Language Selection

English French German Italian Portuguese Spanish

Purism/Librem/PureOS Updates

Filed under
  • Librem 5 November 2019 Software Update

    In November, we shipped the Birch batch of Librem 5, fixed audio routing, made changes to various apps and shared Librem 5 at various meetups and talks.

    A couple of other articles appeared about software development: Oxidizing Squeekboard described the use of the Rust programming language in the Librem 5’s virtual keyboard, and the Linux 5.4 report covered Purism’s contributions to Linux 5.4.

    The software initially included with Birch was tagged, ready to be installed on the phones that shipped out. The built-in software is provided as part of the amber-phone distribution of PureOS, meaning that the core applications are automatically updated if the user enables updates.

    On a similar note, the Librem 5 Development policy document was created to discuss how core software development is done for the phone’s system software. While this is aimed at those working for Purism, it is also of interest to the wider community around the Librem 5.


    Work continues to improve power consumption by implementing devfreq driver which allows the frequency of the I/O buses to be reduced. This involved changes to the u-boot-builder tool and the trusted firmware. Changes to the kernel to avoid problems with the display at low frequencies as well as a workaround to adjust frequencies when the power key is pressed also try to find a balance between usability and power saving.

    Efforts to save power also involve implementing busfreq support, where the speed of the DDR memory can be reduced as needed. This involved making it work on the devkit.

    An issue where the display would be shifted after a resume was fixed.

    Support for Bluetooth audio has been enabled, making it possible to use Bluetooth headsets.

    The U-Boot bootloader was updated for phones in the Birch shipment.

    Changes to the display stack were backported to Linux 5.3 so that the mxsfb driver could be used.

    The flashing scripts were updated for Birch devices, dropping the recovery U-Boot image, updating them for the unified kernel and U-Boot and adding support for the board types in the flashing tool.

  • 2019 Year in Review: Librem One

    We currently have quite low storage limits. Our goal for the first quarter of 2020 is to allow paying subscribers to upgrade their storage capacity. This will involve some boring work in the middleware layer, but lays the foundation for Librem Sync and Librem Files, which we hope to release by mid-year.


    We have begun the very long road to getting all the software we use (clients and server applications) packaged in Debian, our upstream operating system, so that anyone running a Debian-derived system can apt install any service or client. We aim to make any home-baked software “flagship-friendly but vendor-neutral”, so there will be sensible defaults for the domain, but you will always be able to reconfigure the packages to target an alternate domain. Or, for those that like a challenge, you could release your own distribution preconfigured to a service you run.

  • Purism Has Librem 5 Audio Routing Working, Other Software Progress

    Purism has shared an update on their software work for the Librem 5 Linux smartphone over the course of last month.

    Most notably they got audio routing to work so phone calls can work out properly. But they are still battling power consumption and other software work to at least make the device seem more like beta quality.

    - Fixing audio routing for the Librem 5 Birch batch, allowing this Linux smartphone to actually serve as a working phone. Telephone calls now appear to be working reliably.

More in Tux Machines

How to create bootable Ubuntu 20.04 on windows 10

I think so; a few weeks back, I was doing something on my Ubuntu 20.04. Suddenly my friend knocks on my door, and he was curiously peeking on my laptop screen. I asked what happen, Benhur? Benhur replied, what are you doing on your laptop, It is totally different from my laptop screen, and It fascinated me. Will you tell me what it is? Read more

Audio/Video: LHS, Going Linux, and DistroTube

  • LHS Episode #388: The Weekender LXIV

    It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

  • Going Linux · Shownotes

    We are pleased to say we are in an excellent place with music streaming on Linux. For the most part all of the services we reviewed worked really well.

  • "Hey, DT. Why LibreOffice Instead Of OpenOffice?" Plus Other Questions.

Security Leftovers

  • Oh, the Irony! Chrome is Blocking Security Tool Nmap Downloads Considering it a Security Threat

    Nmap is a popular open-source tool created by Gordon Lyon used by security experts and network admins to analyze the network, find exploits, and keep it secure. However, it seems that for a day at least, Google Chrome blocked all Nmap downloads using its Safe Browsing service by labelling it as a threat. Even though this has been fixed quickly. For many visitors trying to download the tool, this must have been confusing. A software that’s more than a decade old is now suddenly considered as a threat?

  • Logging as a service isn't SIEM -- so what is it?

    Log management software is often confused or conflated with security information event management (SIEM) software. Both monitor and analyze system and application data, so vendors often blur the lines between the two categories, with many SIEM products including a log management module. Conversely, some log management vendors also have SIEM offerings that work with or supplement their logging products. The primary distinction between log management and SIEM is focus. SIEM tools prioritize data and metrics relevant to security, not the totality of an environment's system, user and application log output. Log management software and services provide a scalable, holistic platform to collect, manage, archive and analyze all of an IT environment's log output -- on premises and in the cloud.

  • Laptops given to British schools came preloaded with malware and talked to Russia when booted [iophk: Windows TCO]

    These devices have shipped over the past three to four weeks, though it is unclear how many of them are infected. One source at a school told The Register that the machines in question seemed to have been manufactured in late 2019 and appeared to have had their DfE-specified software installed last year.

  • Democrats seek answers on impact of Russian cyberattack on Justice Department, Courts [iophk: Windows TCO]

    The senators’ concerns come weeks after both the Justice Department and the U.S. Courts reported that they had been among the federal agencies compromised by the Russian attack on SolarWinds, which was uncovered in December but had been ongoing for more than a year.

    In a statement earlier this month, a DOJ spokesperson said around 3 percent of the agency’s employee email accounts had been “potentially accessed” as part of the breach, but that there was “no indication that any classified systems were accessed.” DOJ has more than 100,000 employees.

    The federal judiciary confirmed it was breached the same week as DOJ, noting in a statement that the AO’s Case Management/Electronic Files system had suffered an “apparent compromise,” with new procedures immediately put in place to file sensitive court documents.

  • Biden inherited one of the worst [cracks] in history. How will his administration respond?

    But that's the easy part. The SolarWinds [attack] — named for the Texas software company that Russia [cracked] in order to gain access to tens of thousands of its customers, many of them American businesses and federal agencies — ran undetected for at least nine months, siphoning off private information before it was discovered in December.

    At least five federal agencies have admitted they were affected. Several others have so far refused to comment. Few private companies have admitted to being victims, but experts say the working assumption is the number is in the hundreds.

    That's left cybersecurity experts with the labor-intensive task of combing through sensitive networks.

Android Leftovers