209 lines
14 KiB
Plaintext
209 lines
14 KiB
Plaintext
|
|
Episode: 970
|
||
|
|
Title: HPR0970: TGTM Newscast for 2012/4/15
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0970/hpr0970.mp3
|
||
|
|
Transcribed: 2025-10-08 05:47:00
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
If you want to click here, don't forget to hit OK or I'll click…
|
||
|
|
You can't just click Ok.
|
||
|
|
That is great
|
||
|
|
These paintings can explain where we get it.
|
||
|
|
Wow, this is amazing, I really can't!
|
||
|
|
You're listening to Talk Eat To Me News, number 67, record for April 15, 2012.
|
||
|
|
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast,
|
||
|
|
including political, commentary, and other controversial topics.
|
||
|
|
Visit www.talkeaktme.us.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me.
|
||
|
|
Please send your comments to DG at deepgeek.us.
|
||
|
|
The webpage for this program is at www.talkeaktme.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek.
|
||
|
|
Or you could follow me on Twitter.
|
||
|
|
My username there is DGTGM.
|
||
|
|
As in DeepGeek, TalkGeek to me.
|
||
|
|
And now the tech roundup from torrentfreak.com, date April 10, 2012, by Ernesto.
|
||
|
|
Mega upload host refuses to delete user data and evidence for now.
|
||
|
|
Four weeks, Mega upload has attempted to come to a workable solution with the Department
|
||
|
|
of Justice, but Mega upload founder Kim.com has just confirmed to torrentfreak that these
|
||
|
|
efforts have been in vain.
|
||
|
|
The DOJ and Mega upload couldn't reach an agreement, and as a result, several parties
|
||
|
|
are now fighting over the data, all for very different reasons.
|
||
|
|
The government's position is somewhat confusing.
|
||
|
|
Initially, the authorities argued that they had no interest in the data at all, but when
|
||
|
|
Carpathia hosting made a deal with Mega upload to sell the servers for $1 million, the
|
||
|
|
feds backpedaled.
|
||
|
|
The government does not trust Mega upload with the data and would rather see it deleted.
|
||
|
|
But Carpathia refuses to do so, as Mega upload the EFF and even the MPAA all believe
|
||
|
|
that would be a bad idea.
|
||
|
|
Mega upload has argued before the court that the servers hold important evidence and has
|
||
|
|
accused the feds of long to purposefully destroy it so that the file host becomes hindered
|
||
|
|
when mounting its defense.
|
||
|
|
Quote, In essence, the government has taken what it wants from the scene of the alleged
|
||
|
|
crime, and is content that the remaining evidence, even if it is a sculpatory, will
|
||
|
|
otherwise relevant to the defense be destroyed, unquote, Mega's defense wrote to the court.
|
||
|
|
And Mega upload is not the only party interested in keeping the data intact.
|
||
|
|
The EFF is representing a user who is demanding the return of his personal files, and the
|
||
|
|
MPAA wants the data to be preserved for several cases the movie studios may file against
|
||
|
|
Mega upload.
|
||
|
|
In an attempt to save the data, all parties accept the government have asked Judge O'Grady
|
||
|
|
to come up with a solution to prevent Carpathia from having to wipe the servers clean.
|
||
|
|
In a filing to the court yesterday, the hosting company makes its position clear, without
|
||
|
|
an opinion from the court, they are refusing to delete the data, as the government is suggesting.
|
||
|
|
Quote, Carpathia is in no position to decide whether to destroy or keep the data without
|
||
|
|
guidance from this court, defendants claims are sufficiently reasonable that without
|
||
|
|
a court order, it would be intrudent for Carpathia to simply ignore them and reprovision
|
||
|
|
the service, unquote, the hosting company rights.
|
||
|
|
And while the government claims it's sampling is sufficient, and no further data need be
|
||
|
|
preserved, other parties have claimed that all the data is necessary.
|
||
|
|
Mega for its defense, EFF for the return of data innocent users, and MPAA for use in
|
||
|
|
future litigation, they add.
|
||
|
|
For now, Mega upload service is safe, but if the court decides that it has no problems
|
||
|
|
if they are wiped clean, the hosting provider will do so.
|
||
|
|
If the data is to be preserved, Carpathia wants to know if they can sell the service to
|
||
|
|
Mega upload.
|
||
|
|
If the court believes the hosting company should continue to maintain the service, Carpathia
|
||
|
|
wants to be compensated.
|
||
|
|
The fate of Mega upload data is now in the hands of Judge O'Grady.
|
||
|
|
From AllGov.com, dated April 11, 2012, by Noel Brinkohoff and David Wallachinsky, Homeland
|
||
|
|
Security and Navy award contract to hack into gaming systems.
|
||
|
|
The federal government wants to obtain the capability to hack into video game consoles,
|
||
|
|
all in the name of supporting terrorism and pedophiles, obscure technologies, a small
|
||
|
|
San Francisco based company that performs computer forensics has received a $177,000 contract
|
||
|
|
from the Department of Homeland Security and the U.S. Navy to create software that can penetrate
|
||
|
|
the Microsoft Xbox 360, the Sony PlayStation 3, the Nintendo Wii and other game systems.
|
||
|
|
The contract is part of the gaming systems-modeling and analysis project that began in 2008 when
|
||
|
|
law enforcement discovered pedophiles used video game consoles to find victims.
|
||
|
|
Since then, national security officials came to the conclusion that terrorists may also
|
||
|
|
use online games to communicate.
|
||
|
|
Presumably, the developed technology would allow the FBI or CIA to file chat between players
|
||
|
|
and access other information stored on the game systems.
|
||
|
|
The contract was signed by the Naval Postgraduate School, but the tools will be delivered to
|
||
|
|
Homeland Security.
|
||
|
|
From TechDirt.com did April 11, 2012 by Lee Beaton.
|
||
|
|
Breaking, U.S. Sue's Apple publishers over e-book price fixing.
|
||
|
|
Ever since the Justice Department announced that they were investigating Apple and several
|
||
|
|
publishers over allegations that Apple's agency model for e-book pricing violates anti-trust
|
||
|
|
law, we've been waiting for the other shooter drop.
|
||
|
|
Last night, Royalty's report that a lawsuit was imminent and now Bloomberg has the news
|
||
|
|
that the government has filed a lawsuit against Apple, Hatchett, Hopper Collins, Macmillan,
|
||
|
|
Penguin, and Simon Schuster in New York District Court.
|
||
|
|
Details are still scarce, but sources say Apple and Macmillan refuse to participate in
|
||
|
|
some of the talks while some of the other publishers are still hoping to avoid a drawn-out legal
|
||
|
|
battle and may settle soon.
|
||
|
|
Update, Bloomberg is now reporting that SNS, Hopper Collins, and Hatchett have settled.
|
||
|
|
It will be interesting to see what kind of defense Apple brings because the evidence
|
||
|
|
of collusion doesn't look good for them at all.
|
||
|
|
Despite author's guild president Scott Taroes, self-serving claim that this will somehow
|
||
|
|
hurt culture.
|
||
|
|
This is Good News for Readers.
|
||
|
|
Busting apples in the publishers' eye and grip on e-book prices will likely reduce them
|
||
|
|
across the board.
|
||
|
|
From TechDirt.com dated April 11, 2012 by Chris Rhodes.
|
||
|
|
No, violating your employer's computer-used policy is not criminal hacking.
|
||
|
|
You may remember a story from last year about David Nozal, a man who was essentially convicted
|
||
|
|
of computer hacking because the Ninth Circuit Court of Appeals determined that he exeared
|
||
|
|
authorized excess on his employer's computer system when he broke the written rules regarding
|
||
|
|
how data on that system could be used, in this case by accessing said data before leaving
|
||
|
|
the company for a competitor.
|
||
|
|
You are not accessing the data, with some other legally actionable offense, its prosecution
|
||
|
|
under the Computer Foreign Abuse Act, the CFAA, set an alarming present for the rest of
|
||
|
|
us.
|
||
|
|
As noted at the time, if breaking any arbitrary rule accompanying places on its IT system
|
||
|
|
is hacking, then most office workers could be in big trouble.
|
||
|
|
Did you check your Facebook using a company computer?
|
||
|
|
You could be charged with criminal hacking if the rules say you shouldn't.
|
||
|
|
To make matters worse, as Orrin Kerr argued then, prosecutions like this aren't necessarily
|
||
|
|
limited to desktop computers, since the line for what constitutes a computer is so blurry
|
||
|
|
these days.
|
||
|
|
Did you use your company's smartphone to call home and tell your wife that you'll be
|
||
|
|
late for dinner?
|
||
|
|
That could be good for ten years in prison, if company policy prohibits making personal
|
||
|
|
calls from it.
|
||
|
|
Of course, this isn't the first time prosecutors have tried to abuse the CFAA.
|
||
|
|
We call, if you will, the infamous case of Lori Drew, who was prosecuted under the theory
|
||
|
|
that violating the terms of service was also the same thing as hacking, ridiculous to
|
||
|
|
be sure, but a jury convicted her anyway.
|
||
|
|
That conviction was eventually overturned by the judge in the case, but others haven't
|
||
|
|
been so lucky, and given the last decision by the ninth, things were looking pretty grimed
|
||
|
|
for common sense.
|
||
|
|
Happily however, the ninth decided to rehear David's case in bank, meaning with all
|
||
|
|
the judges, rather than a small panel of them, and has now reversed the previous ruling.
|
||
|
|
The analysis by the always entertaining Judge Kuzinsky makes it perfectly clear where
|
||
|
|
the line is drawn.
|
||
|
|
Quote, we can't strew criminal statutes narrowly so that Congress will not unintentionally
|
||
|
|
turn ordinary citizens into criminals.
|
||
|
|
This narrower interpretation is also a more sensible reading of the text and legislative
|
||
|
|
history of a statute whose general purpose is to punish hacking.
|
||
|
|
The circumvention of technological access barriers, not misappropriation of trade secrets,
|
||
|
|
a subject Congress has dealt with elsewhere.
|
||
|
|
Therefore we hold that exceeds authorized access, and the CFAA is limited to violations
|
||
|
|
of restrictions on access to information and not restrictions on its use.
|
||
|
|
Since decisions have gone the other way in other circuits, Kuzinsky goes even further
|
||
|
|
and says that the other courts have failed to apply the longstanding principle that we
|
||
|
|
must construe and vigorous criminal statutes narrowly, and that they, at the ninth, respectfully
|
||
|
|
declined to follow our system circuits and urged them to reconsider instead.
|
||
|
|
Hopefully other courts will heed this message, but for now, this is a win for everyone
|
||
|
|
on the West Coast.
|
||
|
|
From peoplesworld.org by Blake Depp, did April 10, 2012, Facebook consumes Instagram, grows
|
||
|
|
more massive.
|
||
|
|
Facebook recently bought Instagram, a tiny mobile photo sharing company that employed
|
||
|
|
thirteen workers and what appears to be a continuous effort by Facebook to maximize
|
||
|
|
its grip on the internet, as well as its public influence.
|
||
|
|
The Instagram smartphone app had been rapidly gaining popularity, but was hardly viewed
|
||
|
|
as a Facebook rival, nevertheless the social network Goliath bought Instagram for $1
|
||
|
|
billion, and not without making its thirteen employees very wealthy.
|
||
|
|
In addition to keeping those workers, Mark Zuckerberg has also stated he wants to keep Instagram
|
||
|
|
as an independent for now unit maintained by the same people responsible for its success
|
||
|
|
in the first place.
|
||
|
|
Many Instagram fans and critics of this move are unhappy, however, perhaps for a deeper
|
||
|
|
reason.
|
||
|
|
What once began as a small dorm room operated social experiment for students of Harvard
|
||
|
|
has today become one of the big five companies currently monopolizing the internet.
|
||
|
|
Its four peers cited as being Google, Apple, Microsoft, and Amazon.
|
||
|
|
Having carved out its own slice of the web, Facebook expands its outreach more and more
|
||
|
|
as the years tick by and is now viewed as being so large that it can kill or buy most competitors.
|
||
|
|
As it stands now, Zuckerberg's juggernaut pretty much writes the proverbial rules of engagement
|
||
|
|
for social media, hardware software design, and e-commerce.
|
||
|
|
If in the years ahead the expansion of the Facebook machine continues, it raises important
|
||
|
|
questions regarding online freedom and corporate ownership versus democratization of the internet.
|
||
|
|
The critics of Facebook's goblin up of Instagram are agitated because they feel that they
|
||
|
|
are having less and less areas of the web free of Facebook's stronghold.
|
||
|
|
This is partially true, for those areas that are removed from it one or more of the other
|
||
|
|
big five names are most likely involved, and any of these big names have also seen increased
|
||
|
|
usage by government agencies, some say, and potential violation of civil liberties.
|
||
|
|
Facebook has also been increasingly asking for more and more information from people under
|
||
|
|
the guise of new improvements, its new timeline feature stretches back all the way to your
|
||
|
|
birth date, tempting users to add baby photos and fill in the blanks for their entire life
|
||
|
|
year by year for the world to see.
|
||
|
|
As these big companies take measures like this more and more often, those who wish for the
|
||
|
|
internet to have a more democratic approach grow more concerned.
|
||
|
|
The remedy it would seem is to stop the acquisition of the internet by private firms, and in the
|
||
|
|
interest of average working class users, return it to a form in which it may become a
|
||
|
|
democratically controlled public form for society.
|
||
|
|
In the hands of corporations, there is the ever growing feeling that social media may
|
||
|
|
become big brother.
|
||
|
|
Thanks for listening to this episode of Talk Geek To Me.
|
||
|
|
Here are the vials statistics for this program, your feedback matters to me, please send
|
||
|
|
your comments to dg at deepgeek.us.
|
||
|
|
The webpage for this program is at www.talkgeektoMe.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
||
|
|
My username there is dgtgtm as in DeepGeek Talk Geek To Me.
|
||
|
|
This episode of Talk Geek To Me is licensed under the creative comments attribution share
|
||
|
|
like 3.0 on poor license.
|
||
|
|
This license allows commercial reuse of the work as well as allowing you to modify the
|
||
|
|
work as long as you share alike the same rights you have received under this license.
|
||
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
||
|
|
You have been listening to Hacker Public Radio at Hacker Public Radio.
|
||
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||
|
|
Today's show, like all our shows, was contributed by a HBR listener by yourself.
|
||
|
|
If you ever considered recording a podcast, then visit our website to find out how easy
|
||
|
|
it really is.
|
||
|
|
Hacker Public Radio was founded by the Digital.Pound and the Empanomical and Computer Club.
|
||
|
|
HBR is funded by the Binary Revolution at binref.com.
|
||
|
|
All binref projects are crowd-responsive by linear pages.
|
||
|
|
From shared hosting to custom private clouds, go to lunarpages.com for all your hosting
|
||
|
|
needs.
|
||
|
|
Unless otherwise stasis, today's show is released under a creative comments, attribution,
|
||
|
|
share alike, 3.0 license.
|