Friday Hacker Blogging: digiKam 7.1 Released, Fully Supports Canon CR3 Format

Digikam 7.1

The open source and free software digiKam 7.1 has been released. Full support for the Canon CR3 format has been added.

Release notes for digiKam 7.1 are here.

When you buy an expensive camera, such as the latest Canon devices, you should expect the image provided to be seriously pre-processed by the camera firmware and ready to use immediately. This is true for JPEG, but not RAW files, where the format changes for every new camera released, as it depends on the camera’s sensor data. This is also the case for the Canon CR3: the RAW format produced by this camera has required intensive reverse-engineering that the digiKam team cannot always support well. This is why we use the powerful Libraw library to post-process the RAW files on the computer. This library includes complex algorithms to support all kinds of different RAW file formats, including the Canon CR3.

You can download digiKam 7.1 for 64-bit or 32-bit systems from their website.

As usual you can use this post to discuss about whatever you want.

Friday Hacker Blogging: How To Watch Star Wars In Linux Terminal (and update on Canon hacker attack)

Star Wars In Lunux

For the Friday Hacker blogging series here is something that’s as fun as it is useless, but it will appeal to all those hardcore Star Wars fans.

You can watch Star Wars in Linux terminal (not just Linux, every *nix flavor will likely work). We are not talking about a digitally remastered version here, no high res graphics or else. In fact there are no graphics in a modern meaning. All you have to do is to enter the following command in your terminal:


You can stop the “movie” with ctrl-j, and then type quite to exit.

Should you not have telnet on your system you can easily install it. For instance on Ubuntu or Debian:

sudo apt install telnet

Here are two screenshots.

Ready for Star Wars in Linux terminal?

Canon Ransomware Attack

Here is also an update on the ransomware attack against Canon. See here for an update or if you don’t know what a ransomware attack is. The Maze ransomware gang updated their leak site and now it states that “0.2%” of Canon data was published. Previously it was 5%. We do not know yet what exactly that means. Also, we obtained a copy of the leaked Canon data and can confirm it does not contain sensible sensitive or otherwise critical information.

Screenshot from the Maze leaks site

You can use the Friday Hacker Blogging post to discuss whatever topic you want. Please be respectful and polite.

Friday Hacker Blogging: Maze Ransomware Gang Releases 5% Of Stolen Canon Data

Friday Hacker Blogging

Every Friday from now on I’ll make a post on a random topic about Linux, computer and information security, coding and hacking, and more infosec stuff.

You can use the Friday Hacker Blogging post to discuss the topic, or discuss whatever photography news or topic you want. Please be respectful, same rules as usual apply for comments.

The first post in the Friday Hacker Blogging series is a follow up to the hacker attack against Canon USA by the Maze ransomware gang. Numerous Canon services have been affected, including Canon’s email, Microsoft Teams, the Canon USA website, and other internal applications, and 10TB of data was stolen. Bleeping Computer describes the Maze gang and how they work:

Maze is an enterprise-targeting human-operated ransomware that compromises and stealthily spreads laterally through a network until it gains access to an administrator account and the system’s Windows domain controller.

During this process, Maze will steal unencrypted files from servers and backups and upload them to the threat actor’s servers.

Once they have harvested the network of anything of value and gain access to a Windows domain controller, Maze will deploy the ransomware throughout the network to encrypt all of the devices.

If a victim does not pay the ransom, Maze will publicly distribute the victim’s stolen files on a data leak site that they have created.

Ransomware gangs often use a controlled leak of stolen data as a mean to scare the victims and motivate them to pay the ransom. It seems such a controlled leak hit Canon too.

It’s again Bleeping Computer reporting that a 2.2 GB archive called “” was released on the Maze data leak site. Bleeping Computer has been told it contains marketing materials and videos, as well as files related to Canon’s website. However, it seems that the leak does not contain financial or employee information, or other sensitive data.

Leaked Canon data, image courtesy of Bleeping Computer

It’s still an ongoing story and I will keep you posted.

Btw, the idea for Friday Hacker Blogging was inspired by Schneier on Security’s Friday Squid Blogging. As I wrote above, you can use this post to discuss the topic, or about whatever photography news you want. Just be polite and respectful.