Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

278 lines
19 KiB
Plaintext

Episode: 1015
Title: HPR1015: TGTM Newscast for 2012/6/18 DeepGeek
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1015/hpr1015.mp3
Transcribed: 2025-10-17 17:25:34
---
You are listening to episode 69 of TGTM News, recorded for Monday, June 18, 2012.
You are listening to the Tech Only Hacker Public Radio Edition, to get the full podcast
including political, commentary, and other controversial topics.
Please visit www.talkgeektme.us.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.talkgeektme.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DG-T-G-T-M, as in DeepGeek TalkGeek to me.
And now the tech roundup from techdirt.com did June 1, 2012 by Mike Masnick.
New York Times reveals details of how U.S. created Stuxnet and how a programming error led to
its escape.
With a lot of new attention being paid to the flame malware that was data mining computers
around the Middle East, there have been plenty of comparisons to Stuxnet, the famous bit
of malware that was targeted at mucking up Iran's nuclear power program.
So it's very interesting timing to see the New York Times reveal many of the details
behind Stuxnet, including confirming that it was a program driven by the U.S. with a
lot of help from the Israelis.
Many many many people suspected that already, but it certainly appears that the New York
Times has numerous detailed sources that support this claim.
Perhaps even more interesting, however, it's the fact that Stuxnet, which apparently
were originally infected Iranian nuclear plants via workers using USB keys when they
shouldn't, was never supposed to get out into the wild.
It was supposed to just sit in the computers of the power plant, confusing the hell of the
Iranians, but obviously that didn't happen.
Having that info get out into the wild probably killed off the effort, much earlier than
expected, since it basically explained to the Iranians what was happening.
It's also noteworthy that a source in the article claims that Stuxnet was the first
example of using a computer attack to destroy physical items.
It made centrifuges work irregularly in ways that could cause them to break.
Some have therefore used Stuxnet as proof of the cybersecurity threats out there, and
the misnamed cyber war.
I'm not sure if it's true.
That still appears to be a rather unique case in terms of a very, very specific target
that had some significant vulnerabilities.
We hear lots of worries about cybersecurity impacting physical infrastructure, and I'm
sure that those who wish to do harm would love to bring down power grids and airplanes
through some form of a cyber attack.
But I'm not convinced that the success of Stuxnet is so easily replicable in other such
areas.
And I don't see how that automatically justifies effectively torsing out all piracy protections.
From torrentfreak.com, day at May 31, 2012, by Ernesto, Verizon successfully defends privacy
of alleged but torn pirates.
Those who download and share copyright files through BitTorrent risk being mined for various
reasons in the United States, those can also include legal action.
In recent years, more than a quarter million alleged BitTorrent users have been sued in
federal courts, one of the copyright holders participating in this activity is book publisher
John Wiley and Sons, who are famous for their Fordummy series.
Wiley and others file mass lawsuits against John Does, who are only known by their IP address.
They then request a subpoena from the court to obtain the subscriber info connected to
the IP address, so they can contact the person in question where the request to sell the
case in return for some of the money.
A lucrative business, which can bring in millions of dollars, but also one that has been criticized
heavily.
Earlier this month, we reported that Verizon had refused to comply with the subpoena that
was issued by a New York federal court, among other reasons the internet provided doubted
where the subpoena would lead to the discovery of relevant information.
In other words, Verizon suggested that the person who pays for the account might not be the
infringer.
A valid point, especially since another New York judge, stated recently that an IP address
does not identify a person, only a connection.
Verizon also refused to hand over information or to protect the privacy of its subscribers,
which they feel is at stake in the ongoing mass-better lawsuits.
The company asserted that Wiley is seeking information that is protected from disclosure
by third parties for rights of privacy and protections, guaranteed by the First Amendment.
In addition, Verizon noted that the book publishers demanding the information for improper
purposes, namely to harass, cause unnecessary delay, or needlessly increase the course of
litigation.
As expected, Wiley didn't agree with the objections outlined above and asked the court
to compel Verizon to comply with the subpoena.
However, after a conference call between Wiley's lawyer and the judge, this request was dropped,
and that was not all.
A recent letter to the court also reveals that Wiley has withdrawn the subpoenas it sent
to Verizon.
Given the telephone conference with your honor on May 14, 2012, we would draw our subpoenas
to Verizon as well as our motion to compel Verizon to respond to those subpoenas.
The letter reads,
Unfortunately, no further details of being made public, but it appears that Verizon successfully
defend the privacy of the accused between users.
The above is great news for the many Verizon users who may end up in similar position
in the future.
However, Verizon doesn't seem to protest the subpoenas in all cases.
In fact, earlier this month, the company made a huge mistake as a hand over personal details
of subscribers before it was allowed to.
That said, the ISP seems more value in a system where users are warned and educated as opposed
to harassed.
Verizon confirmed this stance last week when the company informed Tornfreak that they
see the six strikes warning model as the right solution for the privacy problem.
Quote,
We believe this program offers the best approach to the problem of illegal file sharing and
importantly is one that respects the privacy and rights of our subscribers.
It also provides a mechanism for helping people to find many great sources of legal content.
The six strikes privacy warning scheme is expected to be implemented later this year.
This doesn't mean that mass law suits will stop entirely, but it is apparent that Verizon
does not intend to cooperate with these practices without putting up a fight.
From Tornfreak.com,
by Ernesto Dade May 30, 2012,
Mega Upload asked Quote to dismiss the criminal case.
In January, the US government announced that it had initiated one of the largest criminal
copyright cases ever brought by the United States.
That case was brought against Mega Upload and its key employees, including founder Kim.com.
The authorities seized a main name, service, and personal belongings, and asked for the
extradition of the defense who were all arrested abroad.
Since then, Kim.com and his colleagues have been fighting against extradition in New Zealand.
Today, the focus is shifting to the US case.
The Upload's lawyers just filed a motion to dismiss at the district court in the Eastern
District of Virginia.
Their argument is simple.
The US authorities failed to serve Mega Upload as its required in a criminal case, because
of this failure and the fact that the company was effectively put out of business, Mega
Uploads do process rights have been violated.
To claim due process violation, Mega Upload has to show that a liberty or property interest
which has been interfered with by the state, and that the procedures attendant upon that
deprivation were constitutionally sufficient.
According to Mega Upload's lawyers, this is certainly the case here.
Both prongs to the procedural due process test are plainly met here.
The government has seized Mega Upload's property and domain name, ruined its reputation, and
destroyed its business pursuant to an indictment which is fatally flawed as a jurisdictional
matter.
Mega Upload now finds itself in a state of abayance with no end in sight, a right.
As a result of the government's inability to properly serve the summons on Mega Upload,
this court lacks jurisdiction over the company, and the absence of effective service of process
criminal proceedings against Mega Upload cannot commence, and as the court has aptly noted,
we frankly don't know what we are ever going to have a trial in this matter.
Mega Upload's legal team therefore concludes that Mega Upload is thus deprived of any procedure
to clear its name or recoup its property in clear violation of its due process rights.
The crucial issue in the motion to dismiss is that Mega Upload was never served.
The origin of this problem is not merely a matter of oversight.
Mega Upload's lawyer, Ira Rothkin, previously noted that unlike people companies can't
be served outside US jurisdiction.
If this issue indeed prevents Mega Upload from being tried in the US that would be a
blunder of epic proportions, and the fact that this court judge O'Grady previously acknowledged
that this issue warns further investigation suggests that the motion filed by Mega Upload
could be the beginning of the end for the Mega Upload case.
From EFF.org, June 15, 2012, Internet Archive sues to stop new Washington state law.
Seattle.
The Internet Archive has filed a federal challenge to a new Washington state law that intends
to make online service providers criminally liable for providing access to third parties
offensive materials.
The Electronic Foundation Foundation is representing the Internet Archive in order to block the
enforcement of SB6251, a law aimed at combating advertisements for underage sex workers but
with vague and overboard language, the squarely in conflict with federal law, procedurally
the Internet Archive lawsuit was filed as an intervention into a similar suit, BackPage.com
versus Pequina, filed last week.
The Internet Archive as an online library, archives the worldwide web and other digital
materials for researchers, historians in the general public said, boost a cowl, digital
librarian, and founder of the Internet Archive.
We strongly support law enforcement efforts to combat child sex trafficking, but this new
law could endanger libraries and other entities that bring access to websites and user-generated
content.
SB6251 was passed with the hope of criminalizing the dissemination of underage sex trafficking
ads and imposing a requirement to confirm the ages of individuals in such ads prior to publication.
The law, however, is fought with problems as written, the vaguely words that you're making
it a felony to directly or indirectly provide access to any material that might constitute
explicit or implicit commercial offer for sex could be read to apply not only to posters
but to neutral entities that provide access to online information, including ISPs, Internet
cafes and libraries.
This would result in a chilling effect as such entities begin feeling pressured to sense
a protected online speech in order to safely stay on the right side of the unclear law.
Washington's new statute also squarely conflicts with the established federal law section 230
of the Communications Decency Act that was passed with the dual aims of protecting Internet
intermediaries from the liability for most of what their users do and establishing a clear
national Internet policy to avoid the development of a confusing patchwork of state laws.
And if allowed to stand SB6251 would undermine this important congressional policy decision
that directly forces free speech, innovation and dissemination of knowledge online.
It would also set a dangerous present along individual states to regulate the Internet
as each sees fit establishing a speech-killing race to the bottom, which service provides
restricting speech according to the most invasive state law on the books.
Indeed, in the wake of SB6251's passage, Tennessee passed a similar bill set up to go into
effect in July and New York and New Jersey are considering their own proposed legislation.
From torrentfreak.com, by Ernesto Day of June 6, 2012, how scary is the U.S. Six Strikes
Anti-Piracy Scheme?
Soon the Center for Copyright Information will start to track down pirates as part of an
agreement, all major U.S. Internet providers struck with the MPAA and RIAA.
The parties agreed on a system through which copyright infringes a warn that their behavior
is unacceptable after 5 or 6 warning size piece may then take a variety of repressive measures.
A lot has been written on in the press about the upcoming scheme, but unfortunately there
are still many myths and misunderstandings, today we hope to clear up some of those inaccuracies
by answering a few simple questions.
What punishments are expected?
After 6 warnings, ISPs will impose so-called mitigation measures or punishments.
The CCI made it clear from the thought that no-by's Internet account will be terminated,
however, temporary disconnections are an option.
In fact, the agreement between the copyright holders and ISPs specifically mentions the
option of such temporary terminations.
This means that in theory subscribers could be disconnected for a week or even a month.
That set such disconnections on not mandatory and ISPs have little incentive to impose
such a strong mitigation measure.
A more likely punishment is a thralled connection, where a connection speeds or severely degrade
for a set period.
The agreement specifically mentions 256 to 640 KBPS as an example.
Alternative ISPs rather alternatively ISPs can direct uses to a landing page until
a subscriber contacts the ISP to discuss the matter.
What happens to those who ignore all warnings?
This is an interesting question.
Public information provides no answer, but the CCI told Torrent Freak the following.
The program is intended to educate consumers, taking them through a system that we believe
will be successful for most consumers, if a subscriber were to receive 6 alerts, that
user would be considered a subscriber, the program is unable to reach.
If ISPs receive additional allegations of copyright infringement for that user, those
notices will not generate alerts under the program, a CCI spokesperson told us.
In other words, nothing will happen under the program.
People who receive more than 6 warnings are removed from the system.
They won't receive any further warnings of punishments and are allowed to continue using
their internet services usual.
Who will be monitoring the copyright infringement?
While ISPs take part in the scheme, they are not the ones who will monitor the subscriber's
behaviors.
The tracking will be done by a third party company such as DetectNet or Peer Media.
These companies collect IP addresses from BitTorrent Swarms and send their findings directly
to the internet providers.
The list of infringing IP addresses are not shared with the MPAA, RIA, or other third parties.
The CCI has not yet published the name of the minor in company, but informs Torrent Freak
that the evidence, gathering, methods will be reviewed by an independent expert.
Each ISP will keep a database of the alleged infringers and send the subscribers to the
appropriate warnings, recording infringements will be stored for 12 months after which
they will be deleted.
What will be monitored?
According to the CCI, the copyright alert system will only apply to P2P file sharing.
In theory, this means that the focus will be almost exclusively on BitTorrent, as other
P2P networks have a relatively low user basis.
Consequently, those who use the use net providers, or file hosting services such as force shared,
rapid share, or hot file, are not at risk, in other words, the six strike scheme only
covers part of all online piracy.
Can monitoring be circumvented?
The answer to the previous question already shows that users could simply switch to other
means of downloading, but there are more alternatives.
BitTorrent users could hide their IP addresses through proxy services and VPNs, for example.
A recent study in Sweden showed that this is a likely response to tough copyright enforcement.
So how scary is the six strikes anti-piracy plan?
While we can't say anything conclusive yet, it appears that the main purpose is to reach
as many copyright infringers as possible to inform them about their inappropriate behavior.
The CCI frame this as education allows you to probably describe it as scare tactics.
How bad the six strike scheme turns out to be, largely depends on what punishments internet
providers intend to hand out, needless to say, a temporary reduction in bandwidth is less
severe than cutting people's internet access.
However, since ISPs have little incentive to apply such stringent measures, we expect
that the punishments will be rather mild.
News from tech.com, and these times.com, all.gov.com, use under range permission.
News from torrentfreak.com, SACIS.org.ca, and EFF.org, use under permission of the
Creative Commons by attribution license.
News from democracynow.org, use in the permission of the Creative Commons by attribution
non-commercial, no derivatives license.
News from gpnys.com is a press release, news sources retain their respective copyrights.
Thank you for listening to this episode of Talk Geek To Me.
Here are the vials statistics for this program.
Your feedback matters to me, please send your comments to dg at deepgeek.us.
The webpage for this program is at www.talkgeektome.us.
You can subscribe to me on identical as the username deepgeek or you could follow me
on Twitter.
My username there is dggtm as in deepgeek talk geek to me.
This episode of talk geek to me is licensed under the Creative Commons attribution share
like 3.0 unpoored license.
This license allows commercial reuse of the work as well as allowing you to modify the
work so long as you share a like the same rights you have received under this license.
Thank you for listening to this episode of Talk Geek To Me.
You have been listening to Hacker Public Radio at Hacker Public Radio.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by a HPR listener like yourself.
If you ever consider recording a podcast, then visit our website to find out how easy
it really is.
Hacker Public Radio was founded by the digital.pound and the economical and the computer
club.
HPR is funded by the binary revolution at binref.com, all binref projects are crowd-responsive
by linear pages.
From shared hosting to custom private clouds, go to lunarpages.com for all your hosting
needs.
On list otherwise stasis, today's show is released under a creative comments, attribution,
share a like, lead us our license.