<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 18:20:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Linux Action News - Episodes Tagged with “Webrtc”</title>
    <link>https://linuxactionnews.com/tags/webrtc</link>
    <pubDate>Thu, 20 Oct 2022 10:45:00 -0700</pubDate>
    <description>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Our weekly take on the free and open source world.</itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Linux Action News 263</title>
  <link>https://linuxactionnews.com/263</link>
  <guid isPermaLink="false">bbf85579-c916-4b02-add3-bf150f9cf650</guid>
  <pubDate>Thu, 20 Oct 2022 10:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/dec90738-e640-45e5-b375-4573052f4bf4/bbf85579-c916-4b02-add3-bf150f9cf650.mp3" length="14563705" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>What makes Google's new OS so secure, a critical WiFi vulnerability in the Kernel, and why Linus is tapping the hype breaks for Linux 6.1.</itunes:subtitle>
  <itunes:duration>17:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
  <description>What makes Google's new OS so secure, a critical WiFi vulnerability in the Kernel, and why Linus is tapping the hype breaks for Linux 6.1. 
</description>
  <itunes:keywords>Linux News Podcast, Linux Action News, KataOS, Sparrow, RISC-V, sel4, CAmkES, microkernel, formal verfication, Linux Wifi Flaw, CVE-2022-41674, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722, mac80211, WLAN frames, TU Darmstadt, SUSE, Firefox 106, WebRTC, Wayland, libwebrtc 103, Impervious, impervious.ai, Fedora 37, Release Party, Linux 6.1, Rust, LTS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What makes Google&#39;s new OS so secure, a critical WiFi vulnerability in the Kernel, and why Linus is tapping the hype breaks for Linux 6.1.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li><li><a rel="nofollow" href="https://l.kolide.co/3klbWzr">Kolide</a>: <a rel="nofollow" href="https://l.kolide.co/3klbWzr">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. </a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Announcing KataOS and Sparrow" rel="nofollow" href="https://opensource.googleblog.com/2022/10/announcing-kataos-and-sparrow.html?m=1">Announcing KataOS and Sparrow</a> &mdash; Our team in Google Research has set out to solve this problem by building a provably secure platform that's optimized for embedded devices that run ML applications.</li><li><a title="Google launches KataOS" rel="nofollow" href="https://lwn.net/Articles/911332/#Comments">Google launches KataOS</a></li><li><a title="Google Announces KataOS As Security-Focused OS, Leveraging Rust &amp; seL4 Microkernel" rel="nofollow" href="https://www.phoronix.com/news/Google-KataOS">Google Announces KataOS As Security-Focused OS, Leveraging Rust &amp; seL4 Microkernel</a></li><li><a title="Some remotely exploitable kernel WiFi vulnerabilities" rel="nofollow" href="https://lwn.net/Articles/911062/">Some remotely exploitable kernel WiFi vulnerabilities</a> &mdash; It would appear that there is a set of memory-related vulnerabilities in the kernel's WiFi stack that can be exploited over the air via malicious packets; five CVE numbers have been assigned to the set.</li><li><a title="Linux Gets Patched For WiFi Vulnerabilities That Can Be Exploited By Malicious Packets - Phoronix" rel="nofollow" href="https://www.phoronix.com/news/Linux-WiFi-Malicious-Packets">Linux Gets Patched For WiFi Vulnerabilities That Can Be Exploited By Malicious Packets - Phoronix</a></li><li><a title="Firefox 106 Brings Improved WebRTC - Better Screen Sharing On Wayland" rel="nofollow" href="https://www.phoronix.com/news/Firefox-106-Available">Firefox 106 Brings Improved WebRTC - Better Screen Sharing On Wayland</a> &mdash; Firefox 106 upgrades its WebRTC capabilities to now make use of libwebrtc 103.</li><li><a title="impervious.ai" rel="nofollow" href="http://impervious.ai/">impervious.ai</a> &mdash; A Suite of Peer-to-Peer Tools for Communications, Data Transport, and Payments, Built Directly Into the Web Browser</li><li><a title="Impervious Ai GitHub" rel="nofollow" href="https://github.com/imperviousai">Impervious Ai GitHub</a></li><li><a title="You’re invited to the Fedora Linux 37 Release Party!" rel="nofollow" href="https://fedoramagazine.org/youre-invited-to-the-fedora-linux-37-release-party/">You’re invited to the Fedora Linux 37 Release Party!</a> &mdash; Please register on Hopin and join us on November 4th and 5th for a short program of informational sessions and social activities.</li><li><a title="Fedora Linux 37 Release Party Registration" rel="nofollow" href="https://hopin.com/events/fedora-linux-37-release-party/registration">Fedora Linux 37 Release Party Registration</a></li><li><a title="Linus Torvalds to Linux devs: Stop pulling all-nighters" rel="nofollow" href="https://www.theregister.com/2022/10/17/linux_6_1_rc1/">Linus Torvalds to Linux devs: Stop pulling all-nighters</a> &mdash; "Let me just say that after I got my machine sorted out and caught up with the merge window, I was somewhat frustrated with various late pull requests. I've mentioned this before, but it's _really_ quite annoying to get quite a few pull requests in the last few days of the merge window"</li><li><a title="Linux 6.1 Features Include Initial Rust Code, MGLRU, New AMD CPU Features, More Security" rel="nofollow" href="https://www.phoronix.com/review/linux-61-features">Linux 6.1 Features Include Initial Rust Code, MGLRU, New AMD CPU Features, More Security</a></li><li><a title="Linux 6.1 Will Likely Be This Year’s LTS Kernel Release" rel="nofollow" href="https://www.phoronix.com/news/Linux-6.1-Likely-LTS">Linux 6.1 Will Likely Be This Year’s LTS Kernel Release</a></li><li><a title="Taming the Beast - LUP 480" rel="nofollow" href="https://www.jupiterbroadcasting.com/show/linux-unplugged/480/">Taming the Beast - LUP 480</a></li><li><a title="Send a Boost" rel="nofollow" href="https://podcastindex.org/apps?appTypes=app&amp;elements=Value">Send a Boost</a> &mdash; Upgrade to a Podcasting 2.0 compatible app, and send a Boost and enjoy other improvements to your podcasts.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What makes Google&#39;s new OS so secure, a critical WiFi vulnerability in the Kernel, and why Linus is tapping the hype breaks for Linux 6.1.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li><li><a rel="nofollow" href="https://l.kolide.co/3klbWzr">Kolide</a>: <a rel="nofollow" href="https://l.kolide.co/3klbWzr">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. </a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Announcing KataOS and Sparrow" rel="nofollow" href="https://opensource.googleblog.com/2022/10/announcing-kataos-and-sparrow.html?m=1">Announcing KataOS and Sparrow</a> &mdash; Our team in Google Research has set out to solve this problem by building a provably secure platform that's optimized for embedded devices that run ML applications.</li><li><a title="Google launches KataOS" rel="nofollow" href="https://lwn.net/Articles/911332/#Comments">Google launches KataOS</a></li><li><a title="Google Announces KataOS As Security-Focused OS, Leveraging Rust &amp; seL4 Microkernel" rel="nofollow" href="https://www.phoronix.com/news/Google-KataOS">Google Announces KataOS As Security-Focused OS, Leveraging Rust &amp; seL4 Microkernel</a></li><li><a title="Some remotely exploitable kernel WiFi vulnerabilities" rel="nofollow" href="https://lwn.net/Articles/911062/">Some remotely exploitable kernel WiFi vulnerabilities</a> &mdash; It would appear that there is a set of memory-related vulnerabilities in the kernel's WiFi stack that can be exploited over the air via malicious packets; five CVE numbers have been assigned to the set.</li><li><a title="Linux Gets Patched For WiFi Vulnerabilities That Can Be Exploited By Malicious Packets - Phoronix" rel="nofollow" href="https://www.phoronix.com/news/Linux-WiFi-Malicious-Packets">Linux Gets Patched For WiFi Vulnerabilities That Can Be Exploited By Malicious Packets - Phoronix</a></li><li><a title="Firefox 106 Brings Improved WebRTC - Better Screen Sharing On Wayland" rel="nofollow" href="https://www.phoronix.com/news/Firefox-106-Available">Firefox 106 Brings Improved WebRTC - Better Screen Sharing On Wayland</a> &mdash; Firefox 106 upgrades its WebRTC capabilities to now make use of libwebrtc 103.</li><li><a title="impervious.ai" rel="nofollow" href="http://impervious.ai/">impervious.ai</a> &mdash; A Suite of Peer-to-Peer Tools for Communications, Data Transport, and Payments, Built Directly Into the Web Browser</li><li><a title="Impervious Ai GitHub" rel="nofollow" href="https://github.com/imperviousai">Impervious Ai GitHub</a></li><li><a title="You’re invited to the Fedora Linux 37 Release Party!" rel="nofollow" href="https://fedoramagazine.org/youre-invited-to-the-fedora-linux-37-release-party/">You’re invited to the Fedora Linux 37 Release Party!</a> &mdash; Please register on Hopin and join us on November 4th and 5th for a short program of informational sessions and social activities.</li><li><a title="Fedora Linux 37 Release Party Registration" rel="nofollow" href="https://hopin.com/events/fedora-linux-37-release-party/registration">Fedora Linux 37 Release Party Registration</a></li><li><a title="Linus Torvalds to Linux devs: Stop pulling all-nighters" rel="nofollow" href="https://www.theregister.com/2022/10/17/linux_6_1_rc1/">Linus Torvalds to Linux devs: Stop pulling all-nighters</a> &mdash; "Let me just say that after I got my machine sorted out and caught up with the merge window, I was somewhat frustrated with various late pull requests. I've mentioned this before, but it's _really_ quite annoying to get quite a few pull requests in the last few days of the merge window"</li><li><a title="Linux 6.1 Features Include Initial Rust Code, MGLRU, New AMD CPU Features, More Security" rel="nofollow" href="https://www.phoronix.com/review/linux-61-features">Linux 6.1 Features Include Initial Rust Code, MGLRU, New AMD CPU Features, More Security</a></li><li><a title="Linux 6.1 Will Likely Be This Year’s LTS Kernel Release" rel="nofollow" href="https://www.phoronix.com/news/Linux-6.1-Likely-LTS">Linux 6.1 Will Likely Be This Year’s LTS Kernel Release</a></li><li><a title="Taming the Beast - LUP 480" rel="nofollow" href="https://www.jupiterbroadcasting.com/show/linux-unplugged/480/">Taming the Beast - LUP 480</a></li><li><a title="Send a Boost" rel="nofollow" href="https://podcastindex.org/apps?appTypes=app&amp;elements=Value">Send a Boost</a> &mdash; Upgrade to a Podcasting 2.0 compatible app, and send a Boost and enjoy other improvements to your podcasts.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Linux Action News 231</title>
  <link>https://linuxactionnews.com/231</link>
  <guid isPermaLink="false">25c35970-b6d9-4c6d-b2a0-01916f665e50</guid>
  <pubDate>Thu, 10 Mar 2022 07:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/dec90738-e640-45e5-b375-4573052f4bf4/25c35970-b6d9-4c6d-b2a0-01916f665e50.mp3" length="13245881" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.</itunes:subtitle>
  <itunes:duration>18:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
  <description>Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS. 
</description>
  <itunes:keywords>Linux News Podcast, Linux Action News, Linux security, Dirty Pipe, Unix pipe, pipelines, zero-copy, CVE-2022-0847, CM4All, Max Kellermann, Linux 5.8, Pixel 6, Samsung Galaxy S22, Android, AMD, KVM, QEMU, virtualization, AI, ML, OpenBMC, UEFI, BIOS, Austin, Texas, CPU, hardware, silicon, Matrix, Element, Element Call, Synapse, Zoom, Hangouts, End-to-end encryption, peer-to-peer, WebRTC, SIP, VOIP, SFU, MCU, elementary OS, Danielle Fore, Cassidy James Blaede, Blake Kostner, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li><li><a rel="nofollow" href="https://linux.ting.com">Ting</a>: <a rel="nofollow" href="https://linux.ting.com">Save $25 off your first device, or $25 in service credit if you bring one!</a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Linux has been bitten by its most high-severity vulnerability in years" rel="nofollow" href="https://arstechnica.com/information-technology/2022/03/linux-has-been-bitten-by-its-most-high-severity-vulnerability-in-years/">Linux has been bitten by its most high-severity vulnerability in years</a> &mdash; Dirty Pipe has the potential to smudge people using Linux and Linux derivitives.</li><li><a title="Catalin Cimpanu on Twitter" rel="nofollow" href="https://twitter.com/campuscodi/status/1500847226083549186">Catalin Cimpanu on Twitter</a> &mdash;  “DirtyPipe (CVE-2022-0847) is a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation. It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. </li><li><a title="Ron Amadeo on Twitter" rel="nofollow" href="https://twitter.com/ronamadeo/status/1501055320973533187">Ron Amadeo on Twitter</a> &mdash;  “By my count, Dirty Pipe affects only brand-new Android 12 devices like the Pixel 6 and S22. Linux 5.8 and above has only been an Android option for five months."</li><li><a title="Canonical Patches “Dirty Pipe” Vulnerability in Ubuntu 21.10 and 20.04 LTS" rel="nofollow" href="https://9to5linux.com/canonical-patches-dirty-pipe-vulnerability-in-ubuntu-21-10-and-20-04-lts-update-now">Canonical Patches “Dirty Pipe” Vulnerability in Ubuntu 21.10 and 20.04 LTS</a></li><li><a title="BLASTY on Twitter: “Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary.”" rel="nofollow" href="https://twitter.com/bl4sty/status/1500822440569708545">BLASTY on Twitter: “Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary.”</a></li><li><a title="The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation" rel="nofollow" href="https://dirtypipe.cm4all.com/">The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation</a></li><li><a title="AMD Posts Some New Linux Job Openings From Client CPU To Server" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=AMD-Linux-Jobs-March-2022">AMD Posts Some New Linux Job Openings From Client CPU To Server</a> &mdash; AMD would need a lot more Linux engineers to achieve the same level of timely Linux support and low-level kernel enhancements that Intel has been focused on for years, especially when it comes to Intel's open-source work beyond just the actual hardware device enablement.</li><li><a title="Introducing Native Matrix VoIP with Element Call!" rel="nofollow" href="https://element.io/blog/introducing-native-matrix-voip-with-element-call/">Introducing Native Matrix VoIP with Element Call!</a> &mdash; What’s more, Element Call is built entirely on Matrix: it doesn’t need any additional servers to get going. You can run it against your existing Matrix homeserver to provide complete self-sovereignty… while still being able to talk to anyone else anywhere on the wider Matrix network! We will also be able to automatically use Matrix’s end-to-end encryption to secure all Element Call conferences</li><li><a title="call.element.io" rel="nofollow" href="http://call.element.io/">call.element.io</a></li><li><a title="https://github.com/vector-im/element-call/issues" rel="nofollow" href="https://github.com/vector-im/element-call/issues">https://github.com/vector-im/element-call/issues</a></li><li><a title="Extending Matrix’s E2EE calls to multiparty" rel="nofollow" href="https://2021.commcon.xyz/talks/extending-matrix-s-e2ee-calls-to-multiparty">Extending Matrix’s E2EE calls to multiparty</a></li><li><a title="Danielle Foré on Twitter" rel="nofollow" href="https://twitter.com/DaniElainaFore/status/1501029682782695430">Danielle Foré on Twitter</a> &mdash; Okay it’s been a full month and this situation still isn’t resolved, and it sucks for you to just be completely in the dark and it’s pretty obvious something is up and people are asking what’s going on, so here is my side of the story 🧵</li><li><a title="Danielle gives an update on elementary Reddit Thread" rel="nofollow" href="https://www.reddit.com/r/elementaryos/comments/t9822i/danielle_gives_an_update_on_elementary_inc/hzv1ifv/">Danielle gives an update on elementary Reddit Thread</a></li><li><a title="Jupiter Broadcasting East Coast Meetup" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/284291401/">Jupiter Broadcasting East Coast Meetup</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li><li><a rel="nofollow" href="https://linux.ting.com">Ting</a>: <a rel="nofollow" href="https://linux.ting.com">Save $25 off your first device, or $25 in service credit if you bring one!</a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Linux has been bitten by its most high-severity vulnerability in years" rel="nofollow" href="https://arstechnica.com/information-technology/2022/03/linux-has-been-bitten-by-its-most-high-severity-vulnerability-in-years/">Linux has been bitten by its most high-severity vulnerability in years</a> &mdash; Dirty Pipe has the potential to smudge people using Linux and Linux derivitives.</li><li><a title="Catalin Cimpanu on Twitter" rel="nofollow" href="https://twitter.com/campuscodi/status/1500847226083549186">Catalin Cimpanu on Twitter</a> &mdash;  “DirtyPipe (CVE-2022-0847) is a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation. It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. </li><li><a title="Ron Amadeo on Twitter" rel="nofollow" href="https://twitter.com/ronamadeo/status/1501055320973533187">Ron Amadeo on Twitter</a> &mdash;  “By my count, Dirty Pipe affects only brand-new Android 12 devices like the Pixel 6 and S22. Linux 5.8 and above has only been an Android option for five months."</li><li><a title="Canonical Patches “Dirty Pipe” Vulnerability in Ubuntu 21.10 and 20.04 LTS" rel="nofollow" href="https://9to5linux.com/canonical-patches-dirty-pipe-vulnerability-in-ubuntu-21-10-and-20-04-lts-update-now">Canonical Patches “Dirty Pipe” Vulnerability in Ubuntu 21.10 and 20.04 LTS</a></li><li><a title="BLASTY on Twitter: “Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary.”" rel="nofollow" href="https://twitter.com/bl4sty/status/1500822440569708545">BLASTY on Twitter: “Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary.”</a></li><li><a title="The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation" rel="nofollow" href="https://dirtypipe.cm4all.com/">The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation</a></li><li><a title="AMD Posts Some New Linux Job Openings From Client CPU To Server" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=AMD-Linux-Jobs-March-2022">AMD Posts Some New Linux Job Openings From Client CPU To Server</a> &mdash; AMD would need a lot more Linux engineers to achieve the same level of timely Linux support and low-level kernel enhancements that Intel has been focused on for years, especially when it comes to Intel's open-source work beyond just the actual hardware device enablement.</li><li><a title="Introducing Native Matrix VoIP with Element Call!" rel="nofollow" href="https://element.io/blog/introducing-native-matrix-voip-with-element-call/">Introducing Native Matrix VoIP with Element Call!</a> &mdash; What’s more, Element Call is built entirely on Matrix: it doesn’t need any additional servers to get going. You can run it against your existing Matrix homeserver to provide complete self-sovereignty… while still being able to talk to anyone else anywhere on the wider Matrix network! We will also be able to automatically use Matrix’s end-to-end encryption to secure all Element Call conferences</li><li><a title="call.element.io" rel="nofollow" href="http://call.element.io/">call.element.io</a></li><li><a title="https://github.com/vector-im/element-call/issues" rel="nofollow" href="https://github.com/vector-im/element-call/issues">https://github.com/vector-im/element-call/issues</a></li><li><a title="Extending Matrix’s E2EE calls to multiparty" rel="nofollow" href="https://2021.commcon.xyz/talks/extending-matrix-s-e2ee-calls-to-multiparty">Extending Matrix’s E2EE calls to multiparty</a></li><li><a title="Danielle Foré on Twitter" rel="nofollow" href="https://twitter.com/DaniElainaFore/status/1501029682782695430">Danielle Foré on Twitter</a> &mdash; Okay it’s been a full month and this situation still isn’t resolved, and it sucks for you to just be completely in the dark and it’s pretty obvious something is up and people are asking what’s going on, so here is my side of the story 🧵</li><li><a title="Danielle gives an update on elementary Reddit Thread" rel="nofollow" href="https://www.reddit.com/r/elementaryos/comments/t9822i/danielle_gives_an_update_on_elementary_inc/hzv1ifv/">Danielle gives an update on elementary Reddit Thread</a></li><li><a title="Jupiter Broadcasting East Coast Meetup" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/284291401/">Jupiter Broadcasting East Coast Meetup</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
