Správa o riešení krízy v oblasti bývania v Európskej únii


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Európsky parlament prijal odporúčania k riešeniu krízy bývania v Európskej únii. Poslanci v nich navrhujú opatrenia, ktoré majú pomôcť zabezpečiť dôstojné, udržateľné a cenovo dostupné bývanie pre obyvateľov EÚ. Správa upozorňuje, že milióny Európanov čelia neistým životným podmienkam v dôsledku rastúcich cien bývania a nedostatku dostupných bytov.

👉 Poslanci preto vyzývajú na opatrenia, ktoré podporia výstavbu nových bytov aj renováciu existujúcich budov. Súčasťou pripravovaného plánu pre cenovo dostupné bývanie by mali byť aj finančné prostriedky na zlepšenie energetickej účinnosti budov a boj proti energetickej chudobe. Nové bývanie by zároveň malo spĺňať štandardy kvality v oblasti izolácie, energetickej efektívnosti a kvality ovzdušia.

🌍 Parlament sa zaoberal aj rastúcim počtom krátkodobých prenájmov. Podľa europoslancov je potrebné nájsť rovnováhu medzi rozvojom cestovného ruchu a dostupnosťou bývania pre miestnych obyvateľov. Pripravovaný zákon by mal stanoviť spoločné európske ciele, pričom jednotlivé štáty a mestá by mali mať dostatočnú flexibilitu pri prijímaní konkrétnych opatrení. Poslanci tiež zdôrazňujú potrebu rozšíriť verejné a sociálne bývanie v mestách EÚ, aby sa zlepšila dostupnosť bývania najmä pre zraniteľné skupiny obyvateľstva.

⚖️ Parlament zároveň odsúdil nelegálne obsadzovanie nehnuteľností a vyzval na lepšiu ochranu vlastníkov. Členské štáty by podľa poslancov mali zároveň posilniť práva nájomcov a zabezpečiť spravodlivé podmienky na trhu s nájmom. V oblasti financií poslanci podporujú aj daňové opatrenia, ktoré by pomohli domácnostiam s nízkymi a strednými príjmami, znížili bariéry pre ľudí kupujúcich prvé bývanie a podporili dlhodobé nájomné bývanie.

📈 Správa tiež vyzýva na vyššie investície do bývania, napríklad lepším využitím existujúcich európskych fondov či presmerovaním nevyužitých zdrojov z plánu obnovy na výstavbu a renováciu sociálneho a cenovo dostupného bývania.
Poslanci zároveň žiadajú jednoduchšie a rýchlejšie povoľovacie procesy v stavebníctve, napríklad digitálne povoľovanie stavieb alebo kratšie lehoty na vydanie stavebných povolení.

👷‍♂️ V neposlednom rade sa správa venuje aj stavebnému sektoru. Podľa europoslancov by EÚ mala podporovať výrobu stavebných materiálov v Európe, rozvíjať inovácie v stavebníctve a zlepšiť pracovné podmienky pracovníkov v tomto odvetví, vrátane lepšej odbornej prípravy a spravodlivých miezd.

IETF125 Hackathon: XEP-0202 Entity Time


The media in this post is not displayed to visitors. To view it, please go to the original post.

The XMPP clients Dino and Conversations have implemented XEP-0202: Entity Time to show a small warning in the chat window when it’s currently the middle of the night for a contact.
This entry was edited (yesterday, 5:09 AM)

Vanadium version 146.0.7680.119.0 released


Changes in version 146.0.7680.119.0:

  • update to Chromium 146.0.7680.119

A full list of changes from the previous release (version 146.0.7680.115.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

Vanadium version 146.0.7680.115.0 released


Changes in version 146.0.7680.115.0:

  • update to Chromium 146.0.7680.115

A full list of changes from the previous release (version 146.0.7680.111.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

Stratégia rozširovania EÚ


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Európsky parlament prijal správu o rozširovaní Európskej únie, v ktorej zdôrazňuje, že prijímanie nových členských štátov je strategickou investíciou do bezpečnosti a stability Európy. Podľa europoslancov je rozširovanie reakciou na meniacu sa geopolitickú situáciu a pomáha predchádzať vzniku tzv. geopolitických „šedých zón“, ktoré by mohli byť vystavené silnejšiemu vplyvu zahraničných mocností.

📊 Parlament zároveň upozorňuje, že náklady na nerozšírenie EÚ by mohli byť vyššie než náklady spojené s prijatím nových členov. Správa pripomína, že niektoré kandidátske krajiny už stanovili konkrétne ciele v prístupových rokovaniach, napríklad Čierna Hora s Albánskom chcú ukončiť rokovania o vstupe do EÚ do roku 2026, respektíve 2027.

👉 Europoslanci zároveň vyzývajú Radu Európskej únie aby podporila tento pokrok, ak bude sprevádzaný reálnymi reformami. Parlament tiež požaduje rýchle otvorenie ďalších rokovacích kapitol s krajinami ako Ukrajina a Moldavsko.

⚖️ Poslanci zároveň zdôrazňujú, že proces vstupu do EÚ musí zostať založený na zásluhách jednotlivých krajín a musí byť podmienený splnením požadovaných reformných krokov. Medzi najdôležitejšie podmienky patria dodržiavanie princípov právneho štátu, demokratické reformy, sloboda médií, ochrana menšín, nezávislosť súdnictva a boj proti korupcii.

📈 Dôležitým ukazovateľom pripravenosti krajín na vstup je aj ich zosúladenie so spoločnou zahraničnou a bezpečnostnou politikou EÚ. Správa zároveň upozorňuje na rastúcu podporu členstva v EÚ na Islande a víta iniciatívy Grónska na posilnenie spolupráce s Európskou úniou.

Auditor app version 91 released


Notable changes in version 91:

  • add support for the Pixel 10a with either the stock OS or future GrapheneOS releases
  • update Gradle to 9.4.0
  • update Android Gradle plugin to 9.0.0
  • update AndroidX Core library to 1.18.0
  • update CameraX library to 1.5.3
  • update Kotlin to 2.3.10
  • update Bouncy Castle to 1.83

A full list of changes from the previous release (version 90) is available through the Git commit log between the releases.

The Auditor app uses hardware security features on supported devices to validate the integrity of the operating system from another Android device. It will verify that the device is running the stock operating system with the bootloader locked and that no tampering with the operating system has occurred. It will also detect downgrades to a previous version.

It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Hardware Security Module (HSM) including the verified boot state, operating system variant and operating system version. The verification is much more meaningful after the initial pairing as the app primarily relies on Trust On First Use via pinning. It also verifies the identity of the device after the initial verification. Trust is chained through the verified OS to the app to bootstrap software checks with results displayed in a separate section.

This app is available through the Play Store with the app.attestation.auditor.play app id. Play Store releases go through review and it usually takes around 1 to 3 days before the Play Store pushes out the update to users. Play Store releases use Play Signing, so we use a separate app id from the releases we publish ourselves to avoid conflicts and to distinguish between them. Each release is initially pushed out through the Beta channel followed by the Stable channel.

Releases of the app signed by GrapheneOS with the app.attestation.auditor app id are published in the GrapheneOS App Store which provides fully automatic updates. Each release is initially pushed out through the Alpha channel, followed by the Beta channel and then finally the Stable channel. These releases are also bundled as part of GrapheneOS and published on GitHub.

Uznesenie o pripravovanom akte o Európskom výskumnom priestore


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Európsky parlament schválil svoju pozíciu k pripravovanému aktu o Európskom výskumnom priestore. Cieľom je posilniť systém výskumu a inovácií v Európskej únii a zároveň riešiť dlhodobé štrukturálne problémy, ktoré brzdia jeho rozvoj.

👉 Pripravovaný návrh zákona, ktorý má Európska komisia predstaviť v treťom štvrťroku 2026, má vytvoriť silnejší, otvorenejší a konkurencieschopnejší európsky výskumný priestor. Ambíciou je prilákať vedecké talenty z celého sveta a podporiť inovácie, ktoré posilnia ekonomickú konkurencieschopnosť EÚ.
Parlament preto podporuje vznik záväzného európskeho rámca, ktorý by zabezpečil voľný pohyb výskumníkov, vedeckých poznatkov a technológií naprieč Úniou, často označovaný ako „piata sloboda“ jednotného trhu.

💶 Europoslanci zároveň vyzývajú na lepšiu koordináciu výskumných politík a investícií medzi EÚ a členskými štátmi. Podporujú aj cieľ investovať do roku 2030 aspoň 3 % HDP do výskumu a vývoja, a to z verejných aj súkromných zdrojov.
Zdôrazňujú tiež potrebu posilniť spoluprácu medzi univerzitami, výskumnými inštitúciami a priemyslom a zároveň znižovať rozdiely vo výkonnosti výskumu medzi jednotlivými členskými štátmi.

👩‍🔬 Dôležitou súčasťou ambícií je aj lepšia podpora kariér výskumníkov, najmä mladých vedcov, väčšia mobilita talentov a rovnaké príležitosti vrátane podpory rodovej rovnosti vo vede. Uznesenie Európskeho parlamentu tak vysiela jasný politický signál o tom, aké ambície by mal mať pripravovaný legislatívny návrh: byť záväzný, účinný a dostatočne ambiciózny na to, aby pomohol posilniť vedecký výskum v Európe.

Vanadium version 146.0.7680.111.0 released


Changes in version 146.0.7680.111.0:

  • update to Chromium 146.0.7680.111
  • simplify disable problematic upstream GPU driver workaround via feature flag
  • backport fix for DrumBrake WebAssembly interpreter race conditions
  • extend workaround for PowerVR GPU driver bug to be active for Pixel 10 devices by raising the maximum OpenGL ES version for the workaround from 3.0 to 3.2

A full list of changes from the previous release (version 146.0.7680.65.1) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

We strongly oppose the Unified Attestation initiative...


The media in this post is not displayed to visitors. To view it, please go to the original post.

We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security & freedom on mobile to avoid it. Companies selling phones should not be deciding which operating systems people are allowed to use for apps.

uattest.net

This 🇪🇺 does NOT make bad practices from 🇺🇲 more palatable. People need to stop flag shagging, good tech is good when open auditable & represents freedom regardless of origin. Those behind this are funded by those pushing Chat Control.

Size of companies and their locale is irrelevant when hardware attestation API exists and is open and freely implementable, these are adversarial solutions looking for a problem. That problem they are 'solving' is the free distributiion and use of apps across the Android eco system.

I didn't know these were a good thing but their proponents in this regard must think they are and which by definition this attestation programme is. It is neither utilitarian nor benevolent. One company Google does it, it is monopolistic, multiple do it they become a...cartel.

Further context:
Play Integrity API should be regulated out of existence rather than making another system where companies permit their own products while disallowing others. It shouldn't be legal when Google does it and it shouldn't be legal when Volla and Murena do it either. This is wrong.

GrapheneOS Foundation Opposes Unified Attestation Initiative


We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it. Companies selling phones should not be deciding which operating systems people are allowed to use for apps.

uattest.net/

Google's Play Integrity API is a horrible system enforcing using devices officially licensing Google Mobile Services. It permits those regardless of how many years behind they are on security patches. The solution to this isn't another anti-competitive system based in Europe.

Play Integrity API should be regulated out of existence rather than making another system where companies permit their own products while disallowing others. It shouldn't be legal when Google does it and it shouldn't be legal when Volla and Murena do it either. This is wrong.

Hardware-based attestation has valid use cases including the Auditor app on GrapheneOS for protecting users. The way these companies are using it serves no truly useful purpose beyond giving themselves as unfair advantage while pretending it has something to do with security.

If banks and governments insist on checking devices for security they should define actual standards. It should be possible for any tiny project to be certified at no cost and the standards should be fairly enforced so a mainstream device without current patches is disallowed.

Volla, Murena and iodé sell products with atrocious security. They fail to provide important patches and protections while misleading users with inaccurate claims about privacy and security. That includes setting an inaccurate Android security patch level despite missing patches.

These companies should not have any say over which devices can be used for European banking and government apps. It will reduce competition and reduce security exactly as the Play Integrity API is already doing. The EU should ban using attestation to determine OS compatibility.

Murena and iodé are extremely hostile towards GrapheneOS. They've spent years misleading people about it with inaccurate claims to promote their insecure products. We'll never work with them. Volla, Murena and iodé should have no say in which OS people can use on their devices.

There's no legitimate purpose for either Play Integrity or Unified Attestation to exist. Both will inherently fail to uphold even basic security standards since otherwise their own products wouldn't be allowed. Root-based attestation is also inherently not a secure approach.

Having a European version of the Play Integrity which permits people to use insecure products from specific European companies participating in it while disallowing using arbitrary hardware or software is the opposite of a solution. It's more of the same anti-competitive garbage.


Having a European version of the Play Integrity which permits people to use insecure products from specific European companies participating in it while disallowing using arbitrary hardware or software is the opposite of a solution. It's more of the same anti-competitive garbage.

in reply to KindnessInfinity

Privacy and anonymity are not just for legislators, billionaires, and corporations. No one is entitled to know my name, age, location, what OS i use, what apps I use and when, forcing me onto their monopoly store, etc online even if they really really want to use that information to oppress me and prevent me from speaking freely. I bought the hardware, it's mine to use as I see fit and only run what I want to run on it.
This entry was edited (Wednesday, March 11, 2026, 7:30 PM)

Vanadium version 146.0.7680.65.1 released


Changes in version 146.0.7680.65.1:

  • revert upstream change triggering memory corruption caught by hardware memory tagging on GrapheneOS

A full list of changes from the previous release (version 146.0.7680.65.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

GrapheneOS version 2026030700 released


Tags:

  • 2026030700 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026030500 release:

  • update Pixel Camera HAL to CP1A.260305.018 (Android 16 QPR3) to resolve compatibility issues with the backported Android 16 QPR3 kernel drivers
  • Pixel 10 Pro Fold: change thermal info configuration to work around an incompatibility with the Android 16 QPR3 kernel device tree
  • Setup Wizard: add opt-in toggles for geocoding to the Location services page since we now have a GrapheneOS geocoding service able to handle a large number of users
  • replace "OpenStreetMaps" with the correct "OpenStreetMap" for the geocoder server option name
  • Vanadium: update to version 146.0.7680.65.0

All of the Android 16 security patches from the current April 2026, May 2026, June 2026, July 2026 and August 2026 Android Security Bulletins are included in the 2026030701 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0049, CVE-2026-0052, CVE-2026-0073
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-48600, CVE-2025-48612, CVE-2026-0016, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050, CVE-2026-0053, CVE-2026-0054, CVE-2026-0055, CVE-2026-0056, CVE-2026-0059, CVE-2026-0060, CVE-2026-0061, CVE-2026-0062, CVE-2026-0063, CVE-2026-0065, CVE-2026-0067, CVE-2026-0070, CVE-2026-0074, CVE-2026-0076

For detailed information on security preview releases, see our post about it.

Vanadium version 146.0.7680.65.0 released


Changes in version 146.0.7680.65.0:

  • update to Chromium 146.0.7680.65
  • re-enable use_relative_vtables_abi now that it's compatible with Control Flow Integrity (enabled by GrapheneOS) on arm64 / Android

A full list of changes from the previous release (version 146.0.7680.31.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

GrapheneOS version 2026030500 released


Tags:

  • 2026030500 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026030200 release:

  • full 2026-03-05 security patch level
  • integrate extra security patches not included in the Android Security Bulletin from the March 2026 Android 16 security tag release
  • update Pixel kernel sources to CP1A.260305.018 (Android 16 QPR3)
  • update Pixel firmware and a large portion of the driver libraries/HALs to CP1A.260305.018 (Android 16 QPR3)
  • fix Network permission enforcement for MediaPlayerService clients by closing a bypass caused by an upstream Android vulnerability for INTERNET permission enforcement caused by using case-sensitive rather than case-insensitive string comparisons
  • rename geocoder options to "GrapheneOS server" and "OpenStreetMaps server" since we're now self-hosting Nominatim instead of providing a proxy to the OpenStreetMaps instance

All of the Android 16 security patches from the current April 2026, May 2026, June 2026, July 2026 and August 2026 Android Security Bulletins are included in the 2026030501 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0049, CVE-2026-0052, CVE-2026-0073
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-48600, CVE-2025-48612, CVE-2026-0016, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050, CVE-2026-0053, CVE-2026-0054, CVE-2026-0055, CVE-2026-0056, CVE-2026-0059, CVE-2026-0060, CVE-2026-0061, CVE-2026-0062, CVE-2026-0063, CVE-2026-0065, CVE-2026-0067, CVE-2026-0070, CVE-2026-0074, CVE-2026-0076

For detailed information on security preview releases, see our post about it.

GrapheneOS Foundation Reporting On MicroG OS Project Leaking Private Keys


The official microG OS project (lineage.microg.org/) leaked their private keys for logging into their servers and signing releases:

github.com/lineageos4microg/l4…

We make our official builds on local machines. Our signing machine's keys aren't ever on any storage unencrypted.

Our roadmap for improving security of verifying updates is based on taking advantage of the reproducible builds. We plan to have multiple official build locations and a configurable signoff verification system in the update clients also usable with third party signoff providers.

We don't have faith in any available commercial HSM products being more secure than keeping keys encrypted at rest on the primary local build machine. Instead, we're planning to develop software for using the secure element on GrapheneOS phones as an HSM for signing our releases.


We don't have faith in any available commercial HSM products being more secure than keeping keys encrypted at rest on the primary local build machine. Instead, we're planning to develop software for using the secure element on GrapheneOS phones as an HSM for signing our releases.

reshared this

in reply to artyom

Our response was, as it is in most cases to help educate people who use it and the OS ecommended by microG themselves since they have deeper microG integration than what's available in official LineageOS. It's an official part of the microG project and it reveals a lot about their overall approach to privacy and security in the project.

We are often asked why we don't implement it instead of sandboxed Play Services and this just goes to further reinforce that position.

This entry was edited (Wednesday, March 11, 2026, 7:32 PM)

Spammer Alert & Fediblock


quasselkopf.de is a single user Mastodon where the sole user is heavily using an LLM to generate posts. They're using AI generated concern trolling to annoy and harass people.

Here's an example of them bothering someone else with AI generated replies:

quasselkopf.de/@kranzkrone/116…

Here's where they began doing it towards us:

quasselkopf.de/@kranzkrone/116…

We posted a constructive reply with useful information so they doubled down on trolling. We called it out and got targeted with abuse.


quasselkopf.de is a single user Mastodon where the sole user is heavily using an LLM to generate posts. They're using AI generated concern trolling to annoy and harass people.

Here's an example of them bothering someone else with AI generated replies:

quasselkopf.de/@kranzkrone/116…

Here's where they began doing it towards us:

quasselkopf.de/@kranzkrone/116…

We posted a constructive reply with useful information so they doubled down on trolling. We called it out and got targeted with abuse.

#fediblock


GrapheneOS version 2026030200 released


Tags:

  • 2026030200 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026030100 release:

  • full 2026-03-01 security patch level

All of the Android 16 security patches from the current April 2026, May 2026, June 2026, July 2026 and August 2026 Android Security Bulletins are included in the 2026030201 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0049, CVE-2026-0052
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-32348, CVE-2025-48600, CVE-2025-48612, CVE-2025-48615, CVE-2025-48617, CVE-2025-48649, CVE-2025-48652, CVE-2026-0016, CVE-2026-0018, CVE-2026-0022, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050, CVE-2026-0053, CVE-2026-0054, CVE-2026-0055, CVE-2026-0056, CVE-2026-0059, CVE-2026-0060, CVE-2026-0061, CVE-2026-0062, CVE-2026-0063, CVE-2026-0065, CVE-2026-0067, CVE-2026-0070

For detailed information on security preview releases, see our post about it.

GrapheneOS Web Server Improvements & Planned Offline Network Location Feature


We recently asked for additional sponsored 10Gbps dedicated servers in Europe. We received over a dozen offers and are still looking into and following those up. So far, we've received a 10Gbps update server from Zare in London and a 20Gbps one in Amsterdam from Cherry Servers.

We now have a total of 5 sponsored update servers:

20Gbps from Cherry Servers in Amsterdam10Gbps from Zare in London10Gbps from Xenyth in Toronto10Gbps from ReliableSite in Miami10Gbps from ReliableSite in Los Angeles

Cherry Servers also provided a 2nd server for geocoding.

We have a full list of our public-facing servers at grapheneos.org/articles/graphe… including details on the sponsored servers with links to the websites of the sponsors. All the update servers are sponsored since paying for the amount of traffic we'll be using would be very expensive.

In addition to the primary purpose of updates, we use these servers as a subset of our 11 locations for website/network services.

We moved our mail server to a system container on the Xenyth server where we're using our own AS and IP space via BGP to avoid spam filtering issues.

We're also going to be using a subset of these as additional ns2 anycast DNS locations. We already use the Xenyth server as 1 of our 9 ns2 locations and plan to use the Zare server for it soon too. This depends on BGP support including BGP communities for traffic engineering.

Cherry Servers also provided a 2nd sponsor server in Amsterdam for us to use as our first geocoding server via Nominatim. Nominatim is very demanding and calls for at least around 128GB of memory and 4TB fast NVMe storage. The initial data import for Nominatim took almost 2 days.

Geocoding means converting the description of a location such as an address or the name of a place to coordinates. It supports many different kinds of searches such as finding a pharmacy or park within a certain zone. There's also reverse search to convert coordinates to names.

We provide geocoding as an opt-in service with a choice between our proxy to the OpenStreetMaps Nominatim server (recommended) or directly using their service. Our proxy will soon be pointed at the server from Cherry Servers and then replaced with a new multi-server GeoDNS setup.

You can try out our new self-hosted geocoding server at ams.nominatim.grapheneos.org/u…. In addition to OpenStreetMaps data, we've imported the primary/secondary Wikipedia importance data, US/UK postcodes, US house data and OSM special phrases. It should be close to the OSM service now.

We provide our own implementation of both network-based location and geocoding in GrapheneOS. Network-based location is implemented with on-device positioning but still depends on a service to obtain location data for nearby networks. We're going to be self-hosting both services.

Settings > Location > Location services provides these settings.

Our added "Geocoder" setting provides a choice of using the GrapheneOS proxy or directly using the OpenStreetMaps service. It will soon change to choosing between our self-hosted service and the OpenStreetMaps one.

Our added "Network location" setting provides a choice between using the GrapheneOS proxy to Apple, Apple or Apple China. We're going to build our own cell tower and Wi-Fi location databases to provide our own non-proxy network location option including full offline support.

For network-based location, enabling "Wi-Fi scanning" is recommended since otherwise it has to fall back to only using cell towers when Wi-Fi is disabled and can't function if cellular is disabled. Wi-Fi scanning changes the meaning of the Wi-Fi toggle to allow scans when off.

Both network-based location and geocoding are opt-in for GrapheneOS. However, we recently added network-based location to our setup wizard to improve discoverability and are going to be adding geocoding there too once we're self-hosting it. OSM server rate limiting was an issue.

We're in the process of getting a sponsored server in Frankfurt from a non-profit with 10G DTAG transit, 10G vodafone and 10G DE-CIX ports in addition to the other transit. DTAG transit is very unique and will be very helpful for serving updates to users in Germany at peak times.

Mullvad will be sponsoring 2 servers for us from DataPacket where DataPacket will bill them for our account under their existing arrangement. We haven't deployed those yet since the locations and specs are more flexible and we want to follow up more less flexible offers first.

These server sponsorships are saving a significant amount of money which can go to hiring more developers instead. There are a bunch other offers we need to filter down to the ones which are a good fit and follow those up. Unfortunately we need to avoid France for the time being.


These server sponsorships are saving a significant amount of money which can go to hiring more developers instead. There are a bunch other offers we need to filter down to the ones which are a good fit and follow those up. Unfortunately we need to avoid France for the time being.

GrapheneOS Collaboration With Motorola Mobility


We're happy to announce a long-term partnership with Motorola. We're collaborating on future devices meeting our privacy and security standards with official GrapheneOS support.

motorolanews.com/motorola-thre…


We're happy to announce a long-term partnership with Motorola. We're collaborating on future devices meeting our privacy and security standards with official GrapheneOS support.

motorolanews.com/motorola-thre…


This entry was edited (Monday, March 2, 2026, 2:18 PM)

GrapheneOS version 2026030100 released


Tags:

  • 2026030100 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026020600 release:

  • SystemUI: migrate to the modern lockscreen infrastructure (smartspace) for showing lockscreen device status info to avoid many upstream bugs caused by AOSP still using the legacy lockscreen infrastructure no longer used on the stock Pixel OS (this allows us to revert a bunch of downstream fixes we were using)
  • Settings: don't allow disabling eSIM when eSIM management support is disabled since it can persistently prevent using the eSIMs without using ADB shell to undo it
  • modify our multicast firewall to stop dropping route advertisements received on the VPN interface which sometimes breaks IPv6 connectivity
  • fix rare edge preventing dismissing the UI for our 2-factor fingerprint unlock feature
  • Setup Wizard: add opt-in toggles for network-based location and always available Wi-Fi scanning to the Location services page
  • kernel (Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold): raise lockdown mode from integrity to confidentiality mode to match the other devices
  • kernel (Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold): add workaround for an upstream arm64 KVM bug breaking booting with lockdown in confidentiality mode
  • kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.163
  • kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.126
  • kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.73
  • hardened_malloc: update libdivide to 5.3.0
  • hardened_malloc: fix handling one form of realloc from small allocations made with alignment above PAGE_SIZE (no known real world examples and it would be crashing if it was happening since it causes internal invalid accesses unable to go outside the bounds of the protected metadata region which is mainly PROT_NONE)
  • Vanadium: update to version 145.0.7632.75.0
  • Vanadium: update to version 145.0.7632.109.0
  • Vanadium: update to version 145.0.7632.120.0
  • Vanadium: update to version 146.0.7680.31.0
  • adevtool: handle Node.js fs.cp behavior change
  • adevtool: update dependencies

All of the Android 16 security patches from the current March 2026, April 2026, May 2026, June 2026, July 2026 and August 2026 Android Security Bulletins are included in the 2026030101 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0047, CVE-2026-0049, CVE-2026-0052
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-32348, CVE-2025-48600, CVE-2025-48612, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2025-64783, CVE-2025-64784, CVE-2025-64893, CVE-2026-0011, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0034, CVE-2026-0035, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050, CVE-2026-0053, CVE-2026-0054, CVE-2026-0055, CVE-2026-0056, CVE-2026-0059, CVE-2026-0060, CVE-2026-0061, CVE-2026-0062, CVE-2026-0063, CVE-2026-0065, CVE-2026-0067

For detailed information on security preview releases, see our post about it.

Výročná správa Európskej centrálnej banky za rok 2025


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Európsky parlament oficiálne prijal výročné preskúmanie politík Európskej centrálnej banky za rok 2026, ktorému predchádzala intenzívna diskusia s prezidentkou Christine Lagardovou. Hlavným posolstvom správy je, že úplná nezávislosť ECB od politických tlakov zostáva základným pilierom pre efektívne udržiavanie cenovej stability. Poslanci však jedným dychom dodávajú, že táto nezávislosť musí ísť ruka v ruke s vysokou mierou zodpovednosti a transparentnosti voči občanom a inštitúciám Únie.

💶 V oblasti modernizácie financií sa Parlament jasne postavil za projekt digitálneho eura, ktorý vníma ako kľúč k posilneniu menovej suverenity a odolnosti jednotného trhu. Zároveň však poslanci dôrazne apelujú na zachovanie dôležitej úlohy fyzickej hotovosti v každodennom živote. Vyjadrili tiež obavy, že ak digitalizáciu platieb ovládnu súkromné subjekty spoza hraníc EÚ, môže to viesť k vylúčeniu zraniteľných skupín obyvateľstva a obchodníkov, preto žiadajú prísnejší dohľad nad kryptoaktívami.

📈 Kritika zo strany europoslancov smerovala k riešeniu nedávnej vysokej inflácie, pričom správa konštatuje, že návrat k stabilným cenám mal byť dosiahnutý rýchlejšie. Parlament vyjadril hlboké znepokojenie nad pretrvávajúcimi vysokými životnými nákladmi, najmä v prípade potravín, ktorých priemerná cena od pandémie vzrástla až o tretinu. ECB bola vyzvaná, aby sa z tejto krízy poučila a pri každom ďalšom uvoľňovaní menovej politiky postupovala nanajvýš opatrne a prísne na základe aktuálnych ekonomických dát.

🏦 Dôležitým bodom správy je aj výzva na rýchlejšie ukončenie takzvaných nekonvenčných opatrení, ako sú masívne nákupy aktív. Podľa poslancov tieto nástroje spôsobujú nežiaduce vedľajšie účinky vrátane skresľovania trhových cien a prílišného nahradzovania súkromných medzibankových úverov schémami centrálnej banky. ECB je v texte priamo kritizovaná za to, že svoju súvahu znižuje len veľmi pomaly, čo môže v dlhodobom horizonte narúšať prirodzené fungovanie finančných trhov.

🛡️ Na záver poslanci vyjadrili podporu postupnému ukončeniu nákupov štátnych dlhopisov a zníženiu priameho zapojenia ECB do nákupu cenných papierov. Správa uznáva, že zlá fiškálna situácia niektorých vlád komplikuje banke sústrediť sa výhradne na jej hlavný cieľ, a teda cenovú stabilitu. V časoch globálneho napätia však Parlament vyzdvihol solidaritu medzi svetovými centrálnymi bankami, najmä vo vzťahu k americkému Federálnemu rezervnému systému, čo považuje za dôležitý stabilizačný prvok.

Vanadium version 146.0.7680.31.0 released


Changes in version 146.0.7680.31.0:

  • update to Chromium 146.0.7680.31

A full list of changes from the previous release (version 145.0.7632.120.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

Vanadium version 145.0.7632.120.0 released


Changes in version 145.0.7632.120.0:

  • update to Chromium 145.0.7632.120

A full list of changes from the previous release (version 145.0.7632.109.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

Uznesenie o systematickom útlaku a represiách zo strany režimu v Iráne


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Europoslanci v minulom týždni prijali uznesenie, v ktorom ostro odsúdili systematické porušovanie ľudských práv zo strany iránskeho režimu a vyjadrili solidaritu s občanmi Iránu. Parlament zároveň potvrdil, že občania Iránu sú jediným legitímnym zdrojom suverenity v krajine.

🕊️ Nedávne protesty si vyžiadali tisíce obetí vrátane žien, detí a starších osôb. Medzi obeťami boli aj občania EÚ. Parlament upozorňuje, že zdokumentované činy môžu predstavovať zločiny proti ľudskosti.

🇮🇷 Europoslanci vyzvali iránsky režim, aby okamžite ukončil násilie voči civilistom, zastavil výkon popráv a prepustil všetky svojvoľne zadržiavané osoby vrátane cudzích štátnych príslušníkov. Zároveň vyzvali na nezávislé zdokumentovanie zločinov a zabezpečenie dôkazov pre budúce trestné stíhanie.

🏦 Parlament tiež vyzval členské štáty EÚ na rozšírenie cielených sankcií vrátane zmrazenia majetku a zákazu cestovania voči osobám zodpovedným za represie.

Uznesenie o štyroch rokoch útočnej vojny Ruska proti Ukrajine


The media in this post is not displayed to visitors. To view it, please go to the original post.

🇪🇺 Štyri roky od začiatku plnohodnotej ruskej invázie prijal Európsky parlament rezolúciu, v ktorej vzdal hold všetkým, ktorí obetovali životy za slobodnú a nezávislú Ukrajinu a tým opätovne potvrdil podporu jej suverenite a územnej celistvosti. V rozpráve aj v texte zaznelo, že ruská agresia musí skončiť neúspechom agresora a Ukrajina musí zvíťaziť. Parlament zároveň odsúdil nielen Rusko, ale aj Čínu, Irán, Severnú Kóreu a Bielorusko za ich priamu vojenskú a diplomatickú podporu Moskvy v tomto konflikte.

🕊️ V otázke mieru europoslanci vyslali jasný odkaz. O ničom, čo sa týka Ukrajiny, sa nesmie rozhodovať bez Ukrajiny a o ničom, čo sa týka Európy, bez Európy. Každá mierová dohoda musí byť podložená skutočnými bezpečnostnými zárukami porovnateľnými s článkom 5 Severoatlantickej zmluvy.

💶 Parlament taktiež víta nedávno schválený balík pomoci vo výške 90 miliárd eur na roky 2026 - 2027 a vyzýva na jeho rýchle uvoľnenie. Podporil aj vytvorenie mnohonárodných zaisťovacích síl a špeciálneho tribunálu na stíhanie zločinov agresie.

🏦 Rezolúcia vyzýva na výrazné sprísnenie sankcií voči Rusku, vrátane ukončenia dovozu všetkých ruských surovín do Európy, tvrdšieho postupu proti ruskej „tieňovej flotile“ a sankcií voči spoločnosti Rosatom. Zmrazené ruské aktíva by mali byť podľa Európskejo parlamentu použité priamo na obnovu Ukrajiny.

👶 Europoslanci zároveň upozornili na násilnú deportáciu najmenej 20 000 ukrajinských detí do Ruska a Bieloruska, vyzvali na ich okamžitý návrat a podporili organizácie, ktoré tieto deti pomáhajú vyhľadávať. Parlament tiež potvrdil, že budúcnosť Ukrajiny je v Európskej únii a vyzval na urýchlenie jej integrácie do jednotného trhu ešte pred formálnym vstupom.

in reply to Ep_prehladne

Je jednoduchšie vojne predchádzať než sa ju snažiť ukončiť. A prispieť k tomu môžme všetci!

Pozývam do bezplatného kurzu pozitívneho mieru - tvorby spoločenských podmienok, ktoré pomáhajú vytvárať a udržiavať mierové spoločnosti 👇
positivepeace.academy/

in reply to Dennis Melhede

Yes!
It is fast and doesn't list all incoming postst and answers in chronological order without context - like you get in Tusky or Fedilab. Instead you have to tap on the main (first) post, which is shown in your timeline, for getting the full thread nice sorted.
Beside that, you have good features for adding links and 'ALT Text' when creating a new post or an answer.

This is for Android. I think on desktop it doesn't have advantages in comparison to Browser/Frio-Theme.

#friendica #android #client #relatica

This entry was edited (Tuesday, February 24, 2026, 11:15 AM)
in reply to Schaf

Trying it out now, this post is from Relatica.
Generally it looks good, and I like it.
It does have a strange initial (I hope) issue with loading notifications. For example I couldnt find this thread, as the notifications I have in the Web client wasnt here. There were strangely only notifications up until 2 days ago. BUT the last update you did, after I had installed it actually DID generate a notification.
I have a feeling posts looks nicer here, but I will compare more thoroughly when I have better time.
in reply to Ruben Storm

@Ruben Storm Let me start by saying that my favorite Dndroid client is... the browser! I like having complete control over the interface, and the browser is unbeatable. Furthermore, the ability to automatically translate posts in other languages ​​is essential for me.

That said, the best app for Friendica is definitely Raccoon for Friendica, although the developer is experiencing some issues with the current state of Kotlin Multiplatform, so development is currently somewhat stalled.

The elements that make for an excellent user experience are, in particular, the following:
1. Ability to manage multiple users
2. A formatting bar integrated into the message composer
3. Ability to view Activitypub groups, showing only the topics and not all conversations (a bit Lemmy-esque). This mode is available not only for Friendica groups, but for all Activitypub groups, from Lemmy communities to NodeBB categories, Peertube channels, and Mbin magazines.
4. Side-scrolling feature: when you click on a message in the timeline, you can swipe left and right to view other conversations, without having to return to the timeline.
5. Ability to insert images inline with the text, and not just import them as attachments (like in other clients), Mastodon-style.
6. Customizable interface colors.

Finally, all these features can be used by both Friendica and Mastodon users, because not only is Raccoon compatible with Mastodon, but Mastodon Glitch-soc users can also take advantage of the formatting toolbar.

Raccoon's flaws, however, are as follows:
1. A certain immaturity that leads to some crashes (fortunately less frequent than a year ago).
2. Some difficulties with searching, both on Friendica and on Mastodon
3. The fact that it still doesn't handle "reshare with quote", both the classic Friendica ones and the weird Mastodon ones.

This entry was edited (Wednesday, March 11, 2026, 2:25 PM)

hardened_malloc version 14 released


Changes in version 14:

  • fix handling one form of realloc from small allocations made with alignment above PAGE_SIZE (no known real world examples and it would be crashing if it was happening since it causes internal invalid accesses unable to go outside the bounds of the protected metadata region which is mainly PROT_NONE)
  • update libdivide to 5.3.0
  • silence false positive warning with GCC 15 and later

A full list of changes from the previous release (version 13) is available through the Git commit log between the releases.

See the README for this release for an overview of the project and many details about the design goals and implementation.

This is a standalone release for use outside of GrapheneOS. GrapheneOS ships these changes shortly after they're implemented as part of our OS releases rather than waiting for these releases.

These integer tags are the standalone releases, while date style tags such as 2024101200 and 2024101200-caimito are part of GrapheneOS releases and may contain GrapheneOS-specific changes such as workarounds for latent memory corruption bugs encountered in the wild while waiting for an upstream or downstream fix.

GrapheneOS Email Server New Server


Our email server (mail.grapheneos.org) has been migrated to our bare metal server sponsored by Xenyth in Toronto. We're now using clean IP space announced via BGP with our AS to improve email deliverability by not having IP/AS neighbours sending spam.

bgp.tools/dns/mail.grapheneos.…


Our email server (mail.grapheneos.org) has been migrated to our bare metal server sponsored by Xenyth in Toronto. We're now using clean IP space announced via BGP with our AS to improve email deliverability by not having IP/AS neighbours sending spam.

bgp.tools/dns/mail.grapheneos.…


This entry was edited (Monday, March 2, 2026, 2:12 PM)

Onboarding experience with Quicksy


The media in this post is not displayed to visitors. To view it, please go to the original post.

Quicksy is a spin off of the popular Jabber/XMPP client Conversations with automatic contact discovery.

quicksy.im

You sign up with your phone number and Quicksy will automatically—based on the phone numbers in your address book—suggest possible contacts to you. Quicksy can be downloaded for free from Google Play Store.

This entry was edited (Friday, February 20, 2026, 1:33 PM)

reshared this

Humans' behavior about LLMs is the same as animals with a mirror: they believe there is "another" in there. It's just their reflexion


To go deeper: some animals act curiously, others with fear, but only a few of them understand what the mirror does and use it to inspect themselves.
This entry was edited (Thursday, February 19, 2026, 4:53 PM)

Vanadium version 145.0.7632.109.0 released


Changes in version 145.0.7632.109.0:

  • update to Chromium 145.0.7632.109
  • use ZXing for barcode detection to replace the unavailable Play services dependency
  • improve stubbing out text detection feature depending on unavailable Play services dependency

A full list of changes from the previous release (version 145.0.7632.75.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Chris Kraus – „15 Jahre“ (2023)

Fünfzehn Jahre im Knast – das ist die Langstrecke. Nach verbüßter Schuld sucht eine Frau einen Neustart. Doch der Film interessiert sich nicht für Neuanfänge als Feelgood Erzählung. Chris Kraus setzt dort an, wo Institutionen behaupten, ihre Arbeit sei getan. Gefängnismauern verschwinden zwar, doch die Mechanismen bleiben. Das Ganze spielt im Sumpf zwischen Fürsorge, Kunst und Castingshows, zwischen der Chance auf Freiheit und der auf Revanche. Mit einer überragenden Hannah Herzsprung in einem Cast aus der ersten Liga. (TV-Premiere, ARTE)
Zum Blog: nexxtpress.de/mediathekperlen/…

Strategické partnerstvo EÚ v oblasti obrany a bezpečnosti


The media in this post is not displayed to visitors. To view it, please go to the original post.

Európsky parlament dnes podporil rozšírenie a prehĺbenie obranných partnerstiev EÚ so strategickými partnermi a otvoril tak novú kapitolu v oblasti spolupráce v oblasti bezpečnosti a obrany. Tento krok má pomôcť EÚ stať sa odolnejšou a efektívnejšou v odpovedi na súčasné a budúce bezpečnostné hrozby.

Poslanci zdôraznili význam posilnenia spolupráce medzi EÚ a partnermi ako Spojené štáty, Kanada, Japonsko či Austrália, aby sa zabezpečilo lepšie zdieľanie schopností, interoperabilita a koordinácia vo vojenskej oblasti. Táto spolupráca by mala zahŕňať nielen výcvik a cvičenia, ale aj spoločné programy, výmenu informácií a technologický rozvoj.

Parlament zároveň vyzval, aby sa obranné partnerstvá stali trvalými mechanizmami, ktoré budú reagovať na meniace sa globálne prostredie, a aby sa posilnila úloha Európskej obranné agentúry a spolupráca v rámci Európskeho obranného fondu. Cieľom je zvýšiť schopnosti členských štátov plánovať, vyvíjať a obstarávať obranné kapacity spoločne, efektívnejšie a strategickejšie.

Europoslanci pripomenuli, že moderné bezpečnostné výzvy, od hybridných hrozieb až po kybernetické útoky si vyžadujú silnejšie strategické partnerstvá mimo EÚ. Rozšírenie spolupráce s globálnymi partnermi tak podľa nich posilní odolnosť EÚ, zlepší obrannú interoperabilitu a prispeje k stabilite v širšom euroatlantickom priestore.

Tento krok je vnímaný ako signál EÚ, že chce byť aktívnym a schopným aktérom v oblasti medzinárodnej bezpečnosti a obrany, schopným spolupracovať s rovnako zmýšľajúcimi partnermi pri ochrane spoločných hodnôt a strategických záujmov.

slidgeqq: new Slidge based XMPP gateway for Tencent QQ


Quite nice to see some networks being supported that are lesser known in the west. Apparently there is a sizable number of Chinese XMPP users these days.
#xmpp

reshared this

Uznesenie o situacii v severovýchodnej Sýrii a ochrane civilného obyvateľstva


The media in this post is not displayed to visitors. To view it, please go to the original post.

Európsky parlament odsúdil násilie voči civilistom v severovýchodnej Sýrii a vyzval na okamžité a udržateľné prímerie. Reaguje tým na ofenzívu začatú 6. januára 2026, ktorá spôsobila rozsiahle vysídlenie obyvateľstva a útoky na civilnú infraštruktúru. Poslanci žiadajú dôkladné a nezávislé vyšetrenie všetkých možných porušení medzinárodného humanitárneho práva. Vyzývajú sýrske orgány, aby umožnili plný prístup medzinárodným vyšetrovacím mechanizmom OSN.

Parlament podporuje vytvorenie bezpečných humanitárnych koridorov, posilnenie humanitárnej pomoci a ochranu humanitárnych a ľudskoprávnych organizácií pôsobiacich v regióne. Europoslanci zdôrazňujú potrebu politického riešenia konfliktu, rešpektovania práv všetkých komunít vrátane kurdskej populácie a podporujú dialóg medzi relevantnými aktérmi s cieľom stabilizácie regiónu.

Parlament vyjadril vážne obavy z útekov zadržiavaných členov tzv. Islamského štátu zo zabezpečených zariadení a upozorňuje na bezpečnostné riziká pre Sýriu aj širší región. Uznesenie zároveň poukazuje na finančnú podporu EÚ a zdôrazňuje, že spolupráca so sýrskymi orgánmi musí byť podmienená konkrétnym pokrokom v ochrane civilistov a dodržiavaní ľudských práv.

Stubsack: weekly thread for sneers not worth an entire post, week ending 22nd February 2026


Want to wade into the snowy surf of the abyss? Have a sneer percolating in your system but not enough time/energy to make a whole post about it? Go forth and be mid.

Welcome to the Stubsack, your first port of call for learning fresh Awful you’ll near-instantly regret.

Any awful.systems sub may be subsneered in this subthread, techtakes or no.

If your sneer seems higher quality than you thought, feel free to cut’n’paste it into its own post — there’s no quota for posting and the bar really isn’t that high.

The post Xitter web has spawned so many “esoteric” right wing freaks, but there’s no appropriate sneer-space for them. I’m talking redscare-ish, reality challenged “culture critics” who write about everything but understand nothing. I’m talking about reply-guys who make the same 6 tweets about the same 3 subjects. They’re inescapable at this point, yet I don’t see them mocked (as much as they should be)

Like, there was one dude a while back who insisted that women couldn’t be surgeons because they didn’t believe in the moon or in stars? I think each and every one of these guys is uniquely fucked up and if I can’t escape them, I would love to sneer at them.


(Credit and/or blame to David Gerard for starting this. Also, hope you had a wonderful Valentine's Day!)