news 2026/01</title>
	<link href="https://sparkylinux.org/sparky-news-2026-01/"/>
	<id>https://sparkylinux.org/?p=14013</id>
	<updated>2026-02-01T19:26:46+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;The 1st monthly Sparky project and donate report of the 2026: – Linux kernel updated up to 6.18.8, 6.12.68-LTS, 6.6.122-LTS – Added new desktop to Sparky testing (9): Labwc – Sparky 2026.01~dev2 Labwc released – changed ‘firefox-sparky’ packaga name to ‘firefox-latest’ Many thanks to all of you for supporting our open-source projects. Your donations help keeping them and us alive.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://sparkylinux.org/sparky-news-2026-01/&quot; rel=&quot;nofollow&quot;&gt;Source&lt;/a&gt;&lt;/p&gt;</content>
	<author>
	  <name>pavroo</name>
	   <uri>https://sparkylinux.org</uri> 
	</author>
	<source>
	  <title type="html">SparkyLinux</title>
	  <subtitle type="html">SparkyLinux project page</subtitle>
	  <link rel="self" href="https://sparkylinux.org/feed/"/>
	  <id>https://sparkylinux.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Michael Prokop: apt, SHA-1 keys + 2026-02-01</title>
	<link href="https://michael-prokop.at/blog/2026/01/31/apt-sha-1-keys-2026-02-01/"/>
	<id>https://michael-prokop.at/blog/?p=7331</id>
	<updated>2026-01-31T13:57:30+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;You might have seen &lt;em&gt;Policy will reject signature within a year&lt;/em&gt; warnings in apt(-get) update runs like this:&lt;/p&gt;
&lt;pre&gt;root@424812bd4556:/# apt update
Get:1 http://foo.example.org/debian demo InRelease [4229 B]
Hit:2 http://deb.debian.org/debian trixie InRelease
Hit:3 http://deb.debian.org/debian trixie-updates InRelease
Hit:4 http://deb.debian.org/debian-security trixie-security InRelease
Get:5 http://foo.example.org/debian demo/main amd64 Packages [1097 B]
Fetched 5326 B in 0s (43.2 kB/s)
All packages are up to date.
Warning: http://foo.example.org/debian/dists/demo/InRelease: Policy will reject signature within a year, see --audit for details

root@424812bd4556:/# apt --audit update
Hit:1 http://foo.example.org/debian demo InRelease
Hit:2 http://deb.debian.org/debian trixie InRelease
Hit:3 http://deb.debian.org/debian trixie-updates InRelease
Hit:4 http://deb.debian.org/debian-security trixie-security InRelease
All packages are up to date.    
Warning:  http://foo.example.org/debian/dists/demo/InRelease: Policy will reject signature within a year, see --audit for details
Audit:  http://foo.example.org/debian/dists/demo/InRelease: Sub-process /usr/bin/sqv returned an error code (1), error message is:
   Signing key on 54321ABCD6789ABCD0123ABCD124567ABCD89123 is not bound:
              No binding signature at time 2024-06-19T10:33:47Z
     because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance
     because: SHA1 is not considered secure since 2026-02-01T00:00:00Z
Audit: The sources.list(5) entry for &#39;http://foo.example.org/debian&#39; should be upgraded to deb822 .sources
Audit: Missing Signed-By in the sources.list(5) entry for &#39;http://foo.example.org/debian&#39;
Audit: Consider migrating all sources.list(5) entries to the deb822 .sources format
Audit: The deb822 .sources format supports both embedded as well as external OpenPGP keys
Audit: See apt-secure(8) for best practices in configuring repository signing.
Audit: Some sources can be modernized. Run &#39;apt modernize-sources&#39; to do so.
&lt;/pre&gt;
&lt;p&gt;If you ignored this for the last year, I would like to tell you that 2026-02-01 is not that far away (hello from the past if you’re reading this because you’re already affected).&lt;/p&gt;
&lt;p&gt;Let’s simulate the future:&lt;/p&gt;
&lt;pre&gt;root@424812bd4556:/# apt --update -y install faketime
[...]
root@424812bd4556:/# export LD_PRELOAD=/usr/lib/x86_64-linux-gnu/faketime/libfaketime.so.1 FAKETIME=&quot;2026-08-29 23:42:11&quot; 
root@424812bd4556:/# date
Sat Aug 29 23:42:11 UTC 2026

root@424812bd4556:/# apt update
Get:1 http://foo.example.org/debian demo InRelease [4229 B]
Hit:2 http://deb.debian.org/debian trixie InRelease                                 
Err:1 http://foo.example.org/debian demo InRelease
  Sub-process /usr/bin/sqv returned an error code (1), error message is: Signing key on 54321ABCD6789ABCD0123ABCD124567ABCD89123 is not bound:            No binding signature at time 2024-06-19T10:33:47Z   because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance   because: SHA1 is not considered secure since 2026-02-01T00:00:00Z
[...]
Warning: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. OpenPGP signature verification failed: http://foo.example.org/debian demo InRelease: Sub-process /usr/bin/sqv returned an error code (1), error message is: Signing key on 54321ABCD6789ABCD0123ABCD124567ABCD89123 is not bound:            No binding signature at time 2024-06-19T10:33:47Z   because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance   because: SHA1 is not considered secure since 2026-02-01T00:00:00Z
[...]
root@424812bd4556:/# echo $?
100

&lt;/pre&gt;
&lt;p&gt;Now, the proper solution would have been to fix the signing key underneath (via e.g. &lt;em&gt;&lt;a href=&quot;https://book.sequoia-pgp.org/lint.html&quot;&gt;sq cert lint&lt;/a&gt;  &amp;amp;dash&amp;amp;dashfix &amp;amp;dash&amp;amp;dashcert-file $PRIVAT_KEY_FILE &amp;gt; $PRIVAT_KEY_FILE-fixed&lt;/em&gt;).&lt;/p&gt;
&lt;p&gt;If you don’t have access to the according private key (e.g. when using an upstream repository that has been ignoring this issue), you’re out of luck for a proper fix.&lt;/p&gt;
&lt;p&gt;But there’s a workaround for the apt situation (related see &lt;a href=&quot;https://salsa.debian.org/apt-team/apt/-/commit/0989275c2f7afb7a5f7698a096664a1035118ebf&quot;&gt;apt commit 0989275c2f7afb7a5f7698a096664a1035118ebf&lt;/a&gt;):&lt;/p&gt;
&lt;pre&gt;root@424812bd4556:/# cat /usr/share/apt/default-sequoia.config
# Default APT Sequoia configuration. To overwrite, consider copying this
# to /etc/crypto-policies/back-ends/apt-sequoia.config and modify the
# desired values.
[asymmetric_algorithms]
dsa2048 = 2024-02-01
dsa3072 = 2024-02-01
dsa4096 = 2024-02-01
brainpoolp256 = 2028-02-01
brainpoolp384 = 2028-02-01
brainpoolp512 = 2028-02-01
rsa2048  = 2030-02-01

[hash_algorithms]
sha1.second_preimage_resistance = 2026-02-01    # Extend the expiry for legacy repositories
sha224 = 2026-02-01

[packets]
signature.v3 = 2026-02-01   # Extend the expiry
&lt;/pre&gt;
&lt;p&gt;Adjust this according to your needs:&lt;/p&gt;
&lt;pre&gt;root@424812bd4556:/# mkdir -p /etc/crypto-policies/back-ends/

root@424812bd4556:/# cp /usr/share/apt/default-sequoia.config /etc/crypto-policies/back-ends/apt-sequoia.config

root@424812bd4556:/# $EDITOR /etc/crypto-policies/back-ends/apt-sequoia.config

root@424812bd4556:/# cat /etc/crypto-policies/back-ends/apt-sequoia.config
# APT Sequoia override configuration
[asymmetric_algorithms]
dsa2048 = 2024-02-01
dsa3072 = 2024-02-01
dsa4096 = 2024-02-01
brainpoolp256 = 2028-02-01
brainpoolp384 = 2028-02-01
brainpoolp512 = 2028-02-01
rsa2048  = 2030-02-01

[hash_algorithms]
sha1.second_preimage_resistance = 2026-09-01    # Extend the expiry for legacy repositories
sha224 = 2026-09-01

[packets]
signature.v3 = 2026-02-01   # Extend the expiry
&lt;/pre&gt;
&lt;p&gt;Then we’re back into the original situation, being a warning instead of an error:&lt;/p&gt;
&lt;pre&gt;root@424812bd4556:/# apt update
Hit:1 http://deb.debian.org/debian trixie InRelease
Get:2 http://foo.example.org/debian demo InRelease [4229 B]
Hit:3 http://deb.debian.org/debian trixie-updates InRelease
Hit:4 http://deb.debian.org/debian-security trixie-security InRelease
Warning: http://foo.example.org/debian/dists/demo/InRelease: Policy will reject signature within a year, see --audit for details
[..]
&lt;/pre&gt;
&lt;p&gt;Please note that this is a &lt;em&gt;workaround&lt;/em&gt;, and &lt;em&gt;not&lt;/em&gt; a proper solution.&lt;/p&gt;</content>
	<author>
	  <name>Grml developers</name>
	   <uri>http://planet.grml.org</uri> 
	</author>
	<source>
	  <title type="html">planet grml</title>
	  <subtitle type="html">planet grml - http://planet.grml.org</subtitle>
	  <link rel="self" href="http://planet.grml.org/rss20.xml"/>
	  <id>http://planet.grml.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Urgent Security Update | OpenSSL Multiple Vulnerabilities Fixed, Please Upgrade ASAP!</title>
	<link href="https://www.deepin.org/en/openssl-multiple-vulnerabilities-fixed/"/>
	<id>https://www.deepin.org/?p=38261</id>
	<updated>2026-01-30T10:05:41+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">🔔 Dear deepin Users and Community Members, Recently, OpenSSL has released multiple security vulnerability fix announcements, involving 13 security vulnerabilities, including 2 High/Medium-risk vulnerabilities. To ensure the security of your system, we strongly recommend all users upgrade the relevant packages as soon as possible.   I. Vulnerability Information The CVE identifiers involved in this fix are as follows: CVE-2025-9230, CVE-2025-9231, CVE-2025-9232, CVE-2025-15467, CVE-2025-15468, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796   Key High/Medium Risk Vulnerability Fixes CVE-2025-15467 | High CMS AuthEnvelopedData Parsing Stack Buffer Overflow: This vulnerability could lead to Remote Code Execution (RCE) under specific conditions. Immediate updating ...&lt;a href=&quot;https://www.deepin.org/en/openssl-multiple-vulnerabilities-fixed/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">VyOS Project January 2026 Update</title>
	<link href="https://blog.vyos.io/vyos-project-january2026-update"/>
	<id>https://blog.vyos.io/vyos-project-january2026-update</id>
	<updated>2026-01-30T09:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;hs-featured-image-wrapper&quot;&gt; 
 &lt;a class=&quot;hs-featured-image-link&quot; href=&quot;https://blog.vyos.io/vyos-project-january2026-update&quot; title=&quot;&quot;&gt; &lt;img alt=&quot;January 2026 Project Update - VyOS&quot; class=&quot;hs-featured-image&quot; src=&quot;https://blog.vyos.io/hubfs/vyos_blogpost_update_option_4.png&quot; style=&quot;width: auto !important; float: left; margin: 0 15px 15px 0;&quot; /&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! The belated development update for December 2025 and January 2026 is finally here.&lt;/p&gt; 
&lt;p&gt;We are getting closer to the 1.5 release but there&#39;s also quite a bit of work towards the future. In particular, there&#39;s good progress towards replacing the old configuration command completion mechanism with a VyConf-based equivalent, which will allow us to get rid of legacy command definition files eventually.&lt;/p&gt; 
&lt;p&gt;More immediate improvements include certificate-based authentication for OpenConnect, new operational commands for VPP, support for configuring watchdog timers, and multiple bug fixes.&lt;/p&gt;</content>
	<author>
	  <name>Daniil Baturin</name>
	   <email>daniil@sentrium.io</email> 
	</author>
	<source>
	  <title type="html">VyOS - Blog</title>
	  <subtitle type="html">VyOS Platform Project news and updates 
All about development and project life in  our blog</subtitle>
	  <link rel="self" href="https://blog.vyos.io/rss.xml"/>
	  <id>https://blog.vyos.io</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Tails 7.4.1</title>
	<link href="https://tails.net/news/version_7.4.1/"/>
	<id>https://tails.net/news/version_7.4.1/</id>
	<updated>2026-01-30T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;This release is an emergency release to fix critical security vulnerabilities
in OpenSSL, a network encryption library used by Tor.&lt;/p&gt;

&lt;h1 id=&quot;changes&quot;&gt;Changes and updates&lt;/h1&gt;


&lt;h2&gt;Included software&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update the OpenSSL library to 3.5.4, which fixes &lt;a href=&quot;https://lists.debian.org/debian-security-announce/2026/msg00022.html&quot;&gt;DSA
6113-1&lt;/a&gt;,
a set of vulnerabilities that could be critical. Using this set of
vulnerabilities, an malicious Tor relay might be able to deanonymize a Tails
user.&lt;/p&gt;

&lt;div class=&quot;attack&quot;&gt;

&lt;p&gt;We are not aware of these vulnerabilities being exploited in practice.&lt;/p&gt;

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Tor&lt;/em&gt; client to 0.4.8.22.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href=&quot;https://www.thunderbird.net/en-US/thunderbird/140.7.0esr/releasenotes/&quot;&gt;140.7.0&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h1 id=&quot;fixes&quot;&gt;Fixed problems&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Fix Gmail authentication in &lt;em&gt;Thunderbird&lt;/em&gt;. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21384&quot;&gt;#21384&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Add a spinner when opening the Wi-Fi settings from the Tor Connection
assistant. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/18594&quot;&gt;#18594&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For more details, read our &lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog&quot;&gt;changelog&lt;/a&gt;.&lt;/p&gt;

&lt;h1 id=&quot;issues&quot;&gt;Known issues&lt;/h1&gt;


&lt;p&gt;The homepage of Tor Browser incorrectly says you are still using Tails 7.4, even
after you have upgraded to 7.4.1. It also links to the release notes for that
older version.&lt;/p&gt;

&lt;p&gt;If in doubt, to verify that you are using Tails 7.4.1, choose &lt;strong&gt;Apps ▸
Tails ▸ About Tails&lt;/strong&gt;.&lt;/p&gt;

&lt;h1 id=&quot;get&quot;&gt;Get Tails 7.4.1&lt;/h1&gt;


&lt;h2&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.4.1.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an
automatic upgrade, please try to do a &lt;a href=&quot;https://tails.net/doc/upgrade/index.en.html#manual&quot;&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;To install Tails 7.4.1 on a new USB stick&lt;/h2&gt;

&lt;p&gt;Follow our installation instructions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/windows/index.en.html&quot;&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/mac/index.en.html&quot;&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/linux/index.en.html&quot;&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/expert/index.en.html&quot;&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;caution&quot;&gt;&lt;p&gt;The Persistent Storage on the USB stick will be lost if
you install instead of upgrading.&lt;/p&gt;&lt;/div&gt;


&lt;h2&gt;To download only&lt;/h2&gt;

&lt;p&gt;If you don&#39;t need installation or upgrade instructions, you can download
Tails 7.4.1 directly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download/index.en.html&quot;&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download-iso/index.en.html&quot;&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
	<author>
	  <name>Tails</name>
	   <uri>https://tails.net/news/index.en.html</uri> 
	</author>
	<source>
	  <title type="html">Tails - News</title>
	  <subtitle type="html">Tails</subtitle>
	  <link rel="self" href="https://tails.net/news/index.en.rss"/>
	  <id>https://tails.net/news/index.en.html</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Why multi-tenant proxies make security decisions harder for applications</title>
	<link href="https://www.skudonet.com/blog/multi-tenant-security-application-behavior/"/>
	<id>https://www.skudonet.com/?p=76385</id>
	<updated>2026-01-29T08:23:45+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;In recent weeks, several incidents surfaced where content providers blocked traffic coming from &lt;strong&gt;multi-tenant proxies&lt;/strong&gt; to stop automated attacks or illegal rebroadcasting. The countermeasure reduced the offensive surface, but also denied access to legitimate users travelling through the same channel. It illustrates a common issue: &lt;strong&gt;upstream security&lt;/strong&gt; — security applied at proxies, CDNs or scrubbing centers before traffic reaches the application — does not always retain the &lt;strong&gt;context&lt;/strong&gt; required to make good decisions.&lt;/p&gt;
&lt;p&gt;The relevant point is not the individual incident, but what it exposes: when security runs &lt;strong&gt;upstream and multi-tenant&lt;/strong&gt;, the backend loses &lt;strong&gt;semantics, session state&lt;/strong&gt; and part of the &lt;strong&gt;operational timeline&lt;/strong&gt;. This alters how attacks are detected, how they are mitigated, and how user continuity is preserved.&lt;/p&gt;
&lt;p&gt;The issue is not that these proxies “fail”, but that their efficiency relies on sharing channel, capacity and enforcement across thousands of customers. The model optimizes cost and scale, but erodes signals that were historically essential for &lt;strong&gt;security and operations: origin, semantics, persistence&lt;/strong&gt; and &lt;strong&gt;temporal correlation&lt;/strong&gt;. Once those signals disappear, security stops being a purely defensive problem and becomes an &lt;strong&gt;operational decision&lt;/strong&gt; problem.&lt;/p&gt;
&lt;h2&gt;Shared-proxy architectures and their operational trade-offs&lt;/h2&gt;
&lt;p&gt;Multi-tenant proxies — Cloudflare being the most visible reference — terminate TLS, filter bots, apply WAF rules, absorb DDoS and optimize latency before forwarding requests to the backend. Operationally, the model offers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;shared scale&lt;/li&gt;
&lt;li&gt;economic amortization&lt;/li&gt;
&lt;li&gt;simplified management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The problem emerges in the least visible layer: &lt;strong&gt;traffic identity&lt;/strong&gt;. When thousands of customers share the same defensive channel, the IP address no longer represents a user, it represents the proxy. For the backend, origin stops being an identity signal and becomes a collective. Attackers, legitimate users and corporate SSO traffic exit through the same door.&lt;/p&gt;
&lt;p&gt;Traditional web security largely assumed origin was enough to make decisions. In a multi-tenant model, that signal degrades and the system no longer separates legitimate from abusive behavior with the same clarity.&lt;/p&gt;
&lt;p&gt;At that point the decision collapses to two choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;block the channel → stops the attack but penalizes legitimate users&lt;/li&gt;
&lt;li&gt;allow the channel → preserves continuity but lets part of the attack through&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The difficulty is not having two options, but having to choose with &lt;strong&gt;incomplete information&lt;/strong&gt;. That is where the &lt;strong&gt;multi-tenant model&lt;/strong&gt; shows its real cost: it gains efficiency but loses &lt;strong&gt;context.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;How upstream filtering fragments application context&lt;/h2&gt;
&lt;p&gt;Context loss is not just about hiding origin or masking IP. In production it appears across multiple planes, and — importantly — not in the same place nor at the same time. This fragments the&lt;strong&gt; operational timeline&lt;/strong&gt;, weakens signals and complicates &lt;strong&gt;defensive decision-making.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;TLS plane&lt;/h3&gt;
&lt;p&gt;When TLS &lt;strong&gt;negotiation and establishment&lt;/strong&gt; happen before reaching the application, the backend stops seeing signals that do not indicate attack but do indicate degradation of legitimate clients, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;renegotiation attempts&lt;/li&gt;
&lt;li&gt;handshake failures&lt;/li&gt;
&lt;li&gt;client-side timeouts&lt;/li&gt;
&lt;li&gt;cipher downgrades&lt;/li&gt;
&lt;li&gt;inconsistent SNI&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;During brownouts or incident response, these signals matter because they describe the real client, not the attacker. In a multi-tenant proxy, that degradation disappears and the application only sees “apparently normal” HTTP. For continuity and &lt;strong&gt;SLO compliance&lt;/strong&gt;, that information is lost in the wrong plane.&lt;/p&gt;
&lt;h3&gt;WAF plane&lt;/h3&gt;
&lt;p&gt;When filtering occurs before the application — at a proxy or intermediary — another effect appears: the backend sees the &lt;strong&gt;symptom&lt;/strong&gt; but not the &lt;strong&gt;cause&lt;/strong&gt;.&lt;br /&gt;
The real circuit is:&lt;/p&gt;
&lt;pre&gt;Request → WAF/Proxy → Block → END&lt;/pre&gt;
&lt;p&gt;but for the backend it becomes simply: &lt;strong&gt;less traffic&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Without correlation between planes, &lt;strong&gt;root-cause analysis&lt;/strong&gt; becomes unreliable. A drop in requests may look like failure, user abandonment or load pressure when it is in fact defensive blocking.&lt;/p&gt;
&lt;h3&gt;Session plane&lt;/h3&gt;
&lt;p&gt;In modern architectures, user state does not live in the connection but in the &lt;strong&gt;session&lt;/strong&gt;: identity, role, flow position and transactional continuity. When session lives in a proxy or intermediary layer, the backend loses &lt;strong&gt;persistence and affinity&lt;/strong&gt;. In applications driven by &lt;strong&gt;login, payment or transactional actions&lt;/strong&gt;, this is critical.&lt;/p&gt;
&lt;p&gt;The symptoms do not resemble an attack; they resemble &lt;strong&gt;broken UX&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;unexpected logouts&lt;/li&gt;
&lt;li&gt;interrupted payments&lt;/li&gt;
&lt;li&gt;inconsistent login flows&lt;/li&gt;
&lt;li&gt;failover correct from infrastructure perspective but wrong from user perspective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A typical case where infrastructure “works”, but the user churns because the flow cannot complete.&lt;/p&gt;
&lt;h3&gt;Observability plane&lt;/h3&gt;
&lt;p&gt;The quietest plane concerns who sees what and when. If logs, metrics and traces stay at the proxy or upstream service, the downstream side — the one closer to application and backend — becomes partial or blind.&lt;/p&gt;
&lt;p&gt;Without temporal continuity across planes, the following increase:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;time-to-detect&lt;/li&gt;
&lt;li&gt;time-to-mitigate&lt;/li&gt;
&lt;li&gt;internal noise&lt;/li&gt;
&lt;li&gt;post-mortem cost&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;And, more importantly, &lt;strong&gt;real-time defensive decisions&lt;/strong&gt; degrade — precisely where continuity matters.&lt;/p&gt;
&lt;h2&gt;From origin-based filtering to behavior-based decisions&lt;/h2&gt;
&lt;p&gt;In recent years, defensive analysis has shifted toward &lt;strong&gt;behavior&lt;/strong&gt;. Where the client comes from matters less than &lt;strong&gt;what the client is trying to do&lt;/strong&gt;. Regular timings, repeated attempts, invalid sequences, actions that violate flow logic, or discrepancies between what the client requests and what the application expects are more stable signals than an aggregated IP.&lt;/p&gt;
&lt;p&gt;In short:&lt;/p&gt;
&lt;table style=&quot;width: 100%; border-collapse: collapse; border: 2pt solid #ffffff; border-radius: 10px; overflow: hidden; margin-bottom: 20px;&quot;&gt;
&lt;thead style=&quot;background-color: #f62642; color: #ffffff;&quot;&gt;
&lt;tr&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Question&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Traditional signal&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Relevant signal&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Defensive value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Where does it come from?&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;IP / ASN / reputation&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;—&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Low (ambiguous in multi-tenant)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;What is it trying to do?&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;—&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Behavior / semantics&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High (context + intent)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Interpreting &lt;strong&gt;intent&lt;/strong&gt; requires three planes that upstream proxies lose by design:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;session&lt;/strong&gt; (who and where in the flow)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;semantics&lt;/strong&gt; (what action is being attempted)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;timeline&lt;/strong&gt; (in what order things occur)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Without those planes, defensive decisions simplify. With them, they can be made &lt;strong&gt;precise.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;The application-side plane where context actually exists&lt;/h2&gt;
&lt;p&gt;If context disappears upstream, the question is not “remove the proxy”, but locating where the &lt;strong&gt;information lives that distinguishes abuse from legitimate use.&lt;/strong&gt; That information only exists where three things converge:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;what the user does&lt;/li&gt;
&lt;li&gt;what the application expects&lt;/li&gt;
&lt;li&gt;what the system allows&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;That point is usually the application or the component immediately before it (typically an &lt;strong&gt;ADC or integrated WAF&lt;/strong&gt;), where session, semantics, protocol, results and transactional continuity coexist.&lt;/p&gt;
&lt;p&gt;A practical example:&lt;/p&gt;
&lt;pre&gt;login() → login_failed() → login_failed() → login_failed()&lt;/pre&gt;
&lt;p&gt;vs:&lt;/p&gt;
&lt;pre&gt;login() → 2FA() → checkout() → pay()&lt;/pre&gt;
&lt;p&gt;For the upstream proxy, both are valid HTTP. For the application, they are different intentions: &lt;strong&gt;abuse vs legitimate flow.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;What matters here is not “blocking more”, but &lt;strong&gt;blocking with context&lt;/strong&gt; — which in operations becomes the difference between:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;blocking the channel&lt;/li&gt;
&lt;li&gt;blocking the behavior&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;and, in service terms, between losing legitimate users or preserving continuity.&lt;/p&gt;
&lt;h2&gt;Where SKUDONET fits&lt;/h2&gt;
&lt;p&gt;SKUDONET operates in that plane closer to the application, without the constraints of the &lt;strong&gt;multi-tenant model.&lt;/strong&gt; The approach is &lt;strong&gt;mono-tenant and unified&lt;/strong&gt;: TLS, session, WAF, load-balancing and observability coexist in the same plane without fragmenting across layers or externalizing identity and semantics.&lt;/p&gt;
&lt;p&gt;This has three operational consequences:&lt;/p&gt;
&lt;h3&gt;1. Origin retains meaning&lt;/h3&gt;
&lt;p&gt;No aggregation or masking. IP becomes useful again when combined with behavior.&lt;/p&gt;
&lt;h3&gt;2. Transactional flows maintain continuity&lt;/h3&gt;
&lt;p&gt;Login, payment, checkout, reservation or any stateful action survives even during active/passive failover.&lt;/p&gt;
&lt;h3&gt;3. Timeline and semantics correlate&lt;/h3&gt;
&lt;p&gt;Errors, attempts and results occur in the same place, enabling precise decisions instead of global blocking.&lt;/p&gt;
&lt;p&gt;Schematically:&lt;/p&gt;
&lt;table style=&quot;width: 100%; border-collapse: collapse; border: 2pt solid #ffffff; border-radius: 10px; overflow: hidden; margin-bottom: 20px;&quot;&gt;
&lt;thead style=&quot;background-color: #f62642; color: #ffffff;&quot;&gt;
&lt;tr&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Plane&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Upstream multi-tenant&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;SKUDONET&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Identity&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Aggregated&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Individual&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Session&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;External&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Local&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Semantics&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Complete&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Observability&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Fragmented&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Correlated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Defense&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Binary&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Contextual&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Continuity&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Fragile&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Transactional&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;From this plane, security stops being “block proxy yes/no” and focuses on &lt;strong&gt;blocking abuse while preserving legitimate users.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Multi-tenant proxies solve scale, cost and distribution. But continuity, semantics and intent still live near the application — because it is the only plane where full context exists.&lt;/p&gt;
&lt;p&gt;If continuity and application-level context matter to your stack, you can evaluate &lt;strong&gt;SKUDONET Enterprise Edition with a 30-day trial.&lt;/strong&gt;&lt;/p&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-top: 30px;&quot;&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;TRY ENTERPRISE DEMO&lt;/a&gt;&lt;/div&gt;</content>
	<author>
	  <name>Nieves Álvarez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 四大场景全覆盖：deepin/UOS 系统打印机配置指南</title>
	<link href="https://www.deepin.org/en/deepin-uos-printer/"/>
	<id>https://www.deepin.org/?p=38250</id>
	<updated>2026-01-28T03:02:39+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">XSAs released on 2026-01-27</title>
	<link href="https://www.qubes-os.org/news/2026/01/27/xsas-released-on-2026-01-27/"/>
	<id>https://www.qubes-os.org/news/2026/01/27/xsas-released-on-2026-01-27/</id>
	<updated>2026-01-27T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;The &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; has released one or more &lt;a href=&quot;https://xenbits.xen.org/xsa/&quot;&gt;Xen security advisories (XSAs)&lt;/a&gt;.
The security of Qubes OS is &lt;strong&gt;not&lt;/strong&gt; affected.&lt;/p&gt;

&lt;h2 id=&quot;xsas-that-do-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do affect&lt;/strong&gt; the security of Qubes OS:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;(none)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;xsas-that-do-not-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO NOT affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do not affect&lt;/strong&gt; the security of Qubes OS, and no user action is necessary:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-477.html&quot;&gt;XSA-477&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only HVMs with shadow paging and tracing enabled. In Qubes OS, shadow paging and
tracing are disabled at build time.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-478.html&quot;&gt;XSA-478&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only XAPI, which is an alternative toolstack. Qubes OS uses libxl instead of XAPI.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-479.html&quot;&gt;XSA-479&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only in-VM isolation, which Qubes OS does not rely on for security. We will still provide the fix for this issue at a later date, but it will not be accompanied by a &lt;a href=&quot;https://www.qubes-os.org/security/qsb/&quot;&gt;Qubes security bulletin (QSB)&lt;/a&gt;.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;about-this-announcement&quot;&gt;About this announcement&lt;/h2&gt;

&lt;p&gt;Qubes OS uses the &lt;a href=&quot;https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview&quot;&gt;Xen hypervisor&lt;/a&gt; as part of its &lt;a href=&quot;https://www.qubes-os.org/doc/architecture/&quot;&gt;architecture&lt;/a&gt;. When the &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; publicly discloses a vulnerability in the Xen hypervisor, they issue a notice called a &lt;a href=&quot;https://xenproject.org/developers/security-policy/&quot;&gt;Xen security advisory (XSA)&lt;/a&gt;. Vulnerabilities in the Xen hypervisor sometimes have security implications for Qubes OS. When they do, we issue a notice called a &lt;a href=&quot;https://www.qubes-os.org/security/qsb/&quot;&gt;Qubes security bulletin (QSB)&lt;/a&gt;. (QSBs are also issued for non-Xen vulnerabilities.) However, QSBs can provide only &lt;em&gt;positive&lt;/em&gt; confirmation that certain XSAs &lt;em&gt;do&lt;/em&gt; affect the security of Qubes OS. QSBs cannot provide &lt;em&gt;negative&lt;/em&gt; confirmation that other XSAs do &lt;em&gt;not&lt;/em&gt; affect the security of Qubes OS. Therefore, we also maintain an &lt;a href=&quot;https://www.qubes-os.org/security/xsa/&quot;&gt;XSA tracker&lt;/a&gt;, which is a comprehensive list of all XSAs publicly disclosed to date, including whether each one affects the security of Qubes OS. When new XSAs are published, we add them to the XSA tracker and publish a notice like this one in order to inform Qubes users that a new batch of XSAs has been released and whether each one affects the security of Qubes OS.&lt;/p&gt;</content>
	<author>
	  <name>Qubes</name>
	   <uri>https://www.qubes-os.org/</uri> 
	</author>
	<source>
	  <title type="html">Qubes OS</title>
	  <subtitle type="html">Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.</subtitle>
	  <link rel="self" href="https://www.qubes-os.org/feed.xml"/>
	  <id>https://www.qubes-os.org/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 调试更高效，投递更省心！deepin 系统 Windows 应用兼容体验再优化</title>
	<link href="https://www.deepin.org/en/deepin-wine-v3-4-2/"/>
	<id>https://www.deepin.org/?p=38236</id>
	<updated>2026-01-26T10:24:41+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Igalia Multimedia contributions in 2025</title>
	<link href="https://eocanha.org/blog/2026/01/26/igalia-multimedia-contributions-in-2025/"/>
	<id>http://maemo.org/midcom-permalink-1f0faa7f51dc2ccfaa711f09da6c17f3257e139e139</id>
	<updated>2026-01-26T09:34:37+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;Now that 2025 is over, it’s time to look back and feel proud of the path we’ve walked. Last year has been really exciting in terms of contributions to GStreamer and WebKit for the Igalia Multimedia team.&lt;/p&gt;



&lt;p&gt;With more than 459 contributions along the year, we’ve been one of the top contributors to the GStreamer project, in areas like Vulkan Video, GstValidate, VA, GStreamer Editing Services, WebRTC or H.266 support.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;a href=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/gstreamer-contributions.jpg&quot;&gt;&lt;img alt=&quot;Pie chart of Igalia&#39;s contributions to different areas of the GStreamer project: other (30%) vulkan (24%) validate (7%) va (6%) ges (4%) webrtc (3%) h266parse (3%) python (3%) dots-viewer (3%) tests (2%) docs (2%) devtools (2%) webrtcbin (1%) tracers (1%) qtdemux (1%) gst (1%) ci (1%) y4menc (1%) videorate (1%) gl (1%) alsa (1%)&quot; class=&quot;wp-image-706&quot; height=&quot;530&quot; src=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/gstreamer-contributions.jpg&quot; width=&quot;943&quot; /&gt;&lt;/a&gt;Igalia’s contributions to the GStreamer project&lt;/figure&gt;



&lt;p&gt;In Vulkan Video we’ve worked on the VP9 video decoder, and cooperated with other contributors to push the AV1 decoder as well. There’s now an H.264 base class for video encoding that is designed to support general hardware-accelerated processing.&lt;/p&gt;



&lt;p&gt;GStreaming Editing Services, the framework to build video editing applications, has gained time remapping support, which now allows to include fast/slow motion effects in the videos. Video transformations (scaling, cropping, rounded corners, etc) are now hardware-accelerated thanks to the addition of new Skia-based GStreamer elements and integration with OpenGL. Buffer pool tuning and pipeline improvements have helped to optimize memory usage and performance, enabling the edition of 4K video at 60 frames per second. Much of this work to improve and ensure quality in GStreamer Editing Services has also brought improvements in the GstValidate testing framework, which will be useful for other parts of GStreamer.&lt;/p&gt;



&lt;p&gt;Regarding H.266 (VVC), full playback support (with decoders such as &lt;code&gt;vvdec&lt;/code&gt; and &lt;code&gt;avdec_h266&lt;/code&gt;, demuxers and muxers for Matroska, MP4 and TS, and parsers for the &lt;code&gt;vvc1&lt;/code&gt; and &lt;code&gt;vvi1&lt;/code&gt; formats) is now available in GStreamer 1.26 thanks to Igalia’s work. This allows user applications such as the WebKitGTK web browser to leverage the hardware accelerated decoding provided by VAAPI to play H.266 video using GStreamer.&lt;/p&gt;



&lt;p&gt;Igalia has also been one of the top contributors to GStreamer Rust, with 43 contributions. Most of the commits there have been related to Vulkan Video.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;a href=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/gstreamer-rs-contributions.jpg&quot;&gt;&lt;img alt=&quot;Pie chart of Igalia&#39;s contributions to different areas of the GStreamer Rust project: vulkan (28%) other (26%) gstreamer (12%) ci (12%) tracer (7%) validate (5%) ges (7%) examples (5%)&quot; class=&quot;wp-image-708&quot; height=&quot;530&quot; src=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/gstreamer-rs-contributions.jpg&quot; width=&quot;943&quot; /&gt;&lt;/a&gt;Igalia’s contributions to the GStreamer Rust project&lt;/figure&gt;



&lt;p&gt;In addition to GStreamer, the team also has a strong presence in WebKit, where we leverage our GStreamer knowledge to implement many features of the web engine related to multimedia. From the 1739 contributions to the WebKit project done last year by Igalia, the Multimedia team has made 323 of them. Nearly one third of those have been related to generic multimedia playback, and the rest have been on areas such as WebRTC, MediaStream, MSE, WebAudio, a new Quirks system to provide adaptations for specific hardware multimedia platforms at runtime, WebCodecs or MediaRecorder.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;a href=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/webkit-contributions.jpg&quot;&gt;&lt;img alt=&quot;Pie chart of Igalia&#39;s contributions to different areas of the WebKit project: Generic Gstreamer work (33%) WebRTC (20%) Regression bugfixing (9%) Other (7%) MSE (6%) BuildStream SDK (4%) MediaStream (3%) WPE platform (3%) WebAudio (3%) WebKitGTK platform (2%) Quirks (2%) MediaRecorder (2%) EME (2%) Glib (1%) WTF (1%) WebCodecs (1%) GPUProcess (1%) Streams (1%) &quot; class=&quot;wp-image-709&quot; height=&quot;530&quot; src=&quot;https://eocanha.org/blog/wp-content/uploads/2026/01/webkit-contributions.jpg&quot; width=&quot;943&quot; /&gt;&lt;/a&gt;Igalia Multimedia Team’s contributions to different areas of the WebKit project&lt;/figure&gt;



&lt;p&gt;We’re happy about what we’ve achieved along the year and look forward to maintaining this success and bringing even more exciting features and contributions in 2026.&lt;/p&gt;
&lt;span class=&quot;net_nemein_favourites&quot;&gt;0 &lt;a class=&quot;net_nemein_favourites_create&quot; href=&quot;http://maemo.org/news/?net_nemein_favourites_execute=fav&amp;amp;net_nemein_favourites_execute_for=1f0faa7f51dc2ccfaa711f09da6c17f3257e139e139&amp;amp;net_nemein_favourites_url=https://maemo.org/news/favorites//json/fav/midgard_article/1f0faa7f51dc2ccfaa711f09da6c17f3257e139e139/&quot;&gt;&lt;img alt=&quot;Add to favourites&quot; src=&quot;http://static.maemo.org:81/net.nemein.favourites/not-favorite.png&quot; style=&quot;border: none;&quot; title=&quot;Add to favourites&quot; /&gt;&lt;/a&gt;0 &lt;a class=&quot;net_nemein_favourites_create&quot; href=&quot;http://maemo.org/news/?net_nemein_favourites_execute=bury&amp;amp;net_nemein_favourites_execute_for=1f0faa7f51dc2ccfaa711f09da6c17f3257e139e139&amp;amp;net_nemein_favourites_url=https://maemo.org/news/favorites//json/bury/midgard_article/1f0faa7f51dc2ccfaa711f09da6c17f3257e139e139/&quot;&gt;&lt;img alt=&quot;Bury&quot; src=&quot;http://static.maemo.org:81/net.nemein.favourites/not-buried.png&quot; style=&quot;border: none;&quot; title=&quot;Bury&quot; /&gt;&lt;/a&gt;&lt;/span&gt;</content>
	<author>
	  <name>Enrique Ocaña González</name>
	   <email>eocanha@igalia.com</email> 
	</author>
	<source>
	  <title type="html">Planet Maemo</title>
	  <subtitle type="html">Blog entries from Maemo community</subtitle>
	  <link rel="self" href="http://maemo.org/news/planet-maemo/rss.xml"/>
	  <id>http://maemo.org/news/planet-maemo/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">BunsenLabs Carbon Release Notes</title>
	<link href="https://forums.bunsenlabs.org/viewtopic.php?id=9675"/>
	<id>https://www.bunsenlabs.org/feed/news/c9d2a0f4-a5f9-516e-b57d-706881fe4e0f</id>
	<updated>2026-01-26T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;div class=&quot;postmsg&quot;&gt;
 &lt;p&gt;
  What&#39;s New in BunsenLabs Carbon?
  ================================
 &lt;/p&gt;
 &lt;p&gt;
  The BunsenLabs Session is now able to launch Wayland sessions, if the necessary apps and configurations are provided. In the near future a &quot;plugin&quot; metapackage will be available to add a base Wayland session to a BL Carbon system.
 &lt;/p&gt;
 &lt;p&gt;
  Several core apps have been changed to ones that support Wayland as well as X11,
  &lt;br /&gt;
  or make theming simpler:
  &lt;br /&gt;
    nitrogen &amp;gt; xwwall + feh
  &lt;br /&gt;
    tint2 &amp;gt; xfce4-panel
  &lt;br /&gt;
    lxappearance &amp;gt; nwg-look
  &lt;br /&gt;
    lxterminal &amp;gt; xfce4-terminal
  &lt;br /&gt;
    arandr &amp;gt; lxrandr
  &lt;br /&gt;
    policykit-1-gnome (obsolete) &amp;gt; mate-polkit
 &lt;/p&gt;
 &lt;p&gt;
  These packages have been dropped from the default install:
  &lt;br /&gt;
    xserver-xorg-video-intel (only needed for pre-2007 Intel graphics)
  &lt;br /&gt;
    qt5-style-plugins
 &lt;/p&gt;
 &lt;p&gt;
  picom configs have been substantially updated to use the current picom, which now needs 3D acceleration and openGL.
  &lt;br /&gt;
  (actual appearance settings have not been changed much)
 &lt;/p&gt;
 &lt;p&gt;
  A wrapper script has been added for pkexec under Wayland, and sudoedit is now used to edit files as root.
  &lt;br /&gt;
  See:
  &lt;br /&gt;
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=143401#p143401&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 01#p143401
  &lt;/a&gt;
  &lt;br /&gt;
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=144442#p144442&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 42#p144442
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  A &quot;bl-menu&quot; command has been added so a menu can be started from the same launcher regardless of running on X11 or Wayland.
 &lt;/p&gt;
 &lt;p&gt;
  blob has seen a lot of work, eg:
  &lt;br /&gt;
  - added support for saving and restoring xfce4-panel settings via xfconf
  &lt;br /&gt;
  - added Carbon-Sage and Carbon-Bark presets
  &lt;br /&gt;
  - older presets still use tint2 (it looks nice): users will be prompted to install it if necessary
  &lt;br /&gt;
  - picom files in older presets have been updated so current picom does not crash
 &lt;/p&gt;
 &lt;p&gt;
  openbox and labwc config files have been moved to
  &lt;em&gt;
   ~/.config/bunsen/openbox
  &lt;/em&gt;
  and
  &lt;em&gt;
   ~/.config/bunsen/labwc
  &lt;/em&gt;
  &lt;br /&gt;
  This means the location of the default openbox rc.xml has changed, but users&#39; original
  &lt;em&gt;
   ~/.config/openbox/bl-rc.xml
  &lt;/em&gt;
  will still exist, so they can either just open that and
  &lt;em&gt;
   ~/.config/bunsen/openbox/rc.xml
  &lt;/em&gt;
  side by side and copy across any changes they want to keep, or use a GUI diff app to compare them (eg meld).
  &lt;br /&gt;
  (Later, they can remove bl-rc.xml and bl-menu.xml)
 &lt;/p&gt;
 &lt;p&gt;
  xfce4-panel plugin icons are resized to match the panel with entries in ~/.config/gtk-3.0/gtk.css :
 &lt;/p&gt;
 &lt;div class=&quot;codebox&quot;&gt;
  &lt;pre&gt;&lt;code&gt;/* some buttons are too big */

#pulseaudio-button * { -gtk-icon-transform: scale(0.6); }

#xfce4-power-manager-plugin * { -gtk-icon-transform: scale(0.4); }

#battery-14 * { -gtk-icon-transform: scale(0.6); }
/* adjust the &quot;#14&quot; to match the widget ID of your battery plugin */&lt;/code&gt;&lt;/pre&gt;
 &lt;/div&gt;
 &lt;p&gt;
  If the audio, power-manager-plugin or battery icons look the wrong size,
  &lt;br /&gt;
  adjust the scale number to suit your desktop. (The battery icon is hidden by default.)
 &lt;/p&gt;
 &lt;p&gt;
  Two menu items in ~/.config/jgmenu/prepend.csv are commented out:
  &lt;br /&gt;
  - Dropbox (bl-dropbox-pipemenu), which helps users to install and use Dropbox
  &lt;br /&gt;
  - Choose Language (bl-setlocale), which lets users choose a locale if their login greeter does not offer that option
 &lt;/p&gt;
 &lt;p&gt;
  bl-exit now uses xfce4-screensaver for locking (it works on Wayland too).
 &lt;/p&gt;
 &lt;p&gt;
  BUNSEN_SESSION_TYPE environment variable is set to x11 or wayland and can be used by scripts etc.
 &lt;/p&gt;
 &lt;p&gt;
  XDG_CURRENT_DESKTOP environment variable is set to &#39;BunsenLabs:XFCE&#39;
 &lt;/p&gt;
 &lt;p&gt;
  bunsen-meta-bluetooth now depends on libspa-0.2-bluetooth for pipewire support.
 &lt;/p&gt;
 &lt;p&gt;
  Apt signing keys are now installed to
  &lt;em&gt;
   /usr/share/keyrings
  &lt;/em&gt;
  but till BL Nitrogen have a symlink from the old location in
  &lt;em&gt;
   /etc/apt/trusted.gpg.d
  &lt;/em&gt;
 &lt;/p&gt;
 &lt;p&gt;
  live-build:
  &lt;br /&gt;
  - use zstd compression
  &lt;br /&gt;
  - ensure grub first boot menu entry shows &quot;BunsenLabs&quot;
  &lt;br /&gt;
  - add Signed-By field to sources
  &lt;br /&gt;
  - make sure en_US.UTF-8 locale is installed along with user&#39;s chosen locale
 &lt;/p&gt;
 &lt;p&gt;
  bl-welcome:
  &lt;br /&gt;
  - rewrite welcome screen to take slightly less space (thanks to @sleekmason)
  &lt;br /&gt;
  - offer to convert sources to deb822 format
  &lt;br /&gt;
  - drop PAE test (no more 32 bit)
 &lt;/p&gt;
 &lt;p&gt;
  Set GTK4 apps to use dark theme by default in gsettings and add some limited support for theme setting:
  &lt;br /&gt;
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=147480#p147480&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 80#p147480
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p&gt;
  CREDITS
  &lt;br /&gt;
  =======
 &lt;/p&gt;
 &lt;p&gt;
  As always, many people have contributed, with special credit to:
  &lt;br /&gt;
  @hhh
  &lt;br /&gt;
  @micko01
  &lt;br /&gt;
  @sleekmason
  &lt;br /&gt;
  @greenjeans
 &lt;/p&gt;
 &lt;p&gt;
  And thanks to Pawel Czerwinski for the beautiful wallpaper that @hhh has adapted for Carbon!
 &lt;/p&gt;
 &lt;p&gt;
  POSSIBLE ISSUES
  &lt;br /&gt;
  ===============
 &lt;/p&gt;
 &lt;p&gt;
  1) 32bit isos and packages are not available from BL Carbon because Debian have dropped support.
  &lt;br /&gt;
  See:
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=148894#p148894&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 94#p148894
  &lt;/a&gt;
  &lt;br /&gt;
  Users of BL Boron with 32bit systems should not attempt to upgrade to Carbon. Boron will be supported as long as Debian Bookworm, ie until June 2028.
 &lt;/p&gt;
 &lt;p&gt;
  2)
  &lt;strong&gt;
   NOTE for Virtual Machine users:
  &lt;/strong&gt;
  &lt;br /&gt;
  If you get an unusable desktop when running Carbon on a VM you may need to disable compositing or enable OpenGL and 3d acceleration.
 &lt;/p&gt;
 &lt;p&gt;
  The compositor, picom 12.5-1, in Debian Trixie and BunsenLabs Carbon, requires OpenGL and 3D acceleration to work properly.
 &lt;/p&gt;
 &lt;p&gt;
  If your BunsenLabs Carbon desktop is unusable when running on a Virtual Machine,
  &lt;br /&gt;
  you can:
 &lt;/p&gt;
 &lt;p&gt;
  a) Disable composition from the menu:
  &lt;em&gt;
   User Settings &amp;gt; Compositor &amp;gt; Disable Compositing
  &lt;/em&gt;
  &lt;br /&gt;
  You will lose round corners, shadows etc but the desktop will be usable.
  &lt;br /&gt;
  To make it permanent:
  &lt;em&gt;
   menu &amp;gt; User Settings &amp;gt; BunsenLabs Session &amp;gt; Edit autostart
  &lt;/em&gt;
  &lt;br /&gt;
  and comment out this line:
  &lt;br /&gt;
     
  &lt;code class=&quot;code&quot;&gt;
   bl-compositor --start
  &lt;/code&gt;
 &lt;/p&gt;
 &lt;p&gt;
  or
 &lt;/p&gt;
 &lt;p&gt;
  b) If your virtual machine manager supports it, enable OpenGL and 3D acceleration.
  &lt;br /&gt;
  If you are using virt-manager:
  &lt;br /&gt;
  In the settings menu, open up the Display Spice section:
  &lt;br /&gt;
  Select Spice server for Type:, and None for Listen type.
  &lt;br /&gt;
  Check the OpenGL checkbox. Hit Apply.
  &lt;br /&gt;
  In the Video Virtio section:
  &lt;br /&gt;
  Set Virtio for Model, and check the 3D acceleration checkbox. Hit Apply.
 &lt;/p&gt;
 &lt;p&gt;
  EDIT:
  &lt;br /&gt;
  c) a third option is to uninstall picom and install compton. After logout/in you should still have transparency and drop shadows, but at the cost of losing picom&#39;s round corners.
 &lt;/p&gt;
 &lt;p&gt;
  See also:
  &lt;br /&gt;
  &lt;a href=&quot;https://forums.bunsenlabs.org/viewtopic.php?pid=141523#p141523&quot; rel=&quot;nofollow&quot;&gt;
   https://forums.bunsenlabs.org/viewtopic … 23#p141523
  &lt;/a&gt;
  &lt;br /&gt;
  &lt;a href=&quot;https://ryan.himmelwright.net/post/virtio-3d-vms/&quot; rel=&quot;nofollow&quot;&gt;
   https://ryan.himmelwright.net/post/virtio-3d-vms/
  &lt;/a&gt;
 &lt;/p&gt;
 &lt;p class=&quot;postedit&quot;&gt;
  &lt;em&gt;
   Last edited by johnraff (Yesterday 02:44:14)
  &lt;/em&gt;
 &lt;/p&gt;
&lt;/div&gt;</content>
	<author>
	  <name>BunsenLabs Linux</name>
	   <uri>https://forums.bunsenlabs.org/viewforum.php?id=12</uri> 
	</author>
	<source>
	  <title type="html">BunsenLabs Linux News</title>
	  
	  <link rel="self" href="https://www.bunsenlabs.org/feed/news/atom"/>
	  <id>https://www.bunsenlabs.org/feed/news/684cbf76-7ebc-5242-9b5c-f18edf49cc9d</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">High availability is not redundancy — it’s operational decision-making</title>
	<link href="https://www.skudonet.com/blog/high-availability-beyond-redundancy/"/>
	<id>https://www.skudonet.com/?p=76247</id>
	<updated>2026-01-23T10:39:01+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;For years, &lt;strong&gt;high availability (HA)&lt;/strong&gt; was treated as a redundancy problem: duplicate servers, replicate databases, maintain a secondary site and ensure that if something failed, there was a plan B waiting. That model worked when applications were monolithic, topologies were simple, and traffic variability was low. Today the environment looks different: applications are split into services, traffic is irregular, &lt;strong&gt;encryption&lt;/strong&gt; is the norm, and infrastructure is distributed. Availability is no longer decided at the machine level, but at the &lt;strong&gt;operational plane.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The first relevant distinction appears when we separate &lt;strong&gt;binary failures&lt;/strong&gt; from &lt;strong&gt;degradations.&lt;/strong&gt; Most HA architectures are designed to detect obvious “crashes,” yet in production the meaningful incidents are rarely crashes—they are &lt;strong&gt;partial degradations (brownouts)&lt;/strong&gt;: the database responds, but slowly; a backend accepts connections but does not process; the &lt;strong&gt;Web Application Firewall (WAF)&lt;/strong&gt; blocks legitimate traffic; intermittent timeouts create queues. For a basic health-check everything is “up”; for the user, it isn’t.&lt;/p&gt;
&lt;h2&gt;From redundancy to operational continuity&lt;/h2&gt;
&lt;p&gt;Operational degradations in production are not homogeneous. In general, we can distinguish at least six categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Failure&lt;/strong&gt; (binary crash)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Partial failure&lt;/strong&gt; (works, but incompletely)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Brownout&lt;/strong&gt; (responds, but not on time)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Silent drop&lt;/strong&gt; (no error, but traffic is lost)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Control-plane stall&lt;/strong&gt; (decisions arrive too late)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data-plane stall&lt;/strong&gt; (traffic is blocked in-path)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The component that arbitrates this ambiguity is the &lt;strong&gt;load balancer&lt;/strong&gt;. Not because it is the most critical part of the system, but because it is the only one observing &lt;strong&gt;real-time traffic&lt;/strong&gt; and responsible for deciding when a service is “healthy,” when it is degraded, and when failover should be triggered. That decision becomes complex when factors like &lt;strong&gt;TLS encryption, session handling, inspection, security controls&lt;/strong&gt; or &lt;strong&gt;latency decoupled from load&lt;/strong&gt; interact. The load balancer does not merely route traffic—it determines continuity.&lt;/p&gt;
&lt;p&gt;In real incidents, operational ambiguity surfaces like this:&lt;/p&gt;
&lt;table style=&quot;width: 100%; border-collapse: collapse; border: 2pt solid #ffffff; border-radius: 10px; overflow: hidden; margin-bottom: 20px;&quot;&gt;
&lt;thead style=&quot;background-color: #f62642; color: #ffffff;&quot;&gt;
&lt;tr&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Phenomenon&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Failure type&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Detected by health-check&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;User impact&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;LB decision&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Real complexity&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend down&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Binary&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Yes&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Immediate failover&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Low&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend slow&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Brownout&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Late / None&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Intermittent timeouts&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Brownout&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Not always&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium/High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Ambiguous&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;WAF blocking&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Security&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;None&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Slow TLS handshake&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;TLS layer&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;N/A&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Session saturation&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Stateful&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Unknown&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Session transfer&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Operational&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Late&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;DB degradation&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Not correlated&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;There is also a persistent misconception between &lt;strong&gt;availability&lt;/strong&gt; and &lt;strong&gt;scaling&lt;/strong&gt;. Scaling answers the question “how much load can I absorb?” High availability answers a completely different one: “what happens when something fails?” An application can scale flawlessly and still suffer a major incident because &lt;strong&gt;failover&lt;/strong&gt; triggered too late, sessions failed to survive backend changes, or the control plane took too long to propagate state.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encrypted traffic inspection&lt;/strong&gt; adds another layer. In many environments, &lt;strong&gt;TLS inspection&lt;/strong&gt; and the &lt;strong&gt;Web Application Firewall&lt;/strong&gt; sit on a different plane than the load balancer. In theory this is modular; in practice it introduces coordination. If the firewall blocks part of legitimate traffic, the load balancer sees fewer errors than the system actually produces. If the backend degrades but the firewall masks the problem upstream, there is no clear signal. &lt;strong&gt;Availability becomes a question of coupling between planes.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The final problem is often epistemological:&lt;strong&gt; who owns the truth of the incident&lt;/strong&gt;? During an outage, &lt;strong&gt;observability&lt;/strong&gt; depends on who retains context. If the balancing plane, the inspection plane, the security plane and the monitoring plane are separate tools, the post-mortem becomes archaeology: fragmented logs, incomplete metrics, sampling, misaligned timestamps, and three contradictory narratives of the same event.&lt;/p&gt;
&lt;h2&gt;So what does high availability actually mean in 2026?&lt;/h2&gt;
&lt;p&gt;For operational teams, the definition that best fits reality is this: &lt;strong&gt;High availability is the ability to maintain continuity under non-binary failures.&lt;/strong&gt;&lt;br /&gt;
This implies:&lt;/p&gt;
&lt;ol type=&quot;a&quot;&gt;
&lt;li&gt;understanding degradation vs true unavailability&lt;/li&gt;
&lt;li&gt;basing decisions on traffic and context, not just checks&lt;/li&gt;
&lt;li&gt;coordinating security, inspection and session&lt;/li&gt;
&lt;li&gt;having observability at the same plane that decides failover&lt;/li&gt;
&lt;li&gt;treating availability as an operational problem, not as hardware redundancy&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Where does SKUDONET fit in this model?&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;SKUDONET Enterprise Edition&lt;/strong&gt; is built around that premise: availability does not depend solely on having an extra node, but on coordinating in a single &lt;strong&gt;operational plane&lt;/strong&gt; load balancing at &lt;strong&gt;layers 4 and 7, TLS termination and inspection, security policies, certificate management,&lt;/strong&gt; and&lt;strong&gt; traffic observability&lt;/strong&gt;. The goal is not to abstract complexity, but to place &lt;strong&gt;decision-making and understanding in the same context.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In environments where failover is exceptional, this coupling may go unnoticed. But in environments where degradation is intermittent and traffic is non-linear, &lt;strong&gt;high availability stops being a passive mechanism and becomes a process.&lt;/strong&gt; What SKUDONET provides is not a guarantee that nothing will fail—such a guarantee does not exist—but an architecture where continuity depends less on assumptions and more on &lt;strong&gt;signals.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A&lt;strong&gt; 30-day evaluation of SKUDONET Enterprise Edition&lt;/strong&gt; is available for teams who want to validate behavior under real workloads.&lt;/p&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-top: 30px;&quot;&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;TRY ENTERPRISE DEMO&lt;/a&gt;&lt;/div&gt;</content>
	<author>
	  <name>Nieves Álvarez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Breaking: XDG Adds Native Support for Linyaps</title>
	<link href="https://www.deepin.org/en/xdg-linyaps/"/>
	<id>https://www.deepin.org/?p=38229</id>
	<updated>2026-01-23T09:54:47+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">In the world of Linux desktop computing, there exists a foundational &quot;common language&quot; that underpins all interoperability—the XDG specifications, developed and maintained by the freedesktop.org organization. XDG is the critical standard for solving Linux&#39;s ecosystem fragmentation and establishing unified resource access protocols. Whether you are an application developer or a distribution maintainer, ensuring your product runs well on a modern Linux desktop necessitates adherence to the XDG standard. It is the key cornerstone enabling the Linux desktop to evolve from &quot;working in silos&quot; to &quot;unified collaboration.&quot; From desktop icons and application menus to system notifications and file dialogs, XDG specifications permeate every facet ...&lt;a href=&quot;https://www.deepin.org/en/xdg-linyaps/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">High availability is not redundancy — it’s operational decision-making</title>
	<link href="https://www.skudonet.com/blog/high-availability-beyond-redundancy/"/>
	<id>https://www.skudonet.com/?p=76248</id>
	<updated>2026-01-22T08:27:03+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;For years, &lt;strong&gt;high availability (HA)&lt;/strong&gt; was treated as a redundancy problem: duplicate servers, replicate databases, maintain a secondary site and ensure that if something failed, there was a plan B waiting. That model worked when applications were monolithic, topologies were simple, and traffic variability was low. Today the environment looks different: applications are split into services, traffic is irregular, &lt;strong&gt;encryption&lt;/strong&gt; is the norm, and infrastructure is distributed. Availability is no longer decided at the machine level, but at the &lt;strong&gt;operational plane.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The first relevant distinction appears when we separate &lt;strong&gt;binary failures&lt;/strong&gt; from &lt;strong&gt;degradations.&lt;/strong&gt; Most HA architectures are designed to detect obvious “crashes,” yet in production the meaningful incidents are rarely crashes—they are &lt;strong&gt;partial degradations (brownouts)&lt;/strong&gt;: the database responds, but slowly; a backend accepts connections but does not process; the &lt;strong&gt;Web Application Firewall (WAF)&lt;/strong&gt; blocks legitimate traffic; intermittent timeouts create queues. For a basic health-check everything is “up”; for the user, it isn’t.&lt;/p&gt;
&lt;h2&gt;From redundancy to operational continuity&lt;/h2&gt;
&lt;p&gt;Operational degradations in production are not homogeneous. In general, we can distinguish at least six categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Failure&lt;/strong&gt; (binary crash)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Partial failure&lt;/strong&gt; (works, but incompletely)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Brownout&lt;/strong&gt; (responds, but not on time)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Silent drop&lt;/strong&gt; (no error, but traffic is lost)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Control-plane stall&lt;/strong&gt; (decisions arrive too late)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data-plane stall&lt;/strong&gt; (traffic is blocked in-path)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The component that arbitrates this ambiguity is the &lt;strong&gt;load balancer&lt;/strong&gt;. Not because it is the most critical part of the system, but because it is the only one observing &lt;strong&gt;real-time traffic&lt;/strong&gt; and responsible for deciding when a service is “healthy,” when it is degraded, and when failover should be triggered. That decision becomes complex when factors like &lt;strong&gt;TLS encryption, session handling, inspection, security controls&lt;/strong&gt; or &lt;strong&gt;latency decoupled from load&lt;/strong&gt; interact. The load balancer does not merely route traffic—it determines continuity.&lt;/p&gt;
&lt;p&gt;In real incidents, operational ambiguity surfaces like this:&lt;/p&gt;
&lt;table style=&quot;width: 100%; border-collapse: collapse; border: 2pt solid #ffffff; border-radius: 10px; overflow: hidden; margin-bottom: 20px;&quot;&gt;
&lt;thead style=&quot;background-color: #f62642; color: #ffffff;&quot;&gt;
&lt;tr&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Phenomenon&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Failure type&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Detected by health-check&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;User impact&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;LB decision&lt;/th&gt;
&lt;th style=&quot;border: 2pt solid #ffffff; padding: 15px; text-align: center; font-weight: bold;&quot;&gt;Real complexity&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend down&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Binary&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Yes&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Immediate failover&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Low&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend slow&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Brownout&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Late / None&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Intermittent timeouts&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Brownout&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Not always&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium/High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Ambiguous&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;WAF blocking&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Security&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;None&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Slow TLS handshake&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;TLS layer&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;N/A&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Session saturation&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Stateful&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Unknown&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Session transfer&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Operational&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;No&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Late&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Medium&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;background-color: #f7f7f7;&quot;&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;DB degradation&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Backend&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Partial&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;Not correlated&lt;/td&gt;
&lt;td style=&quot;border: 2pt solid #ffffff; padding: 15px;&quot;&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;There is also a persistent misconception between &lt;strong&gt;availability&lt;/strong&gt; and &lt;strong&gt;scaling&lt;/strong&gt;. Scaling answers the question “how much load can I absorb?” High availability answers a completely different one: “what happens when something fails?” An application can scale flawlessly and still suffer a major incident because &lt;strong&gt;failover&lt;/strong&gt; triggered too late, sessions failed to survive backend changes, or the control plane took too long to propagate state.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encrypted traffic inspection&lt;/strong&gt; adds another layer. In many environments, &lt;strong&gt;TLS inspection&lt;/strong&gt; and the &lt;strong&gt;Web Application Firewall&lt;/strong&gt; sit on a different plane than the load balancer. In theory this is modular; in practice it introduces coordination. If the firewall blocks part of legitimate traffic, the load balancer sees fewer errors than the system actually produces. If the backend degrades but the firewall masks the problem upstream, there is no clear signal. &lt;strong&gt;Availability becomes a question of coupling between planes.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The final problem is often epistemological:&lt;strong&gt; who owns the truth of the incident&lt;/strong&gt;? During an outage, &lt;strong&gt;observability&lt;/strong&gt; depends on who retains context. If the balancing plane, the inspection plane, the security plane and the monitoring plane are separate tools, the post-mortem becomes archaeology: fragmented logs, incomplete metrics, sampling, misaligned timestamps, and three contradictory narratives of the same event.&lt;/p&gt;
&lt;h2&gt;So what does high availability actually mean in 2026?&lt;/h2&gt;
&lt;p&gt;For operational teams, the definition that best fits reality is this: &lt;strong&gt;High availability is the ability to maintain continuity under non-binary failures.&lt;/strong&gt;&lt;br /&gt;
This implies:&lt;/p&gt;
&lt;ol type=&quot;a&quot;&gt;
&lt;li&gt;understanding degradation vs true unavailability&lt;/li&gt;
&lt;li&gt;basing decisions on traffic and context, not just checks&lt;/li&gt;
&lt;li&gt;coordinating security, inspection and session&lt;/li&gt;
&lt;li&gt;having observability at the same plane that decides failover&lt;/li&gt;
&lt;li&gt;treating availability as an operational problem, not as hardware redundancy&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Where does SKUDONET fit in this model?&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;SKUDONET Enterprise Edition&lt;/strong&gt; is built around that premise: availability does not depend solely on having an extra node, but on coordinating in a single &lt;strong&gt;operational plane&lt;/strong&gt; load balancing at &lt;strong&gt;layers 4 and 7, TLS termination and inspection, security policies, certificate management,&lt;/strong&gt; and&lt;strong&gt; traffic observability&lt;/strong&gt;. The goal is not to abstract complexity, but to place &lt;strong&gt;decision-making and understanding in the same context.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In environments where failover is exceptional, this coupling may go unnoticed. But in environments where degradation is intermittent and traffic is non-linear, &lt;strong&gt;high availability stops being a passive mechanism and becomes a process.&lt;/strong&gt; What SKUDONET provides is not a guarantee that nothing will fail—such a guarantee does not exist—but an architecture where continuity depends less on assumptions and more on &lt;strong&gt;signals.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A&lt;strong&gt; 30-day evaluation of SKUDONET Enterprise Edition&lt;/strong&gt; is available for teams who want to validate behavior under real workloads.&lt;/p&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-top: 30px;&quot;&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/try-skudonet/&quot;&gt;TRY ENTERPRISE DEMO&lt;/a&gt;&lt;/div&gt;</content>
	<author>
	  <name>Nieves Álvarez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Evgeni Golov: Validating cloud-init configs without being root</title>
	<link href="https://www.die-welt.net/2026/01/validating-cloud-init-configs-without-being-root/"/>
	<id>https://www.die-welt.net/2026/01/validating-cloud-init-configs-without-being-root/</id>
	<updated>2026-01-21T19:42:45+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;p&gt;Somehow this whole DevOps thing is all about generating the wildest things from some (usually equally wild) template.&lt;/p&gt;
&lt;p&gt;And today we&#39;re gonna generate &lt;a href=&quot;https://github.com/theforeman/foreman/blob/develop/app/views/unattended/provisioning_templates/cloud_init/cloud_init_default.erb&quot;&gt;YAML from ERB&lt;/a&gt;, what could possibly go wrong?!&lt;/p&gt;
&lt;p&gt;Well, actually, &lt;a href=&quot;https://projects.theforeman.org/issues/38442&quot;&gt;quite&lt;/a&gt; &lt;a href=&quot;https://projects.theforeman.org/issues/37433&quot;&gt;a lot&lt;/a&gt;,
so one wants to validate the generated result before using it to break systems at scale.&lt;/p&gt;
&lt;p&gt;The YAML we generate is a cloud-init &lt;a href=&quot;https://cloudinit.readthedocs.io/en/latest/explanation/about-cloud-config.html&quot;&gt;cloud-config&lt;/a&gt;,
and while checking that we generated a valid YAML document is easy (and we were already doing that),
it would be much better if we could check that cloud-init can actually use it.&lt;/p&gt;
&lt;p&gt;Enter &lt;a href=&quot;https://cloudinit.readthedocs.io/en/latest/howto/debug_user_data.html#check-user-data-cloud-config&quot;&gt;&lt;code&gt;cloud-init schema&lt;/code&gt;&lt;/a&gt;, or so I thought.
Turns out &lt;a href=&quot;https://github.com/canonical/cloud-init/issues/6680&quot;&gt;running &lt;code&gt;cloud-init schema&lt;/code&gt; is rather broken without root privileges&lt;/a&gt;,
as it tries to load &lt;a href=&quot;https://github.com/canonical/cloud-init/issues/6592&quot;&gt;a ton of information from the running system&lt;/a&gt;.
This seems like a bug (or multiple), as the data should not be required for the validation of the schema itself.
I&#39;ve not found a way to disable that behavior.&lt;/p&gt;
&lt;p&gt;Luckily, &lt;a href=&quot;https://xkcd.com/208/&quot;&gt;I know Python&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Enter &lt;code&gt;evgeni-knows-better-and-can-write-python&lt;/code&gt;:&lt;/p&gt;
&lt;div class=&quot;code&quot;&gt;&lt;pre class=&quot;code literal-block&quot;&gt;&lt;span class=&quot;ch&quot;&gt;#!/usr/bin/env python3&lt;/span&gt;

&lt;span class=&quot;kn&quot;&gt;import&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nn&quot;&gt;sys&lt;/span&gt;
&lt;span class=&quot;kn&quot;&gt;from&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nn&quot;&gt;cloudinit.config.schema&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;kn&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;get_schema&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;validate_cloudconfig_file&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;SchemaValidationError&lt;/span&gt;

&lt;span class=&quot;k&quot;&gt;try&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;
    &lt;span class=&quot;n&quot;&gt;valid&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;validate_cloudconfig_file&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;config_path&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;sys&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;argv&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;mi&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;],&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;schema&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;get_schema&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;())&lt;/span&gt;
    &lt;span class=&quot;k&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;ow&quot;&gt;not&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;valid&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;
        &lt;span class=&quot;k&quot;&gt;raise&lt;/span&gt; &lt;span class=&quot;ne&quot;&gt;RuntimeError&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;Schema is not valid&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;/span&gt;
&lt;span class=&quot;k&quot;&gt;except&lt;/span&gt; &lt;span class=&quot;p&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;SchemaValidationError&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;ne&quot;&gt;RuntimeError&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;k&quot;&gt;as&lt;/span&gt; &lt;span class=&quot;n&quot;&gt;e&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;
    &lt;span class=&quot;nb&quot;&gt;print&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;e&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;/span&gt;
    &lt;span class=&quot;n&quot;&gt;sys&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;n&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;mi&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;

&lt;p&gt;The canonical&lt;sup id=&quot;fnref:canonical&quot;&gt;&lt;a class=&quot;footnote-ref&quot; href=&quot;https://www.die-welt.net/2026/01/validating-cloud-init-configs-without-being-root/#fn:canonical&quot;&gt;1&lt;/a&gt;&lt;/sup&gt; version if this &lt;a href=&quot;https://github.com/theforeman/foreman/blob/develop/script/cloud-init-validate&quot;&gt;lives in the Foreman git repo&lt;/a&gt;, so go there if you think this will ever receive any updates.&lt;/p&gt;
&lt;p&gt;The hardest part was to understand the&lt;code&gt;validate_cloudconfig_file&lt;/code&gt; API,
as it will sometimes raise an &lt;code&gt;SchemaValidationError&lt;/code&gt;,
sometimes a &lt;code&gt;RuntimeError&lt;/code&gt; and sometimes just return &lt;code&gt;False&lt;/code&gt;.
No idea why.
But the above just turns it into a couple of printed lines and a non zero exit code,
unless of course there are no problems, then you get peaceful silence.&lt;/p&gt;
&lt;div class=&quot;footnote&quot;&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id=&quot;fn:canonical&quot;&gt;
&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Canonical&quot;&gt;&quot;canonical&quot;&lt;/a&gt;, not &lt;a href=&quot;https://en.wikipedia.org/wiki/Canonical_(company)&quot;&gt;&quot;Canonical&quot;&lt;/a&gt; &lt;a class=&quot;footnote-backref&quot; href=&quot;https://www.die-welt.net/2026/01/validating-cloud-init-configs-without-being-root/#fnref:canonical&quot; title=&quot;Jump back to footnote 1 in the text&quot;&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</content>
	<author>
	  <name>Grml developers</name>
	   <uri>http://planet.grml.org</uri> 
	</author>
	<source>
	  <title type="html">planet grml</title>
	  <subtitle type="html">planet grml - http://planet.grml.org</subtitle>
	  <link rel="self" href="http://planet.grml.org/rss20.xml"/>
	  <id>http://planet.grml.org</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">(中文) 当 BMF 遇见玲珑：一款支持 AI 的音视频转换工具这样落地 deepin</title>
	<link href="https://www.deepin.org/en/openconverter/"/>
	<id>https://www.deepin.org/?p=38224</id>
	<updated>2026-01-21T08:05:16+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">Sorry, this entry is only available in 中文.</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">CVE-2025-64155: In the Wild Exploitation of FortiSIEM for Unauthenticated Root-Level RCE</title>
	<link href="https://www.greenbone.net/en/blog/cve-2025-64155-fortisiem-root-rce-cvss-9-8/"/>
	<id>https://www.greenbone.net/?p=62886</id>
	<updated>2026-01-20T07:53:25+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">On January 13th, 2026, Fortinet publicly disclosed and patched CVE-2025-64155 (CVSS 9.8) affecting FortiSIEM along with five additional vulnerabilities across its product line [1][2][3][4][5]. In particular, CVE-2025-64155 represents high-risk exposure; immediately after its release, active exploitation was reported. The flaw was responsibly disclosed to Fortinet almost six months ago (August 2025), by Horizon3.ai. Greenbone includes […]</content>
	<author>
	  <name>Joseph Lee</name>
	   <uri>https://www.greenbone.net/en/</uri> 
	</author>
	<source>
	  <title type="html">Greenbone</title>
	  <subtitle type="html">Be a moving target, hard to hit</subtitle>
	  <link rel="self" href="https://www.greenbone.net/en/feed/"/>
	  <id>https://www.greenbone.net/en/</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">deepin 25.0.10 Release Note</title>
	<link href="https://www.deepin.org/en/deepin-25-0-10-release/"/>
	<id>https://www.deepin.org/?p=38199</id>
	<updated>2026-01-19T05:41:29+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en">In order to further optimize the deepin 25 system update experience and enhance stability, the deepin 25.0.10 image is now officially released. This update focuses on system installation experience, file management, system interaction, and stability, optimizing multiple high-frequency usage scenarios, fixing a large number of known issues, and improving system smoothness and reliability.   Key Updates in This Release System Installer: Optimized the prompt text for data formatting during full-disk installation, now supporting the option to retain user data and reuse the original account data, configurations, and files. Comprehensive Upgrade of File Manager: Added practical features such as automatic scrolling during file ...&lt;a href=&quot;https://www.deepin.org/en/deepin-25-0-10-release/&quot;&gt;Read more&lt;/a&gt;</content>
	<author>
	  <name>xiaofei</name>
	   <uri>https://www.deepin.org/en</uri> 
	</author>
	<source>
	  <title type="html">Deepin Technology Community</title>
	  
	  <link rel="self" href="https://www.deepin.org/en/feed/"/>
	  <id>https://www.deepin.org/en</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en">Tails 7.4</title>
	<link href="https://tails.net/news/version_7.4/"/>
	<id>https://tails.net/news/version_7.4/</id>
	<updated>2026-01-15T00:00:00+00:00</updated>
	<summary type="html" xml:lang="en"></summary>
	<content type="html" xml:lang="en">&lt;h1 id=&quot;features&quot;&gt;New feature&lt;/h1&gt;


&lt;h2&gt;Persistent language and keyboard layout&lt;/h2&gt;

&lt;p&gt;You can now save your language and keyboard layout from the &lt;em&gt;Welcome
Screen&lt;/em&gt; to the USB stick. These settings will be applied automatically when
restarting Tails.&lt;/p&gt;

&lt;p&gt;If you turn on this option, your language and keyboard layout are saved
unencrypted on the USB stick to help you type the passphrase of your Persistent
Storage more easily.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://tails.net/news/version_7.4/persistent_language.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;screenshot&quot; height=&quot;701&quot; src=&quot;https://tails.net/news/version_7.4/persistent_language.png&quot; width=&quot;692&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1 id=&quot;changes&quot;&gt;Changes and updates&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href=&quot;https://blog.torproject.org/new-release-tor-browser-1504/&quot;&gt;15.0.4&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href=&quot;https://www.thunderbird.net/en-US/thunderbird/140.6.0esr/releasenotes/&quot;&gt;140.6.0&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Linux&lt;/em&gt; kernel to 6.12.63.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Drop support for BitTorrent download.&lt;/p&gt;

&lt;p&gt;With the ongoing transition from BitTorrent v1 to v2, the BitTorrent v1 files
that we provided until now can become a security concern. We don&#39;t think that
updating to BitTorrent v2 is &lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/19275&quot;&gt;worth the extra
migration and maintenance cost&lt;/a&gt; for our team.&lt;/p&gt;

&lt;p&gt;Direct download from one of our mirrors is usually faster.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h1 id=&quot;fixes&quot;&gt;Fixed problems&lt;/h1&gt;


&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Fix opening &lt;em&gt;.gpg&lt;/em&gt; encrypted files in &lt;em&gt;Kleopatra&lt;/em&gt; when double-clicking or
selecting &lt;em&gt;Open with Kleopatra&lt;/em&gt; from the shortcut menu. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21281&quot;&gt;#21281&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fix the desktop crashing when unlocking &lt;em&gt;VeraCrypt&lt;/em&gt; volumes with a wrong
password. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21286&quot;&gt;#21286&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use 24-hour time format consistently in the top navigation bar and the lock
screen. (&lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/issues/21310&quot;&gt;#21310&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For more details, read our &lt;a href=&quot;https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog&quot;&gt;changelog&lt;/a&gt;.&lt;/p&gt;

&lt;h1 id=&quot;get&quot;&gt;Get Tails 7.4&lt;/h1&gt;


&lt;h2&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.4.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an
automatic upgrade, please try to do a &lt;a href=&quot;https://tails.net/doc/upgrade/index.en.html#manual&quot;&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;To install Tails 7.4 on a new USB stick&lt;/h2&gt;

&lt;p&gt;Follow our installation instructions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/windows/index.en.html&quot;&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/mac/index.en.html&quot;&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/linux/index.en.html&quot;&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/expert/index.en.html&quot;&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;caution&quot;&gt;&lt;p&gt;The Persistent Storage on the USB stick will be lost if
you install instead of upgrading.&lt;/p&gt;&lt;/div&gt;


&lt;h2&gt;To download only&lt;/h2&gt;

&lt;p&gt;If you don&#39;t need installation or upgrade instructions, you can download
Tails 7.4 directly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download/index.en.html&quot;&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://tails.net/install/download-iso/index.en.html&quot;&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
	<author>
	  <name>Tails</name>
	   <uri>https://tails.net/news/index.en.html</uri> 
	</author>
	<source>
	  <title type="html">Tails - News</title>
	  <subtitle type="html">Tails</subtitle>
	  <link rel="self" href="https://tails.net/news/index.en.rss"/>
	  <id>https://tails.net/news/index.en.html</id>  
	</source>
  </entry>
  
  <entry xml:lang="en">
	<title type="html" xml:lang="en-US">Cloud security works, but not as a unified system</title>
	<link href="https://www.skudonet.com/blog/cloud-security-fragmentation/"/>
	<id>https://www.skudonet.com/?p=76239</id>
	<updated>2026-01-14T10:25:42+00:00</updated>
	<summary type="html" xml:lang="en-US"></summary>
	<content type="html" xml:lang="en-US">&lt;p&gt;Talking about cloud today is no longer about a technological trend, but about a central piece of the business. More and more companies are moving their infrastructure to cloud providers under the promise of less hardware, less maintenance, fewer licenses and less time spent on activities that do not generate value.&lt;/p&gt;
&lt;p&gt;Much of that promise has been fulfilled. Cloud has democratized capabilities that only large organizations could access a few years ago. Launching a service, increasing capacity or deploying a new region is now easier, faster and more accessible.&lt;/p&gt;
&lt;p&gt;However, as often happens with technology, the story changes when we zoom into operations. Cloud simplifies infrastructure, but it does not always simplify how that infrastructure is operated. And that nuance affects not only technical teams, but also the business itself.&lt;/p&gt;
&lt;h2&gt;Cloud providers don’t sell “solutions” — they sell components&lt;/h2&gt;
&lt;p&gt;The first point of friction does not appear in compute or storage, but in the services that accompany the infrastructure. This includes&lt;strong&gt; security, load balancing, TLS certificates, application firewalls, monitoring and observability.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the cloud provider’s catalog, the technology is there, but it is sold as separate components. Security on one side, certificates on another, observability on another, and advanced capabilities billed as add-ons. The customer does not go without service, but is left with a recurring question: what exactly must be purchased to remain protected and operate reliably?&lt;/p&gt;
&lt;p&gt;A less visible aspect also emerges: &lt;strong&gt;security is billed per event&lt;/strong&gt;, per inspection or per volume of traffic. What used to be a hardware expense becomes a bill based on requests, analysis and certificates. Cloud solved hardware, but externalized the operational complexity of security.&lt;/p&gt;
&lt;p&gt;Metrics and logs exist, but they are often fragmented, sampled and weakly correlated. Understanding what happened during an incident may require navigating multiple services and data models. Cloud promises security, but it rarely promises explanations.&lt;/p&gt;
&lt;p&gt;And at its core this is not a technical problem, but a model problem. &lt;strong&gt;Cloud security&lt;/strong&gt; is commercialized as a product but consumed as a service. And when there is a mismatch between how something is purchased and how it is used, friction eventually appears.&lt;/p&gt;
&lt;h2&gt;SkudoCloud as an example of the managed approach&lt;/h2&gt;
&lt;p&gt;This is the context in which &lt;strong&gt;SkudoCloud&lt;/strong&gt; emerges — not to replace the cloud provider or compete as infrastructure, but to resolve the operational coherence between load balancing, security and visibility.&lt;/p&gt;
&lt;p&gt;SkudoCloud is a&lt;strong&gt; SaaS platform&lt;/strong&gt; that enables companies to deploy &lt;strong&gt;advanced load balancing&lt;/strong&gt; and &lt;strong&gt;application protection&lt;/strong&gt; without assembling separate modules, tools or services. From a single interface, organizations can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;manage SSL/TLS certificates&lt;/li&gt;
&lt;li&gt;inspect encrypted traffic&lt;/li&gt;
&lt;li&gt;apply WAF rules&lt;/li&gt;
&lt;li&gt;distribute load across backends&lt;/li&gt;
&lt;li&gt;and monitor application behavior&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The most evident difference appears in security. In the modular cloud model, the customer must decide what to purchase, which rules to enable, how to correlate logs and how to keep everything updated. In a&lt;strong&gt; managed model like SkudoCloud&lt;/strong&gt;, certificates, WAF, TLS inspection and load balancing behave as one coherent system.&lt;/p&gt;
&lt;p&gt;This has direct consequences for the business:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;it reduces operational uncertainty&lt;/li&gt;
&lt;li&gt;it improves visibility during incidents&lt;/li&gt;
&lt;li&gt;and it avoids billing models tied to traffic volume or number of inspections&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Instead of acquiring security, companies acquire operability. Instead of assembling components, they obtain an outcome. That is the difference of a managed approach.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Cloud adoption is already a given. The real question now is how to operate it sustainably. Fragmentation was a natural side effect of the migration phase. Unification will likely be the central theme of the operational phase.&lt;/p&gt;
&lt;p&gt;Cloud simplified servers. &lt;strong&gt;Now it is time to simplify operations.&lt;/strong&gt;&lt;/p&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-top: 30px;&quot;&gt;&lt;a class=&quot;brxe-button bricks-button red-btn&quot; href=&quot;https://www.skudonet.com/skudocloud/&quot;&gt;Learn more about SkudoCloud Load Balancer&lt;/a&gt;&lt;/div&gt;</content>
	<author>
	  <name>Nieves Álvarez</name>
	   <uri>https://www.skudonet.com</uri> 
	</author>
	<source>
	  <title type="html">SKUDONET</title>
	  
	  <link rel="self" href="https://www.skudonet.com/feed/"/>
	  <id>https://www.skudonet.com</id>  
	</source>
  </entry>
  
</feed>
