Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
327
hpr_transcripts/hpr1245.txt
Normal file
327
hpr_transcripts/hpr1245.txt
Normal file
@@ -0,0 +1,327 @@
|
||||
Episode: 1245
|
||||
Title: HPR1245: TGTM Newscast for 2013-06-05 for by Dann Washko and DeepGeek
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1245/hpr1245.mp3
|
||||
Transcribed: 2025-10-17 22:17:37
|
||||
|
||||
---
|
||||
|
||||
You're listening to Toolkit Me News Number 96, recorded for Monday, May the 6th, 2013.
|
||||
You're listening to the Tech Only Hacker Public Radio Edition.
|
||||
To get the full podcast including political, commentary, and other controversial topics,
|
||||
please visit www.toolkitme.us.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to dg at deepgeek.us.
|
||||
The webpage for this program is at www.toolkitme.us.
|
||||
You can subscribe to me on Identica as the username DeepGeek.
|
||||
Or you could follow me on Twitter.
|
||||
My username there is dgtgtm.
|
||||
As a deepgeek, talk geek to me.
|
||||
This is Dan Waschko and now the tech roundup.
|
||||
From torrentfree.com by Andy, Pirate Bay founder on trial next month facing societal damage
|
||||
claims.
|
||||
Earlier this month, prosecutor Henry Olin of the International Public Prosecution Office
|
||||
in Stockholm announced that Godfrey's Forthome had been charged with several hacking-related
|
||||
offenses, including serious fraud, attempted aggravated fraud, and aiding attempted aggravated
|
||||
fraud.
|
||||
The public heard of these charges via press statement on April 16th, but Godfrey discovered
|
||||
the news only after watching TV in his mayor-frid present cell later that day.
|
||||
According to computer Sweden, Godfrey then as alleged accomplices will now go on trial
|
||||
starting May 20th.
|
||||
At this stage, it appears that Godfrey will plead not guilty to what is emerging as a
|
||||
sophisticated hack between January 2010 and April 2012 of Logica, a Swedish IT company
|
||||
working with local tax authorities.
|
||||
Much of the prosecution's evidence was obtained from a computer seized from Godfrey.
|
||||
The Pirate Bay co-founder says that the information was placed there via the internet, but he won't
|
||||
name the culprit out of fear of reprisals.
|
||||
According to the indictment, Godfrey had an accomplices first gained access to an FTP
|
||||
server on which scripts were run to obtain such things as password lists.
|
||||
These were subsequently cracked, and the information was used to gain access to more systems.
|
||||
This claimed that the attackers took steps to hide their identities by using compromised
|
||||
wireless networks and relay servers around the world.
|
||||
According to authorities, around 16 gigabytes of confidential data was copied by the hackers
|
||||
and the transfer of such a large amount of data was one of the factors that led to their
|
||||
discovery.
|
||||
But it's the nature of the data and the weights being presented to the media by Swedish
|
||||
authorities that is causing concern for Godfrey's mother, Christina Swarthome.
|
||||
The prosecutor has claimed in the media that the hacking of Logica and the thus the
|
||||
access to information emanating from the Swedish tax authorities has caused worries among
|
||||
people who live with protected identities.
|
||||
Some of them have even felt compelled to move from one place to another, according to
|
||||
the prosecutor, Christina Tordorofrike.
|
||||
I have recently been approached by people who have told me that they simply can't be
|
||||
true.
|
||||
Personally, I don't know much about how the system works, but since one of these persons
|
||||
has protected identity or herself, I find it less plausible that I am totally misinformed
|
||||
and quote.
|
||||
Christina says that her sources report that there's no possibility that obtaining information
|
||||
from the attacks authorities would be harmful to protected individuals in the way the prosecutor
|
||||
has claimed, since their identities are protected both within and outside the system.
|
||||
Quote, what was hacked and published on the internet were so-called personal numbers,
|
||||
not to be mixed up with social security numbers, numbers that are public in themselves.
|
||||
Some of them did belong to people that were protected and other numbers did not.
|
||||
Anyhow, the numbers couldn't be used for finding out the identities and whereabouts
|
||||
of anyone.
|
||||
End quote.
|
||||
Christina believes that if this scenario is true, the bleak picture now being painted
|
||||
by authorities is the cause of anxiety among people.
|
||||
She adds that one of the companies involved reported to the police that the publicity being
|
||||
given to the data breach could be more harmful than the hacking itself.
|
||||
Quote, my question is why the prosecutor wants to give this picture of severe damage
|
||||
caused to individuals?
|
||||
A picture quite different from what my sources have told me.
|
||||
Unfortunately, it is well in line with what was communicated to Cambodian authorities
|
||||
last year when the Swedish prosecutor asked for their help to pick up Godfried and quote,
|
||||
Christina notes.
|
||||
These documents haven't become public until now.
|
||||
They show that the Swedish authorities presented daunting facts to Cambodia about Godfried,
|
||||
no wonder that they placed him on their anti-terrorist locals and the phenomenon.
|
||||
However, I can't see much of that information reflected in the prosecution presented two
|
||||
weeks ago.
|
||||
Finally, as further reading, researchers at Lund University Sweden had been commenting
|
||||
on the hacks in subsequent prosecution.
|
||||
Marcin Day Kemenenski asks what lessons can be learned and hack and hide in asks whether
|
||||
the $4,200 Godfried is alleged to have transferred from a Danish bank account amounts to aggravated
|
||||
fraud and abusing the public trust.
|
||||
From tornfreak.com by handy dated April 29th, MPAA executive tampered with IFPI evidence
|
||||
in internet piracy case.
|
||||
More than five years ago, an investigation was launched into Angel Falls, a system of
|
||||
servers used by the so-called Weir scene for storing and distributing copyright content.
|
||||
Following an undercover investigation in 2007, rights holders filed an official complaint
|
||||
and two months later, the site was rated by authorities in Aulu, Finland.
|
||||
A total of 15 servers were discovered containing a range of copyrighted materials, including
|
||||
music, movies, TV shows, video games, and software.
|
||||
Represented by anti-piracy group CIA PC, known locally as TTVK, rights holders said that
|
||||
the individuals running the Angel Falls top site had caused damages to their businesses
|
||||
totaling 6 million euros.
|
||||
The developing copyright case was to be the largest in Finland's history.
|
||||
Earlier this month, the trial concluded, four member found guilty and two were cleared
|
||||
per our earlier report.
|
||||
However, according to Herkeko Heitonen, a defense lawyer in the case from the TURLegal
|
||||
firm, the case has somewhat interesting feature.
|
||||
During the trial, an IFPI investigator was called upon as a witness, but during his testimony
|
||||
something unusual came to light.
|
||||
Quote, after his presentation, the defense counsels pointed out how the information shown
|
||||
on the video of his investigations did not match with the printed log files.
|
||||
Heitonen informs Tornfreak.
|
||||
The video, a screencast of the investigation, showed a particular username accessing an
|
||||
Angel Falls FTP server.
|
||||
However, the corresponding text log for the same event showed a completely different username.
|
||||
Quote, when the IFPI investigator was asked about this, he acknowledged that the names
|
||||
did not match.
|
||||
He said that the Finnish anti-piracy people in the IFPI had collected the information
|
||||
together, but there was also an MPAA executive in the room while the evidence gathering took
|
||||
place and, quote, Heitonen explains.
|
||||
The IFPI investigator was then asked to reveal the name of the MPAA executive.
|
||||
He declined, but did offer to an explanation for the inconsistencies in the evidence.
|
||||
In a parent attempt to hide the identity of one of their spies, the MPAA executive edited
|
||||
the evidence gathered during the session.
|
||||
Quote, the IFPI investigator handed over the evidence material to the MPAA senior executive
|
||||
who then changed the text file before the anti-piracy organization hand over the evidence
|
||||
to the Finnish police, and, quote, Heitonen says.
|
||||
No one from the MPAA informed the defense that the edits had been made, and the tampering
|
||||
was revealed at the worst possible time during the trial.
|
||||
This resulted in the prosecutor ordering a police investigation into the changes that
|
||||
had been made.
|
||||
Quote, police then proceeded by comparing the work copy that the IFPI investigator produced
|
||||
with the material that the police and the defendant councils had received.
|
||||
Police found out that the material had differences in over 10 files, and, quote, Heitonen reveals.
|
||||
Considering the effort that had gone into the case, the outcome was somewhat of a disappointment.
|
||||
Two members were completely cleared and four who were found guilty escaped with suspended
|
||||
jail sentences.
|
||||
The six million euros in damages claimed by the rights holders were reduced to only 45,000
|
||||
euros.
|
||||
The fate of the MPAA investigator is unclear, but since his username was revealed in court,
|
||||
it seems likely that if he used the same one on other sides, that will no longer be possible.
|
||||
From eff.org dated May 1st by Daniel Naser, eff to federal judge.
|
||||
Don't let the DMCA be a tool for censorship.
|
||||
Together with the digital media law project, we filed an amicus brief today in federal
|
||||
court and Massachusetts.
|
||||
We are urging the court to ensure that the Digital Millennium Copyright Act provides
|
||||
protection for victims of abusive takedown notices, specifically that the DMCA requires
|
||||
copyright owners to consider fair use before sending takedowns.
|
||||
The takedown procedure of the DMCA provides a quick, cheap, extra-judicial way to get
|
||||
speech removed from the internet.
|
||||
As we've written many, many times before, this makes it a tempting tool for those who
|
||||
wish to remove speech they happen to dislike.
|
||||
To prevent such abuse, Section 512F of the DMCA provides victims of wrongful takedowns
|
||||
with a remedy, allowing them to file a lawsuit for misrepresentation under the DMCA.
|
||||
This latest Section 512F, case out of Massachusetts, has a curious history.
|
||||
It began as an online battle between two bloggers.
|
||||
Doologyna Crosley-Corcoran, an OB-GYN, Dr. Amy Tutier, about the safety of home birth.
|
||||
After an exchange of critical posts, Crosley-Corcoran posted a photo of herself making a well-known
|
||||
finger-related gesture to Tutier, and writing, I don't want to leave you without something
|
||||
you can take back to your blog and obsess over.
|
||||
So here's a picture of me.
|
||||
Tutier responded with a post of her own that included the photo with some commentary.
|
||||
The photo is now removed from this post, a clear case of fear of use.
|
||||
Crosley-Corcoran then sent a DMCA takedown notice of the hosts of Tutier's blog alleging
|
||||
copyright infringement of the finger photo.
|
||||
After Tutier changed hosts, Crosley-Corcoran sent another takedown notice to the new
|
||||
host.
|
||||
Following the Tutier, the second notice was sent after Crosley-Corcoran's attorney
|
||||
admitted that there was no valid copyright claim.
|
||||
And on her blog, Crosley-Corcoran wrote that she would be prepared to settle the matter
|
||||
if Tutier would agree to stop personally attacking me.
|
||||
As others have concluded, the chain of events suggested that Crosley-Corcoran was using
|
||||
a DMCA to silence a critic.
|
||||
Tutier responded by filing a federal lawsuit Massachusetts, disturbing a DMCA section
|
||||
512F claim.
|
||||
On its own initiative, the court issued an order to show cause suggesting that it seriously
|
||||
questions whether Tutier had stated a viable section 512F claim.
|
||||
The core of the Crosley-Corcoran is that a fair use is an affirmative defense.
|
||||
The judge questioned whether the DMCA requires the senator of a takedown notice to consider
|
||||
fair use.
|
||||
This is an important question.
|
||||
If the DMCA did not require copyright owners to consider fair use, it would be an open
|
||||
invitation for private censorship.
|
||||
For example, an author could send a takedown notice to remove a critical book review based
|
||||
on just a few quoted words.
|
||||
Fortunately, other courts that have considered this issue have found that the DMCA does require
|
||||
consideration of fair use.
|
||||
For example, in Lens vs. Universal, when EFS represents the plaintiff, the court ruled
|
||||
that content owners must consider fair use before sending takedowns.
|
||||
The case of Tutier vs. Crosley-Corcoran is not about the relative merits of the bloggers
|
||||
views on childbirth.
|
||||
Rather, it is about the alleged misuse of the DMCA to silence a critic.
|
||||
The case of a two-year versus Crosley-Corcoran is not about the relative merits of these bloggers
|
||||
views about childbirth.
|
||||
Rather, it is about the alleged misuse of the DMCA to silence a critic and the crucial
|
||||
legal issues of whether the DMCA requires senders of takedown notices to consider fair
|
||||
use.
|
||||
Today, we urge the court to reach the right result and ensure that the DMCA protects
|
||||
free expression.
|
||||
From EFF.org dated April 29th by Katica Rodriguez and Mera Sutton, what is TPP?
|
||||
Biggest global threat to the Internet since Acta.
|
||||
The United States and 10 governments from around the Pacific are meeting yet again to
|
||||
hash out the secret Trans-Pacific Partnership Agreement on May 15th to 24th in Lima, Peru.
|
||||
The TPP is one of the worst global threats to the Internet since Acta, since the negotiations
|
||||
have been secretive from the beginning.
|
||||
We mainly know what is in its current version of this trade agreement because of a leaked
|
||||
draft PDF from the February 2011.
|
||||
Based upon that text, some other leaked notes and the undemocratic nature of the entire process,
|
||||
we have every reason to be alarmed about the copyright enforcement provisions contained
|
||||
in this multinational trade deal.
|
||||
The TPP is likely to explore some of the worst features of U.S. copyright law to Pacific
|
||||
rim countries.
|
||||
A broad ban on breaking digital locks on devices and creative works, even for legal purposes,
|
||||
a minimum copyright term of the lifetime of the creator plus 70 years, the current international
|
||||
norm is the lifetime plus 50 years.
|
||||
Privatization of enforcement for copyright infringement, ruinous statutory damages with
|
||||
no proof of actual harm and government seizures of computers and equipment involved in the
|
||||
alleged infringement.
|
||||
Moreover, the TPP is worse than U.S. copyright rules.
|
||||
It does not export the many balances and exceptions that favor the public interest and act as
|
||||
safety valves in limiting rights holders' protection.
|
||||
Adding insult to injury, the TPP's temporary copies provision will likely create chilling
|
||||
effects on how people with and companies behave online and their basic ability to use
|
||||
and create on the web.
|
||||
The stated goal of the TPP is to unite the Pacific rim countries by harmonizing tariffs
|
||||
and trade rules between them, but in reality it is much more than that.
|
||||
The intellectual property chapter in this massive trade agreement will likely force changes
|
||||
to copyright and patent rules in each of the signatory countries.
|
||||
Accepting these new rules will not just rewrite in and rewrite national laws, but will also
|
||||
restrict the possibility for countries to introduce more balanced copyright laws in the future.
|
||||
The strategy may end up harming other countries' more proportionate laws, such as Chile,
|
||||
where judicial orders require for ISPs to be held liable for copyright infringement and
|
||||
takedown content.
|
||||
Such systems better protect users and intermediaries from disappro- just proportionate or censorship
|
||||
like driven takedowns.
|
||||
If the final TPP takes forces countries to adopt the privatized notice and takedown
|
||||
regime, this could imply the end of the Chilean system.
|
||||
It would also undermine Canada's notice and notice regime.
|
||||
The content industry can and will continue to buy and lie to get their way to get laws
|
||||
to protect their interests, and what they want more than anything is for us to remain
|
||||
passively ignorant.
|
||||
They did it with SOPA ACTA announced TPP.
|
||||
It's going to be a challenge to defeat these policies, but we can do it.
|
||||
The TPP is slated for the conclusion this October, but our goal is to get the worst of these
|
||||
copyright provisions out of it.
|
||||
The way to flight back is to show that we will not put up with this, to demand an open
|
||||
transparent process that allows everyone including experts from civil societies to analyze
|
||||
questions and probe any initiatives to regulate the internet.
|
||||
The secrecy must be stopped once and for all.
|
||||
Take this action and join over 26,000 people to send a message to your elected representatives.
|
||||
Let's call on Congress to demand for the immediate release of the text and the TPP, and
|
||||
make this process become democratic and transparent once and for all.
|
||||
And there's a take action button that you can link to that's linked to in the show
|
||||
notes on the website.
|
||||
Below is our infographic highlighting the most problematic aspects of TPP.
|
||||
Please spread the word about how this agreement will impact you in your country.
|
||||
Right click and save the image for the PNG file, or you can download the PDF version below.
|
||||
This is referring to their website.
|
||||
Remix it, build upon it, and get the word out.
|
||||
Let's protect and defend the internet from the secret trade deal.
|
||||
So to get that information and the graphics and design the proposal, head on over to the
|
||||
eff.org website that's linked to in the show notes.
|
||||
From hyawathawebserver.org, dated April 15th by Hugo Blesinick, hyawatha 9.1 has been
|
||||
released.
|
||||
This brings two interesting new security features.
|
||||
Wifersweet selection based on protocol.
|
||||
A while ago, vulnerability called beast was discovered in CBC ciphers in TLS 1.0.
|
||||
Many experts advised to use RC4 instead.
|
||||
However, a vulnerability was recently also discovered in RC4.
|
||||
The best solution is to switch to TLS 1.1 with CBC ciphers.
|
||||
But that will cause problems for many users because Firefox still doesn't support TLS
|
||||
1.1 and an operand internet explorer support for TLS 1.1 is disabled by default.
|
||||
What to do then?
|
||||
Many believe that using RC4 is still the best choice when using TLS 1.0.
|
||||
However, using RC4 gives lower security to TLS 1.1 and TLS 1.2 users, then while using
|
||||
CBC ciphers.
|
||||
But using CBC ciphers makes TLS 1.0 users vulnerable for the beast attack.
|
||||
Iawatha has the best answer thanks to Polar SSL.
|
||||
Iawatha will use RC4 and SSL 3.0 and TLS 1.0 CBC ciphers for TLS 1.1 and GCM or CBC ciphers
|
||||
for TLS 1.2.
|
||||
As far as I know, no other SSL library and therefore no other web server can offer this
|
||||
solution.
|
||||
Protection against uploaded malware.
|
||||
Via the new file hash's option, you can specify a list of files and the hash of their
|
||||
contents.
|
||||
Before serving a file, Iawatha checks that hash of that file with the one in the list.
|
||||
If the hash doesn't match or the file is not listed, access is denied.
|
||||
This prevents against unauthorized file changing or uploading.
|
||||
Newsflash, this just end.
|
||||
The Debian project proudly announces the release of Debian 7.0 codenamed Weezy.
|
||||
This new version of Debian includes various interesting features such as multi-arch support,
|
||||
several specific tools to deploy private clouds and improved installer and a complete
|
||||
set of multimedia codecs and front ends which remove the need for third party repositories.
|
||||
The installation process has been greatly improved.
|
||||
Debian can now be installed using software speech, above all by visually impaired people
|
||||
who do not use a brailed device.
|
||||
And also, the release features more than 36,000 ready-to-use software packages built
|
||||
from nearly 17,500 source packages.
|
||||
Staff them produced by the TGTM News Team, editorial selection by DeepGeek, views of the
|
||||
story authors reflect their own opinions and not necessarily those of TGTM News.
|
||||
News from Megan McNeil.wordpress.com, in these times.com, and higherwaterwebserver.org,
|
||||
used under a range permission.
|
||||
News from Tornfreak.com, and EFF.org, used under permission of the Creative Commons
|
||||
by Attribution License.
|
||||
News from DemocracyNow.org, and People's World.org, used under permission of the Creative
|
||||
Commons by Attribution, non-commercial, no derivative license, news sources retain
|
||||
their respective copyrights.
|
||||
Thank you for listening to this episode of Talk Geek To Me.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to DG at deepgeek.us.
|
||||
The webpage for this program is at www.talkgeektoMe.us.
|
||||
You can subscribe to me on Identica as the username DeepGeek, or you could follow me on Twitter.
|
||||
My username there is DGTGM, as in DeepGeek Talk Geek To Me.
|
||||
This episode of Talk Geek To Me is licensed under the Creative Commons Attribution Share
|
||||
Like 3.0 on Port License.
|
||||
This license allows commercial reuse of the work, as well as allowing you to modify the
|
||||
work, so long as you share a like the same rights you have received under this license.
|
||||
Thank you for listening to this episode of Talk Geek To Me.
|
||||
You have been listening to Hacker Public Radio at Hacker Public Radio.
|
||||
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||||
Today's show, like all our shows, was contributed by a HBR listener by yourself.
|
||||
If you ever consider recording a podcast, then visit our website to find out how easy
|
||||
it really is.
|
||||
Hacker Public Radio was founded by the Digital Dog Pound and the Infonomicom Computer
|
||||
Club.
|
||||
HBR is funded by the Binary Revolution at binref.com, all binref projects are crowd- Exponsored
|
||||
by Lina Pages.
|
||||
From shared hosting to custom private clouds, go to LinaPages.com for all your hosting
|
||||
needs.
|
||||
Unless otherwise stasis, today's show is released under a Creative Commons Attribution Share
|
||||
and Like.
|
||||
The Digital Dog License.
|
||||
Reference in New Issue
Block a user