Files

458 lines
22 KiB
Plaintext
Raw Permalink Normal View History

Episode: 1145
Title: HPR1145: TGTM Newscast for 12/20/2012
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1145/hpr1145.mp3
Transcribed: 2025-10-17 19:45:14
---
Hey everybody, this is Poki from Hacker Polic Radio.
We're putting on another party like the New Year's Eve party we had last year.
If you have a computer and you can get mumble working on it, we want you to join us on New
Year's Eve.
When is the party going to be?
It's going to be all day.
It's a 24 hour party, so you have plenty of time to call in and participate.
If you're a podcaster, if you're a podcast listener, come and join us because this is our
thing.
This is our party we're getting together and we're doing it live.
We're going to stream it live.
And we're going to re-broadcast the recording later.
The information is all available at hackerpublicradio.org.
Please come along and join us on New Year's Eve.
You're listening to 12 Geeks Me News, number 85 recorded for Thursday, December 20, 2012.
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast,
including political, commentary, and other controversial topics.
Please visit www.torkgeeksme.us.
Here are the vials to six for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.torkgeeksme.us.
You can subscribe to me on Identica as the user name DeepGeek or you could follow me
on Twitter.
My username there is DGTGM as in DeepGeek TorkGeek to me.
This is Pokey, reading for TechGeek to me news.
And now for the tech news roundup from techdirt.com by Mike Maznik, dated December 14, 2012.
ITU boss in denial claims success, misrepresents final treaty as US, UK, Canada, and many more
refused to sign.
From the, this is not consensus department.
The ITU's world conference on international telecommunications, WCIT, is now over, and
it played out almost exactly as many had predicted.
After going back on explicit promises that the treaty would A, not be about the internet
and B, would only be completed by consensus rather than by majority vote, the US lived
up to its promise not to support such a treaty by officially stating that it would not sign.
A number of other countries quickly followed suit including the UK, Canada, Denmark, Australia,
Norway, Costa Rica, Serbia, Greece, Finland, Italy, Japan, Kenya, Sweden, New Zealand,
Czech Republic, Slovenia, Netherlands, Poland, Portugal, and Qatar.
Though some apparently said that they could not sign because they first had to consult
with their own governments.
So it's possible that some of these may change their mind, but many viewed such statements
as a more diplomatic way of refusing to sign.
The US on the other hand was explicit in refusing to sign, quote, it's with a heavy heart
and a sense of missed opportunities that the US must communicate that it's not able
to sign the agreement in the current form.
End quote said US ambassador to WCIT Terry Kramer, quote, the internet has given the world
unimaginable economic and social benefit during these past 24 years, all without UN regulation.
We candidly cannot support an ITU treaty that is inconsistent with the multi-stakeholder
model of internet governance.
End quote Kramer had it.
The US delegation also laid out the specific reasons why it refused to sign, and they're
the same issues we've been talking about all along.
One, the attempts to expand the definition of the types of entities covered by the treaty
from the big telcos to just about everyone running network.
Two, the explicit inclusion of internet and internet governance in the treaty.
Three, the claim of a mandate over cybersecurity and four, the official regulation of Spain.
The last one hasn't received as much attention, but the US found the rules put forth for dealing
with Spain going way too far and putting in place rules that would violate the First Amendment.
Of course, with so many countries bailing out, the ITU's promise that this would all be
about consensus look positively laughable in retrospect.
But perhaps even more laughable is the response from the ITU boss, Hamadun Torre, whose claims
read like those of a bureaucrat in complete denial.
First, he claimed complete surprise that the US and other countries walked away.
Quote, I couldn't imagine they wouldn't sign it.
I especially was surprised by the reasons that were put in place.
I had made it clear from the opening that internet and content were not a part of the discussion.
I invited ICANN to show that we want to build bridges.
The telcom society and internet society need to work together.
I made an appeal to please help us build bridges.
The fighting will not help the consumer that we are trying to reach here.
End quote.
He kept going on and on insisting that the internet and internet governance were not part of the agreement,
even though they are.
Of course, he then effectively admits that part of the goal is to be the key player in the internet.
Quote, I have been saying in the run up to this conference that this conference is not about governing the internet.
I repeat that the conference did not include provisions on the internet in the treaty text.
Annex to the treaty is a non-binding resolution which aims at fostering the development and growth of the internet.
A task that ITU has contributed significantly to since the beginning of the internet era,
and a task that is central to the ITU's mandate to connect the world,
a world that today still has two-thirds of its population without internet access.
End quote.
So it's not about the internet,
but the internet is central to the ITU's mandate.
Of course, that claim is also a lie.
The ITU's mandate does not cover the internet, but telecom infrastructure.
One of the more nefarious moves by Torrey and the ITU and this whole process
was to continually blur the lines between telecom, infrastructure, and the internet, as if they were the same.
To read the rest of this story for yourself, please visit techdirt.com or see the link in the show notes.
Our next story, also from Techdirt by Tim Cushing, dated December 13, 2012.
Sony's new German e-book store features thousands of DRM-free books.
From the, in other news, Sony sells e-readers department.
DRM is becoming less and less prevalent these days,
as more companies are realizing that the flashback from crippling the purchases of paying customers
far outweighs any perceived prevention of infringement.
It is not a wholesale conversion,
but the new DRM-free converts are appearing more frequently,
including some surprising holdouts.
The digital reader brings us the news that Sony of all companies is opening its own e-book store in Germany,
bringing with it a large selection of DRM-free books.
Quote, the press release mentions that not all of the e-pub books sold by Sony
come with the owner's Adobe D.E. DRM.
Some of the books, numbering in the thousands, use digital watermarks instead.
Apparently, several German publishers have decided to go with this low-hassel security,
including Bastille, Lubé, Verlag, which publishes novels by Ken Follett, Andreas, Eschbach, and Dan Brown.
It is not clear that any of these authors' novels are DRM-free.
End quote.
Rather than inject malignant coding that often fails to distinguish between paying customers and file sharers,
these German publishers are opting for digital watermarking,
which generally works as well as nastier forms of DRM,
but without the negative side effects.
Book's team is handling the watermarking for Sony,
having proved its worth to publishers by providing this service to one of the biggest e-book store fronts of all time.
Pottermore.
So what convinced Sony to go DRM-free on thousands of titles?
Perhaps it was observing Book's stream success in detecting piracy without having to resort to draconian measures.
Quote, according to Hube Vanderpoll,
the founder of Book's team's parent company Eye Contact,
the official release of the Harry Potter e-books saw a decrease in piracy of the series.
Once the titles were available legally and were easy to use,
pirates saw little reason to post copies of the e-books online.
End quote.
As Hofolder points out,
you can't make the same claim about DRM-loaded e-books.
In nearly every case, the DRM is discarded easily by enterprising shareholders,
or just as often by consumers who strip their purchases of this handicap
in order to move them to other devices,
or simply to make sure the publisher,
bookstore, or DRM itself,
doesn't suddenly decide to register their purchases unavailable or useless.
Some customers may download the pirated version,
even if they've purchased it,
just to have an easily portable version, unhampered by DRM.
Why punish your paying customers in order to temporarily annoy,
slash, entertain, and fringes?
The other key to book stream and Pottermore's success
is the simplest one to solve.
Make the books available for sale at reasonable prices
and with as few limitations as possible.
Do this, and your piracy problem will very possibly solve itself.
Our next story from torrentfreak.com.
By Ernesto, dated December 12th, 2012.
Six strikes scheme may lead to lawsuits against pirates.
Early next year, the controversial Six Strikes anti-piracy system
will kick off in the US.
While the initiative itself has a focus on education
instead of punishing bit torrent pirates,
ISPs are obliged to hand over IP addresses of repeat infringers
to the MPAA and the RIAA.
Commenting on this largely overlooked aspect,
CCI director Jill Lesser confirmed
to torrentfreak that lawsuits may indeed
be initiated based on information collected under the program.
Last year, the MPAA and RIAA teamed up
with five major internet providers in the United States
to launch the Center for Copyright Information, CCI.
The parties agreed to operate a system,
which will see subscribers warned
when their connections are observed,
engaging in copyright infringement.
After several warnings, the ISPs will take a variety
of mitigation measures against account holders.
This continues up to six strikes.
And after that, quote, nothing will happen
and quote, according to the parties involved.
While this is true in terms of mitigation measures
applied by internet providers,
the tracking of these subscribers doesn't stop.
Even worse, in the memorandum of understanding
signed by the participating parties we read the following, quote,
the participating ISP will, however,
continue to track and report the number of ISP notices
the participating ISP receives for that subscriber's account.
So that information is available to a content owner representative
if it elects to initiate a copyright infringement action
against that subscriber, end quote.
While copyright infringement action could mean a lot of things,
we previously pointed out that this also means lawsuits.
As a part of the system, ISPs have
to share the monthly reports with copyright holders,
which would allow these groups to uncover identities
of those alleged Victorian pirates.
This means that IP addresses will be shared
without being redacted.
The memorandum of understanding puts it as follows, quote,
the content owner representatives, explicitly MPAA
and RIAA, or any other member of the participating content
owners group may use such reports or data
as the basis for seeking a subscriber's identity
through a subpoena or order or other lawful process.
For the avoidance of doubt, the parties
agree that the content owner representatives
may share such reports with other members
of the participating content owners group, end quote.
This quote unquote side effect of the Six Strikes Plan
has been largely ignored.
So to get clarification on the purpose
of the above paragraphs,
Torrent Freak contacted CCI Executive Director Jill Lesser
this week.
Lesser confirmed over the phone that the data
shared by ISPs would allow copyright holders
to request the personal details of alleged infringers
through subpoenas, but that this type of legal action
is not part of the copyright alerts program.
Lesser added, the copyright holders
can and are already tracking bit Torrent users right now,
suggesting that it's nothing new.
While it's true that the MPAA and RIAA
can use monitoring companies to track alleged infringers,
from a legal perspective, they have a much stronger case
when it's done as part of the copyright alert system.
For example, getting the data from ISPs
allows copyright holders to say with certainty
that certain accounts were used for multiple infringements
as ISPs will connect dynamic IP addresses
to the correct account holders.
Also, those who receive warnings
under the copyright alert system
will have to acknowledge that they understand the risks.
This means that the rights holders could show the court
that subscribers were warned multiple times,
but chose not to take action.
Lesser told Torrent Freak that she doesn't believe
that the MPAA and RIAA are interested
in going after persistent pirates.
However, she admitted that she doesn't know why
the language was included in the agreement
as she wasn't yet around when the agreement was drafted.
While we can't say with certainty that the information
shared by the ISPs will lead to lawsuits
from the RIAA or MPAA,
it wouldn't be a surprise if this happens.
Why else would they have negotiated this option to begin?
We can think of no other reason why these groups
would want to know the identities of repeat infringers.
From the website perspective.mvderona.com
by James Hamilton, dated December 11th, 2012.
I'll add here that this story includes a disclaimer
by Mr. Hamilton that the opinions expressed here
are his own and do not necessarily represent those
of his current or past employers.
Micro-server market heats up
Intel Adam S-1200, codenamed Centerton announcement.
Since 2008, I've been excited by working on
and writing about micro-servers.
In these early days,
some of the workloads I worked with were IO-bound
and didn't really need or use high single thread performance,
replacing the server class processors
that supported these applications
with high volume low cost client system CPUs,
yielded both better price performance
and better power performance.
Fortunately, at that time,
there were good client processors available with ECC enabled
and most embedded system processors also supported ECC.
I wrote up some of the advantages
of these early micro-server deployments
and showed performance results
from a production deployment
in an internet scale mail processing application
in the story,
cooperative, expandable,
micro-slice servers,
low cost, low power servers
for internet scale services.
Intel recognizes the value of low power low cost processors
for less CPU demanding applications
and announced this morning
the newest members of the Adam family,
the S-1200 series.
These new processors support two cores and four threads
and are available in variance of up to two gigahertz
while staying under 8.5 watts.
The lowest power members of the family
come in at just over six watts.
Intel has demonstrated the S-1200 reference board
running spec web at 7.9 watts,
including memory, SATA, networking,
BMC and other onboard components.
Unlike past Adam processors,
the S-1200 series supports full ECC memory
and all members of the family
support hardware virtualization,
64 bit addressing and up to eight gig of memory.
These are real server parts.
For a more complete list
of the Centerton S-1200 microservice features
and more of James Hamilton's opinions on it,
please visit the story on perspectives.mvderona.com,
a link will be in the show notes.
Our last story from torrentfreak.com by Ernesto,
dated December 12th, 2012.
Verizon determines to expose bit torrent copyright trolls.
It's now apparent that Verizon is fed up
with the avalanche of masked bit torrent lawsuits
and is determined to put an end to copyright trolls
extortion-like practices.
The internet provider is asking a Texas court
to grant discovery so it can expose
how these companies operate.
According to Verizon, copyright trolling practices
don't belong in court,
and the ISP equates the companies involved with,
quote,
school yard bullies who push and shove
until firm opposition is met when they shrink away.
End quote.
Two weeks ago, a group of adult movie companies sued Verizon
for failing to hand over the personal details
of alleged bit torrent pirates.
The internet provider had ignored court orders
and Malibu media, Patrick Collins and third degree films
asked the court to hold Verizon in contempt
and compel the company to respond to the subpoenas.
This week, Verizon responded to the claims
with a frontal attack.
Verizon is asking a Texas federal court
to grant discovery so the ISP can expose
how the quote unquote copyright trolls
in question operate.
Verizon's motion is short,
but leaves very little to the imagination.
In its filing, Verizon states that the copyright holders,
quote, pursue a scheme which, if not illegal,
is at a minimum of a type to which the courts
should not lend their powers and support.
End quote.
The provider has therefore decided to turn the tables.
Instead of exposing the identities of their customers,
they want to be granted discovery themselves
so that they can request sensitive information
on the companies involved.
An unusual request at this stage of a case,
but needed because many of Verizon's customers
are unable to defend themselves.
Quote, the circumstances are also unusual
because the persons subject to potential abuse
by the plaintiffs' approach are unlikely to be able
for financial reasons, personal reasons,
or plaintiffs' tactical approach to those
who do actively oppose them to effectively oppose
the plaintiffs' oppressive and unfair methods,
end quote, Verizon writes.
By exposing the tactics of these copyright holders,
Verizon hopes the court can make an informed decision
as to whether the alleged bit torrent users
should have their identities revealed.
This expose includes uncovering the tangled web
of individuals behind these lawsuits
and the tactics copyright holders use
to get defendants to hand over their money.
Quote, Verizon intends, among other things,
to seek discovery from the senior level managers
of the plaintiffs and from the persons
affiliated with the plaintiffs whose declarations
have been used to support the plaintiffs' requests
for discovery, end quote, Verizon writes.
Quote, Verizon further intends to seek discovery
into the business model of plaintiffs
and whether the plaintiffs are good faith publishers
of the material they purportedly seek to protect
as opposed to whether the plaintiffs' business model
is primarily profit from their aggressive
and abusive copyright enforcement efforts,
end quote, they added.
The ISP concludes its request
by equating the tactics of the copyright holders
to school yard bullies who run away scared
if their targets fight back,
a seemingly fitting description
as none of their cases have ever made it
through a full trial.
Quote, plaintiffs tactics appeared to be much like those
of school yard bullies who push and shove
until firm opposition is met when they shrink away.
Plaintiffs and those like them have apparently avoided
having to deal with these issues
by not pursuing those who would raise these issues
and quote, Verizon concludes.
From the filings, it becomes clear
that Verizon is determined to end the trolling tactics
of the adult studios
and they're not scared to invest money into the fight.
Torrent Freak talked to attorney Graham Stifert,
who has a lot of experience
with these mass bit torrent lawsuits
and he believes that this case could have a wide impact.
Quote, if discovery is granted,
these companies will be subject to the same scrutiny
as a plaintiff in a trial
and those depositions and answers could be used
in cases nationwide and quote, Stifert told us.
This means that if Verizon gets their way
and they uncover an updirt,
some of the most active copyright trolls
may be put out of business.
In any case, we can expect fireworks.
Other interesting headlines in the news this week
to read these stories, please follow the links
in the show notes.
Swedish Pirate Party defends role as Pirate Bay ISP.
Pirate Bay founder released from solitary confinement.
Production and editorial selection by DeepGeek,
views of the story authors reflect their own opinions
and not necessarily those of TGTM news or its readers.
News from tecturt.com of anti-times.org,
perspectives.mvderona.com,
in these times.com and allgov.com
are used under arranged permission.
News from torrentfreak.com and dff.org
are used under permission of the creative comments
by attribution license.
News from democracynow.org is used under permission
of the creative comments by attribution,
non-commercial, no derivatives license.
News sources retain their respective copyrights.
Thank you for listening to this episode of Talk Geek to Me.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to dgatdeepgeek.us.
The web page for this program is at www.talkgeektme.us.
You can subscribe to me on Identica as the username DeepGeek
or you could follow me on Twitter.
My username there is dggtm as in DeepGeek Talk Geek to me.
This episode of Talk Geek to Me is licensed
under the creative comments attribution share
like 3.0 on port license.
This license allows commercial reuse of the work
as well as allowing you to modify the work
so long as you share a like the same rights
you have received under this license.
Thank you for listening to this episode of Talk Geek to Me.
You have been listening to Hacker Public Radio
at Hacker Public Radio.org.
We are a community podcast network
that releases shows every weekday on day through Friday.
Today's show, like all our shows,
was contributed by an HPR listener by yourself.
If you ever consider recording a podcast,
then visit our website to find out how easy it really is.
Hacker Public Radio was founded by the digital dog pound
and near-phonomical and computer cloud.
HPR is funded by the binary revolution at binref.com.
All binref projects are crowd-responsive by linear pages.
From shared hosting to custom private clouds,
go to lunarpages.com for all your hosting needs.
Unless otherwise stasis,
today's show is released under a creative commons,
attribution, share a like, videos or license.