Files

282 lines
25 KiB
Plaintext
Raw Permalink Normal View History

Episode: 1251
Title: HPR1251: TGTM Newscast for 2013-05-19 DeepGeek
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1251/hpr1251.mp3
Transcribed: 2025-10-17 22:27:09
---
You are listening to TGTM News, number 97. Record for Sunday, May 19, 2013. You are listening
to the Tech Only Hacker Public Radio Edition to get the full podcast, including political,
commentary, and other controversial topics. Please visit www.toolgeektme.us.
Here are the vials statistics for this program. Your feedback matters to me. Please send
your comments to DG at deepgeek.us. The webpage for this program is at www.toolgeektme.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DGTGM, as in DeepGeek TalkGeek to me.
The United States government told the court last week that it fears the end of the mega upload
prosecution if the judge makes the quote wrong and quote decision. And these words are now being
used against it. In a new brief submitted to the Virginia District Court, mega uploads
lawyers argue that the government admits that it may not have a case. Earlier this week,
mega uploads lawyers released a white paper accusing the Obama administration of being
corrupted by Hollywood and other major corporations and detailing how the entire criminal case
against mega upload is baseless. In addition to this public attack, mega uploads legal
teams also building up pressure in court. In a new brief, they argue that the case against
the company should be thrown out since the government has more or less admitted that there
is no legal basis to keep the company in criminal limbo. The two parties have a standoff about
rule four of criminal procedure, which requires the authorities to serve a company at an address
in the United States. According to mega upload, this is impossible since the company is based
in Hong Kong. The US government disagreed and said that it could find a way to serve the
company, but this is yet to happen. What followed was a back and forth exchange with mega upload
requesting an end to the case and the US arguing against it. In an unexpected move last week,
the government stressed the importance of the pending decision by pointing out that the
wrong choice could put an end to the case. In a brief file yesterday evening, mega uploads
lawyers responded to these claims by pointing out that without a dismissal, quote, mega upload
will be indefinitely stuck in criminal limbo. This would mean that the company's rights
will continue to be violated by the current stalemate. As a result, mega upload is trapped
in a state of criminal limbo where it is subjected to daily irreparable harm from criminal
indictment and the seizure of its assets while being denied the benefits of the adversarial
process and protections. According to mega upload's legal team, the government appears
to be contradicting itself. The lawyers note that the government first argued that mega
upload can be served when Kim.com and the other defendants are extradited from New Zealand,
but that it now appears to be backing away from this stance. Quote, the government has
now changed its tune, claiming that because of delays in the extradition process, sub-quote,
it is likely that any temporary dismissal would be permanent and contrary to the interests
of justice in sub-quote and, quote, the lawyers write, quote, the government thus seems
to confirm what this court has already observed, namely, sub-quote, that the individual defendants
may never be extradited and sub-quote. And criminal proceedings may therefore never
commence. Given this reality, due process demands that the superseding indictment be dismissed,
and quote, the recent briefs from the U.S. government and mega upload show that district
court judge Liam O'Grady's decision will be a pivotal one. From EFF.org dated May 7,
2013, by Danny O'Brien and contributors Anas Kutesh and Rainy Wrightman. Syrian
Internet goes dark, leaving questions and uncertainty. Earlier today, we learned that
Internet traffic between Syria and Western online services had plummeted drastically,
indicated sick, that the country's connection to the wider Internet had been shut down. Reports
from renesis and Google confirmed that the routes into Syria had been withdrawn, implying
either a massive infrastructure cut, or a deliberate silencing of online communication.
The details of the situation in Syria are still unknown, but we are deeply concerned that
this blackout is a deliberate attempt to silence Syria's online communications and further
draw a curtain over grave events currently unfolding on the ground in Syria. There's a graph
here that you can find by going to the original article linked in the show notes. According
to Dan Hubbard of Umbrella Security Labs, quote, at around 1845 UTC, open DNS resolvers
saw a significant drop in traffic from Syria. On closer inspection, it seems Syria has
largely disappeared from the Internet, end quote. Hubbard notes that the two top level
domain servers for Syria, NS1.tld.sy and NS2.tld.s, were unreachable earlier today. Matthew
Prince at CloudFair published a video demonstrating just how the routes into and out of Syria's
Internet were withdrawn. This is not the first time Syria has suffered an Internet shutdown.
In November 2012, Syria suffered a severe Internet blackout. And as the violence in the
region has escalated, we've documented campaigns of targeted malware attacks against Syrian
activists. Syrians have been suffering an unprecedented humanitarian crisis as the uprising
against the Assad regime turned into a violent civil war encompassing the entire country.
The uprising in Syria began in March 2011 as part of the Arab Spring revolutions, with
protesters taking to the streets to demand the resignation of President Bashar Assad.
The human rights data analysis group has analyzed evidence of mass killings in the region
and found 59,648 unique identifiable records of killings between March 2011 and November
2012. Most foreign media were banned and expelled from Syria in 2011. Yet, during this time,
the Internet has largely remained available. While heavily censored, monitored, and compromised,
the Internet has served as an important window connecting the world at large to Syria,
and one way that international observers could connect with individuals on the ground in that country.
A number of activists on the ground in Syria have access to Internet via satellite links,
which can connect them to the Internet, but carries a high risk for detection, which can be life-threatening.
We are continuing to monitor the situation in Syria. Information and resources are being
shared on Twitter using the hashtag SyriaBlackOut. From eff.org dated May 9, 2013, by Mark MJ Cox.
Update to email privacy law must go further.
Proposals to update the email privacy law, the Electronic Communications Privacy Act,
are moving quickly in Congress. ECPA is in dire need of an update,
as it was written in the mid-1980s, long before the advent of ubiquitous webmail and cloud storage.
In the past, ECPA was used by the Department of Justice, the DOJ, to obtain emails and other
private online messages older than 180 days without a probable cause warrant. If law enforcement
sought those same messages in the physical world, a warrant would be required. This difference is
known only wrong, but also inconsistent with the Fourth Amendment. Senators Patrick Leahy and
Mike Lee plan to fix this. Last month, s.607, a bill sponsored by Senators Leahy and Lee, passed
out of the Senate Judiciary Committee. The bill requires that law enforcement obtain a warrant
if it wants any private online messages, like private Facebook messages or Twitter direct messages.
The Digital Due Process Coalition, a diverse coalition of privacy advocates, including EFF,
and major companies, has worked hard to advance ECPA reform and should be commended for its work.
But because many agencies and companies already require a warrant for all private online messages,
more could be done to bolster the law. The bill should go beyond the status quo.
Missing in the bill is a suppression remedy. In the current draft, if law enforcement
obtained your email without a warrant and violation of the revised law, nothing would prevent that
illegally obtained evidence from being admitted in a criminal trial. A suppression remedy is a
common sense addition to the bill, ensuring that its impact is equal to its intent, ensuring all
private virtual messages, just like any other private physical message, are available to the
government only with a warrant based on probable cause. In United States V. Warshack, 2010,
the sixth circuit ruled that the 180-day rule, as written, was unconstitutional. At a hearing last
month, the DOJ Office of Legal Policy finally admitted that emails older than 180 days should
logically be protected by a warrant. That statement suggests that the DOJ will be seeking
warrants for all private online messages going forward.
But even before the DOJ's admission, many companies already require a warrant before they allow
law enforcement access to a user's private messages.
In the Hill, Google, Microsoft, and Yahoo, the three largest webmail providers,
said they require the government obtain a search warrant before accessing private content.
In addition, Facebook and Twitter also require a warrant for private messages.
Our Who Has Your Back campaign lists even more companies. Senators Leahy and Lee provided a good
start for Eckber reform. Likewise, the DDP coalition has done tremendous work to move the bill
forward, but Eckber reform must do more than codify the status quo. At the minimum, any bill passed
by Congress should have a suppression remedy. From torrentfreak.com by Andy, dated May 11th.
Why private torrent sites have strict copyright enforcement rules?
Private torrent sites have a much lower profile than, say, the Pirate Bay. But there are hundreds,
possibly thousands of them online, going about their business behind closed invite-only walls.
However, when it comes to providing access to content, private trackers are quite different
from their public counterparts. Instead of a Pirate Bay style free for all, access to pirate content
is held back by site admins and only unlocked when members contribute to the health of the community.
When asked to come up with an example of a torrent site, most tech savvy internet users might
cite a public and open site such as the Pirate Bay. However, thousands of file shares,
many of whom consider themselves to be experts, might reference a private invite-only site like
what.cd, whht.cd. The argument over which is better will continue forever, but the differences
between private and public sites are clear. Public sites offer content for free on a level playing field.
It doesn't matter who you are or where you're from. You can access the site's content for free.
There are no barriers to entry and there are no rules. Generally, private sites first require
potential users to obtain an invitation and these vary from fairly easy to extremely difficult to
get hold of. Once in, users are expected to play by a set of often very strict rules in order to
be guaranteed continued access to content. Screw up and the user is out and sometimes banned forever.
In short, and as strange as it might sound, to a certain extent operators of private torrent
sites implement an intellectual property protection regime to restrict access to content
and according to a research paper just published by Badal Balaz at Budapest University of Technology
and Economics, these voluntary IP regimes can go even further.
Balaz begins with a recollection of his attempts to gain an invite to a private tracker via the
site's IRC channel. He was immediately booted by a bot which explained that his entire country
had been banned from the site due to users from Hungary proving bad for the community in the past.
Quote, I laughed out loud. In the last few years, I got used to the black YouTube screens
telling me that this video was not available in your country. But it was completely unexpected to
see that the pirates are also locking me out from their musical archives and, quote, he writes.
Not that Balaz does not appreciate the need for control. He understands that by being closed,
these sites gain a stability that sites like the Pirate Bay cannot hope to achieve,
and he recognizes the need for rules in order to maintain a flourishing community.
Quote, most of the rules are there to ensure the long-term survival of the common resource pool
of shared files in an increasingly hostile, legal, and technological environment.
They also make sure that the collection is as comprehensive as possible and maintains the
highest achievable standards in terms of technical quality, and, quote, Balaz explains.
Quote, other rules establish internal administrative hierarchies, decision-making processes,
and conflict resolution methods. In other words, they establish the foundations of a self-governing
community, and, quote, throughout his paper, Balaz references several private sites,
but redacts their names to protect their privacy. We'll continue with his wishes,
but suffice to say this offers them very little extra security.
We recognize the sites immediately from his descriptions.
One, a site specializing in non-mainstream movies, told Balaz an interesting story about how they
handle copyright issues in order to keep their community healthy. Rather, then a straightforward
takedown response to a complaint, the site admin described an interesting negotiation,
where the complainant was paid off, not with money, but with ratio, the main currency available
on a private tracker. Ratio is the comparison between the quantities of data a user downloads
versus what he uploads. The more he does of the latter, the more he is allowed to do of the
former. Site admins have the ability to manipulate these stats to give users more relaxed access to,
quote, free, end, quote, content. Quote, most often, the producer will ask for his content to be
removed until a certain date or until they break even on the film. We have also paid, in ratio,
producers to keep their work on the site and, quote, the admin explained.
Balaz notes that, quote, backroom dealings, end, quote, like these, seem to be better received by
the site operators and provide an avenue for negotiated settlement rather than the alternative
of sending in the lawyers. Torrent Freak spoke to the admin of another private tracker specializing
in music, who confirmed that deals were in place with at least two dozen artists and label
workers who agree to keep the piece in exchange for ratio. With issues over outstanding influences
aside, private tracker rules are put in place to keep the community healthy. Balaz argues that
these revolve around keeping quality high, maintaining the completeness of the overall library,
and keeping the file sharing community strong. These factors take priority, even if that means
significantly reducing the usefulness of the site to the individual user.
One of the biggest complaints from users on private sites is that they are restricted by ratio
rules, while these are necessarily put in place to protect site's libraries and quality of service,
transfer speeds. For the rest of the community, they also amount to a copy protection system
enforced by the site admins, which effectively introduces a price for consumption, download,
and a price for labor, upload. It is important to note that private
trackers are not free markets, and the prices are not automatically defined by supply and demand.
On the contrary, prices are set by the not-so-invisible hands of the site administrators to
signal preferred behavior and to address certain shortcomings of the P2P activity. And quote,
Balaz notes, quote, by rewarding the sharing of certain content and penalizing the sharing of
others, such pricing mechanisms are able to ensure that older, less popular, niche, fringe,
or otherwise archival content stays accessible at all times within the community.
By setting download prices to zero, free leech, these sites play an important role in
directing attention to certain works and authors. Such mechanisms help admins to, quote,
curate the collection, end quote, and shape the cultural canon within the network. End quote.
Content producers are often accused of failing to adjust to the reality that online content
is no longer scarce. The internet allows infinite digital copies of content to be made at virtually
no cost. Balaz writes that while this is the case for open-torrent trackers, private trackers
counter with the implementation of rules that reintroduce artificial scarcity. Nevertheless,
users of private trackers are generally happy to play by the site rules, and their admins seem
to be more open to deal with rights holders, even as they break many of the rules laid down in
copyright law. Balaz notes, however, that these decisions are less to do with the rule of law
and more to do with the code of ethics negotiated within private site communities.
Quote, as long as the main question of the intellectual property field is not how people can be
forced to obey the law, but rather under what conditions they choose to respect the wishes of
authors and ensure the reproduction of different cultural fields. The survival of different social
practices will be a factor of their ethical disposition rather than their legality, and, quote,
Balaz writes, quote, in other words, we should expect ethically robust practices to persist,
even if their legality remains in question, and unethical practices will face considerable
public opposition, even if they are found to be legal. And, quote, finally, on the issue of private
trackers and their restrictions, Balaz closes with the following thoughts. Quote, voluntary
IP restrictions and peritical communities are probably the most effective enforcement mechanisms
up to date. Closed file sharing communities have developed tools of social control in spaces
where statutory copyright is irrelevant. The enforcement efforts that target these networks
destroy not just the resource pools and the communities that built them, but also destroy
the social controls that are in place, and, quote, Balaz notes. Quote, paradoxical as this may sound,
the aforementioned peritical communities may be the enforcement allies that rights holders have
been seeking all this time. In any case, it is apparent that they both have at least one
interest in common, a substantial cultural ecosystem. So maybe it is time to ask ourselves,
should we set the foxes to watch the geese? And, quote, from techdirt.com by Tim Cushing,
dated May 10th. Blogger issues DMCA notice to take down posts for infringing his How-To-Infringed
Post. From the Yo-Dog, I heard you liked infringement department. And your ad gauche is a blogger who
would like to have some infringing posts removed from the web. See if you can spot the point when
Goshi's irony detector malfunctions. Quote, copyright claim number zero. My article, How-To-Play
Nintendo DS Games on Android is infringed by the text exerted on the site. Beginning with the
text, did you know that your Android device can play NDS games? With the help of an emulator,
yes, there is a free open source DS emulator out there on Google Play. You can play games like
Phoenix Wright, Dragon Quest 9, and touch detective on your phone, end quote.
Original work URL, HTTP colon, frontslash, frontslash, and URAG2008.hubpages.com slash hub slash How-To-Play-Tentendo-DS-Games-On-Android.
To paraphrase, yeah, it looks like some people have infringed my post about infringing,
so if you could do me a solid and take those out, that would be great.
Goshi's post titled How-To-Play Nintendo Games on your Android does exactly what it says on the
tin, pointing readers towards a free open source emulator, providing instructions on installing
an NDS BIOS and directing readers towards Google to search for .NDS ROMs. Goshi has thoughtfully
included the following warning on his post. Quote, downloading ROMs and BIOS files is illegal.
I don't support piracy, and this guide is only for entertainment purpose. Reader discretion
is advised, end quote. The discussion about whether emulation equals infringement can wait for
another day, but I'm very definitely sure Nintendo considers emulation of current gen hardware
and software to be infringing. In fact, Nintendo seems to get a bit irate about it when questioned
about it, according to its extensive FAQ on emulation. Quote, how does Nintendo feel about
the emergence of video game emulators? The introduction of emulators created to play
illegally copied Nintendo software represents the greatest threat to date to the intellectual
property rights of video game developers. As is the case with any business or industry,
when its products become available for free, the revenue stream supporting that industry is threatened.
Such emulators have the potential to significantly damage a worldwide entertainment software
industry, which generates over $15 billion annually and tens of thousands of jobs.
How come Nintendo does not take steps towards legitimizing Nintendo emulators?
Emulators developed to play illegally copied Nintendo software promote piracy.
That's like asking, why doesn't Nintendo legitimize piracy?
It doesn't make any business sense. It's that simple and not open to debate. End quote.
Wow, Tasty, Gosh knows it too, hence the disclaimer.
Now, Gosh may have a legitimate complaint that his post is being scraped or reposted without
his consent, but complaining about infringers infringing on your post about infringement is more
than a little like sending an official notice informing Google that listed kettles are black
and infringing on your original pot's blackness. Perhaps the offending scrapers could just put up
a little warning stating that they copied Gosh's post for entertainment purposes only.
It certainly entertained me. Additional headlines in the news. To read this story,
follow the link in the show notes. US government attack on mega upload bears hallmarks of
digital gitmo. And now for a talk geek to me news original piece. The brick and mortar store
staples has for a while now given customers a rebate on used ink cartridges of $2 per cartridge.
Staples is now changing that policy to give customers $2 back on ink cartridges only when they've
spent at least $30 on ink or toner in the previous 180 days. Since a lot of people don't use a whole
lot of ink anymore, it could be a lot more than 180 days since the last time they purchased ink.
This is going to cut into the rebates that people have been expecting from staples on their
used up ink cartridges. On the upside, they've doubled the monthly limit, but that doesn't help people
don't use a lot of ink. If you're one of those folks who was used to recycling ink and getting
a rebate from staples, you're probably going to want to hang onto your used cartridges until just
after you purchase replacement cartridges. Staffed and produced by the TGTM news team
at a turtle selection by DeepGeek, views of the soy authors reflect their own opinions and not
necessarily those of TGTM news. News from techdirt.com and these times.com and allgov.com used under
range permission. News from turntfreak.com and EFF.org used on the permission of the Creative
Commons by Attribution Licensed. News from venezuelaanalysis.com and democracynow.org used on the
permission of the Creative Commons by Attribution non-commercial no-dirters license. News sources
retain their respective copyrights. Thank you for listening to this episode of Talk Geek To Me.
Here are the vials statistics for this program. Your feedback matters to me. Please send your comments
to dg at deepgeek.us. The web page for this program is at www.talkgeektoMe.us. You can
subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter. My username
there is dggtm as in DeepGeek Talk Geek To Me. This episode of Talk Geek To Me is licensed
under the Creative Commons Attribution ShareLike3.0 on Port License. This license allows commercial
reuse of the work as well as allowing you to modify the work so long as you share
alike the same rights you have received under this license. Thank you for listening to this episode
of Talk Geek To Me. You have been listening to Hacker Public Radio or Hacker Public Radio
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by a HPR listener like yourself. If you ever
consider recording a podcast, then visit our website to find out how easy it really is.
Hacker Public Radio was founded by the Digital Dark Pound and New Phenomicon Computer Club.
HPR is funded by the binary revolution at binref.com. All binref projects are
crowd-responsive by linear pages. From shared hosting to custom private clouds,
go to lunarpages.com for all your hosting needs. Unless otherwise stasis,
today's show is released under a Creative Commons Attribution ShareLike3.0 on License.