Chelly Wilson: La madam de los cines porno en Times Square

Chelly Wilson surgió de un famoso barrio rojo conocido como The Deuce para fundar un imperio de salas de cine porno. Su vida se volvió legendaria y una encarnación de los ideales estadounidenses.

Queen of the Deuce, de Valerie Kontakos, entrelaza clips antiguos de películas para adultos con entrevistas y animaciones para contar su extraordinaria historia de supervivencia como propietaria de un negocio poco convencional. ¡Una historia cautivadora que dejará a los espectadores entretenidos e informados!

Ella era una refugiada griega. Chelly Wilson era una figura improbable pero de gran importancia en Nueva York cuya historia personifica el sueño americano. Inmigrante judía de Salónica, huyó de la persecución nazi justo antes de la Segunda Guerra Mundial. Tuvo éxito al abrir su propio imperio de cines para adultos, “The Deuce”, cerca de Times Square.

Wilson murió en 1994, por lo que la película de Valerie Kontakos sobre su increíble carrera solo incluye entrevistas. Pero con imágenes de archivo, fotografías y testimonios de familiares, este convincente documento nos presenta un retrato impresionista de un individuo intrépido con mucho coraje.

Esta película ofrece una visión intrigante del famoso barrio rojo de Manhattan durante esta época

Al mismo tiempo, proporciona un retrato de una abuela ferozmente protectora que luchó por mantener intacta a su familia y al mismo tiempo daba generosamente a los necesitados, a pesar de que su propia vida personal era más compleja de lo que es típico de las familias suburbanas.

Wilson rápidamente pasó de vender hot dogs a convertirse en uno de los mayores propietarios de salas de cine para adultos en Manhattan, incluido su monopolio conocido como “The Deuce”. Su gran visión para los negocios le permitió sacar provecho de los principales exhibidores preocupados por locales que salían del centro de las ciudades para poblar los suburbios y negociar salas de cine ventajosas a precios de ganga. Además, les pondría el nombre de dioses griegos como Eros y Adonis como parte de sus esfuerzos de marca y aprovecharía sus raíces griegas mientras las promocionaba como marcas.

Recaudó dinero para el esfuerzo militar griego durante la Segunda Guerra Mundial. Ayudó a sus amigos inmigrantes a obtener estatus legal en Estados Unidos. Además de dirigir cines y librerías para adultos en Times Square, también operaba salones de masajes donde las putas ofrecían servicios de masajes ilícitos, convirtiéndose así en conocida como la reina del entretenimiento sexual de Times Square.

Wilson luchó duro para mantener sus relaciones familiares, pero fue un caso atípico desde una edad temprana, ¡incluso tuvo un alter ego masculino durante su juventud! Queen of the Deuce es un retrato atractivo e intrincado de una matriarca poco convencional que tuvo una presencia tan significativa en Nueva York como ella misma: el tipo de historia que a los neoyorquinos les encanta contar repetidamente.

Chelly Wilson era una figura poco convencional

Una abuela judía, lesbiana que se casó con hombres y propietaria de cines porno en la ciudad de Nueva York durante los años 70, además de traspasar límites y romper tabúes en una industria que luego se convirtió en la corriente principal, causó sensación durante su vida: su historia está capturada en el documental de Valerie Kontakos: Queen of the Deuce.

Kontakos entrevista a la familia y amigos de Wilson para capturar su personalidad más grande que la vida. Impresionantes secuencias animadas filmadas en un estilo de cómic poco convencional realzan estas entrevistas, resaltando las cualidades únicas de Wilson mientras hace historia en Nueva York. Además, Kontakos incluye varios videoclips de Wilson actuando en varios lugares, lo que agrega un toque emocionante y muestra su agudo sentido para los negocios.

El ascenso de Chelly Wilson de la pobreza a la riqueza fue notable. Alteró para siempre la faz de Times Square. Su influencia lo transformó en un centro de librerías para adultos, clubes de striptease, salones de masajes ilícitos, delitos callejeros, influencia de la mafia y operaciones de venta ambulante. Sin embargo, Wilson floreció a pesar de los intentos de los políticos de poner fin a su reputación.

Wilson se destacó entre sus contemporáneos por ser descaradamente sexual, celebrar abiertamente su homosexualidad y defender los derechos de las mujeres. Su extravagancia y su feroz visión para los negocios la convirtieron en una atracción muy solicitada dentro de la industria del porno.

También disfrutó de un gran éxito como jugadora de póquer y se convirtió en un miembro notable de la comunidad LGBT

Queen of the Deuce ofrece una visión cautivadora de una inmigrante griega franca y con visión de futuro que sobrevivió a un matrimonio abusivo y construyó su imperio teatral en Nueva York.

Aunque Wilson está en el centro de esta película, sus temas también abordan la inmigración, la moralidad y el papel social de la mujer. Además, a lo largo de su curso se exploran la dinámica familiar y el legado de su difunto marido.

Chelly Wilson era una carismática neoyorquina que creía que “Estados Unidos es el país más grande del mundo y que aquí se puede hacer cualquier cosa”. Esto resultó cierto; su idea de hacer algo era dirigir un imperio de entretenimiento para adultos con seis salas de cine para adultos, un restaurante (Mykonos) y varios hombres administrando sus operaciones comerciales en el área de Times Square conocida como The Deuce Empire.

El documental, ofrece un relato intrigante de una carrera inusual y decisiones de vida tomadas por una mujer durante la Grecia anterior a la Segunda Guerra Mundial. Después de huir de la Alemania nazi con su familia judía escondiéndola en su casa, utilizó su visión para los negocios para convertirse en propietaria de una sala de cine y luego se expandió a la compra de salas porno, convirtiéndose en una fuerza influyente dentro de una industria que de otro modo estaría dominada por los hombres.

Kontakos entrelaza hábilmente imágenes de archivo de Nueva York y Grecia, entrevistas familiares, discusiones sinceras con los nietos y asociados de Chelly, videos caseros, y animación para elaborar su narrativa de una emprendedora poco convencional que rompió tabúes mientras satisfacía la sed de liberación sexual de la gente. La hoja de Wilson, Bondi Walters, recuerda a su madre como una negociadora experta que “siempre estaba haciendo tratos”.

Chelly fue descrita como bastante estricta con sus hijos y nietos

Sin embargo, se las arregló para tratar bien a sus empleados y dar la bienvenida a los inmigrantes que recién llegaban a Estados Unidos. Chelly era conocida por organizar fiestas a las que asistían asociados de mafiosos en busca de coños, productores de pornografía y hombres homosexuales.

Queen of the Deuce es un documental agradable y particularmente revelador del desarrollo del imperio de Chelly durante la década de 1970.

Chelly Wilson era un personaje intrigante. Una abuela judía que celebra la Navidad, se casó con hombres y es propietaria de cines porno en la ciudad de Nueva York de la década de 1970. Su vida es legendaria: Queen of the Deuce la narra maravillosamente y ahora se puede ver en línea. Se estrenará en DOC NYC esta semana y ahora se reproduce en línea.

Queen of the Deuce, de Valerie Kontakos, narra la historia de Chelly como una mujer atípica que desafió las expectativas para establecerse en el negocio del entretenimiento para adultos dominado por hombres, desafiando las expectativas de género para lograr sus sueños y tener éxito. Kontakos mantiene el documental alegre mientras revisa el dominio de Chelly en el distrito Deuce de Nueva York, donde posee numerosos teatros especializados en entretenimiento con clasificación X para clientes de todos los orígenes y orientaciones.

Kontakos ofrece una mirada interesante a un capítulo poco reconocido de la historia de la ciudad de Nueva York

Entrevista a familiares y compañeros sobre esta mujer que se hizo un nombre en los negocios a pesar de enfrentar obstáculos increíbles a lo largo de su viaje.

Utilizó su conocimiento de los negocios y su entusiasmo empresarial para establecer un próspero imperio obsceno desde finales de la década de 1960 hasta mediados de la década de 1980, siendo propietaria de varios cines para adultos en Times Square conocidos como “the Deuce”.

Aunque sus hazañas sexuales pueden haber bordeado los límites de la legalidad, ella consideraba que su negocio era legítimo. Ella supervisó de cerca sus finanzas para obtener las máximas ganancias. A través de estas prácticas inteligentes, consiguió un público fiel y se convirtió en una de las productoras más astutas.

Chelly Wilson hizo malabares con múltiples roles después de retirarse de la realización de películas para adultos, como criar a dos hijos y mantener estrechas conexiones con Salónica, Grecia, donde residía su familia biológica.

Si bien estaba tremendamente orgullosa de su herencia y ofrecía generosa ayuda a la comunidad 2SLGBTQ+, con cigarrillos en mano y bolsas de dinero guardadas debajo de la mesa de su sala de estar, regularmente reinaba sobre una camarilla de amantes y amigas en su apartamento sobre el Teatro Adonis.

The four most popular Colombian women on Onlyfans: one of them charges over $100,000 for racy photos and videos

Aida Cortés, Aura Cristina Geithner, Esperanza Gómez and Cintia Cossio are the most visible adult content creators in Colombia.

Selling adult content has become a profitable source of income for many people. From old glories of acting to renowned porn actresses have opened a space in Onlyfans, the largest platform for the consumption of this type of content in the world. Here are the four women who receive the most money through this platform in Colombia.
Aida Cortés

Born in Santander, Aida Cortés began her career as a webcam model, a profession she hid during her time at university. She stayed that way for a while, until her content began to leak, so she decided to dedicate herself entirely to the production of erotic material. When Onlyfans arrived y españolas webcam, as it is known, it has managed to bill, monthly and on average, about 40 million pesos.

To access the content produced by Cortés you have to pay, on the platform, 14.5 dollars, which are, pesos plus, pesos minus, $68,000.
Aura Cristina Geithner

The Colombian singer and actress has revitalized her career in recent years. Since her participation in Master Chef Celebrity in 2019 and her subsequent foray into adult content creation at Onlyfans, as well as her new music production, has put her back under the media spotlight.

People interested in consuming the singer and actress’ content, as well as to listen to her speak, without filters, will have to pay $15.99 a month, which more or less, is about 75 thousand pesos.

Esperanza Gomez

Esperanza Gomez needs no introduction. She is the most popular adult film actress in Colombian history. The pornography entrepreneur currently lives in the United States in a luxurious apartment for which she pays more than 7 thousand dollars a month in rent. Over the years, Gomez, a native of Caldas, has built a prominent career in the porn industry. Recently, the actress has been involved in a legal battle against Facebook and Meta, for the closure of her Instagram account.

People interested in seeing the content of chicas webcam the Caldas native will have to pay 10 dollars, about 17 thousand pesos.

 

Cintia Cossio

This list is closed by Cintia Cossio, who has also managed to position herself as one of the strongest Colombians on the adult content platform. The Antioquian is the sister of influencer and content creator Yefferson Cossio, which has undoubtedly helped her to open a space in Onlyfans and in social networks, being the woman, of this list, who charges the most for her content on the English platform: $23, about 108,550 Colombian pesos.

License Part II and Quick start

Using lbzip2 should be straightforward for most of users because it is fully compatible with bzip2. Additionally, lbzip2 usage is very similar to other compressors, like gzip and xz, so users of these programs should have no problems using lbzip2.

There’s a chance that lbzip2 is already installed in your system. You can check this by running:

If lbzip2 is not installed then system shell will print something like “command not found”. Otherwise version of installed lbzip2 will be printed. The latest released version of lbzip2 is 2.5. It’s recommended to use the latest version if possible. If you can’t upgrade lbzip2 installed in your system then you can build and install a local copy.

lbzip2 is shipped with number of operating systems. It is recommended to use packaging management software of your system to install system version of lbzip2. If you can’t or don’t want to do this, you can compile lbzip2 from sources.

This document presents only basic usage of lbzip2. More advanced usage, including all available options, is described in detail in the manual. You are encouraged to see the manual if this document doesn’t give enough information.

File compression

To compress a single file you can simply run:

This command will replace file_name with its compressed form – file_name.bz2. The original file will be deleted upon successful compression. You can keep it by specifying --keep parameter (-k in short):

lbzip2 doesn’t output any logging information during normal operation. Error messages are printed only on failure, but also warnings can be printed in some cases too. More verbose logging can be turned on by specifying --verbose option (-v in short):

lbzip2 doesn’t output any logging information during normal operation. Error messages are printed only on failure, but also warnings can be printed in some cases too. More verbose logging can be turned on by specifying --verbose option (-v in short):

If no file names are given as command line arguments then lbzip2 works in filter mode. This means that lbzip2 will compress or decompress data from standard input to standard output. For example:

To extract all files just skip the files-to-be-extracted part.

The above commands will use lbzip2 only if bzip2 is not installed or tar was configured to work with lbzip2. Otherwise you can pass an additional --use-compress-program option to tar to make it use lbzip2, for example:

lbzip2 works well with pipes, so you can redirect standard streams to a pipe. The following example concatenates several compressed files, sorts them and writes merged output to a single file.

 

License

lbzip2 is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

lbzip2 is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

A copy of the GNU General Public License is included below.

The GNU General Public License is a free, copyleft license for
software and other kinds of works.

The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program–to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.

When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.

Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.

For the developers’ and authors’ protection, the GPL clearly explains
that there is no warranty for this free software. For both users’ and
authors’ sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.

Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users’ freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and
modification follow.

TERMS AND CONDITIONS

0. Definitions.

“This License” refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this
License. Each licensee is addressed as “you”. “Licensees” and
“recipients” may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a “modified version” of the
earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based
on the Program.

To “propagate” a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices”
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work
for making modifications to it. “Object code” means any non-source
form of a work.

A “Standard Interface” means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
“Major Component”, in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work’s
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.

The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.

The Corresponding Source for a work in source code form is that
same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.

When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work’s
users, your or third parties’ legal rights to forbid circumvention of
technological measures.

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program’s source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:

a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.

b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
“keep intact all notices”.

c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.

d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.

A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
“aggregate” if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation’s users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.

FAQ

What does it mean that lbzip2 is a block compressor?

It means that if file being compressed is big enough lbzip2 will internally divide it into blocks of data and compresses them independently. This allows number of blocks to be processed in parallel, as well as makes it possible to recover data from partially damaged .bz2 files. It does not mean that lbzip2 can compress only block devices, nor that input file size must be multiply of block size.

Why progress estimation doesn’t work with pipes?

Knowledge of input file length is necessary for lbzip2 to be able to estimate current progress and predict ETA. lbzip2 uses fstat(2) system call to obtain this information. When processing files which size is not available, such as pipes, named FIFO queues, or some special devices) lbzip2 has no way of measuring progress.

Does lbzip2 support non-regular files?

Yes, lbzip2 should work correctly with almost any kind of files. This includes regular disk files, pipes, block devices, character devices, FIFOs, network sockets, UNIX-domain sockets, streams and any other special files, as long as they support read(2) and/or write(2) system calls. Files don’t need to support random access system calls, like lseek(2) or pread(2).

Note that when you execute lbzip2 from shell you probably will only be able to open named files and pipes. For example, lbzip2 won’t open any network connections on its own, but it should work with network sockets if you pass it as one of three standard file descriptors.

How can I enable progress indicator by default?

By default lbzip2 doesn’t display any information about files it processes. This behavior follows what bzip2 does. Progress measurement can be useful, especially when processing large files.

You can pass any arguments to lbzip2 via it’s environmental variable LBZIP2. Simply add a line such as this to your shell configuration file:

For more information about environmental variables and options accepted by lbzip2, see the manual page.

What’s the recommended way of using lbzip2 with GNU tar?

GNU tar has built-in support for lbzip2. This means it will use lbzip2 for compression and decompression of bz2 tarballs provided that bzip2 is not installed.

To use lbzip2 no matter if bzip2 is installed or not, you need to configure it at build time or use --use-compress-program option. For more information see GNU tar documentation about using lbzip2 with GNU tar.

How can I concatenate compressed files?

To concatenate files while recompressing them you can run:

Files in bz2 format can be simply concatenated without decompression, so it is also possible to concatenate them directly – just use the cat utility:

The second solution may be faster, but be aware that it is also less portable. While lbzip2 and recent versions of bzip2 will be able to decompress the resulting file, other software may have problems. In particular the following software is known not to support concatenated streams: libbzip2 (all versions), bzip2 older than version 0.9.0, Apache Commons Compress.

lbzip2 -> parallel bzip2 compression utility

The latest released version of lbzip2 is 2.5. You can see its release notes or download it.

If you don’t know what is lbzip2 then keep reading this introduction. If you are looking for examples how to use it then you should read quick start.

If you need help, found a bug or want to request a feature then you can contact lbzip2 maintainer. Any feedback is welcome too.

Introduction

lbzip2 is a free, multi-threaded compression utility with support for bzip2 compressed file format.

lbzip2 can process standard bz2 files in parallel. It uses POSIX threading model (pthreads), which allows it to take full advantage of symmetric multiprocessing (SMP) systems. It has been proven to scale linearly, even to over one hundred processor cores.

lbzip2 is fully compatible with bzip2 – both at file format and command line level. Files created by lbzip2 can be decompressed by all versions of bzip2 and other software supporting bz2 format. lbzip2 can decompress any bz2 files in parallel. All bzip2 command-line options are also accepted by lbzip2. This makes lbzip2 a drop-in replacement for bzip2.

lbzip2 is portable. It was successfully compiled and ran on wide variety of operating systems and on multiple hardware architectures. It is included in most popular GNU/Linux distributions.

Quality is essential. It was achieved by careful design and thorough testing. lbzip2 test suite consists of more than 300,000 test cases, which are ran on several system architectures before every release. The code is checked using different static analysis tools.

Download

The latest version of lbzip2 is 2.5. For older versions, see below.

lbzip2 is released in form of source code only – lbzip2 authors themselves don’t provide pre-built binaries. You can either download source tarball of released versions of lbzip2 (recommended), or check out development branch.

Before trying to compile lbzip2 from source you should consider checking repositories of your operating system distribution. A number of systems ships packaged lbzip2 binaries. For many others lbzip2 is available from external repositories. See below.

Source code

You can download source tarball of the latest released version here: lbzip2-2.5.tar.gz, or in bz2 format: lbzip2-2.5.tar.bz2. Downloadable tarballs of older releases are listed at the botton of this page.

For instructions how to build lbzip2 from source code unpack sources and read the INSTALL file included there. lbzip2 uses GNU build system, so compilation and installation usually boils down to the following sequence:

Development snapshots

lbzip2 uses Git for source configuration management. Full source code of all versions of lbzip2 is available in the Git repository on GitHub.

The repository is accessible through Git native protocol at git://github.com/kjn/lbzip2.git or more securely, through HTTPS at https://github.com/kjn/lbzip2.git. There is also a Subversion mirror available at https://github.com/kjn/lbzip2.

Git repositories don’t contain any bundled third-party code, pre-built binaries or autogenerated files. To build lbzip2 from Git you need to generate bootstrap it first. During this process a few source files are generated, others are copied from Gnulib. You need a few additional software dependencies. See BOOTSTRAP file for more information.

Pre-built binaries

lbzip2 is part of a number of operating systems. The following list includes distributions for which lbzip2 is known to be packaged. It can be either included in official repositories or available from third parties.

Please note that neither these distributions nor lbzip2 packages provided by them are supported or endorsed by lbzip2 authors; this list is provided merely for users’ convenience.