Files
hpr-knowledge-base/hpr_transcripts/hpr0960.txt

245 lines
21 KiB
Plaintext
Raw Normal View History

Episode: 960
Title: HPR0960: TGTM Newscast for 2012/04/04
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0960/hpr0960.mp3
Transcribed: 2025-10-08 05:38:21
---
Music
Music
Music
Music
Music
Music
Music
You are listening to Talk Geek 3 News, number 65, recorded for Wednesday, April 4, 2012.
You are listening to the Tech Only Hacker Public Radio Edition.
To get the full podcast, including political, commentary, and other controversial topics,
please visit www.TalkGeek3.us.
Here are the vials statistics for this program. Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.TalkGeek2Me.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DGTGM as a deepgeek talk geek to me.
And now the tech roundup.
From eff.org
Did March 30, 2012
by Katica, Rodriguez, and Maira Sutton
French Constitutional Court Banslow Enforcement Use of National Diometric ID Database
Last week, the Constitutional Constitutional, the highest authority on the French Constitution,
declared the provisions of a law permitting judicial and police use of a centralized national ID database
to be unconstitutional.
200 members of the French Parliament referred the law to the Conceal
Fung Laws Adoption on March 6. The Conceal determined that the use of the centralized database
was incompatible with France's fundamental rights, including the right to privacy and the presumption
of innocence. The proposed legislation mandated compulsory civilian ID cards contained a chip
designed to store personal and biometric information, including home addresses,
marital status, eye color, and fingerprints. Proponents argued that the biometric ID card
would be used to stop honest folk from becoming the victims of identity fraud.
In fact, the law would have enabled the honest folk database to be used for criminal and judicial
purposes. The Conceal correctly determined that such use has constituted a serious
incursion into the right to private life, disproportionate to the law's stated objective.
Another provision in the law would have allowed for a second optional chip to be used
for online authentication and e-commerce transactions. The Conceal determined that such use
would require too broad a range of personal data to be collected without any guarantees of security
and confidentiality. Furthermore, it condemned the law's vague conditions for authenticating
individuals, especially minors. EFF welcomes the Conceal's decision to strike out substantial
plots of the legislation to protect privacy. Nevertheless, the Conceal should explain the
unmotivated reasoning behind leaving significant anti-privacy portions of the law intact,
namely biometric data collection for the purpose of preventing ID fraud.
The argument for biometrics is predicated on the flawed assumption that a national biometric
ID scheme will prevent identity fraud. Massive databases already invite security breaches,
and a biometric database of this scale is a honeypot of sensitive data vulnerable to exploitation.
Such a data breach is not just costly, it is irreversible. You cannot change your fingerprints
or your irises. To read the rest of the Zaukel follow links in the show notes.
From EFF.log did March 21st by Trevor Tim, NSA chief appears to deny ability to warrant
lessly wiretap despite evidence. The former NSA official held his thumb and forefinger close
together. We are, like that far, from a turnkey totalitarian state, he says,
quoted from Wired Magazine April 2012. Last week in Wired Magazine, note author James Bamford
reported on an expensive $2 billion data center being built by the NSA in Utah that will house
an almost unimaginable amount of data on its servers along with the world's fastest supercomputers.
Part of the purpose of this new center according to Bamford is to store all forms of communication
including the complete contents of private emails, cell phone calls, and Google searches,
as well as all sorts of personal data trails, parking receipts, travel attendories,
bookstore purchases, and other digital pocket litter. In the Wired article Bamford interviewed
former NSA official William Binney, a crypto mathematician largely responsible for
automating the agency's worldwide eavesdropping network. Binney further shed light on the NSA's
warrantless wiretapping program first exposed the New York Times in 2005, and the subject of EFF's
long-running suit, Jewel versus NSA, which challenges the constitutionality of the NSA's program.
The NSA claims it only has access to emails and phone calls of the non-US citizens overseas,
but Binney provides more detail to the many previous reports by the New York Times, USA Today,
New Yorker, and many more. That program indeed targets US-based email records. In the 11
years since 9-11, Binney estimates 15-20 trillion transactions have been collected and stored
by the NSA. From the Wired article quote, he explains that the agency could have installed its
tapping gear at the nation's cable landing stations, the more than two dozen sites on the
periphery of the US for fiber optic cables come ashore. If it had taken that route, the NSA would
have been able to limited eavesdropping to just international communications, which at the same time
was all that was allowed on the US law. Instead, it shows to put the wiretapped rooms at key
junction points throughout the country, large windowless buildings known as switches, less gaining
access to not just the international communications, but also to most of the domestic traffic flowing
through the US. The network of intercept stations goes far beyond the single room and AT&T building
in San Francisco, exposed by a whistleblower in 2006. I think there's 10-20 of them, Binney says.
That's not just San Francisco. They have them in the middle of the country and also in the East Coast.
The director of the NSA, General Keith Alexander, testifies at a house subcommittee hearing Tuesday
and representative Hank Johnson, Democrat from Georgia, grilled him on the details of the
wired story. He appears to deny the main points of the article, including that the NSA was
intercepting emails, phone calls, Google searches, and phone records of individuals in the United States,
as well as the technical capabilities of the program software described by Binney.
But, perhaps more strangely, Alexander also seemed to claim the NSA did not have the
technical ability to collect American's emails and internet traffic even if it weren't required
to get a warrant. General Alexander, quote, in the United States, we'd have to go through the FBI
process. They weren't to get that and serve it to somebody to actually get it.
Representative Johnson, but you do have the capability of doing it? General Alexander, not in the US.
Representative Johnson, not without a warrant? General Alexander, we don't have the technical insights
in the United States. In other words, you have to have something to intercept with some way of doing
that, either by going to a service provider with a warrant, or you have to be collecting in that
area. We're not authorized to collect, nor do we have the equipment in the United States to
actually collect that kind of information, emphasis had. In our lawsuits, EFF has provided evidence
that the NSA operated a monitoring center out of AT&T switching facility in San Francisco
that has the ability to do exactly what General Alexander says the NSA can't. In light of all the
evidence, it is hard to take comfort from General Alexander's apparent denial. In previous discussions
of the warrantless wiretapping program, the government has used crabbed and unusual definitions of
words to make misleading statements that also seem like denials, but turn out to be largely word
games. In one prominent example, then Principal Deputy Director of National Intelligence, Michael Hayden
said in a 2006 statement, quote, let me talk for a few minutes also about what this program is not.
It is not a drift net over deerborn or laquana or freemont, grabbing conversations.
End of quote, later when confronted with evidence of a wider drift net program during his
confirmation hearing, he explained, quote, a pointedly and consciously downshifted the language I was
using. When I was talking about a drift net over laquana or freemont or other cities, I switched
from the word communications to a much more specific and unalgurably accurate conversation,
unquote. Notably, the NSA's interpretation of what it means to collect communications seems
to be quite limited. Under Department of Defense regulations, information is considered to be
collected, only after it has been received for use by an employee of a DOD intelligence component.
And data acquired by electronic means is collected only when it has been processed into
intelligible form. So under this definition, if the communications of millions of ordinary Americans
were gathered and stored indefinitely in Utah, it would not be collected until the NSA
officially accepts in some manner such information for use within that component. The illegality
of warrantless wiretapping, however, does not depend on when the NSA officially accepts their
information or processes it into intelligible form, whatever that means. Americans' privacy and
constitutional protections do and should not hinge on word games. We are looking forward to
establishing, in the jewel versus NSA case, a simple proposition that the government can't
spy on anyone much less everyone without a warrant from tectet.com. They had March 30, 2012 by Mike
Massick. Trademark lawyers pushed for crazy new domain rules, making it easy for them to take
away others' domains. IP maximalists now seem to be targeting ICANN as yet another way to
overclaim their rights and block legitimate domains from existing. As we've been discussing,
there have been several fights concerning the new generic top level domains, where we've seen
folks like the entertainment industry demand extra special measures to keep them from being used
to infringe copyrights, but the trademark folks may be going even further. We already have the
somewhat flawed UDRP uniform domain dispute resolution process system for trademark holders to
try and claim the rights over domain. This process lets trademark holders go through an
arbitration process if they feel someone is abusing a trademark in a domain. In the past,
we've discussed how this process is pretty sloppy, but it's still heavily favors trademark
holders. As in many arbitration situations, the big companies who bring back business to the
arbitrators magically seem to win quite frequently. However, that's just not enough for these trademark
holders. Last year, for these new GTLDs, they were also able to establish a separate process
the URS uniform rapid suspension system, which everyone was told would only be used for the most
egregious cases of trademark infringement. The cases where it's so totally obvious that the
domain in question infringes that the whole process can be cheap and streamlined. However,
before this process has even been really tested, trademark holders are trying very, very hard
to basically lower the standards on URS and broaden the reach of it, such that it more or less
replaces the UDRP process. And let's mix it a system that lets trademark holders seize the
domains of those they accuse of infringement very cheaply, with minimal review and to also block
certain words from being registered in domains. Even more incredible, they're abusing an
ICANN comment process to push this plan, which ICANN had earlier rejected. All of this came out
recently in a letter to ICANN's board racing concerns about this effort. ICANN had opened up
a comment period for a specific issue having to do with GTLDs. And the trademark folks went hog
wild asking for all these other things, including lowering the standard for when a simplified URS
process sees domains quickly as questions later. Process can be put in place. Originally the
ball had been set high so that this process could only be used in truly egregious cases,
where there was no question that the domain was infringing. But the proposal sought to lower
the standards such that it's the same as the UDRP standard effectively stepping in and replacing
UDRP. Changing the already agreed upon URS systems such that domains that go through the process
aren't just suspended, but transfer to the trademark holder. In other words, rather than just
shutting down a domain, this fastpass system would simply turn the domains over to the trademark
bullies. Saying that the URS process, which was developed just for these new TLDs, should also be
expanded to cover the most important TLD of all, COM. That's right. That's the goal in all of this
to actually make it much much easier for trademark bullies to completely shut down and gain control
of domains that they don't like others to use and to do it cheaply with very little review.
And they did all this by abusing a comment process that has nothing to do with these issues.
And despite the fact that earlier, hard fork battles over these issues came out with them
on the losing side, but this is how IP maximalists work. They just keep trying every way possible
to get the same ridiculous rules made in their favor. From AMD.com, press release, AMD launches
new platform for dedicated web hosting providers. AMD today announced the latest solution as part of
its ongoing web cloud initiative with the launch of the new AMD Optaron 3200 series processor.
Dedicated web hosting customers seeking enterprise class reliability have a new choice that delivers
great value with up to 38% better price performance and up to 19% less power per core than the
competition error correcting code memory and server reliability features at a low price point.
Fast hardware payback in as few as seven months hosting fees can cover hardware costs up to 14%
quicker than with the competition efficient economics for the cloud with twice the core density
per rack later on the article AMD has delivered on its promise of a low power single socket
solution that brings server functionality with desktop economics. The AMD Optaron 3000 series
platform is targeted to the dense power efficient one processor web hosting web server market
available in either a four or eight core CPU. The AMD Optaron 3200 series processor is shipping
today on platforms from MSI, Tion, Fujitsu and Dell based on the bulldozer core the AMD Optaron
3000 series platform leverages socket AM3 plus and provides customers with the core savings
associated with a desktop like infrastructure yet still offers server class reliability
enterprise class Silicon validation testing security features and server OS certification some
technical details 45 watts to 65 watts TDP 2.7 gigahertz base frequency up to 3.7 gigahertz
frequency 2 DDR3 memory channel supporting ecc memory 1,333 1,600 and 1,866 megahertz memory speeds
up to 32 gigabytes memory capacity up to two dims per memory channel a total cage of 16 megabytes
for eight core and eight megabytes for four core L2 cage up to eight megabytes and L3 cage up to eight
megabytes at 12 comment okay why is this significant because servers are often sold and multi
processor CPUs that is multiple chips each chip having several cores now if you just don't need
that kind of a power in in that particular server for the past few years your choice was to buy a
server class motherboard which is industrial duty and half populated which was a costly proposition
with this move they're going back that making one processor server class motherboards which means
that all the people who didn't need that power for the past few years were forced to use
outside services can now bring those small server needs back into the organization
and of course the usual disclaimer is applied to my knowledge level on this matter
but it's a significant step back to enabling people with low needs to get server class
hardware if they so need it and a total comment from torrentfreak.com did March 27th 2012 by Ernesto
rapid share declared legal in court with a twist in the aftermath of the mega upload shutdown
people have been keeping a close eye on court cases involving other file hosting services
rapid share included during the past several years rapid share has made tremendous efforts to
cooperate with copyright holders and limit copyright infringements but this couldn't prevent
the company from getting involved in a handful of lawsuits against rights holders two weeks ago
a press release published by copyright holders claimed that rapid share had suffered an enormous
defeat in court however now the court has published its final decision rapid share is claiming a
victory of its own in the verdict of rapid share's legal dispute against the music rights group
g-e-m-a the higher regional court in Hamburg explicitly recognizes that rapid share's business
model is legal this news is music to the ears of the file poster quote for the first time the
Hamburg higher regional court has filed outline of argument on key points and has conferred legal
legitimacy on our service just as other courts have done over the considerable period of time
this is a significant result for us and of course said rapid share CEO Alexandra Zwingli
the court further ruled that rapid share has no obligation to proactively minor files
that are uploaded by its users instead the company has to monitor external sites that link to
copyright files on rapid share and ensure that these files become inaccessible this is not a problem
according to the cyber locker quote that is exactly what rapid share has already been doing
for many years if the anti-abuse team identifies a download link on such pages which results in a
file that has clearly been published illegally being on the company's service the file and
question is immediately blocked end of quote aside from monitoring forms and linking sites for
infringing links rapid share has made several other adjustments to its service to decrease
unlawful use most recently the company limited the download speeds of free users to drive away
pirates nevertheless rapid share objects the fact that they have to carry out this monitoring
based on a court order and they will therefore take the case to the Supreme Court quote we are doing
this of our own accord because we have a strong interest in ensuring that our service remains
clean we believe that being obliged to carry out such actions is questionable from a legal
perspective for this reason we will appeal the verdict to clarify the issue of proactive
monitoring of external websites at the highest judicial level end of quote zwingli said
the eventual decision of the Supreme Court may have massive implications not only for rapid share
but also for the many other file hosting services that operate in Germany other headlines in the
news to read these stories follow link in the show notes power management of online data intensive
services this is a link in James Hamilton's excellent technical perspectives blog on whether or
not large scale data centers should oversell their electrical usage news from tech dot com audio
of moment of clarity number 126 of at times that log and all of that com used under arranged
permission news from eFF dot log and torrent freak dot com used the permission of the creative
comments by attribution license news from gpny s dot com and AMD dot com all press releases
news from wl central dot log used in the permission of the creative comments by attribution non-commercial
no delivers license news sources retain their respective copyrights thank you for listening to
this episode of talk geek to me here are the vials statistics for this program your feedback
matters to me please send your comments to dg at deepgeek.us the web page for this program is at
dub dub dub that talk geek to me that us you can subscribe to me on identica as the username deepgeek
or you could follow me on twitter my username there is dg tgpm as in deepgeek talk geek to me
this episode of talk geek to me is licensed under the creative comments attribution share like 3.0
unported license this license allows commercial reuse of the work as well as allowing you to modify
the work so long as you share alike the same rights you have received under this license thank you
for listening to this episode of talk geek to me you have been listening to hr public radio at
hr public radio does our we are a community podcast network the release of shows every weekday
on day through friday today's show like all our shows was contributed by an hbr listener like
yourself if you ever consider recording a podcast then visit our website to find out how easy it
really is hr public radio was founded by the digital dark pound and the economical and computer cloud
hbr is funded by the binary revolution at binref.com all binref projects are crowd-responsive by
linear pages from shared hosting to custom private clouds go to lunar pages.com for all your hosting needs
unless otherwise stasis today's show is released under a creative comments attribution share
on live, eat those own license