xdg Digest, Vol 156, Issue 5

Lazarus Long raider_56 at hotmail.com
Sun Mar 26 16:02:33 UTC 2017

‎Xorg lying is actually a good point. I am reading up on the XDG mailing list for quite awhile, although I know next to nothing about (modern) programming - my knowledge of Turbo Pascal and Delphi must be considered ancient. But my reason for subscribing is different, and maybe someone on this mailing list has the answer to my problem:

As I see it, there's a lot more to freedesktop.org than it meets the eye. I am - despite my outdated knowledge about programming - a fairly nerdy guy with about a dozen computers in use at home. Since October 2016, ALL of then are down owing to a polymorphic, multi-platform malware. NOT a virus or Trojan, although in reality it amounts to that.

The backbone seem to be faked root certificates. How I got those in the first line, no idea. But together with DBUS, Fileroller, Avahi, ConsoleKit, CACertificates and about a dozen other legit and fairly common pieces, of software, these turn ANY PC into the perfect surveillance tool no matter of OS used. This crap marched through my well maintained Win7Pro installations in the same way it affected Mint Linux 64, TrueOS and Kali Linux installations. It even shows on my BlackBerry OS 10 devices (which are actually QNX or Posix). On a Windows machine, a lot of malware dll's are crossloaded, with the fake root certs making sure no major Antivirus solution is acting up, and as soon as the bugging has been detected by the user the only aim is to destroy primarily data and then the OS, rendering the installation unusable. On Linux based machines, anything one says, does, watches, stores or retrieves is submitted through encrypted channels to I dunno where.

Why have I not just wiped, reinstalled and moved on? Because this crap is... advanced. Probably at least a part of this belong to the NSA deployment tools stolen from that bugged server. The malware is BIOS and firmware resident. Even if one starts a system from a live medium -CD, DVD, USB stick, network server or even floppy disc, the very first thing executed is BusyBox and an encrypted SQASHfs partition, crossloading functions which are...detrimental to the legit's users interest, to put it politely.

Uninstalling is impossible, since the repositories of any Linux installation have been altered in a way that by uninstalling parts of the malware backbone you also uninstall core functionalities of your system. Eventually, the system is rendered unusable, crashes and gets reinfected upon reboot from the BIOS. Of course i've tried to flash the BIOS and the firmware controllers. Suffice it to say that didn't work, long story why.

The malware is capable of gaining Internet access by using WiFi and Bluetooth connections which were not made available; e.g. which were turned off in the BIOS or for which even the user does not know the password (because they don't belong to him). A whole bunch of hacking tools -most of these astoundingly small - are contained in the core load.

While I can't read most of the directories created by that malware - most of them symlinked 50x and in multiple ways - some I can, and almost all links point to, you may have guessed it, freedesktop.org.

So far, three service providers have smiled at me in their most reassuring manner and said "no problem, we'll take care of it". A maximum of two weeks later they neither smiled nor were they reassuring.

The answer in all cases amounted to "never seen or heard about something like this" and "sorry but no can do".

So I guess my question simply is threefold:

1) How do I get rid of it?
2) why do I have it?
3) What's the purpose of it?

One more thing: I am not a programmer. That doesn't mean I don't know my way around a server or workstation system under any standard ‎OS.

Since this crap started I bought four new computers. All of them got infected, in no time, no matter if Windows, Linux, MacOSX (actually also a Linux, I know that) or QNX. For the two last systems, I had taken out the WLAN and Bluetooth components and used NO USB stick at all, a network cable wasn't attached and the discs used were original branded Microsoft or other directly from strip-sealed, verifiable sources.

So...any ideas, anyone?

Regards, Laze

  Original Message
From: xdg-request at lists.freedesktop.org
Sent: Sunday, March 26, 2017 14:00
To: xdg at lists.freedesktop.org
Reply To: xdg at lists.freedesktop.org
Subject: xdg Digest, Vol 156, Issue 5

Send xdg mailing list submissions to
        xdg at lists.freedesktop.org

To subscribe or unsubscribe via the World Wide Web, visit
or, via email, send a message with subject or body 'help' to
        xdg-request at lists.freedesktop.org

You can reach the person managing the list at
        xdg-owner at lists.freedesktop.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of xdg digest..."

Today's Topics:

   1. Fix URL of jmimeinfo (Sebastian Kürten)
   2. Re: Pixels Per Inch needs to be standardized 🔍
      (Thomas U. Grüttmüller)
   3. Re: Pixels Per Inch needs to be standardized 🔍
      (Kai Uwe Broulik)


Message: 1
Date: Sat, 25 Mar 2017 14:33:39 +0100
From: Sebastian Kürten <sebastian.kuerten at fu-berlin.de>
To: xdg at lists.freedesktop.org
Subject: Fix URL of jmimeinfo
Message-ID: <20170325143339.19fda659 at pluto>
Content-Type: text/plain; charset="utf-8"


I noticed the URL of jimimeinfo is out of date (404) on this page[1]
under section 'Current implementors'. It should be changed from [2] to
[3] probably. I also attached a git patch if you find this more
convenient than fixing it manually yourself.

The original homepage is not available anymore and the original author
(Andy Hedges) moved the source code to GitHub a few years ago.


[2] http://hedges.net/archives/2006/11/08/java-shared-mime-info/
[3] https://github.com/andyhedges/jmimeinfo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-Fix-URL-of-jmimeinfo-on-Specifications-shared-mime-i.patch
Type: text/x-patch
Size: 1625 bytes
Desc: not available
URL: <https://lists.freedesktop.org/archives/xdg/attachments/20170325/f624858a/attachment-0001.bin>


Message: 2
Date: Sun, 26 Mar 2017 01:41:06 +0100
From: Thomas U. Grüttmüller <sloyment at gmx.net>
To: xdg at lists.freedesktop.org
Subject: Re: Pixels Per Inch needs to be standardized 🔍
Message-ID: <58D70E22.9070906 at gmx.net>
Content-Type: text/plain; charset=utf-8; format=flowed

On 04.05.2016 17:44, Alberto Salvia Novella wrote:
 > I would like to propose having a standard way of advertising Pixels Per
 > Inch, so applications can know its value independently of the desktop
 > environment in use.

The X server already advertises the DPI of the monitor.
I found this in /var/log/Xorg.0.log:

[  6882.546] (==) intel(0): DPI set to (96, 96)

Here, the resolution is set to 96 DPI although in reality, my screen has
120 DPI. And you know what: I want it to stay this way. Please don’t set
it to the true value. Or at least provide some means to change it back
to 96 DPI manually. The point in having a higher definition screen is to
fit a lot of stuff on it.

Thank you.


Message: 3
Date: Sun, 26 Mar 2017 09:00:46 +0200
From: Kai Uwe Broulik <kde at privat.broulik.de>
To: xdg at lists.freedesktop.org
Subject: Re: Pixels Per Inch needs to be standardized 🔍
Message-ID: <20170326070046.5115984.42767.91330 at privat.broulik.de>
Content-Type: text/plain; charset="utf-8"

> The point in having a higher definition screen is to ‎fit a lot of stuff on it.

The point in having a higher definition screen is to have crisper fonts and graphics.

See how opinions differ? X.org lying to us by forcing 96 dpi is a terrible thing and one of the major complaints we in Plasma get (e.g. Login screen unreadably small)

Kai Uwe


Subject: Digest Footer

xdg mailing list
xdg at lists.freedesktop.org


End of xdg Digest, Vol 156, Issue 5

More information about the xdg mailing list