Language Selection

English French German Italian Portuguese Spanish

Hans Reiser: Once a Linux Visionary, Now Accused of Murder

Filed under
Reiser
Interviews

Hans Reiser is waiting for me, standing on the other side of an imitation-wood table. The room is small, the concrete walls bare. A guard locks the steel door from the outside. There is no sound. Reiser is wearing the red jumpsuit of a prisoner in solitary confinement, though he has been allowed to meet with me in this chilly visiting room. There was a time when he was known as a cantankerous but visionary open source programmer. His work was funded by the government; he was widely credited (and sometimes reviled) for rethinking the structure of the Linux operating system. Now he is known as prisoner BFP563.

I stick out my hand. It's an awkward moment — his wrists are chained to his waist. It's mid-December now, and he's been in this jail 40 miles east of San Francisco for two months, ever since the Alameda County District Attorney's office accused him of murdering Nina Reiser, his estranged wife. The police found drops of her blood in Reiser's house and car, and, when they picked him up on an Oakland street to swab his mouth for DNA, he was carrying his passport and $8,960 in cash in a fanny pack. At the police station, they photographed his body for signs of scratches or bruises. None were found. By this time, though, he had been under surveillance for three weeks. The police had followed him on foot, tailed his car, and even tracked him by airplane. On October 10, he was arrested, locked up, and, days later, charged with murder. (His trial is set to begin in July.) His only visitors have been his lawyers and his parents. I'm the first new face he's seen from the outside world.

I'm here because his defense lawyer thinks I will understand Reiser.

More Here.




More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more