Episode: 920 Title: HPR0920: TGTM Newscast for 2012/02/08 Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0920/hpr0920.mp3 Transcribed: 2025-10-08 04:58:58 --- music You're listening to Talk Geek 3 News, number 59, required for February 8, 2012. You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast, including political, commentary, and other controversial topics. Please visit www.talkgeektme.us. Here are the vials statistics for this program. Your feedback matters to me, please send your comments to dgatdeepgeek.us. The webpage for this program is at www.talkgeektme.us. You can subscribe to me on Identica, as the username DeepGeek, or you could follow me on Twitter. My username there is dgtgtm, as an DeepGeek Talk Geek to me. Now the tech round up. Data January 20, 2012, from eff.org, ACLU and EFF, to appeal secrecy ruling in Twitter WikiLeaks case, Richmond, Virginia. Find to make public government efforts to obtain internet users' private information without a warrant, today the American Civil Liberties Union, the ACLU, and the Electronic Frontier Foundation, the EFF, planned to file an appeal in the legal battle over the records of several Twitter users in connection with the government's WikiLeaks investigation. The ACLU and EFF represent Icelandic parliament member, Bergetta Hans Dattier, the appeal filed jointly with other Twitter users, Jacob Applebaum, and Rob Gungrip. In challenges US District Court, Liam O'Grady's November decision refusing to unseal or publicly list all orders that may have been sent to companies other than Twitter and any related motions and court orders. Quote, these people want to try to protect their privacy and their First Amendment rights, and the government should not be able to prevent that by hiding court records, our courts or public. Secret court orders and secret court docket should not be permitted, except in extraordinary circumstances, said Aiden Fine, staff attorney with the ACLU speech Privacy and Technology Project. This case is just one example of the unfortunate recent trend to make our court processes less open and transparent. In light of the District Court's denial of stay, Hans Dattier and the other Twitter users involved in the case did not appeal the judge's decision, requiring Twitter to turn over their records. Attorneys for Hans Dattier and Fine of the ACLU Rebecca Glenberg of the ACLU of Virginia and Cindy Cohen, Lee Tien, and Masha Hoffman of EFF. The motions were joined by attorneys from the law firm Kekir and Van Neste LLP and the law office of John Decline on behalf of Jacob Applebaum and Ron Gangship, respectively as well as local counsel in Virginia. Editorial comment, after the ruling the Icelandic Member of Parliament, Ms. Berketa Hans Dattier broke silence on the matter of this case, so I included in the other headlines section links to her blog entry about it, as well as a link to a Radio Netherlands International English podcast that includes an interview with her. From EFF.org, dear January 28, 2012, by Jillian C. Ork, the right to an anonymity is a matter of privacy. Throughout history there have been a number of reasons why individuals have taken to writing or producing art under a pseudonym. In the 18th century, James Madison, Alexander Hamilton, and John Jay took on the pseudonym Publius to publish the Federalist Papers. In 19th century England, pseudonyms allowed women, like the bronze sisters, who initially published under Kura Ellis and Acton Bell, to be taken seriously as writers. Today, pseudonyms continue to serve a range of individuals and for a variety of reasons. At EFF, review anonymity as both a matter of free speech and privacy, but in light of the International Privacy Day, January 28, this peaceful focus mainly on the later, including at the ways in which the right to anonymity or pseudonymity is truly a matter of privacy. Human beings are complex creatures with multiple interests, as such many professionals use pseudonyms online to keep their employment separate from their personal life. One example of this is the guardian columnist, girl scientist, spelled GRL, who, upon discovering her Google Plus account, had been deleted for violating their common name policy, penned a piece explaining her need for privacy. Another example is prominent Moroccan blogger, Hisham Kribchi, who has explained his use of a pseudonym, stating, quote, When I first started blogging, I want my identity to remain secret because I didn't want my online activity to interfere with my professional life. I want to keep both as separate as possible. I also want to use a fake name because I wrote about politics and I was critical of my own government. A pseudonym would shield me and my family from personal attacks. I want to have a comfortable space to express myself freely without having to worry about the police when I visit my family back in Morocco. Although Kribchi's reasoning is too fold, his primary concern even stronger than his need for protection from his government was keeping his online life separate from his employment. Even Wail Gonam, the now famous Egyptian, who helped launch a revolution conducted his activism under a pseudonym, not to protect himself from the Egyptian government, but rather because he was an employee of Google and wanted to maintain an air of neutrality. In 2008, an Alaskan blog, known as Alaska Muckraker or AKM, rose to fame for her vocal criticism of fellow Alaskan and then McCain running mate Sarah Palin. Later, after invading against a rude email sent to constituents by Alaska State Representative Michael Dugan, AKM was outed by Dugan, who wrote that his, quote, own theory about public process is you can say what you want as long as you are willing to stand behind it using your real name, unquote. AKM, a blogger decidedly committing an act of journalism could have had any number of reasons to remain anonymous as she later wrote, quote, I might be a state employee, I might not want my children to get grief at school, I might be fleeing from an ex partner who was abusive and would rather he not know where I am, my family might not want to talk to me anymore, I might alienate my best friend, maybe I don't feel like having a brick phone through my window, maybe my spouse might work for the Palin administration, maybe I'd rather people not know where I live or where I work, or none of those things may be true, none of my readers nor Mike Dugan had any idea what my personal circumstances might be. Though Dugan claimed that AKM gave up her right to anonymity, when her blog began influencing public policy he's wrong, in the United States the right to anonymity is protected by the first amendment and must remain so to ensure both the free expression and privacy rights of citizens, similarly in 2009 Ed Wielins, a former official with the Department of Justice out anonymous blogger John Blevins, a professor at the South Texas College of Law, in the National Review calling him irresponsible and a coward, Blevins took the fall gracefully later explaining why he had chosen to blog under a pseudonym. Unlike Kryptchi, Blevins reasons were numerous, he feared losing tenure and legal clients, but he also feared putting the jobs of family members in the political space at risk. A friend of mine, let's call him Joe, is the sibling of a famous celebrity, but while he's very proud of his sibling Joe learned early on that not everyone has his best interests at heart. Therefore Joe devised a pseudonym to use online in order to protect the privacy of himself and his family. In Joe's case the threat is very real, celebrities are regularly stalked, their houses broken into, his pseudonym keeps him feeling normal in his online interactions while simultaneously protecting his sibling and the rest of his family from invasions of privacy. Anonymity and pseudonymity may seem increasingly difficult to achieve online, not only to companies like Facebook restrict your right to use a pseudonym, but even when you do think you're anonymous you might not be, as blogger Rosemary Port found in 2009 after Google turned her over her name in response to a court order. While we should continue to fight for our privacy under the law. The best thing we can do as users who value their right to anonymity is to use tools like TOR. Anonymous bloggers can use global voices, advocacy, online guide to blogging anonymously with WordPress and TOR. And all internet users should educate themselves about what is and isn't private on their online accounts and profiles. From TORNFREAK.com by EnigmaX, they generate 20th 2012. What made it a rogue site worthy of destruction? File hosting services all around the world will have looked on in horror yesterday as Mega Upload, one of the world's largest cyberlocker services was taken apart by the FBI. Foreign citizens were arrested in foreign lands and at least $50 million in assets seized. So what exactly prompted this action? TORNFREAK read every word of the 72 page indictment so you don't have to. And we were surprised by its contents. Yesterday a massive operation took down Mega Upload, one of the world's leading file storage services and one of the world's biggest sites period. While the timing came as a huge post-soap of protest surprise, the fact that the site was targeted was not. For many months there have been rumblings behind the scenes that something might be done about Mega Upload, nevertheless the manner in which the action was taken and the language used by the authorities in doing so was utterly unprecedented. So the key question this morning is this, what made Mega Upload a rogue site which deserved to be completely dismantled and its key staff arrested. The answers lie in the 72 page indictment and showed just how the authorities with the massive assistance of the MPAA no doubt framed Mega's activities in such a way as to strip it of any protection under the DMCA. In the U.S., online service providers are eligible for safe harbor under the DMCA from copyright infringement suits by meeting certain criteria, however the indictment states that a member of the mega-conspiracy capital M capital C no less do not meet these criteria because quote, they willfully infringing copyrights themselves on these systems have actual knowledge that the materials on their systems aren't infringing or alternatively know facts or circumstances that would make infringing material apparent, receive a financial benefit directly attributable to copyright infringing activity where the provider can control that activity and have not removed or disabled access to known copyright infringing material from service they control. End quote. Let's cover the last point first, the apparent a non-removable of known copyright material from Mega Upload servers first, a little background on how Mega Upload's user uploading system worked because this is absolutely crucial to the case against the site. Mega had developed a system whereby files set to be uploaded by users were hashed and order to discover if a copy of the file already exists on the Mega Service. If a file existed, the user did not have to upload his copy and was simply given a unique URL in order to access the content in future. Like this meant in practice is that there could be countless URLs owned by various users but which all pointed to the same file. Mega Upload's abuse tool to which major copyright holders were given access enabled the removal of links to infringing works hosted on Mega Upload's servers. However, the indictment claims that it quote did not actually function as DMCA compliance tool as the copyright owners were led to believe unquote and here's why. The indictment claims that when a copyright holder issued a takedown notice for content referenced by its URL, only the URL was taken down, not the content to which it pointed. So although the URL in question would report that it had been removed and would no longer resolve to infringing material, URLs issued to others would remain operational. Furthermore, the indictment states that a low Mega Upload staff referred to as members of the conspiracy, discussed how they could automatically remove child pornography from their systems, given a specific hash value. The same standards weren't applied to complaint about copyright works. In June 2010, it appears that Mega Upload was subjected to something of a test by the authorities. The company was informed pursuant to a criminal search warrant from the US District Court for the Eastern District of Virginia that 39 infringing movies were being stored on their service in Copatia, hosting in the Eastern District of Virginia. Quote, a member of the Mega Conspiracy informed several of his co-conspirators at that time that he located the named files using internal searches of their system. As of November 18, 2011, more than a year later, 36 of the 39 infringing motion pictures were still being stored on the service controlled by the Mega Conspiracy. Unquote, the indictment reads. The paperwork goes on to accuse Mega Upload of running a program between September 2005 and July 2011, which rewarded users for uploading infringing material. A citation from an internal Mega Upload email from February 2007 titled Reward Payments claims to show that at least two key staff members knew that cash payments were being paid to users who uploaded infringing material, including, quote, full popular DVD rips, unquote, and software with key generators wears. Then, the indictment starts to throw up some very interesting questions, especially how the authorities managed to get hold of not just one, but many of Mega Uploads internal company emails, dating back to 2006, to use in the case against them. It's certainly possible that the authorities were monitoring Mega Uploads correspondence, but there are also at least two mentions in the indictment of an unnamed person described as quote, an unindicted co-conspirator unquote, while prosecutors sometimes use this term to describe people who have been excluded from an indictment on evidentiary concerns. They also use it to describe individuals who have been granted immunity from prosecution. In any case, these emails are being heavily relied upon since many appeared to indicate knowledge among staff that copyright works were held on the company's service. Here's a sample. The email from 2006 claims to show how Mega Upload attempted to download large amounts of content from YouTube and appeared by April that year to have obtained 30% of the site's content. A follow-up email in 2007 claimed that quote, Kim, Mega Uploads, found a really wants to copy YouTube one-to-one unquote. To read the rest of the samples of the email correspondence between internal staffers of Mega Upload, you may read the full article at the show notes. However, later on in the article, in one email, Kim.com reportedly said, this is a serious threat to our business. Please look into this and see how we can protect ourselves. Adding should remove our domain to another country, Canada, or even Hong Kong. The indictment separately lists several movies being distributed from Mega Uploads servers in the United States, all of which were not yet commercially available. There is no indication, however, that Mega Uploads operators knew they were there. On face value, it would seem that in a handful of site instances, staff at the company did indeed link each other to copyright works, but when the massive scale of the Mega Upload operation is set besides them, their significance is put into a different perspective. The issue of not taking down content is a fascinating one. Mega Upload is not on its own when a hash's content then allows users to access already stored versions of the same files, nevertheless, while taking down a specific URL and not the content itself be enough to appease the courts. Finally, and despite the assertions of the MPAA, RAAA, and the authorities, Mega Upload carried a huge amount of non-infringing content, giving the service itself substantial non-infringing users, nevertheless, all content has now been seized, leaving millions of people and companies without their personal data. Cyberlocker services and potential stops all around the world will be watching this case like Hawks. SizeMick doesn't really come close. A tutorial comment there has been a lot of coverage of the Mega Upload case, both on TorrentFreak, TechDirt.com, and OzTechnica. I suggest you file this case as much as I will be following it, however, I can't read everything into these podcasts, so you may want to follow articles, follow links, do searches of the three aforementioned sites on your own. However, it is fascinating how the e-leagles operated. Mega Upload had both people legally operating and e-leal operating, and now because of the rap musicians who have historically been short-changed by the big record labels, the big name wants for moving the content to Mega Upload and getting paid as they were automatically major sources of downloads and advertising revenues. So the deal offered from Mega Upload to rap artists who were famous was better than the deal offered by the RIAA and Kim.com in his last guest article written for TorrentFreak.com said that he found a way to pay them 90% of the time, regardless of whether or not their download is paid, preceded this attack. You are not, you want to believe that the FBI is merely acting for their bosses, the RIAA and MPAA or not, I submit that for your consideration, but I do want to turn now to another Mega Upload article that details how the e-leagles operated as I found the patterns fascinated. And then finally, to end up the tech segment, I will read about a foreign social networking site to give an example of how people are reacting to the United States-America's fascist and heavy-handed attitude toward the internet. So that further ado, from TorrentFreak.com, day of January 28th, 2012, by a NIGMEX, Mega Aftermath, upheaval in Pirate Warrersland. While last week's shutdown of Mega Upload is a huge interest in itself, but a wave of aftershocks and side effects are proving equally fascinating to watch, in addition to causing all sorts of problems for legitimate users of file-sharing services, there is no avoiding the fact that certain elements of the piracy scene are in a mess, amazingly still the beat goes on. Despite its rogue-stite status and various other warnings, when Mega Upload went down last week, it still came as a shock. But what came next was unprecedented, a dramatic reaction in Cyberlockerland that took out vast libraries of digital content and capacity, the perception of the established ground rules had been changed without passing of a single new door. FBI are rest by huge numbers of police, enormous cash and asset seizures overseas, reward program scrutiny, knowledge of payouts to persistent uploaders of infringing content, extradition. These are things that changed the game. Quote, if the US government can come forward Kim.com, it can happen to almost anyone, unquote, a file-hosting operator told Torrent Freak on condition of anonymity. I'm trying to think of everything I did positively wrong in the last three years and worrying about that and the next three years also, if we even have that long. For many hosting sites, it was time to react quickly. Over this week, we documented the drastic actions taken by services such as file Sonic and file serve, who shut down all third party sharing and, like many of this close down their affiliate payout programs. Later, we showed how file hosting competitors, such as foreshared, rapid share, and hot file, had grown as users hunted for spare capacity. In the space of a week, and the Mega Upload shut down aside, huge libraries of both legitimate and pirate material were wiped out as file host after file host deleted and impossible to calculate number of files and closed down thousands of suspected infringing accounts. And this is where it gets quite interesting. For more than half a decade Hollywood and the recording industry have spent millions of dollars, not so much on actually eliminating illegal content, but getting rid of links to content, such as those found on BitTort. This week, without a single cease and desist being sent, cyber lockers across the globe not only self-deleted vast quantities of files, but in doing so made millions of links across thousands of linking sites completely useless too. For the operators of these linking sites and their uploaders this week has been a very hard work indeed, for some sites it was all too much and the shutters have simply come down. The problem it seems is money. While there is money to be made in torrent sites, the content shares there are largely altruistic. The cyber lockers scene is more complex and incestuous, with revenue being generated in a handful of basic ways on both legal and illegal content. Through reward programs, uploaders get paid on the number of times people subsequently download content. Typically, release sites can upload the content themselves and get paid like a regular uploader when people download. We want programs are important for cyber lockers too, since they attract customers away from competitors and also give them an incentive to supply content. Release sites and wears forms and uses the cyber lockers to get content, and when they get there they are faced with a choice. But a little, relatively slowly but for free, or pay for a premium account and get lots as quickly as possible. In many cases, choosing the first option means that cyber lockers also make more money from advertising. While various sites shut their rewards programs this week, those uploading purely for the money were hit hard. In fact, many who had cash mounting up in their accounts lost at all. Some cyber lockers simply kept the accrued money, while the victims were livid. Those who hate financially motivated sharing commented that just as had been served. But while it's clear that some uploaders often young and in less well off countries are sharing small time for a few bucks, for some the reward payouts are more important. For many release sites, those rewards pay the server bills. Quote, we needed to pay out and when, file host named redacted on request, shut down sharing, we were all but finished, unquote, one admin of a release site told Torrent Freak. Quote, 90% of our content was hosted there. Then they deleted all our files and closed the account. They won't even speak with us about it. A whole year's work gone, we shut at the end of the month, unquote. But like working aunts, whose nest has just been smashed apart by angry humans, others are utterly unfazed and just want to know which hosts are still paying out. Despite the climate of fear, quite a few hosts say they are and it's evident from the links being posted on release blogs that the upload for cash crew have noticed them quickly. Things however are still in a state of flux. Some of the file hosts still paying out appeared to be offering tiered rewards systems with just about every country in the world getting a reasonable deal, but with the United States right at the very bottom. Another interesting rumor, which at the time of writing we have been unable to confirm, is that one of the file hosts who banned third-party downloads earlier this week is now re-enabling them. This is something to look out for, without third-party links being operational, users are extremely unlikely to sign up for a premium account, and this is where the cyber lockers can make good money. So finally, one has to ask, whether the mega upload shutdown has damaged the internet piracy infrastructure, providing an answer is not easy. The amount of material coming online has not really reduced. Content feeding from the scene is business as usual. Torrent sites are watching on closely, but the public ones tend not to host content. Their users do. Cyber lockers are in a mess, but already recovering. Release sites are continuing albeit with a reduced number of multiple links to the same content. Perhaps the best test is whether it's now very hard or impossible to find and download popular content. Not even close. From Venezuelaanalysis.com, by Tamara Pearson of Venezuelaanalysis.com, new Venezuelan social network takes off. Mi Rida, January 25, 2012. The new Venezuela social network, called Plaxed, which allows streams of short posts to 100 characters, as well as event invitation polls and questions, was created as an alternative site so that the files or personal details found on the network, quote, aren't blocked, erased, or followed, unquote, by U.S. Laws, said its creator, Cesar Coaches, a systems and a nearing student. The idea for a website began one and a half years ago, but was on trial a long time. Then the project became a success. We had 10,000 people registered in just one day, which collapsed our servers, unquote, Cotiz, said, quote, we want a social network specifically for Venezuela, for phones and desktops, and that is completely free. Anyone can create a social network, be it for personal use or business, unquote, Cotiz, said. Plaxed is still under development, based on the freeware status net. It still contains a lot of English, which is gradually being replaced. It has no advertising, and its name, according to Cotiz, doesn't mean anything. It's important that Venezuelians gradually take on new technology and create new social networks, in order to start to eliminate this dependence that we have on websites made in other countries, which fall under the law of those countries, so they can take the information we put there at any time and do whatever they want with it, unquote. Cotiz explained that Venezuelians could take Plaxed to court. Should it do something on-tward with its information it has, because it falls under Venezuelian laws, where they could not do that in the case of other social networks, like Facebook or Twitter. Social networking in Venezuela has experienced growth in recent years in Venezuela, as internet usage has risen 40%, while President Hugo Chavez's Twitter account has the most followers in the country. According to report by Tendencius and Digitalis, Venezuela is third in Latin America for social networking media use, with 30% of internet users registering on Facebook and 21% on Twitter. Last year, the United Nations Institute UNESCO award Venezuelist info centers the King Hamid bin Issa Al-Khalifa prize for their work in providing free internet access as well as training, especially to people who were previously excluded due to poverty or location. In 2010, there were 668 info centers, and since then many more have been built. Other headlines in the news? My Twitter case and thought crime. This is Brigitte Hans Dattier's official blog post entry on the Twitter case. The state were in Freedom's Road. This is the English Podcasts from Rio Nellins and to National it features the interview with Brigitte Hans Dattier. News from Havana at times.org.org.gov.com and dissidentvoice.org use under a range permission. News from EFF.org and twartfreak.com use under permission of the Creative Commons by Attribution Non-Commercial.no-derivorous license. News from renisreliaanalysis.com is copy-left audio-interlude moment of clarity number 112. Use under permission of Lee Camp. News sources retain their respective copyrights. Thank you for listening to this episode of Talk Geek to Me. Here are the vials statistics for this program. Your feedback matters to me. Please send your comments to DG at deepgeek.us. The web page for this program is at www.talkgeektoMe.us. You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter. My username there is DGTGM as a deepgeek talk geek to me. This episode of Talk Geek to Me is licensed under the Creative Commons Attribution share like 3.0 on poor license. This license allows commercial reuse of the work as well as allowing you to modify the work as long as you share a like the same rights you have received under this license. Thank you for listening to this episode of Talk Geek to Me. You have been listening to Hacker Public Radio or Hacker Public Radio does not. We are a community podcast network that releases shows every weekday Monday through Friday. Today's show, like all our shows, was contributed by an HBR listener by yourself. If you ever consider recording a podcast, then visit our website to find out how easy it really is. Hacker Public Radio was founded by the digital.com and the economical and computer cloud. HBR is funded by the binary revolution at binref.com. All binref projects are proudly sponsored by Lina Pages. From shared hosting to custom private clouds, go to LinaPages.com for all your hosting needs. Unless otherwise stasis, today's show is released under a Creative Commons Attribution share a like 3.0 license.