- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
244 lines
16 KiB
Plaintext
244 lines
16 KiB
Plaintext
Episode: 1105
|
|
Title: HPR1105: TGTM Newscast for 10/24/2012
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1105/hpr1105.mp3
|
|
Transcribed: 2025-10-17 19:02:51
|
|
|
|
---
|
|
|
|
You're listening to Turkey To Me News, number 79, record for Wednesday, October 24, 2012.
|
|
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast
|
|
including political, commentary and other controversial topics.
|
|
Please visit www.tourgeektme.us.
|
|
Here are the vials statistics for this program.
|
|
Your feedback matters to me.
|
|
Please send your comments to dg at deepgeek.us.
|
|
The webpage for this program is at www.tourgeektme.us.
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
|
My username there is dgtgtm, as in DeepGeek Talk Geek to me.
|
|
And now the tech round up.
|
|
From eff.log, date October 22, 2012, by Hany Fakuri and Trevor Tim.
|
|
Stingrays, the biggest technological threat to cell phone privacy you don't know about.
|
|
The Friday EFF and the ACLU submitted an amicus brief in United States vs. Rig Maden, a closely
|
|
failed case that has enormous consequences for individuals' fourth amendment rights in
|
|
their home and on their cell phone.
|
|
As the Wall Street Journal explained today, the technology, at the heart of the case, invades
|
|
the privacy of countless innocent people that have never even been suspected of a crime.
|
|
Rig Maden sentenced around a secretive device that federal law enforcement and local police
|
|
have been using with increased frequency.
|
|
An international mobile subscriber identity locator or IMSI catcher.
|
|
These devices allow the government to electronically search large areas for a particular cell phone
|
|
signal, sucking down data on potentially thousands of innocent people along the way while attempting
|
|
to avoid many of the traditional limitations set forth in the Constitution.
|
|
The Stingray is a brand name of an IMSI catcher targeted and sold to law enforcement.
|
|
A Stingray works by masquerading as a cell phone tower to which your mobile phone sends
|
|
signals to every 7-15 seconds whether you are on a call or not and tricks your phone
|
|
into connecting to it.
|
|
As a result, the government can figure out who, when, and to where you are, calling
|
|
the precise location of every device within range and with some devices even capture
|
|
the content of your conversations.
|
|
Given the breadth of information that can stealthily obtain, the government prefers the
|
|
public and judges alike not know exactly how Stingray's work.
|
|
And they have even argued in court that it should be able to keep its use of the technology
|
|
secret.
|
|
The Electronic Privacy Information Center has filed a FOIA request for more information
|
|
on Stingrays, but the FBI is dragging its feet and is sitting on 25,000 pages of documents
|
|
explaining the device.
|
|
In Rigmaiden, the government asked a federal judge in Northern California to order Verizon
|
|
to assist in locating the defendant, who was suspected in a tax fraud scheme, but after
|
|
they received an order telling Verizon to provide the location information of an aircraft
|
|
they thought to be the defendants, the government took matters into their own hands.
|
|
They claimed this authorization somehow permitted its own use of a Stingray.
|
|
Not only did the Stingray find the suspect, Rigmaiden, but it also got the records of
|
|
every other innocent cell phone users nearby.
|
|
The government now concedes that the user device was a search under the Fourth Amendment
|
|
and claims it had the warrant, despite the fact that, as we explained in our brief, the
|
|
order directs Verizon to provide the government with information and assistance, but nowhere
|
|
authorizes the government to search or seize anything.
|
|
In fact, the government's application made no mention of an IMSI catcher or a Stingray
|
|
and only has a brief sentence about its plans buried at the end of an 18-page declaration.
|
|
The mobile tracking equipment ultimately generates a signal that fixes the geographic position
|
|
of the target broadband access cards selling the telephone.
|
|
A judge initially signed off on this order, but clearly the government did not accurately
|
|
and adequately explained what it was really up to.
|
|
Beyond the government's conduct in this specific case, there is an even broader danger in
|
|
law enforcement using these devices to locate suspects.
|
|
Regardless of whether they explained the technology to the judges, these devices allowed the
|
|
government to conduct broad searches amount to general warrants, the exact type of search
|
|
the Fourth Amendment was written to prevent.
|
|
A Stingray, which could potentially be beamed into all the houses in one neighborhood,
|
|
looking for a particular signal, is the digital version of the pre-revolutionary war practice
|
|
of British soldiers going tour to tour, searching American homes without rationale or suspicion
|
|
let alone judicial approval.
|
|
The Fourth Amendment was enacted to prevent these general fishing expeditions.
|
|
As the Supreme Court has explained, a warrant requires probable cause for all places searched
|
|
and is supposed to detail the scope of the search to ensure nothing is left to the discretion
|
|
of the officer executing the warrant.
|
|
But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing
|
|
the government to enter into the home via a cellular signal at law enforcement's discretion
|
|
and rummaging at will without any supervision, the government can't simply use technology
|
|
to up end centuries of constitutional law to conduct a search they would be prevent from
|
|
doing physically.
|
|
To read the rest of this article, follow links in the show notes.
|
|
From torrentfreak.com
|
|
Dated October 18, 2012 by IndigMax, new mega upload will deflect copyright liability and become
|
|
rate proof.
|
|
This week the hottest story in file sharing was the announcement that the pirate bay had
|
|
boosted its security by migrating its operation into the cloud.
|
|
Performance and cost issues aside, the main aim of the site is to have as much uptime as
|
|
possible and that necessarily involves not getting rated.
|
|
The site's operators believe they have that covered.
|
|
It's a day later and another famous file sharing operation is preparing for its relaunch
|
|
with similar issues in mind, albeit from a different angle.
|
|
The return of mega upload, or rather mega as it will be called, will have an eye firmly
|
|
placed on security to ensure not only a completely legal operation, but one there's almost
|
|
immune to shutdown.
|
|
Speaking with wiredkim.com, and business partner Matthays Ortman have been outlining how encryption
|
|
will strengthen mega's safe harbors.
|
|
Before users upload their files to mega, they will be encrypted using the AES algorithm.
|
|
Users will then be provided with a unique decryption key giving them sole responsibility
|
|
for who can have future use of the file.
|
|
Not only does this ensure complete security, and privacy for users' files, mega will
|
|
have no knowledge of any encrypted file's contents at any stage, effectively deflecting
|
|
any future accusation that they were aware of how this service was being used.
|
|
But of course, none of this can protect mega from the kind of act-first worry-later strategy
|
|
employed by the U.S. government when it raid mega upload in January, so to counter
|
|
that kind of threat, mega will employ some technical countermeasures, including placing
|
|
sets of servers in separate countries.
|
|
Quote, so even if one country decides to go completely berserk from a legal perspective
|
|
and freeze all servers, for example, which we don't expect because we're fully complied
|
|
with all the laws of the countries we place servers in, or if a natural disaster happens,
|
|
there's still an allocation where all the files are available or explained.
|
|
This way it's impossible to be subjected to the kind of abuse that we've had in the
|
|
U.S. he adds.
|
|
To read the rest of this article, follow links in the show notes.
|
|
From EFF.org, day at October 5, 2012, by Jillian York, EFF condemns a rest of prominent Cuban
|
|
bloggers.
|
|
EFF is deeply concerned to hear of the arrest of Cuban dissident blogger Yoni Sanchez,
|
|
along with her husband journalist Renaldo Escobar, and blogger Augustin Diaz, according
|
|
to reports, the trio was arrested in the eastern province of Bayamo, where they had
|
|
traveled to attend the trial of a Spanish political activist facing vehicular homicide
|
|
charges in the crash that killed democracy activists as Waldo Péra and Harold Capero.
|
|
The purpose of Cora Mero's visit to Cuba was to meet with human rights activists.
|
|
The official reason for their arrest is currently unknown.
|
|
Global voices has compiled reactions to the arrest from Cuban bloggers.
|
|
Sanchez has become one of Cuba's most prominent bloggers over the years, winning several
|
|
awards and being named to Time Magazine's 100 Most Influential People in 2008.
|
|
Due to Cuba's tight restrictions on internet use, she has often relied upon networks outside
|
|
of the country to publish her posts.
|
|
Sanchez has repeatedly been denied permission to leave the country.
|
|
We joined the Committee to Protect Journalists in condemning the arrest of the three bloggers
|
|
and call on Cuban authorities to release Sanchez Escobar and Diaz immediately.
|
|
From torrentfreak.com by Nick Maxx, day of October 16, 2012, DMC noticed forces 1,450,000
|
|
education blogs, offline.
|
|
The DMCA gives rights holders a mechanism through which they can have content or links
|
|
to content removed from the internet if they infringe on their copyrights.
|
|
Google alone receives millions of these kinds of requests every year and to be fair a majority
|
|
appear to play by the rules.
|
|
However, the system, or rather, the way it is being played, is clumsy.
|
|
Every week we're seeing wrongful takedowns, including those designed to hurt free speech,
|
|
bifold dissenting voices, and some that are just overly aggressive and totally blind
|
|
to the collateral damage they can cause.
|
|
Today we see the DMCA take down that fits squarely in the leader category, and involves
|
|
a publisher, Pearson, and the operator of WordPress Information Resource, WPMU Dev, or
|
|
EduBlogs, described as the oldest and second largest WordPress multi-site setup on the web.
|
|
While according to the company's stats, EduBlogs have more than 1,451,000 teacher and
|
|
student blogs online, but last week, due to the DMCA action by Pearson, and a massive
|
|
overreaction by EduBlogs server host server Beach, every single one of them was taken offline.
|
|
The problem, five years ago an Eduberg user called Clive published a copy of the Bex
|
|
Hopelessness Scale, a proct to which Pearson owns the copyright.
|
|
One of our teachers in 2007 had shared a copy of Bex Hopelessness Scale with his class,
|
|
a 20 question list, tolling some 279 words, published in 1974, that Pearson would like
|
|
you to pay $120 for, EduBlogs founder, and CEO James Former explains.
|
|
However, instead of simply contacting EduBlogs where their takedown knows, Pearson contacted
|
|
server Beach instead.
|
|
This tactic of contacting host of websites instead of the sites themselves is becoming
|
|
more widespread.
|
|
A developing strategy of anti-piracy companies is to cause as much aggravation as possible
|
|
with their takedown notices to make hosting difficult for anyone deemed to be an infringer.
|
|
Whether Pearson follows this strategy is unknown, but if they want to cause a lot of trouble
|
|
with this notice it definitely worked, despite EduBlogs complying with the notice.
|
|
So we looked at the infringing blog, figured that whether or not we liked it, Pearson
|
|
will probably correct about it, and as it hadn't been used in the last five years,
|
|
it's blocked the site so that the content was no longer available and informed server
|
|
Beach.
|
|
Says Former.
|
|
However, Former says that server Beach detected that the offending blog was still in the
|
|
EduBlogs web cache, and even though it was inaccessible to the public, responded with
|
|
the following notice, and closed as a picture of the notice.
|
|
A few hours later, server Beach took action, not to shut down just the offending blog,
|
|
but to take the whole EduBlogs operation offline.
|
|
A total of more than 1.45 million blogs.
|
|
That's a huge number of people affected, even if each blog has just a single reader.
|
|
The blogs were eventually restored, but now there is some debate over who said what to
|
|
who and when.
|
|
Former says that server Beach now inform him that they tried to contact EduBlogs 10 days
|
|
earlier via an automated system, but Former denies they received anything.
|
|
To read the rest of this article, follow links in the show notes.
|
|
From TechDirt.com by Mike Masnick, dated Friday, October 19, 2012.
|
|
School suspend students for finding Racy Photo Teacher accidentally put on their iPads.
|
|
We've seen schools that ridiculously blame men suspend their students for videotaping
|
|
misdeeds by staff or faculty, but this latest story is really bizarre.
|
|
A female middle school teacher in Anderson, Indiana, somehow, and the details are not
|
|
at all clear.
|
|
Put a Racy Photo herself onto a school-issued iPad that students were using.
|
|
They found the photo, and the school suspended the students.
|
|
Again, the details are pretty hazy.
|
|
The photo was described by one of the students as a topless photo, but a police report on
|
|
the instance said it was from the neck down with partial exposure.
|
|
At the link above, Cash Hill suggests this sounds more like, quote, a classic no-face
|
|
no-shirt shot that involved a bra and possible cleavage, but no actual nudity, unquote.
|
|
This is also not entirely clear how it got onto the iPad.
|
|
Though the suggestion is that it may have had something to do with Apple's iCloud sinking
|
|
across devices, it's entirely possible that the teacher used her own account for her
|
|
own iPhone and the school iPad, leading to the images from her phone, sinking to the iPad.
|
|
No matter what, it makes no sense that the students are suspended and may face even more
|
|
punishment.
|
|
Quote, those students have been suspended and threatened with expulsion, unquote.
|
|
The students, quite reasonably, are infuriated this, quote, it's not our fault that she had
|
|
the photo on there.
|
|
Trout said, we couldn't do anything not to look at it.
|
|
If it just popped up when he pressed the button, it was her fault that she had the photo
|
|
on there, her iPhone sink to it.
|
|
She had to have pressed something to make all of her photos sink on there, unquote.
|
|
When asked about it, the school district's assistant superintendent, Beth Clock, told
|
|
the media, the students' punishment will not be changed.
|
|
Hopefully, the students will seek to get the suspension overturned in some way, because
|
|
based on the details, this seems absolutely ridiculous.
|
|
Other headlines in the news, to read these articles, follow links, and the show notes
|
|
under the other headlines section, pirate bay moves to the cloud becomes rate proof.
|
|
The command line podcast, 1016-2012, interview with Cory Doctro over the note novel, pirate
|
|
cinema.
|
|
A tale of two countries, New Zealand apologized for illegal domestic spying, while US still
|
|
refuses to acknowledge NSA's warrantless wiretapping.
|
|
News from tech.com, worldstory.com, islingreview.com, and allgov.com used under a range permission.
|
|
News from torrentfreak.com and EFF.org used under permission of the creative commons
|
|
by attribution license.
|
|
News from democracynow.org used under permission of the creative commons by attribution, non-commercial,
|
|
no derivatives license.
|
|
News sources retain their respective copyrights.
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
|
Here are the vials statistics for this program.
|
|
Your feedback matters to me.
|
|
Please send your comments to dg at deepgeek.us.
|
|
The webpage for this program is at www.talkgeektoMe.us.
|
|
You can subscribe to me on Identica as the username DeepGeek.
|
|
You could follow me on Twitter.
|
|
My username there is dgtgtm as in DeepGeek Talk Geek To Me.
|
|
This episode of Talk Geek To Me is licensed under the creative commons attribution share
|
|
like 3.0 on port license.
|
|
This license allows commercial reuse of the work, as well as allowing you to modify the
|
|
work, so long as you share alike the same rights you have received under this license.
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
|
You have been listening to Hacker Public Radio at Hacker Public Radio.
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
|
Today's show, like all our shows, was contributed by a HBR listener like yourself.
|
|
If you ever consider recording a podcast, then visit our website to find out how easy
|
|
it really is.
|
|
Hacker Public Radio was founded by the Digital Dark Pound and the Infonomicom Computer
|
|
Club.
|
|
HBR is funded by the Binary Revolution at binref.com, all binref projects are crowd-sponsored
|
|
by LinaPages.
|
|
From shared hosting to custom private clouds, go to LinaPages.com for all your hosting
|
|
needs.
|
|
Unless otherwise stasis, today's show is released under a creative commons attribution share
|