353 lines
24 KiB
Plaintext
353 lines
24 KiB
Plaintext
|
|
Episode: 1005
|
||
|
|
Title: HPR1005: TGTM Newscast for 2012/6/6
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1005/hpr1005.mp3
|
||
|
|
Transcribed: 2025-10-17 17:14:16
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
You're listening to Turkey 3 News, number 68, record for Wednesday, June 6, 2012.
|
||
|
|
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast,
|
||
|
|
including political, commentary, and other controversial topics.
|
||
|
|
Please visit www.toolgeektme.us.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me, please send your comments to dgatdeepgeek.us.
|
||
|
|
The webpage for this program is www.toolgeektme.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek, or you could follow me on Twitter.
|
||
|
|
My username there is dgtgtm, as in DeepGeek TalkGeek to me.
|
||
|
|
Thanks for tuning in, TGTM News.
|
||
|
|
This is DeepGeek, coming off of a month-long sabbatical, took the month of May off, and
|
||
|
|
in it I accomplished many things that I needed to do, one of which being a DAAA new website.
|
||
|
|
So if you want to go over to www.toolgeektme.us, when you hear this, I will have rolled out
|
||
|
|
the new website, which will have several new features, it brings under my control some
|
||
|
|
functions that I have been performing in other places on the net, and will now be performing
|
||
|
|
for myself.
|
||
|
|
This gives me great happiness and more control, that's all a good thing.
|
||
|
|
So you will notice in the new design that, not as the main page, the newscast page, but
|
||
|
|
the links I generate when searching for the news stories for you dear listeners.
|
||
|
|
Are now divided into two sub pages with two individual RSS feeds, called NewsLinks and
|
||
|
|
TechLinks.
|
||
|
|
So for those of you who would prefer to follow one or the other, or both, you may subscribe
|
||
|
|
to either or both.
|
||
|
|
And also a combination blog, mini blog, I will be doing on my own web page now.
|
||
|
|
The tab will be there, unlike regular blogs, I make no guarantee as to my frequency posting
|
||
|
|
there, but it's important for me to have it under my own control.
|
||
|
|
So please check that out, and as this month, the month of June progresses, I hope to have
|
||
|
|
even a bigger web serving surprise for listeners of my podcast, especially those who live
|
||
|
|
in the European Union and its neighboring territories, and now the tech roundup.
|
||
|
|
In these times.com, dated April 28, 2012, by Kenneth Raposa, radio is about to get better.
|
||
|
|
The Federal Communications Commission, the FCC, is set to increase the number of low-powered
|
||
|
|
FM, LPFM stations after a 12-year hiatus caused by a successful campaign against community
|
||
|
|
radio by a national association of broadcasters, a lobby group for major commercial media.
|
||
|
|
Much to the joy of community radio activists, hundreds of new radio stations will pop up
|
||
|
|
in cities across the country, and they will be all owned by you.
|
||
|
|
Want to be your neighborhood's newest blockpoi DJ or run the local criminal of democracy
|
||
|
|
now?
|
||
|
|
Your window has opened, but not for long.
|
||
|
|
Back in the 70s, most Americans got their glimpse of the inner workings of a radio
|
||
|
|
station from the sitcom WKRP and Cincinnati, WKRP wasn't big money glam.
|
||
|
|
This was, since the after all, not L.A. It was down to earth, it was practically grassroots,
|
||
|
|
DJ's Johnny Fever and Venus flytrap interviewed local bands, not the Bee Gees.
|
||
|
|
But just 20 years later, the radio landscape has changed, it is mostly run by large stations
|
||
|
|
like Kiss FM owned by clear channel communications and guys who signed the checks of Ryan Seacrest,
|
||
|
|
a radio personality who needs no introduction.
|
||
|
|
Pat Fagala, 29, needs an introduction.
|
||
|
|
She's one part guitarist from Indy Rock band, Slack Panther, one part host of Queen City
|
||
|
|
Awesome, which airs Monday and Wednesdays on WVCQ in Cincinnati to 95.7 FM.
|
||
|
|
WVCQ is operated by media bridges and is one of the largest LP FM stations within
|
||
|
|
top 30 media markets.
|
||
|
|
It's helping people in that city connect through the free public airwaves in ways largest
|
||
|
|
cities cannot.
|
||
|
|
I'm not looking for a career in broadcasting or anything, Fagali tells me, WVQC, DJ's
|
||
|
|
and show hosts are volunteers.
|
||
|
|
They are trained by media bridges on how to use a soundboard and run a radio program.
|
||
|
|
I'm into the local music scene and this show I do with my lead singer Bree Blisters
|
||
|
|
gives us a chance to interview local bands.
|
||
|
|
If not for LP FM, there is no way I would have done this and most of these musicians would
|
||
|
|
not get an opportunity to discuss their music in this format.
|
||
|
|
I don't know where it will lead, I just know we are having a great time.
|
||
|
|
There are about 800 LP FM stations nationwide.
|
||
|
|
Small 100 watt stations with a reach of 3.5 miles.
|
||
|
|
LP FM launched in 2000 and media bridges applied for its license a year later.
|
||
|
|
They were granted to permit 7 years later and didn't go on air until 2010.
|
||
|
|
Today, WVQC has over 40 locally produced shows on topics ranging from the paranormal to
|
||
|
|
issues in the gay communities to old school hip-hop.
|
||
|
|
Monty Rue is WVQC's version of Ed Lover spinning throwbacks to days of Yo MTV wraps
|
||
|
|
today.
|
||
|
|
I'm playing stuff you don't hear on commercial radio anymore unless they have a blast
|
||
|
|
from the past hour.
|
||
|
|
I'm putting up public enemy, MC light, I get calls that appreciate what I do and think
|
||
|
|
it rounds out since these commercial hip-hop stations that are only going to play new
|
||
|
|
music, he says.
|
||
|
|
To read the list is awful, including what legal necessities were required to get these
|
||
|
|
applications permitted and what niche markets LP FM fulfills.
|
||
|
|
Please follow links and read the list is awful from the show notes.
|
||
|
|
From torrentfreak.com by Ernesto, dated May 3, 2012.
|
||
|
|
Judge, an IP address doesn't identify a person or bit torrent pirate.
|
||
|
|
Spit torrent lawsuits have been dragging on for more than two years in the US involving
|
||
|
|
more than a quarter million alleged downloaders.
|
||
|
|
The copyright holders who start these cases generally provide nothing more than an IP address
|
||
|
|
as evidence.
|
||
|
|
Then they ask the courts to grant a subpoena allowing them to ask internet providers for
|
||
|
|
the personal details of the alleged offenders.
|
||
|
|
The problem however is that the person listed as the account holder is often not the person
|
||
|
|
who is downloading the infringing material or put differently.
|
||
|
|
An IP address is not a person.
|
||
|
|
Previous judges who held bit torrent cases have made observations along these lines but
|
||
|
|
none has been detailed as New York magistrate Judge Gary Brown was in a recent order.
|
||
|
|
In his recommendation order the judge labels mass bit torrent lawsuits a waste of judicial
|
||
|
|
resources.
|
||
|
|
For a variety of reasons he recommends other judges to reject similar cases in the future.
|
||
|
|
One of the arguments discussed in detail is the copyright hold is claim that IP addresses
|
||
|
|
can identify the alleged infringers.
|
||
|
|
According to Judge Brown, this claim is very weak.
|
||
|
|
The assumption that the person who pays for internet access at a given location is the
|
||
|
|
same individual who allegedly downloaded a single sexually explicit film is tenuous
|
||
|
|
and one that has grown more so over time he writes.
|
||
|
|
An IP address provides only the location at which one of any number of computer devices
|
||
|
|
may be deployed much like a telephone number can be used for any number of telephones.
|
||
|
|
Thus it is no more likely that the subscriber to an IP address carried out a particular
|
||
|
|
computer function.
|
||
|
|
Here the purported illegal downloading of a single pornographic film then to say an
|
||
|
|
individual who pays a telephone bill made a specific telephone call.
|
||
|
|
The judge continues by arguing that having an IP address as evidence is even weaker than
|
||
|
|
a telephone number as the majority of US homes have a wireless network nowadays.
|
||
|
|
This means that many people including complete strangers if one has an open network can
|
||
|
|
use the same IP address simultaneously.
|
||
|
|
While decades ago home wireless networks were nearly nonexistent, 61% of US homes now
|
||
|
|
have wireless access.
|
||
|
|
As a result, a single IP address usually supports multiple computer devices which unlike
|
||
|
|
traditional telephones can be operated simultaneously by different individuals Judge Brown writes.
|
||
|
|
Different family members or even visitors could have performed the alleged downloads unless
|
||
|
|
the wireless router has been appropriately secured and in some cases even if it has been
|
||
|
|
secured.
|
||
|
|
Neighbors or pass or buy could access the internet using the IP address assigned to a particular
|
||
|
|
subscriber and download the plaintiff's film.
|
||
|
|
Judge Brown explains that the widespread use of wireless networks makes a significant
|
||
|
|
difference in cases against file sharers.
|
||
|
|
He refers to an old RHAA case of nearly a decade ago where the alleged infringer was located
|
||
|
|
at a university on a wire connection offering hundreds to tracks in a shared folder.
|
||
|
|
The judge points out that nowadays it is much harder to pinpoint specific infringers.
|
||
|
|
Brown also cite various other judges who have made comments on the IP address issue in
|
||
|
|
SBO pictures incorporated versus DOES 1 through 3036 for example.
|
||
|
|
The court noted quote.
|
||
|
|
By defying DOE defendants as ISP subscribers who were assigned certain IP addresses instead
|
||
|
|
of actual internet users who allegedly engage in infringing activity plaintiffs sought after
|
||
|
|
discovery has the potential to draw numerous innocent internet users into litigation placing
|
||
|
|
a burden upon them that weighs against allowing the discovery as designed end of quote.
|
||
|
|
Judge Brown concludes that in these and other massed, bit torn lawsuits is simply unknown
|
||
|
|
whether the person linked to the IP address has anything to do with the alleged copyright
|
||
|
|
infringement.
|
||
|
|
Although the complaint state that the IP addresses are assigned to devices and thus by discovering
|
||
|
|
the individual associated with that IP address will review defense true identity, this is
|
||
|
|
unlikely to be the case he concludes.
|
||
|
|
In other words, the copyright holders in these cases have wrongfully accused dozens, hundreds,
|
||
|
|
and sometimes thousands of people.
|
||
|
|
Decided from effectively shutting down all mass bit torn lawsuits in the Eastern District
|
||
|
|
of New York, the order is a great reference for other judges dealing with similar cases.
|
||
|
|
Sowing bit torn users is fine, especially one at a time, but with proper evidence and
|
||
|
|
not by abusing and misleading the courts.
|
||
|
|
From torrentfreak.com, dated May 23, 2012 by Ernesto, mega uploads Kim.com refuses to give
|
||
|
|
up passwords.
|
||
|
|
Mega upload continues its legal battle both in the U.S. and New Zealand.
|
||
|
|
This week, dot com and his legal team were at Auckland's High Court to request a judicial
|
||
|
|
review of the legality of the search warrants that were used to raid his Coatsville mansion
|
||
|
|
in January.
|
||
|
|
During the hearing, dot com's lawyer Paul Davison demanded access to the data stored
|
||
|
|
on the 135 computers and odd drives that were taken into custody.
|
||
|
|
The lawyer argued that the data is needed to mount the proper defense.
|
||
|
|
Not only to fight for the extradition, but also to show that excessive police action was
|
||
|
|
used during the raid.
|
||
|
|
The raid was captured by CCTV data, which is stored on the computers in question.
|
||
|
|
The FBI, however, is objecting to the data handover because some of the files are encrypted.
|
||
|
|
The uploads founder is refusing to hand over the passwords to those files before he's
|
||
|
|
guaranteed access to the data himself, supervised by the court if needed.
|
||
|
|
During the hearing, dot com and his legal team also learned that the data stored on the
|
||
|
|
computers has already been sent to the U.S. authorities, previously the court had offered
|
||
|
|
assurances that this would not happen without prior warning.
|
||
|
|
Davison responded to these revelations by saying that the process was off the rails and that
|
||
|
|
the rights of mega uploads founder have been subverted.
|
||
|
|
Talking to Rae in New Zealand, dot com's lawyer Ira Rothkin suggests file play and alleges
|
||
|
|
that the U.S. government is trying to get valuable evidence out of New Zealand to obstruct
|
||
|
|
a successful defense.
|
||
|
|
Our concerns are that the United States will have New Zealand take all the data and all
|
||
|
|
the hard drives that have been confiscated and remove them from the New Zealand jurisdiction,
|
||
|
|
essentially making it so the New Zealand judiciary cannot exercise New Zealand's reviews, New
|
||
|
|
Zealand values and fairness and due process and bring it all over the United States so
|
||
|
|
that it cannot be used in an extradition hearing.
|
||
|
|
Their hearings had an emotional effect on the mega upload founder when his lawyer recalled
|
||
|
|
how dot com was ripped from his family in January in a raid which may not have been legitimate.
|
||
|
|
He had to wipe tears from his eyes.
|
||
|
|
Outside the court dot com commented on his emotional reaction.
|
||
|
|
It's just remembering what happened to us which I think was unfair and over the top.
|
||
|
|
It just got to me.
|
||
|
|
I'm just a human being you know, he told reporters.
|
||
|
|
Now that the hearings are over is up to Judge Winkleman to decide whether mega upload founder
|
||
|
|
can have access to his personal data and to decide on the possible judicial review
|
||
|
|
into the legality of the search warrants.
|
||
|
|
Meanwhile the US criminal case has gone relatively silent dot com told torn freak that his legal
|
||
|
|
team is working hard on a reply to the indictment where the mega conspiracy is accused of engaging
|
||
|
|
in a racketeering conspiracy conspiring to commit copyright infringement conspiring to commit
|
||
|
|
money laundering and two substantive counts of criminal copyright infringement where the
|
||
|
|
mega upload will have to defend itself in the US is still uncertain though.
|
||
|
|
This month Judge O'Grady informed the FBI that a trial in the United States may never
|
||
|
|
happen because it is impossible to serve a foreign company with criminal charges.
|
||
|
|
So editorial comment that last paragraph is much more significant than it sounds.
|
||
|
|
The case may not be prosecutable in the United States.
|
||
|
|
What this implies and this is a very heavy implication is that a business in a foreign country
|
||
|
|
that announces that it has discovered a way for independent artists to get paid by people
|
||
|
|
downloading their music regardless of whether or not the people who are doing the downloading
|
||
|
|
or subscribers to the company provide the web server that is downloaded off of.
|
||
|
|
Whether a company that makes that announcement can be rated by a foreign country have all
|
||
|
|
of its infrastructure taken by the FBI wiping its business off of the face of the internet
|
||
|
|
regardless of whether or not the case actually gets to the courts in the United States the
|
||
|
|
business has been smashed.
|
||
|
|
So is quite conceivable that the RIA and MPAA companies could have bribed either legally
|
||
|
|
or illegally FBI agents and other police forces to destroy a business in a foreign country
|
||
|
|
illegally and effectively take a competitor to American music media establishment off
|
||
|
|
the internet out of fear that they might have found a business model that finally frees
|
||
|
|
us of the RIA that's an important concept to remember and of editorial comment.
|
||
|
|
From EFF.org by Parker Higgins did May 21, 2012, the Netherlands passes net neutrality
|
||
|
|
legislation.
|
||
|
|
New legislation in the Netherlands makes it the first country in Europe to establish
|
||
|
|
a legal framework supporting net neutrality.
|
||
|
|
In addition to the net neutrality provisions the law contains language that restricts when
|
||
|
|
ISPs can wiretapped their users and limits the circumstances under which ISPs can cut
|
||
|
|
off a subscriber's internet access altogether.
|
||
|
|
The anti wiretapping section of the new law specifies that ISPs may not use technologies
|
||
|
|
like deep packet inspection except under limited circumstances or with explicit consent from
|
||
|
|
the ISPs customer or to comply with the court order or other legislative provision.
|
||
|
|
One Dutch ISP KPN came under fire last year for using DPI to determine whether its subscribers
|
||
|
|
were using VoIP on mobile devices.
|
||
|
|
The new law sets out an exhaustive list of six circumstances in which an ISP can disconnect
|
||
|
|
or suspend the internet access of subscribers.
|
||
|
|
These include termination of the request of the subscriber, nonpayment by the subscriber
|
||
|
|
in case of deception at the expiry of a fixed contract, force measure or if the ISP is
|
||
|
|
required to terminate by law or a court order.
|
||
|
|
In addition the net neutrality provisions also permit blocking of an internet connection
|
||
|
|
where necessary for the integrity and security of a network.
|
||
|
|
The provisions are the Dutch government's implementation of the 2009 Yee Utilicombs
|
||
|
|
package, Revision Framework, article 13A of the Framework Directive States that EU member
|
||
|
|
states may only adopt measures interfering with citizens' ability to access and use the
|
||
|
|
internet and limit its circumstances.
|
||
|
|
In particular measures may only be imposed if they are appropriate, proportionate and necessary
|
||
|
|
when a democratic society and their implementation shall be subject to adequate procedural safeguards
|
||
|
|
and conformity with the European Convention for the protection of human rights and fundamental
|
||
|
|
freedoms and general principles of community law, including effective judicial protection
|
||
|
|
and due process.
|
||
|
|
To read the rest of the small call follow links in the show notes.
|
||
|
|
From eff.org did April 20, 2012 by Hany Fakuri, a picture is worth a thousand words
|
||
|
|
including your location.
|
||
|
|
At first blush it seems obvious that a picture could reveal your location.
|
||
|
|
A picture of you standing in front of the Golden Gate Bridge sensibly leads the conclusion
|
||
|
|
you're in the San Francisco Bay area when the photo was taken.
|
||
|
|
But now that small phones are quickly supplanting traditional digital cameras and even traditional
|
||
|
|
cameras now have Wi-Fi built in, many more pictures are finding their way onto the web
|
||
|
|
in places like Twitter, Flickr, Google Plus and Tumblr.
|
||
|
|
In the span of 10 days, popular photo social network Instagram add 10 million new users
|
||
|
|
as a result of the release of its Android app and its acquisition by Facebook.
|
||
|
|
And the location data hidden in these quick and candid pictures, even when your location
|
||
|
|
isn't as obvious as standing in front of the Golden Gate Bridge, is becoming another
|
||
|
|
easy way for anyone including law enforcement to figure out where you are.
|
||
|
|
Like the case of Warmer, a member of an anonymous offshoot called Cabin Crew, for example,
|
||
|
|
according to the federal government, Warmer broke into a number of different law enforcement
|
||
|
|
databases and obtained a wealth of sense of information, and a Twitter post, Warmer,
|
||
|
|
provided a link to a website that contained the sense of information as well as a picture
|
||
|
|
of a woman posing with a sign torquing the authorities.
|
||
|
|
What's the picture was taken with an iPhone 4, which contains a GPS device built in.
|
||
|
|
The GPS coordinates of where the picture was taken was embedded into the picture's
|
||
|
|
exif metadata.
|
||
|
|
The FBI was able to use the exif data to determine that the picture was taken at a house.
|
||
|
|
In one turn, South Australia.
|
||
|
|
The FBI tracked down other online references to Warmer with one website containing the name
|
||
|
|
Higinio Okoa.
|
||
|
|
The feds took a look at Okoa's Facebook account, which detailed that his girlfriend was
|
||
|
|
Australian.
|
||
|
|
Combined with the exif metadata, the government believed they had corroborated the identity
|
||
|
|
of Warmer as Okoa, and it turned arrested him.
|
||
|
|
Even for folks taken with a smartphone and not embedded with GPS coordinates, for example,
|
||
|
|
point and shoot SLO cameras that do not geotag.
|
||
|
|
It's so possible for the police to get location information through exif metadata.
|
||
|
|
You can upload a picture here and see the metadata stored in a picture for yourself.
|
||
|
|
Contained within the metadata is the camera serial number.
|
||
|
|
Along with that information, the police can easily scour the internet for other pictures
|
||
|
|
tagged with the same serial number.
|
||
|
|
In Australia, a man whose camera was stolen was able to track it down using stolencamerafiner.com
|
||
|
|
because the thief had taken a picture with the camera and uploaded it to Flickr, where
|
||
|
|
he had listed his address.
|
||
|
|
But even if the thief's Flickr site didn't contain his address, police could have subpoenaed
|
||
|
|
Flickr.
|
||
|
|
Like law enforcement have, attempted to do with Twitter.
|
||
|
|
For information concerning a user's temporary signed IP address, as well as session times
|
||
|
|
and logs, to eventually determine where a person uploaded a picture from, all of which
|
||
|
|
can be used to piece together a snapshot, not only your movements, but as in the case
|
||
|
|
of Warmer, potentially your identity.
|
||
|
|
In the United States, police are being trained about the broad investigative potential of
|
||
|
|
this information.
|
||
|
|
It might be tempting to say that the problem is overblown because some social media sites,
|
||
|
|
including Facebook and Twitter, stripped the metadata out of photos, uploaded by their
|
||
|
|
members, but not all do.
|
||
|
|
To a fixed default is to use the picture's location tag unless you opt out.
|
||
|
|
Flickr gives you the option to hide a photo's exit data, but many casual photographers
|
||
|
|
tempted by the rapid growth of photo sharing may not understand what exit data is, and
|
||
|
|
the implication of making it publicly available.
|
||
|
|
The bigger problem is that courts have been expanding the police's right to search digital
|
||
|
|
devices without a warrant under the search instant to arrest exception of the Fourth Amendment.
|
||
|
|
While many of these cases, while warrantless searches of cell phones, there has been at
|
||
|
|
least one case in California where the police used the search instant to arrest exception
|
||
|
|
to search a juvenile digital camera.
|
||
|
|
And there are other report incidents of photo journalists having their camera confiscated
|
||
|
|
and searched when covering political protests and rallies.
|
||
|
|
If the cops have the physical camera and less the memory cards that store the photos,
|
||
|
|
whatever scrubbing that happens when the photo is uploaded to the web is no obstacle.
|
||
|
|
So if you value your privacy, you should take steps to ensure the exit metadata on your
|
||
|
|
pictures isn't an easy way for anyone on the internet to figure out your location.
|
||
|
|
If you're using a smartphone to take pictures, disable geotagging from your pictures.
|
||
|
|
If you're uploading your pictures to a website like Flickr or TripPick, that defaults
|
||
|
|
to automatically include exit data and location information, take the steps to turn it off.
|
||
|
|
And if you're using a traditional SLO or points and shoot camera that doesn't geotag,
|
||
|
|
but does contain a breadth of exit data, then make sure you scrub its metadata before
|
||
|
|
you upload it on the internet.
|
||
|
|
There are free online tools that will help you do precisely that.
|
||
|
|
These simple steps will help ensure that the thousand words of picture describes doesn't
|
||
|
|
include your location.
|
||
|
|
Other headlines in the tech news?
|
||
|
|
Erz Halsel at Open Networking Summit in 2012.
|
||
|
|
This is a link to the excellent perspective blog by AWS Engineer James Hamilton, where
|
||
|
|
we talked about Erz Halsel's keynote talk at the Open Networking Summit.
|
||
|
|
If you have a professional interest in computers, you really want to read this review, and
|
||
|
|
I should say listen to the audio or watch the video on YouTube for this talk.
|
||
|
|
Google has proved that you can take the processing out of network switchers and vest it instead
|
||
|
|
in a full web server, less slaving all the network devices to a centralized server for
|
||
|
|
increased performance, scalability, and security.
|
||
|
|
Important if you have a professional interest in these things.
|
||
|
|
Why a cyber security bill will pass?
|
||
|
|
This is an in these times article about why the necessity, I should say, necessity will
|
||
|
|
demand the passing of some form of cyber security bill regardless of how utopians may view freedom
|
||
|
|
and self-determination on the internet to be news from rostory.com and these times.com
|
||
|
|
spnyc.org and all.gov.com and audio for moment of clarity number one thirty nine use under
|
||
|
|
range permission, news from torrentfreak.com, sasis.org.ca and eff.org use under permission
|
||
|
|
of the career commons by attribution license, news sources retain their respective copyrights.
|
||
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me, please send your comments to dg at deepgeek.us.
|
||
|
|
The web page for this program is at www.talkgeektoMe.us.
|
||
|
|
You can subscribe to me on identica as the username deepgeek or you could follow me on Twitter.
|
||
|
|
My username there is dgtgtm as in deepgeek talk geek to me.
|
||
|
|
This episode of talk geek to me is licensed under the career of commons attribution share
|
||
|
|
like 3.0 on port license.
|
||
|
|
This license allows commercial reuse of the work as well as allowing you to modify the
|
||
|
|
work so long as you share alike the same rights you have received under this license.
|
||
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
||
|
|
You have been listening to Hacker Public Radio or Hacker Public Radio does not.
|
||
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||
|
|
Today's show, like all our shows, was contributed by a HBR listener by yourself.
|
||
|
|
If you ever consider recording a podcast, then visit our website to find out how easy
|
||
|
|
it really is.
|
||
|
|
Hacker Public Radio was founded by the digital.com and the economical and computer cloud.
|
||
|
|
HBR is funded by the binary revolution at binref.com.
|
||
|
|
All binref projects are crowd-responsive by linear pages.
|
||
|
|
For shared hosting to custom private clouds, go to lunar pages.com for all your hosting
|
||
|
|
needs.
|
||
|
|
Unless otherwise stasis, today's show is released under a creative commons attribution share
|
||
|
|
alike 3.0 license.
|