- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
245 lines
21 KiB
Plaintext
245 lines
21 KiB
Plaintext
Episode: 960
|
|
Title: HPR0960: TGTM Newscast for 2012/04/04
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0960/hpr0960.mp3
|
|
Transcribed: 2025-10-08 05:38:21
|
|
|
|
---
|
|
|
|
Music
|
|
Music
|
|
Music
|
|
Music
|
|
Music
|
|
Music
|
|
Music
|
|
You are listening to Talk Geek 3 News, number 65, recorded for Wednesday, April 4, 2012.
|
|
You are listening to the Tech Only Hacker Public Radio Edition.
|
|
To get the full podcast, including political, commentary, and other controversial topics,
|
|
please visit www.TalkGeek3.us.
|
|
Here are the vials statistics for this program. Your feedback matters to me.
|
|
Please send your comments to DG at deepgeek.us.
|
|
The webpage for this program is at www.TalkGeek2Me.us.
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
|
My username there is DGTGM as a deepgeek talk geek to me.
|
|
And now the tech roundup.
|
|
From eff.org
|
|
Did March 30, 2012
|
|
by Katica, Rodriguez, and Maira Sutton
|
|
French Constitutional Court Banslow Enforcement Use of National Diometric ID Database
|
|
Last week, the Constitutional Constitutional, the highest authority on the French Constitution,
|
|
declared the provisions of a law permitting judicial and police use of a centralized national ID database
|
|
to be unconstitutional.
|
|
200 members of the French Parliament referred the law to the Conceal
|
|
Fung Laws Adoption on March 6. The Conceal determined that the use of the centralized database
|
|
was incompatible with France's fundamental rights, including the right to privacy and the presumption
|
|
of innocence. The proposed legislation mandated compulsory civilian ID cards contained a chip
|
|
designed to store personal and biometric information, including home addresses,
|
|
marital status, eye color, and fingerprints. Proponents argued that the biometric ID card
|
|
would be used to stop honest folk from becoming the victims of identity fraud.
|
|
In fact, the law would have enabled the honest folk database to be used for criminal and judicial
|
|
purposes. The Conceal correctly determined that such use has constituted a serious
|
|
incursion into the right to private life, disproportionate to the law's stated objective.
|
|
Another provision in the law would have allowed for a second optional chip to be used
|
|
for online authentication and e-commerce transactions. The Conceal determined that such use
|
|
would require too broad a range of personal data to be collected without any guarantees of security
|
|
and confidentiality. Furthermore, it condemned the law's vague conditions for authenticating
|
|
individuals, especially minors. EFF welcomes the Conceal's decision to strike out substantial
|
|
plots of the legislation to protect privacy. Nevertheless, the Conceal should explain the
|
|
unmotivated reasoning behind leaving significant anti-privacy portions of the law intact,
|
|
namely biometric data collection for the purpose of preventing ID fraud.
|
|
The argument for biometrics is predicated on the flawed assumption that a national biometric
|
|
ID scheme will prevent identity fraud. Massive databases already invite security breaches,
|
|
and a biometric database of this scale is a honeypot of sensitive data vulnerable to exploitation.
|
|
Such a data breach is not just costly, it is irreversible. You cannot change your fingerprints
|
|
or your irises. To read the rest of the Zaukel follow links in the show notes.
|
|
From EFF.log did March 21st by Trevor Tim, NSA chief appears to deny ability to warrant
|
|
lessly wiretap despite evidence. The former NSA official held his thumb and forefinger close
|
|
together. We are, like that far, from a turnkey totalitarian state, he says,
|
|
quoted from Wired Magazine April 2012. Last week in Wired Magazine, note author James Bamford
|
|
reported on an expensive $2 billion data center being built by the NSA in Utah that will house
|
|
an almost unimaginable amount of data on its servers along with the world's fastest supercomputers.
|
|
Part of the purpose of this new center according to Bamford is to store all forms of communication
|
|
including the complete contents of private emails, cell phone calls, and Google searches,
|
|
as well as all sorts of personal data trails, parking receipts, travel attendories,
|
|
bookstore purchases, and other digital pocket litter. In the Wired article Bamford interviewed
|
|
former NSA official William Binney, a crypto mathematician largely responsible for
|
|
automating the agency's worldwide eavesdropping network. Binney further shed light on the NSA's
|
|
warrantless wiretapping program first exposed the New York Times in 2005, and the subject of EFF's
|
|
long-running suit, Jewel versus NSA, which challenges the constitutionality of the NSA's program.
|
|
The NSA claims it only has access to emails and phone calls of the non-US citizens overseas,
|
|
but Binney provides more detail to the many previous reports by the New York Times, USA Today,
|
|
New Yorker, and many more. That program indeed targets US-based email records. In the 11
|
|
years since 9-11, Binney estimates 15-20 trillion transactions have been collected and stored
|
|
by the NSA. From the Wired article quote, he explains that the agency could have installed its
|
|
tapping gear at the nation's cable landing stations, the more than two dozen sites on the
|
|
periphery of the US for fiber optic cables come ashore. If it had taken that route, the NSA would
|
|
have been able to limited eavesdropping to just international communications, which at the same time
|
|
was all that was allowed on the US law. Instead, it shows to put the wiretapped rooms at key
|
|
junction points throughout the country, large windowless buildings known as switches, less gaining
|
|
access to not just the international communications, but also to most of the domestic traffic flowing
|
|
through the US. The network of intercept stations goes far beyond the single room and AT&T building
|
|
in San Francisco, exposed by a whistleblower in 2006. I think there's 10-20 of them, Binney says.
|
|
That's not just San Francisco. They have them in the middle of the country and also in the East Coast.
|
|
The director of the NSA, General Keith Alexander, testifies at a house subcommittee hearing Tuesday
|
|
and representative Hank Johnson, Democrat from Georgia, grilled him on the details of the
|
|
wired story. He appears to deny the main points of the article, including that the NSA was
|
|
intercepting emails, phone calls, Google searches, and phone records of individuals in the United States,
|
|
as well as the technical capabilities of the program software described by Binney.
|
|
But, perhaps more strangely, Alexander also seemed to claim the NSA did not have the
|
|
technical ability to collect American's emails and internet traffic even if it weren't required
|
|
to get a warrant. General Alexander, quote, in the United States, we'd have to go through the FBI
|
|
process. They weren't to get that and serve it to somebody to actually get it.
|
|
Representative Johnson, but you do have the capability of doing it? General Alexander, not in the US.
|
|
Representative Johnson, not without a warrant? General Alexander, we don't have the technical insights
|
|
in the United States. In other words, you have to have something to intercept with some way of doing
|
|
that, either by going to a service provider with a warrant, or you have to be collecting in that
|
|
area. We're not authorized to collect, nor do we have the equipment in the United States to
|
|
actually collect that kind of information, emphasis had. In our lawsuits, EFF has provided evidence
|
|
that the NSA operated a monitoring center out of AT&T switching facility in San Francisco
|
|
that has the ability to do exactly what General Alexander says the NSA can't. In light of all the
|
|
evidence, it is hard to take comfort from General Alexander's apparent denial. In previous discussions
|
|
of the warrantless wiretapping program, the government has used crabbed and unusual definitions of
|
|
words to make misleading statements that also seem like denials, but turn out to be largely word
|
|
games. In one prominent example, then Principal Deputy Director of National Intelligence, Michael Hayden
|
|
said in a 2006 statement, quote, let me talk for a few minutes also about what this program is not.
|
|
It is not a drift net over deerborn or laquana or freemont, grabbing conversations.
|
|
End of quote, later when confronted with evidence of a wider drift net program during his
|
|
confirmation hearing, he explained, quote, a pointedly and consciously downshifted the language I was
|
|
using. When I was talking about a drift net over laquana or freemont or other cities, I switched
|
|
from the word communications to a much more specific and unalgurably accurate conversation,
|
|
unquote. Notably, the NSA's interpretation of what it means to collect communications seems
|
|
to be quite limited. Under Department of Defense regulations, information is considered to be
|
|
collected, only after it has been received for use by an employee of a DOD intelligence component.
|
|
And data acquired by electronic means is collected only when it has been processed into
|
|
intelligible form. So under this definition, if the communications of millions of ordinary Americans
|
|
were gathered and stored indefinitely in Utah, it would not be collected until the NSA
|
|
officially accepts in some manner such information for use within that component. The illegality
|
|
of warrantless wiretapping, however, does not depend on when the NSA officially accepts their
|
|
information or processes it into intelligible form, whatever that means. Americans' privacy and
|
|
constitutional protections do and should not hinge on word games. We are looking forward to
|
|
establishing, in the jewel versus NSA case, a simple proposition that the government can't
|
|
spy on anyone much less everyone without a warrant from tectet.com. They had March 30, 2012 by Mike
|
|
Massick. Trademark lawyers pushed for crazy new domain rules, making it easy for them to take
|
|
away others' domains. IP maximalists now seem to be targeting ICANN as yet another way to
|
|
overclaim their rights and block legitimate domains from existing. As we've been discussing,
|
|
there have been several fights concerning the new generic top level domains, where we've seen
|
|
folks like the entertainment industry demand extra special measures to keep them from being used
|
|
to infringe copyrights, but the trademark folks may be going even further. We already have the
|
|
somewhat flawed UDRP uniform domain dispute resolution process system for trademark holders to
|
|
try and claim the rights over domain. This process lets trademark holders go through an
|
|
arbitration process if they feel someone is abusing a trademark in a domain. In the past,
|
|
we've discussed how this process is pretty sloppy, but it's still heavily favors trademark
|
|
holders. As in many arbitration situations, the big companies who bring back business to the
|
|
arbitrators magically seem to win quite frequently. However, that's just not enough for these trademark
|
|
holders. Last year, for these new GTLDs, they were also able to establish a separate process
|
|
the URS uniform rapid suspension system, which everyone was told would only be used for the most
|
|
egregious cases of trademark infringement. The cases where it's so totally obvious that the
|
|
domain in question infringes that the whole process can be cheap and streamlined. However,
|
|
before this process has even been really tested, trademark holders are trying very, very hard
|
|
to basically lower the standards on URS and broaden the reach of it, such that it more or less
|
|
replaces the UDRP process. And let's mix it a system that lets trademark holders seize the
|
|
domains of those they accuse of infringement very cheaply, with minimal review and to also block
|
|
certain words from being registered in domains. Even more incredible, they're abusing an
|
|
ICANN comment process to push this plan, which ICANN had earlier rejected. All of this came out
|
|
recently in a letter to ICANN's board racing concerns about this effort. ICANN had opened up
|
|
a comment period for a specific issue having to do with GTLDs. And the trademark folks went hog
|
|
wild asking for all these other things, including lowering the standard for when a simplified URS
|
|
process sees domains quickly as questions later. Process can be put in place. Originally the
|
|
ball had been set high so that this process could only be used in truly egregious cases,
|
|
where there was no question that the domain was infringing. But the proposal sought to lower
|
|
the standards such that it's the same as the UDRP standard effectively stepping in and replacing
|
|
UDRP. Changing the already agreed upon URS systems such that domains that go through the process
|
|
aren't just suspended, but transfer to the trademark holder. In other words, rather than just
|
|
shutting down a domain, this fastpass system would simply turn the domains over to the trademark
|
|
bullies. Saying that the URS process, which was developed just for these new TLDs, should also be
|
|
expanded to cover the most important TLD of all, COM. That's right. That's the goal in all of this
|
|
to actually make it much much easier for trademark bullies to completely shut down and gain control
|
|
of domains that they don't like others to use and to do it cheaply with very little review.
|
|
And they did all this by abusing a comment process that has nothing to do with these issues.
|
|
And despite the fact that earlier, hard fork battles over these issues came out with them
|
|
on the losing side, but this is how IP maximalists work. They just keep trying every way possible
|
|
to get the same ridiculous rules made in their favor. From AMD.com, press release, AMD launches
|
|
new platform for dedicated web hosting providers. AMD today announced the latest solution as part of
|
|
its ongoing web cloud initiative with the launch of the new AMD Optaron 3200 series processor.
|
|
Dedicated web hosting customers seeking enterprise class reliability have a new choice that delivers
|
|
great value with up to 38% better price performance and up to 19% less power per core than the
|
|
competition error correcting code memory and server reliability features at a low price point.
|
|
Fast hardware payback in as few as seven months hosting fees can cover hardware costs up to 14%
|
|
quicker than with the competition efficient economics for the cloud with twice the core density
|
|
per rack later on the article AMD has delivered on its promise of a low power single socket
|
|
solution that brings server functionality with desktop economics. The AMD Optaron 3000 series
|
|
platform is targeted to the dense power efficient one processor web hosting web server market
|
|
available in either a four or eight core CPU. The AMD Optaron 3200 series processor is shipping
|
|
today on platforms from MSI, Tion, Fujitsu and Dell based on the bulldozer core the AMD Optaron
|
|
3000 series platform leverages socket AM3 plus and provides customers with the core savings
|
|
associated with a desktop like infrastructure yet still offers server class reliability
|
|
enterprise class Silicon validation testing security features and server OS certification some
|
|
technical details 45 watts to 65 watts TDP 2.7 gigahertz base frequency up to 3.7 gigahertz
|
|
frequency 2 DDR3 memory channel supporting ecc memory 1,333 1,600 and 1,866 megahertz memory speeds
|
|
up to 32 gigabytes memory capacity up to two dims per memory channel a total cage of 16 megabytes
|
|
for eight core and eight megabytes for four core L2 cage up to eight megabytes and L3 cage up to eight
|
|
megabytes at 12 comment okay why is this significant because servers are often sold and multi
|
|
processor CPUs that is multiple chips each chip having several cores now if you just don't need
|
|
that kind of a power in in that particular server for the past few years your choice was to buy a
|
|
server class motherboard which is industrial duty and half populated which was a costly proposition
|
|
with this move they're going back that making one processor server class motherboards which means
|
|
that all the people who didn't need that power for the past few years were forced to use
|
|
outside services can now bring those small server needs back into the organization
|
|
and of course the usual disclaimer is applied to my knowledge level on this matter
|
|
but it's a significant step back to enabling people with low needs to get server class
|
|
hardware if they so need it and a total comment from torrentfreak.com did March 27th 2012 by Ernesto
|
|
rapid share declared legal in court with a twist in the aftermath of the mega upload shutdown
|
|
people have been keeping a close eye on court cases involving other file hosting services
|
|
rapid share included during the past several years rapid share has made tremendous efforts to
|
|
cooperate with copyright holders and limit copyright infringements but this couldn't prevent
|
|
the company from getting involved in a handful of lawsuits against rights holders two weeks ago
|
|
a press release published by copyright holders claimed that rapid share had suffered an enormous
|
|
defeat in court however now the court has published its final decision rapid share is claiming a
|
|
victory of its own in the verdict of rapid share's legal dispute against the music rights group
|
|
g-e-m-a the higher regional court in Hamburg explicitly recognizes that rapid share's business
|
|
model is legal this news is music to the ears of the file poster quote for the first time the
|
|
Hamburg higher regional court has filed outline of argument on key points and has conferred legal
|
|
legitimacy on our service just as other courts have done over the considerable period of time
|
|
this is a significant result for us and of course said rapid share CEO Alexandra Zwingli
|
|
the court further ruled that rapid share has no obligation to proactively minor files
|
|
that are uploaded by its users instead the company has to monitor external sites that link to
|
|
copyright files on rapid share and ensure that these files become inaccessible this is not a problem
|
|
according to the cyber locker quote that is exactly what rapid share has already been doing
|
|
for many years if the anti-abuse team identifies a download link on such pages which results in a
|
|
file that has clearly been published illegally being on the company's service the file and
|
|
question is immediately blocked end of quote aside from monitoring forms and linking sites for
|
|
infringing links rapid share has made several other adjustments to its service to decrease
|
|
unlawful use most recently the company limited the download speeds of free users to drive away
|
|
pirates nevertheless rapid share objects the fact that they have to carry out this monitoring
|
|
based on a court order and they will therefore take the case to the Supreme Court quote we are doing
|
|
this of our own accord because we have a strong interest in ensuring that our service remains
|
|
clean we believe that being obliged to carry out such actions is questionable from a legal
|
|
perspective for this reason we will appeal the verdict to clarify the issue of proactive
|
|
monitoring of external websites at the highest judicial level end of quote zwingli said
|
|
the eventual decision of the Supreme Court may have massive implications not only for rapid share
|
|
but also for the many other file hosting services that operate in Germany other headlines in the
|
|
news to read these stories follow link in the show notes power management of online data intensive
|
|
services this is a link in James Hamilton's excellent technical perspectives blog on whether or
|
|
not large scale data centers should oversell their electrical usage news from tech dot com audio
|
|
of moment of clarity number 126 of at times that log and all of that com used under arranged
|
|
permission news from eFF dot log and torrent freak dot com used the permission of the creative
|
|
comments by attribution license news from gpny s dot com and AMD dot com all press releases
|
|
news from wl central dot log used in the permission of the creative comments by attribution non-commercial
|
|
no delivers license news sources retain their respective copyrights thank you for listening to
|
|
this episode of talk geek to me here are the vials statistics for this program your feedback
|
|
matters to me please send your comments to dg at deepgeek.us the web page for this program is at
|
|
dub dub dub that talk geek to me that us you can subscribe to me on identica as the username deepgeek
|
|
or you could follow me on twitter my username there is dg tgpm as in deepgeek talk geek to me
|
|
this episode of talk geek to me is licensed under the creative comments attribution share like 3.0
|
|
unported license this license allows commercial reuse of the work as well as allowing you to modify
|
|
the work so long as you share alike the same rights you have received under this license thank you
|
|
for listening to this episode of talk geek to me you have been listening to hr public radio at
|
|
hr public radio does our we are a community podcast network the release of shows every weekday
|
|
on day through friday today's show like all our shows was contributed by an hbr listener like
|
|
yourself if you ever consider recording a podcast then visit our website to find out how easy it
|
|
really is hr public radio was founded by the digital dark pound and the economical and computer cloud
|
|
hbr is funded by the binary revolution at binref.com all binref projects are crowd-responsive by
|
|
linear pages from shared hosting to custom private clouds go to lunar pages.com for all your hosting needs
|
|
unless otherwise stasis today's show is released under a creative comments attribution share
|
|
on live, eat those own license
|