Archive 4.3.2005 - 14.3.2005

Agreements on data retention cause outrage

Owl Content

heise online - Absprachen über Vorratsdatenspeicherung lösen Empörung aus

According to a result paper of the backroom talks with Deutsche Telekom, which is available to heise online, investigators and intelligence agencies are pushing for a storage period of 180 days for IP addresses and login data, the connection data in a landline call and in the mobile communications sector, in addition, the location identifier and "if necessary card number (IMSI) or identifier of the terminal device (IMEI)". Deutsche Telekom is said to have agreed to archive the corresponding personal data for this period. Currently, the company stores data for 90 days. Contrary to the requirements of the security authorities, Schily and Zypries are considering storing data for one year.

Great. The demands of the intelligence agencies are already absurd to the extreme - especially in mobile communications, this results in continuous tracking of all mobile subscribers - and Otto Orwell and the combined incompetence of the Ministry of Justice are even demanding more. Great democracy, I feel so safe with so much surveillance.

Brand name "Milka" wins against Mrs. Milka - and thus joins the current series of nonsense.

Crooked Otto

Schräger Otto

Schräger Otto

A very crooked dog, the tower. Somehow, you can photograph it however you want, it always looks crooked. This is because the base of the tower is an oval and the windows are not always the same on the floors. Somehow it always looks like a spiral, but they are just normal floors. Many partition walls probably don't have offices ...

Vacation booked for May ...

... it will be Flensburg. And timed so that we can experience the Flensburger Rum Regatta.

What you can find on roofs ...

What one finds on roofs ...

What one finds on roofs ...

Time to Ditch iChat

And why? Well, AOL's strange terms of use for AIM enforce the surrender of all rights and all privacy in the data transported over the AIM network. Verbatim:

In addition, by posting Content on an AIM Product, you grant AOL, its parent, affiliates, subsidiaries, assigns, agents and licensees the irrevocable, perpetual, worldwide right to reproduce, display, perform, distribute, adapt and promote this Content in any medium. You waive any right to privacy. You waive any right to inspect or approve uses of the Content or to be compensated for any such uses.

Sorry, what? Have they gone mad? These terms of use should actually be completely illegal in Germany - I don't think you can absolve yourself of all responsibility and the user of all rights through a disclaimer ...

iChat is based on AIM as a transport network. Hence the subject. It's time to work with clients like Fire where you can switch to Jabber for example - a network of servers that, on the one hand, are not under the central control of a company and, on the other hand, can be easily expanded with your own server. Moreover, the technical protocol is better ...

The CCC also operates a Jabber server. The topic of AOL terms of use was also taken up there. The use of the server is also free of charge and no changes are currently planned. So I am now available via instant messaging at hugo at jabber.ccc.de, if I am reachable. The AIM and ICQ (also belongs to AOL!) accounts that I still have will probably be closed. Jabber accounts are now really trivial to get and there is no reason to use the outdated and proprietary protocols anymore. (Found via Ted Leung)

Orwell with Delay

Owl Content

Pläne für EU-Beschluss: Bundesregierung will das gläserne Handy - not only the mobile phone, but also email connection data, SMS connection data, etc. are to be stored centrally. What utter nonsense. On the one hand, it is absurd to create these amounts of data when only a tiny fraction of them is relevant to the authorities. On the other hand, it is even more absurd that this whole mess is paid for by tax money and indirectly by customers through the burden on companies. We are paying for our own surveillance.

It is always shocking how far this SPD government is willing to go to fulfill Schily's paranoia and the omnipotence fantasies of intelligence agencies and parts of the law enforcement authorities.

It is time to promote projects like tor, pgp, and similar services and combinations thereof (how about Internet telephony over tor, encrypted and signed with PGP keys?). Tor, in particular, plays an important role in hindering connection analysis. This general suspicion by the state is simply unacceptable.

However, it is a permanent mystery to me why allegedly left-wing politicians do not take notice when their proposals receive applause from prolethicians like Beckstein. Where are the supposedly concerned people who wanted to advocate for the interests of citizens? Where do they stand against the hardliner direction of Schily and his ilk?

Zypries will expand DNA tests

Owl Content

Zypries will DNA-Tests ausweiten

Moreover, Zypries wants to restrict the so-called judicial reserve: In the case of anonymous crime scene traces and with the consent of a suspect to the test, a judicial order would no longer be required.

Not only can a repeat burglar end up in the genetic database according to the draft - at least if the police think he might also do more than just burglaries (and to secure the data we simply suspect everyone) - but the last hurdle, namely the judicial decision, is also simply bypassed.

Otto Orwell is working on 1984 and the combined incompetence of the Ministry of Justice on the police state. I did learn that the Ministry of the Interior is responsible for the police and the Ministry of Justice for the courts, and that the separation of powers between the executive and the judiciary should also be reflected in these ministries, but that was probably just a rumor ...

In any case, both are working hand in hand to dismantle the liberal component of our democracy - more efficiently than any Union government. And the opposition is laughing at the stupidity of the government - they are doing all the things that a Union government would not have dared to do, as they would have had to fear re-election ...

Poly/ML Home Page

Poly/ML is a very fast implementation of Standard ML 97. Interesting feature (apart from performance): the system is much more oriented towards Lisp systems than towards classic command-line compilers. You have an interactive working environment and an image that is automatically saved when the session ends and thus makes all definitions available again in the next run.

The advantage of this way of working is simply that you can adapt your system to your own needs over time. Together with the FFI and external libraries, you can gradually put together a nice environment that is optimized exactly for the intended goals. In addition, you often save extra object databases: you simply save values (or in the case of ML, structures) in the image and keep them there.

Since Poly/ML simply hangs the image in the address space using mmap and does not first read and then write it later, the whole thing is also quite fast - with image systems, the system start often bothers.

Oh, and by the way, Poly/ML runs smoothly under OS X ...

The speed of the compiler unfortunately does not necessarily continue in the generated code, as can be seen from this comparison. But just like with OpenMCL, the fast environment is definitely advantageous for prototyping. You can then set a compiler that takes longer but then spits out better optimized code like MLTon.

Ruby stuff for Macs

Ruby stuff for Macs is a ready-made DMG for both Panther and Jaguar with pre-installed Ruby 1.8.2 and various extensions (including Rails and Rubygems!). Unfortunately, the 10.2 DMG is broken - I've contacted the author.

You can of course also compile Ruby yourself, it's not particularly complicated. For OS X, there's also DarwinPorts. However, the port under 10.2 is acting up and cannot be compiled cleanly. Something in the iconv module - syntax error.

Somehow my system doesn't like Ruby today

Update: now the package works.

The fate of reduce() in Python 3000

The fate of reduce() in Python 3000 - well, it's probably time for me to switch languages. Because anyone who is so stupid as to cut themselves off from Lisp roots will only manage to rebuild more powerful possibilities with primitive means. Ruby also looks very useful and I'm slowly getting used to the syntax ...

Anonymous functions (lambda in Python, blocks in Ruby or Smalltalk) are far more than just obscure Lisp relics. I have many code snippets that live precisely on the fact that I can pass around anonymous code blocks - ultimately, this is about writing your own program structures. In Smalltalk and similar languages (and to some extent in Ruby) you can use this to extend and develop the language itself - which is one of the strengths of Lisp and its friends (and that's why it's also found in Smalltalk and its friends - the Smalltalk developers had a lot of Lisp know-how).

Languages that castrate themselves at this point and think that iterators and list comprehensions (basically nothing more than loops written in shorthand) are a viable replacement for being able to program your own control structures and your own language tools have become completely uninteresting to me. I don't like language designers who think they are smarter than the later programmer and want to impose a language corset on them.

UnCommon Web Tutorial

The article hyper-cliki : Web/Continuation describes how to write web applications with the continuation-based web framework UnCommon Web in Common Lisp. Very interesting, as Common Lisp itself is much more handicapped with continuations than Scheme - in Scheme continuations are first-class objects by standard, in Common Lisp they are not.

Continuation-based web servers have the advantage that the actual code can be structured very similarly to classical applications. You don't have to deal much with the event model of classical web programming and you rarely have to deal with explicit session constructs, because the session in a continuation-based web system is implicit.

There are continuation-based web frameworks for the following languages:

  • [Smalltalk][1]
  • [Common Lisp][2]
  • [Scheme][3] (unfortunately no direct link to the web server itself)
  • [SISC Scheme][4]
  • [Ruby][5] [twice][6]
  • [Python (via CherryPy and either Stackless or StateSaver)][7]

There are certainly more, but these are the ones I could find quickly.

WP: Gravatar Signup [ Tempus Fugit | TxFx.net ] is a small plugin that allows users to sign up for a Gravatar directly from the comment form, making it as easy as possible for people without a Gravatar to get started (and thus spreading Gravatars). Fun idea.

Scam Star Laurenz Meyer

400,000 Euro severance for Laurenz Meyer - wow, yes, certainly these were very tough negotiations in which he managed to pocket another 400,000 euros. He will surely also waive the 80,000 euros that he was going to donate to SOS Children's Villages anyway. That's how you really cash in - Meyer shows how it's done.

I'm curious to see if RWE will keep their word and transfer the money...

By the way: take a look at what comes up on Google when you search for Laurenz Meyer. And I think this can get a bit "nicer"

Devil's grin

Borderline Chaos is a rather nice WordPress theme - I like the strong colors and the quite simple layout. Might be an idea to build on ... (yes, yes, someday I'll do more than just talk about layouts)

CherryOS Violates the GPL

Pro-Linux News: CherryOS violates the GPL:

Since the release of the commercial emulator, the free project has been busy comparing the codebase of CherryOS and PearPC. The project is now 100% sure, according to a programmer speaking to Golem.de, that the manufacturer is using the code of the free projects in an unlawful manner.

Another store that believes it can get away with GPL software unpunished. What's so hard about just adhering to licenses? Just because something is free software doesn't mean there are no conditions for use ...

Iridient Digital - RAW Developer

Iridient Digital - RAW Developer - wow. I am thrilled. I have already looked at many RAW photo editing software. But the RAW Developer is absolutely brilliant. A rather sleek interface, sensible features and incredibly fast.

So far, with almost every software except the Canon software, I have stumbled upon a certain image from my collection - it was displayed incorrectly by all, with completely shifted green tones (rather all yellow instead of green). With the RAW Developer it works - and the results look just as good as with the standard software from Canon. But the operation is much more agile.

Also very nice: unlike the Canon software, you can pass a series of marked images to the program via AppleEvent - the RAW Developer thus integrates absolutely comfortably into iView Media Pro. Much better than the Canon software, which would then only display the appropriate folder, but not directly only the selected images.

Additionally, it has the advantage that it is the only software I have found so far that can handle the old Kodak DCS RAW images - all others could read the newer RAW formats from Kodak, but not the old ones - and I still have those from my rather short interlude with the DCS 520 on my hard drive.

65 euros is not a small amount of money (especially for a pure auxiliary tool), but if you work a lot with RAW images and possibly with different cameras, then the investment is worth it in my opinion. Because you don't constantly have to fiddle with different programs and the speed is simply great - and even if it's just a hobby for me, slow software is still annoying.

Perverse Taste Aberrations

Bullock smuggles Nuremberg sausages:

We always celebrate Christmas in the traditional German way. Then we have bratwurst with sauerkraut and cucumber salad. That's why our secret sources already send the packages with the Nuremberg sausages a month in advance. Surprisingly, they always arrive.

Hello, what please? Since when is traditional German Christmas dinner bratwurst with sauerkraut and cucumber salad? I mean, bratwurst with sauerkraut was an everyday meal for us and to then perversely eat cucumber salad on top of that can really only be an American ...

Schmidt threatens health insurers over high contribution rates - of course, the health insurers and the profiteers in the executive suite who quickly approved a salary increase for themselves will certainly be very impressed by the threat. Apart from the fact that even I would burst into hysterical laughter if the Proletarians in Berlin came at me with morality ...

Music Industry and Its Alleged Interest in Musicians' Rights

Music industry wants 95-year protection period for sound recordings and justifies this by saying that musicians should earn money from the rights to their music throughout their lives. Pretty cheeky, when it's precisely the music industry that makes the most money from these rights and musicians - if at all - only receive small contributions. The music industry doesn't care about musicians at all. They only care about increasing their own revenues without having to contribute even a bit of effort.

One can imagine what's behind this when you look at when the old songs were produced that the music industry still heavily relies on, because they are incapable of producing anything that goes beyond one-hit wonders. Because the copyrights for music from some bands from the 60s and 70s will expire in the foreseeable future - and then the gentlemen in the executive suites would actually have to take risks and support new bands to still have significant business in the future.

You can't live forever off the songs of the Beatles or the Stones ...

What Harvard Business School Understands by Hacking

According to Philip Greenspun's Weblog, it's quite banal: changing a URL to access actually blocked data. Not the supplier is fired because he is incompetent and the system is poorly secured - but the HBS applicants who used this "hack" to check their status before the official date are now not accepted to HBS. Because of changing a URL. Well, confirms all my prejudices about business schools.

Poverty is female

In the young world: Poverty is female. On the occasion of International Women's Day, a reminder that the equality of women in society is by no means fulfilled or even completed - on the contrary, the current social cutbacks in Germany particularly affect women. Surely, politicians will now find a whole bunch of great reasons why we are just imagining all this.

By the way, for the next election, one could also take a look at what the corresponding parties have to say about the topic of women's equality ...

Hedgehog is a nice little Lisp compiler and bytecode interpreter with a special focus on low resource consumption. Unfortunately, interactivity and debugging suffer as a result: no tracebacks and no REPL, just running scripts and searching for the breakpoint in the pseudo-assembler source via grep. It would be nice if the language could offer these interactive features as an option - you can then leave them out in small boxes.

In Rechte auf dem Weg in die Mitte the political scientist Chloé Lachauer discusses in an interview the reasons for right-wing extremism and what to make of the wild accusations of politicians.

Social Software and Un-Social Behaviour

Again, a social software manufacturer is causing a stir: Technorati censoring employee blogs? - of course, an employee can potentially harm a company if they speak negatively about the company or the business. That's one reason why there's nothing about my employer on my blog and nothing about our customers - you have to draw the line somewhere. But would I accept if my employer wanted to dictate what I think? If I were no longer allowed to report negatively about the nonsense of the IT industry because my employer is in the industry? I don't think so - that goes way too far.

Even as an employee of a company, one should be allowed to express one's opinion freely - within the limits of what is legally permitted, of course. Recently, I was even insulted as a German because we supposedly don't know what free speech is - we are all censored, regulated, and brainwashed. And then I read from the land of unlimited idiocy how free speech is trampled on there, lands you in jail, or gets you fired. Strange idea of free speech. And when I read the blogger's reaction - who was brainwashed there?

What kind of light this sheds on manufacturers of so-called social software is a whole different topic. It's not the first time that such a company has stood out extremely negatively (I spontaneously think of friendster) - communication seems to be a terrible threat to the communication experts.

Ancient LAND attack works again in current Windows - wow, Microsoft has a heart for outdated bugs and gives them a new life

Another bug in Linux security extension grsecurity - of course, something like this had to come up just when I'm writing about grsecurity, right?

Wladimir Kaminer on Entry to Germany

Wladimir Kaminer: Ein Vorschlag zur Güte - wirres, konsequent alles falsch describes the situation for people entering the country. Jutta's brother had some experience with this topic (entering Germany, applying for visas, etc.) a few years ago in Hamburg. His wife (Thai) brought two children into the marriage. They have a third child together. Of the two children from the first marriage, she could only bring the younger girl to Germany - she had to give up the boy (under 16 at the time of the application!) to at least have her daughter in Germany. Can anyone imagine what this means for a mother?

Sorry, but all the politicians who scream about how dangerous and bad all the people who apply for visas are should be thrown out of the country and have their German passports taken away. And then they should try to get back into the country through our great embassies and consulates ...

If you want to authenticate your WordPress against external user databases: the Authentication Plugins Patch extends WordPress with the necessary hooks to secure it, for example, via Apache authentication.

EU Council of Ministers for Compromise on Software Patents

Unbelievable - despite the resistance of various national parliaments and the clear vote of the European Parliament, the software patents directive was pushed through today. And then this corrupt and deceitful bunch wonders why citizens no longer take politics seriously when they trample democracy underfoot.

Disgusting, Mr. Clement, how you ignore and trample the clear request of the Bundestag. Disgusting how you, with your arrogance, think you have to cause more damage to the economic location than the 16 years of Kohl's government managed to achieve. Disgusting how you, with your stupidity, drive another nail into the coffin of the European IT industry - just to crawl up to some multinational corporations that won't create any jobs anyway.

angry face

Munich Regional Court Bans Link to Copy Software Manufacturer

Munich Regional Court bans link to copy software manufacturer - and Heise celebrates this as an important partial success. However, the court has only rejected the completely absurd demands - but the link itself must be removed. Well, one might be glad that not all the most outrageous demands of the music industry are being met, but the fact that links to manufacturers are illegal is still a big idiocy. Because this continues to open the door for link warning letters - and even if it's nice for the Heise publishing house that every page bears its own court costs, for the average web worker this is not realistic - hardly anyone has the money to pay the costs of such a procedure (and possibly even through several instances).

OSER is a project that aims to replace Exchange while keeping Outlook. Although I don't like Outlook as one of the biggest virus and trojan vectors, it is popular in companies because of its good integration of various information services. Switching to an open source server solution can be the first step to gradually replace Outlook with other programs. However, at the moment it is still mainly vaporware - at least if you look at the websites.

Top-Level Domain .at has no mandatory connection to Austria

Top Level Domain .at has no mandatory connection to Austria - because German judges think so. Unless you live in Switzerland - then the judges have a different opinion. All this nonsense about naming rights is simply ridiculous - arbitrariness would almost be a reliable alternative against all the judgments that have been made in Europe on this matter.

A similarly absurd justification - that a top-level domain does not stand for a country - was also brought up with .ag. There, the judges even dared to determine that only an AG has the right to a domain under .ag.

The controversial vehicle registration plate patent has been declared invalid - take a good look at this nonsense, we'll probably have to deal with more of this thanks to proles like Clement. And no, we can't be sure that such patents will be deleted.

cyrusharmon.org: More GCC-XML (new and improved -- now with pr0n!) - crazy title, but a brilliant thing: SBCL gets native bindings to the Carbon API. And thus becomes the second Open Source Lisp system with integration into the OS X world (although Cocoa bindings would of course be cooler - but so far in the Open Source area only OpenMCL offers that).

Graffiti and Art

Graffiti and Art - 1

Graffiti and Art - 1

The Skaters Palace is sprayed with graffiti and is a beautiful splash of color in an otherwise bleak area. If you continue from there to Agravis, you walk along a wall full of graffiti.

Graffiti and Art - 2

Graffiti and Art - 2

Here too, the colors are a wonderful contrast to the rather bleak industrial area. Even the plants in the area seem rather depressed - only the colors of the wall stand out. If you walk further to the canal and look at the Agravis silo, you will then be presented with the art.

Graffiti and Art - 3

Graffiti and Art - 3

Somehow I have the impression that the company would rather have spent the money on a decent, safe scaffolding and colors for the sprayers - the result would interest me far more than the colorful rags that were nailed to the silo ...

Graffiti and Art - 2

Graffiti and Art - 2

Graffiti and Art - 2

Graffiti and Art - 3

Graffiti and Art - 3

Graffiti and Art - 3

Graffiti and Art - 1

Graffiti and Art - 1

Graffiti and Art - 1

No Banana Union Europe

banana0503-400x90.de-crossed.jpg

Snowflowers

Snowflowers - 1

Snowflowers - 1

Snowflowers - 2

Snowflowers - 2

Snowflowers - 1

Schneeblumen - 1

Schneeblumen - 1

Snowflowers - 2

Schneeblumen - 2

Schneeblumen - 2

Beach Hut by the Canal?

Strandguthütte am Kanal?

Strandguthütte am Kanal?

No idea who has settled there and for what purpose - it is a small hut made of garbage, fenced and with a small area. Everything is equipped with garbage bags and right in the bushes - normally not visible. Only through the preparations for the canal expansion did it become visible. Somehow reminds me of these beachcombers on the beach of Amrum.

In the Law Blog, it is explained what we can expect due to the blacklist against corruption in NRW.

Install grsecurity

I used to play around with grsecurity before, but the installation was a bit tricky - especially, you didn't know what to configure as a start and how to begin a reasonable rule-based security - the whole thing was more of a trial-and-error hopping than an understandable installation. However, for a security solution for an operating system, it is rather negative if you don't get the feeling of understanding what is happening there.

With the current versions of grsecurity, however, this has changed to a large extent. On the one hand, the patches run completely smoothly into the kernel, on the other hand there are two essential features that make the start easier: a Quick Guide and RBACK Full System Learning.

The Quick Guide provides a short and concise installation guide for grsecurity with a starting configuration for all the options that already offer a fairly good basis and excludes problematic options (which could exclude some system services). This way you get a grsecurity installation that offers a lot of protection but usually does not conflict with common system services. This is especially important for people with root servers - a wrong basic configuration could lock themselves out of the system and thus make the system unusable and a service case.

But the Full System Learning is really nice: here the RBAC engine is transformed into a logging system and it is logged which users execute what and what rights are needed for this. The whole thing is still controlled by corresponding basic configs that classify different system areas differently (e.g. ensure that the user can access everything in his home, but not necessarily everything in various system directories). You just let the system run for a few days (to also catch cron jobs) and then generate a starting configuration for RBAC from it. You can of course still fine-tune this (you should also do this later - but as a start it is already quite usable).

RBAC is basically a second security/rights layer above the classic user/group mechanisms of Linux. The root user does not automatically have all rights and access to all areas. Instead, a user must log in to the RBAC subsystem in parallel to his normal login (which happens implicitly through the system start for system services!). Rules are stored there that describe how different roles in the system have different access permissions.

The advantage: even automatically started system services are only allowed to access what is provided for in the RBAC configuration - even if they run under root rights. They only have limited capabilities in the system until they log in to the RBAC subsystem - but for this, a manual password entry is usually required for the higher roles. Attackers from the outside can indeed gain the user rights restricted by RBAC, but usually cannot get to the higher roles and therefore cannot interfere with the system as much as would be possible without RBAC.

The disadvantage (should not be concealed): RBAC is complex. And complicated. If you do something wrong, the system is locked - quite annoying for root servers that are somewhere out there in the network. You should always have fallback strategies so that you can still reach a blocked system. For example, after changes to the RBACs, comment out the automatic activation at system startup so that a reboot puts the system in a more open state in case of problems. Or have an emergency access through which you can still administer a blocked system to some extent. In general, as with all complex systems: Keep your hands off if you don't know what you're doing.

In addition to the very powerful RBAC, grsecurity offers a whole range of other mechanisms. The second major block is pax(important: here a current version must be used, in all older ones there is an evil security hole) - a subsystem that restricts buffer overflow attacks by removing the executability and/or writability from memory blocks. Especially important for the stack, as most buffer overflows start there. Pax ensures that writable areas are not executable at the same time.

A third larger block is the better protection of chroot jails. The classic possibilities for processes to break out of a chroot jail are no longer given, since many functions necessary for this are simply deactivated in a chroot jail. Especially for admins who run their services in chroot jails, grsecurity offers important tools, as these chroot jails were only very cumbersome to make really escape-proof.

The rest of grsecurity deals with a whole collection of smaller patches and changes in the system, many of which deal with better randomization of ports/sockets/pids and other system IDs. This makes attacks more difficult because the behavior of the system is less predictable - especially important for various local exploits, where, for example, the knowledge of the PID of a process is used to gain access to areas that are identified via the PID (memory areas, temporary files, etc.). The visibility of system processes is also restricted - normal users simply do not get access to the entire process list and are also restricted in the /proc file system - and can therefore not so easily attack running system processes.

A complete list of grsecurity features is online.

All in all, grsecurity offers a very sensible collection of security patches that should be recommended to every server operator - the possibility of remote exploits is drastically restricted and local system security is significantly enhanced by RBAC. There is no reason not to use the patch, for example, on root servers as a standard, given the rather simple implementation of the grsecurity patch in an existing system (simply patch the kernel and reinstall, boot, learn, activate - done). Actually, a security patch should be part of the system setup just like a backup strategy.

Now it would of course be even nicer if the actual documentation of the system was a bit larger than the man pages and a few whitepapers - and above all was up to date. This is still a real drawback, because the right feeling of understanding the system does not really set in without qualified documentation ...

Sometimes Wikipedia surprises me with things that are actually quite obvious. For example, the very nice descriptions of the Münsterland and of course Münster itself.

WordPress Theme: Gila - looks quite nice, is three-column and has a flexible middle column.

Outrage over statement by JuLi chairman - well, Westerwelle was also once a JuLi Hansel and he also had some dumb remarks - so this guy seems to be the future leader of the FDP in 10 years ...

How to setup WebObjects 5.1 on Linux

How to setup WebObjects 5.1 on Linux describes how to get WebObjects (the original from Apple) running under Linux - due to the Java basis of the 5.x versions, this has become significantly easier by now. Although I am naturally much more interested in the Objective-C version for Linux - Java is not the big performer on Linux in terms of performance ...

Well, for the Objective-C version, you can also fall back on SOPE (I reported), it is compatible in many areas. For using XCode, there are also project templates, so you get similar comfort during development. I have to try how it looks with ProjectBuilder.