Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
457
hpr_transcripts/hpr1145.txt
Normal file
457
hpr_transcripts/hpr1145.txt
Normal file
@@ -0,0 +1,457 @@
|
||||
Episode: 1145
|
||||
Title: HPR1145: TGTM Newscast for 12/20/2012
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1145/hpr1145.mp3
|
||||
Transcribed: 2025-10-17 19:45:14
|
||||
|
||||
---
|
||||
|
||||
Hey everybody, this is Poki from Hacker Polic Radio.
|
||||
We're putting on another party like the New Year's Eve party we had last year.
|
||||
If you have a computer and you can get mumble working on it, we want you to join us on New
|
||||
Year's Eve.
|
||||
When is the party going to be?
|
||||
It's going to be all day.
|
||||
It's a 24 hour party, so you have plenty of time to call in and participate.
|
||||
If you're a podcaster, if you're a podcast listener, come and join us because this is our
|
||||
thing.
|
||||
This is our party we're getting together and we're doing it live.
|
||||
We're going to stream it live.
|
||||
And we're going to re-broadcast the recording later.
|
||||
The information is all available at hackerpublicradio.org.
|
||||
Please come along and join us on New Year's Eve.
|
||||
You're listening to 12 Geeks Me News, number 85 recorded for Thursday, December 20, 2012.
|
||||
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast,
|
||||
including political, commentary, and other controversial topics.
|
||||
Please visit www.torkgeeksme.us.
|
||||
Here are the vials to six for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to DG at deepgeek.us.
|
||||
The webpage for this program is at www.torkgeeksme.us.
|
||||
You can subscribe to me on Identica as the user name DeepGeek or you could follow me
|
||||
on Twitter.
|
||||
My username there is DGTGM as in DeepGeek TorkGeek to me.
|
||||
This is Pokey, reading for TechGeek to me news.
|
||||
And now for the tech news roundup from techdirt.com by Mike Maznik, dated December 14, 2012.
|
||||
ITU boss in denial claims success, misrepresents final treaty as US, UK, Canada, and many more
|
||||
refused to sign.
|
||||
From the, this is not consensus department.
|
||||
The ITU's world conference on international telecommunications, WCIT, is now over, and
|
||||
it played out almost exactly as many had predicted.
|
||||
After going back on explicit promises that the treaty would A, not be about the internet
|
||||
and B, would only be completed by consensus rather than by majority vote, the US lived
|
||||
up to its promise not to support such a treaty by officially stating that it would not sign.
|
||||
A number of other countries quickly followed suit including the UK, Canada, Denmark, Australia,
|
||||
Norway, Costa Rica, Serbia, Greece, Finland, Italy, Japan, Kenya, Sweden, New Zealand,
|
||||
Czech Republic, Slovenia, Netherlands, Poland, Portugal, and Qatar.
|
||||
Though some apparently said that they could not sign because they first had to consult
|
||||
with their own governments.
|
||||
So it's possible that some of these may change their mind, but many viewed such statements
|
||||
as a more diplomatic way of refusing to sign.
|
||||
The US on the other hand was explicit in refusing to sign, quote, it's with a heavy heart
|
||||
and a sense of missed opportunities that the US must communicate that it's not able
|
||||
to sign the agreement in the current form.
|
||||
End quote said US ambassador to WCIT Terry Kramer, quote, the internet has given the world
|
||||
unimaginable economic and social benefit during these past 24 years, all without UN regulation.
|
||||
We candidly cannot support an ITU treaty that is inconsistent with the multi-stakeholder
|
||||
model of internet governance.
|
||||
End quote Kramer had it.
|
||||
The US delegation also laid out the specific reasons why it refused to sign, and they're
|
||||
the same issues we've been talking about all along.
|
||||
One, the attempts to expand the definition of the types of entities covered by the treaty
|
||||
from the big telcos to just about everyone running network.
|
||||
Two, the explicit inclusion of internet and internet governance in the treaty.
|
||||
Three, the claim of a mandate over cybersecurity and four, the official regulation of Spain.
|
||||
The last one hasn't received as much attention, but the US found the rules put forth for dealing
|
||||
with Spain going way too far and putting in place rules that would violate the First Amendment.
|
||||
Of course, with so many countries bailing out, the ITU's promise that this would all be
|
||||
about consensus look positively laughable in retrospect.
|
||||
But perhaps even more laughable is the response from the ITU boss, Hamadun Torre, whose claims
|
||||
read like those of a bureaucrat in complete denial.
|
||||
First, he claimed complete surprise that the US and other countries walked away.
|
||||
Quote, I couldn't imagine they wouldn't sign it.
|
||||
I especially was surprised by the reasons that were put in place.
|
||||
I had made it clear from the opening that internet and content were not a part of the discussion.
|
||||
I invited ICANN to show that we want to build bridges.
|
||||
The telcom society and internet society need to work together.
|
||||
I made an appeal to please help us build bridges.
|
||||
The fighting will not help the consumer that we are trying to reach here.
|
||||
End quote.
|
||||
He kept going on and on insisting that the internet and internet governance were not part of the agreement,
|
||||
even though they are.
|
||||
Of course, he then effectively admits that part of the goal is to be the key player in the internet.
|
||||
Quote, I have been saying in the run up to this conference that this conference is not about governing the internet.
|
||||
I repeat that the conference did not include provisions on the internet in the treaty text.
|
||||
Annex to the treaty is a non-binding resolution which aims at fostering the development and growth of the internet.
|
||||
A task that ITU has contributed significantly to since the beginning of the internet era,
|
||||
and a task that is central to the ITU's mandate to connect the world,
|
||||
a world that today still has two-thirds of its population without internet access.
|
||||
End quote.
|
||||
So it's not about the internet,
|
||||
but the internet is central to the ITU's mandate.
|
||||
Of course, that claim is also a lie.
|
||||
The ITU's mandate does not cover the internet, but telecom infrastructure.
|
||||
One of the more nefarious moves by Torrey and the ITU and this whole process
|
||||
was to continually blur the lines between telecom, infrastructure, and the internet, as if they were the same.
|
||||
To read the rest of this story for yourself, please visit techdirt.com or see the link in the show notes.
|
||||
Our next story, also from Techdirt by Tim Cushing, dated December 13, 2012.
|
||||
Sony's new German e-book store features thousands of DRM-free books.
|
||||
From the, in other news, Sony sells e-readers department.
|
||||
DRM is becoming less and less prevalent these days,
|
||||
as more companies are realizing that the flashback from crippling the purchases of paying customers
|
||||
far outweighs any perceived prevention of infringement.
|
||||
It is not a wholesale conversion,
|
||||
but the new DRM-free converts are appearing more frequently,
|
||||
including some surprising holdouts.
|
||||
The digital reader brings us the news that Sony of all companies is opening its own e-book store in Germany,
|
||||
bringing with it a large selection of DRM-free books.
|
||||
Quote, the press release mentions that not all of the e-pub books sold by Sony
|
||||
come with the owner's Adobe D.E. DRM.
|
||||
Some of the books, numbering in the thousands, use digital watermarks instead.
|
||||
Apparently, several German publishers have decided to go with this low-hassel security,
|
||||
including Bastille, Lubé, Verlag, which publishes novels by Ken Follett, Andreas, Eschbach, and Dan Brown.
|
||||
It is not clear that any of these authors' novels are DRM-free.
|
||||
End quote.
|
||||
Rather than inject malignant coding that often fails to distinguish between paying customers and file sharers,
|
||||
these German publishers are opting for digital watermarking,
|
||||
which generally works as well as nastier forms of DRM,
|
||||
but without the negative side effects.
|
||||
Book's team is handling the watermarking for Sony,
|
||||
having proved its worth to publishers by providing this service to one of the biggest e-book store fronts of all time.
|
||||
Pottermore.
|
||||
So what convinced Sony to go DRM-free on thousands of titles?
|
||||
Perhaps it was observing Book's stream success in detecting piracy without having to resort to draconian measures.
|
||||
Quote, according to Hube Vanderpoll,
|
||||
the founder of Book's team's parent company Eye Contact,
|
||||
the official release of the Harry Potter e-books saw a decrease in piracy of the series.
|
||||
Once the titles were available legally and were easy to use,
|
||||
pirates saw little reason to post copies of the e-books online.
|
||||
End quote.
|
||||
As Hofolder points out,
|
||||
you can't make the same claim about DRM-loaded e-books.
|
||||
In nearly every case, the DRM is discarded easily by enterprising shareholders,
|
||||
or just as often by consumers who strip their purchases of this handicap
|
||||
in order to move them to other devices,
|
||||
or simply to make sure the publisher,
|
||||
bookstore, or DRM itself,
|
||||
doesn't suddenly decide to register their purchases unavailable or useless.
|
||||
Some customers may download the pirated version,
|
||||
even if they've purchased it,
|
||||
just to have an easily portable version, unhampered by DRM.
|
||||
Why punish your paying customers in order to temporarily annoy,
|
||||
slash, entertain, and fringes?
|
||||
The other key to book stream and Pottermore's success
|
||||
is the simplest one to solve.
|
||||
Make the books available for sale at reasonable prices
|
||||
and with as few limitations as possible.
|
||||
Do this, and your piracy problem will very possibly solve itself.
|
||||
Our next story from torrentfreak.com.
|
||||
By Ernesto, dated December 12th, 2012.
|
||||
Six strikes scheme may lead to lawsuits against pirates.
|
||||
Early next year, the controversial Six Strikes anti-piracy system
|
||||
will kick off in the US.
|
||||
While the initiative itself has a focus on education
|
||||
instead of punishing bit torrent pirates,
|
||||
ISPs are obliged to hand over IP addresses of repeat infringers
|
||||
to the MPAA and the RIAA.
|
||||
Commenting on this largely overlooked aspect,
|
||||
CCI director Jill Lesser confirmed
|
||||
to torrentfreak that lawsuits may indeed
|
||||
be initiated based on information collected under the program.
|
||||
Last year, the MPAA and RIAA teamed up
|
||||
with five major internet providers in the United States
|
||||
to launch the Center for Copyright Information, CCI.
|
||||
The parties agreed to operate a system,
|
||||
which will see subscribers warned
|
||||
when their connections are observed,
|
||||
engaging in copyright infringement.
|
||||
After several warnings, the ISPs will take a variety
|
||||
of mitigation measures against account holders.
|
||||
This continues up to six strikes.
|
||||
And after that, quote, nothing will happen
|
||||
and quote, according to the parties involved.
|
||||
While this is true in terms of mitigation measures
|
||||
applied by internet providers,
|
||||
the tracking of these subscribers doesn't stop.
|
||||
Even worse, in the memorandum of understanding
|
||||
signed by the participating parties we read the following, quote,
|
||||
the participating ISP will, however,
|
||||
continue to track and report the number of ISP notices
|
||||
the participating ISP receives for that subscriber's account.
|
||||
So that information is available to a content owner representative
|
||||
if it elects to initiate a copyright infringement action
|
||||
against that subscriber, end quote.
|
||||
While copyright infringement action could mean a lot of things,
|
||||
we previously pointed out that this also means lawsuits.
|
||||
As a part of the system, ISPs have
|
||||
to share the monthly reports with copyright holders,
|
||||
which would allow these groups to uncover identities
|
||||
of those alleged Victorian pirates.
|
||||
This means that IP addresses will be shared
|
||||
without being redacted.
|
||||
The memorandum of understanding puts it as follows, quote,
|
||||
the content owner representatives, explicitly MPAA
|
||||
and RIAA, or any other member of the participating content
|
||||
owners group may use such reports or data
|
||||
as the basis for seeking a subscriber's identity
|
||||
through a subpoena or order or other lawful process.
|
||||
For the avoidance of doubt, the parties
|
||||
agree that the content owner representatives
|
||||
may share such reports with other members
|
||||
of the participating content owners group, end quote.
|
||||
This quote unquote side effect of the Six Strikes Plan
|
||||
has been largely ignored.
|
||||
So to get clarification on the purpose
|
||||
of the above paragraphs,
|
||||
Torrent Freak contacted CCI Executive Director Jill Lesser
|
||||
this week.
|
||||
Lesser confirmed over the phone that the data
|
||||
shared by ISPs would allow copyright holders
|
||||
to request the personal details of alleged infringers
|
||||
through subpoenas, but that this type of legal action
|
||||
is not part of the copyright alerts program.
|
||||
Lesser added, the copyright holders
|
||||
can and are already tracking bit Torrent users right now,
|
||||
suggesting that it's nothing new.
|
||||
While it's true that the MPAA and RIAA
|
||||
can use monitoring companies to track alleged infringers,
|
||||
from a legal perspective, they have a much stronger case
|
||||
when it's done as part of the copyright alert system.
|
||||
For example, getting the data from ISPs
|
||||
allows copyright holders to say with certainty
|
||||
that certain accounts were used for multiple infringements
|
||||
as ISPs will connect dynamic IP addresses
|
||||
to the correct account holders.
|
||||
Also, those who receive warnings
|
||||
under the copyright alert system
|
||||
will have to acknowledge that they understand the risks.
|
||||
This means that the rights holders could show the court
|
||||
that subscribers were warned multiple times,
|
||||
but chose not to take action.
|
||||
Lesser told Torrent Freak that she doesn't believe
|
||||
that the MPAA and RIAA are interested
|
||||
in going after persistent pirates.
|
||||
However, she admitted that she doesn't know why
|
||||
the language was included in the agreement
|
||||
as she wasn't yet around when the agreement was drafted.
|
||||
While we can't say with certainty that the information
|
||||
shared by the ISPs will lead to lawsuits
|
||||
from the RIAA or MPAA,
|
||||
it wouldn't be a surprise if this happens.
|
||||
Why else would they have negotiated this option to begin?
|
||||
We can think of no other reason why these groups
|
||||
would want to know the identities of repeat infringers.
|
||||
From the website perspective.mvderona.com
|
||||
by James Hamilton, dated December 11th, 2012.
|
||||
I'll add here that this story includes a disclaimer
|
||||
by Mr. Hamilton that the opinions expressed here
|
||||
are his own and do not necessarily represent those
|
||||
of his current or past employers.
|
||||
Micro-server market heats up
|
||||
Intel Adam S-1200, codenamed Centerton announcement.
|
||||
Since 2008, I've been excited by working on
|
||||
and writing about micro-servers.
|
||||
In these early days,
|
||||
some of the workloads I worked with were IO-bound
|
||||
and didn't really need or use high single thread performance,
|
||||
replacing the server class processors
|
||||
that supported these applications
|
||||
with high volume low cost client system CPUs,
|
||||
yielded both better price performance
|
||||
and better power performance.
|
||||
Fortunately, at that time,
|
||||
there were good client processors available with ECC enabled
|
||||
and most embedded system processors also supported ECC.
|
||||
I wrote up some of the advantages
|
||||
of these early micro-server deployments
|
||||
and showed performance results
|
||||
from a production deployment
|
||||
in an internet scale mail processing application
|
||||
in the story,
|
||||
cooperative, expandable,
|
||||
micro-slice servers,
|
||||
low cost, low power servers
|
||||
for internet scale services.
|
||||
Intel recognizes the value of low power low cost processors
|
||||
for less CPU demanding applications
|
||||
and announced this morning
|
||||
the newest members of the Adam family,
|
||||
the S-1200 series.
|
||||
These new processors support two cores and four threads
|
||||
and are available in variance of up to two gigahertz
|
||||
while staying under 8.5 watts.
|
||||
The lowest power members of the family
|
||||
come in at just over six watts.
|
||||
Intel has demonstrated the S-1200 reference board
|
||||
running spec web at 7.9 watts,
|
||||
including memory, SATA, networking,
|
||||
BMC and other onboard components.
|
||||
Unlike past Adam processors,
|
||||
the S-1200 series supports full ECC memory
|
||||
and all members of the family
|
||||
support hardware virtualization,
|
||||
64 bit addressing and up to eight gig of memory.
|
||||
These are real server parts.
|
||||
For a more complete list
|
||||
of the Centerton S-1200 microservice features
|
||||
and more of James Hamilton's opinions on it,
|
||||
please visit the story on perspectives.mvderona.com,
|
||||
a link will be in the show notes.
|
||||
Our last story from torrentfreak.com by Ernesto,
|
||||
dated December 12th, 2012.
|
||||
Verizon determines to expose bit torrent copyright trolls.
|
||||
It's now apparent that Verizon is fed up
|
||||
with the avalanche of masked bit torrent lawsuits
|
||||
and is determined to put an end to copyright trolls
|
||||
extortion-like practices.
|
||||
The internet provider is asking a Texas court
|
||||
to grant discovery so it can expose
|
||||
how these companies operate.
|
||||
According to Verizon, copyright trolling practices
|
||||
don't belong in court,
|
||||
and the ISP equates the companies involved with,
|
||||
quote,
|
||||
school yard bullies who push and shove
|
||||
until firm opposition is met when they shrink away.
|
||||
End quote.
|
||||
Two weeks ago, a group of adult movie companies sued Verizon
|
||||
for failing to hand over the personal details
|
||||
of alleged bit torrent pirates.
|
||||
The internet provider had ignored court orders
|
||||
and Malibu media, Patrick Collins and third degree films
|
||||
asked the court to hold Verizon in contempt
|
||||
and compel the company to respond to the subpoenas.
|
||||
This week, Verizon responded to the claims
|
||||
with a frontal attack.
|
||||
Verizon is asking a Texas federal court
|
||||
to grant discovery so the ISP can expose
|
||||
how the quote unquote copyright trolls
|
||||
in question operate.
|
||||
Verizon's motion is short,
|
||||
but leaves very little to the imagination.
|
||||
In its filing, Verizon states that the copyright holders,
|
||||
quote, pursue a scheme which, if not illegal,
|
||||
is at a minimum of a type to which the courts
|
||||
should not lend their powers and support.
|
||||
End quote.
|
||||
The provider has therefore decided to turn the tables.
|
||||
Instead of exposing the identities of their customers,
|
||||
they want to be granted discovery themselves
|
||||
so that they can request sensitive information
|
||||
on the companies involved.
|
||||
An unusual request at this stage of a case,
|
||||
but needed because many of Verizon's customers
|
||||
are unable to defend themselves.
|
||||
Quote, the circumstances are also unusual
|
||||
because the persons subject to potential abuse
|
||||
by the plaintiffs' approach are unlikely to be able
|
||||
for financial reasons, personal reasons,
|
||||
or plaintiffs' tactical approach to those
|
||||
who do actively oppose them to effectively oppose
|
||||
the plaintiffs' oppressive and unfair methods,
|
||||
end quote, Verizon writes.
|
||||
By exposing the tactics of these copyright holders,
|
||||
Verizon hopes the court can make an informed decision
|
||||
as to whether the alleged bit torrent users
|
||||
should have their identities revealed.
|
||||
This expose includes uncovering the tangled web
|
||||
of individuals behind these lawsuits
|
||||
and the tactics copyright holders use
|
||||
to get defendants to hand over their money.
|
||||
Quote, Verizon intends, among other things,
|
||||
to seek discovery from the senior level managers
|
||||
of the plaintiffs and from the persons
|
||||
affiliated with the plaintiffs whose declarations
|
||||
have been used to support the plaintiffs' requests
|
||||
for discovery, end quote, Verizon writes.
|
||||
Quote, Verizon further intends to seek discovery
|
||||
into the business model of plaintiffs
|
||||
and whether the plaintiffs are good faith publishers
|
||||
of the material they purportedly seek to protect
|
||||
as opposed to whether the plaintiffs' business model
|
||||
is primarily profit from their aggressive
|
||||
and abusive copyright enforcement efforts,
|
||||
end quote, they added.
|
||||
The ISP concludes its request
|
||||
by equating the tactics of the copyright holders
|
||||
to school yard bullies who run away scared
|
||||
if their targets fight back,
|
||||
a seemingly fitting description
|
||||
as none of their cases have ever made it
|
||||
through a full trial.
|
||||
Quote, plaintiffs tactics appeared to be much like those
|
||||
of school yard bullies who push and shove
|
||||
until firm opposition is met when they shrink away.
|
||||
Plaintiffs and those like them have apparently avoided
|
||||
having to deal with these issues
|
||||
by not pursuing those who would raise these issues
|
||||
and quote, Verizon concludes.
|
||||
From the filings, it becomes clear
|
||||
that Verizon is determined to end the trolling tactics
|
||||
of the adult studios
|
||||
and they're not scared to invest money into the fight.
|
||||
Torrent Freak talked to attorney Graham Stifert,
|
||||
who has a lot of experience
|
||||
with these mass bit torrent lawsuits
|
||||
and he believes that this case could have a wide impact.
|
||||
Quote, if discovery is granted,
|
||||
these companies will be subject to the same scrutiny
|
||||
as a plaintiff in a trial
|
||||
and those depositions and answers could be used
|
||||
in cases nationwide and quote, Stifert told us.
|
||||
This means that if Verizon gets their way
|
||||
and they uncover an updirt,
|
||||
some of the most active copyright trolls
|
||||
may be put out of business.
|
||||
In any case, we can expect fireworks.
|
||||
Other interesting headlines in the news this week
|
||||
to read these stories, please follow the links
|
||||
in the show notes.
|
||||
Swedish Pirate Party defends role as Pirate Bay ISP.
|
||||
Pirate Bay founder released from solitary confinement.
|
||||
Production and editorial selection by DeepGeek,
|
||||
views of the story authors reflect their own opinions
|
||||
and not necessarily those of TGTM news or its readers.
|
||||
News from tecturt.com of anti-times.org,
|
||||
perspectives.mvderona.com,
|
||||
in these times.com and allgov.com
|
||||
are used under arranged permission.
|
||||
News from torrentfreak.com and dff.org
|
||||
are used under permission of the creative comments
|
||||
by attribution license.
|
||||
News from democracynow.org is used under permission
|
||||
of the creative comments by attribution,
|
||||
non-commercial, no derivatives license.
|
||||
News sources retain their respective copyrights.
|
||||
Thank you for listening to this episode of Talk Geek to Me.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to dgatdeepgeek.us.
|
||||
The web page for this program is at www.talkgeektme.us.
|
||||
You can subscribe to me on Identica as the username DeepGeek
|
||||
or you could follow me on Twitter.
|
||||
My username there is dggtm as in DeepGeek Talk Geek to me.
|
||||
This episode of Talk Geek to Me is licensed
|
||||
under the creative comments attribution share
|
||||
like 3.0 on port license.
|
||||
This license allows commercial reuse of the work
|
||||
as well as allowing you to modify the work
|
||||
so long as you share a like the same rights
|
||||
you have received under this license.
|
||||
Thank you for listening to this episode of Talk Geek to Me.
|
||||
You have been listening to Hacker Public Radio
|
||||
at Hacker Public Radio.org.
|
||||
We are a community podcast network
|
||||
that releases shows every weekday on day through Friday.
|
||||
Today's show, like all our shows,
|
||||
was contributed by an HPR listener by yourself.
|
||||
If you ever consider recording a podcast,
|
||||
then visit our website to find out how easy it really is.
|
||||
Hacker Public Radio was founded by the digital dog pound
|
||||
and near-phonomical and computer cloud.
|
||||
HPR is funded by the binary revolution at binref.com.
|
||||
All binref projects are crowd-responsive by linear pages.
|
||||
From shared hosting to custom private clouds,
|
||||
go to lunarpages.com for all your hosting needs.
|
||||
Unless otherwise stasis,
|
||||
today's show is released under a creative commons,
|
||||
attribution, share a like, videos or license.
|
||||
Reference in New Issue
Block a user