- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
282 lines
25 KiB
Plaintext
282 lines
25 KiB
Plaintext
Episode: 1251
|
|
Title: HPR1251: TGTM Newscast for 2013-05-19 DeepGeek
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1251/hpr1251.mp3
|
|
Transcribed: 2025-10-17 22:27:09
|
|
|
|
---
|
|
|
|
You are listening to TGTM News, number 97. Record for Sunday, May 19, 2013. You are listening
|
|
to the Tech Only Hacker Public Radio Edition to get the full podcast, including political,
|
|
commentary, and other controversial topics. Please visit www.toolgeektme.us.
|
|
Here are the vials statistics for this program. Your feedback matters to me. Please send
|
|
your comments to DG at deepgeek.us. The webpage for this program is at www.toolgeektme.us.
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
|
My username there is DGTGM, as in DeepGeek TalkGeek to me.
|
|
The United States government told the court last week that it fears the end of the mega upload
|
|
prosecution if the judge makes the quote wrong and quote decision. And these words are now being
|
|
used against it. In a new brief submitted to the Virginia District Court, mega uploads
|
|
lawyers argue that the government admits that it may not have a case. Earlier this week,
|
|
mega uploads lawyers released a white paper accusing the Obama administration of being
|
|
corrupted by Hollywood and other major corporations and detailing how the entire criminal case
|
|
against mega upload is baseless. In addition to this public attack, mega uploads legal
|
|
teams also building up pressure in court. In a new brief, they argue that the case against
|
|
the company should be thrown out since the government has more or less admitted that there
|
|
is no legal basis to keep the company in criminal limbo. The two parties have a standoff about
|
|
rule four of criminal procedure, which requires the authorities to serve a company at an address
|
|
in the United States. According to mega upload, this is impossible since the company is based
|
|
in Hong Kong. The US government disagreed and said that it could find a way to serve the
|
|
company, but this is yet to happen. What followed was a back and forth exchange with mega upload
|
|
requesting an end to the case and the US arguing against it. In an unexpected move last week,
|
|
the government stressed the importance of the pending decision by pointing out that the
|
|
wrong choice could put an end to the case. In a brief file yesterday evening, mega uploads
|
|
lawyers responded to these claims by pointing out that without a dismissal, quote, mega upload
|
|
will be indefinitely stuck in criminal limbo. This would mean that the company's rights
|
|
will continue to be violated by the current stalemate. As a result, mega upload is trapped
|
|
in a state of criminal limbo where it is subjected to daily irreparable harm from criminal
|
|
indictment and the seizure of its assets while being denied the benefits of the adversarial
|
|
process and protections. According to mega upload's legal team, the government appears
|
|
to be contradicting itself. The lawyers note that the government first argued that mega
|
|
upload can be served when Kim.com and the other defendants are extradited from New Zealand,
|
|
but that it now appears to be backing away from this stance. Quote, the government has
|
|
now changed its tune, claiming that because of delays in the extradition process, sub-quote,
|
|
it is likely that any temporary dismissal would be permanent and contrary to the interests
|
|
of justice in sub-quote and, quote, the lawyers write, quote, the government thus seems
|
|
to confirm what this court has already observed, namely, sub-quote, that the individual defendants
|
|
may never be extradited and sub-quote. And criminal proceedings may therefore never
|
|
commence. Given this reality, due process demands that the superseding indictment be dismissed,
|
|
and quote, the recent briefs from the U.S. government and mega upload show that district
|
|
court judge Liam O'Grady's decision will be a pivotal one. From EFF.org dated May 7,
|
|
2013, by Danny O'Brien and contributors Anas Kutesh and Rainy Wrightman. Syrian
|
|
Internet goes dark, leaving questions and uncertainty. Earlier today, we learned that
|
|
Internet traffic between Syria and Western online services had plummeted drastically,
|
|
indicated sick, that the country's connection to the wider Internet had been shut down. Reports
|
|
from renesis and Google confirmed that the routes into Syria had been withdrawn, implying
|
|
either a massive infrastructure cut, or a deliberate silencing of online communication.
|
|
The details of the situation in Syria are still unknown, but we are deeply concerned that
|
|
this blackout is a deliberate attempt to silence Syria's online communications and further
|
|
draw a curtain over grave events currently unfolding on the ground in Syria. There's a graph
|
|
here that you can find by going to the original article linked in the show notes. According
|
|
to Dan Hubbard of Umbrella Security Labs, quote, at around 1845 UTC, open DNS resolvers
|
|
saw a significant drop in traffic from Syria. On closer inspection, it seems Syria has
|
|
largely disappeared from the Internet, end quote. Hubbard notes that the two top level
|
|
domain servers for Syria, NS1.tld.sy and NS2.tld.s, were unreachable earlier today. Matthew
|
|
Prince at CloudFair published a video demonstrating just how the routes into and out of Syria's
|
|
Internet were withdrawn. This is not the first time Syria has suffered an Internet shutdown.
|
|
In November 2012, Syria suffered a severe Internet blackout. And as the violence in the
|
|
region has escalated, we've documented campaigns of targeted malware attacks against Syrian
|
|
activists. Syrians have been suffering an unprecedented humanitarian crisis as the uprising
|
|
against the Assad regime turned into a violent civil war encompassing the entire country.
|
|
The uprising in Syria began in March 2011 as part of the Arab Spring revolutions, with
|
|
protesters taking to the streets to demand the resignation of President Bashar Assad.
|
|
The human rights data analysis group has analyzed evidence of mass killings in the region
|
|
and found 59,648 unique identifiable records of killings between March 2011 and November
|
|
2012. Most foreign media were banned and expelled from Syria in 2011. Yet, during this time,
|
|
the Internet has largely remained available. While heavily censored, monitored, and compromised,
|
|
the Internet has served as an important window connecting the world at large to Syria,
|
|
and one way that international observers could connect with individuals on the ground in that country.
|
|
A number of activists on the ground in Syria have access to Internet via satellite links,
|
|
which can connect them to the Internet, but carries a high risk for detection, which can be life-threatening.
|
|
We are continuing to monitor the situation in Syria. Information and resources are being
|
|
shared on Twitter using the hashtag SyriaBlackOut. From eff.org dated May 9, 2013, by Mark MJ Cox.
|
|
Update to email privacy law must go further.
|
|
Proposals to update the email privacy law, the Electronic Communications Privacy Act,
|
|
are moving quickly in Congress. ECPA is in dire need of an update,
|
|
as it was written in the mid-1980s, long before the advent of ubiquitous webmail and cloud storage.
|
|
In the past, ECPA was used by the Department of Justice, the DOJ, to obtain emails and other
|
|
private online messages older than 180 days without a probable cause warrant. If law enforcement
|
|
sought those same messages in the physical world, a warrant would be required. This difference is
|
|
known only wrong, but also inconsistent with the Fourth Amendment. Senators Patrick Leahy and
|
|
Mike Lee plan to fix this. Last month, s.607, a bill sponsored by Senators Leahy and Lee, passed
|
|
out of the Senate Judiciary Committee. The bill requires that law enforcement obtain a warrant
|
|
if it wants any private online messages, like private Facebook messages or Twitter direct messages.
|
|
The Digital Due Process Coalition, a diverse coalition of privacy advocates, including EFF,
|
|
and major companies, has worked hard to advance ECPA reform and should be commended for its work.
|
|
But because many agencies and companies already require a warrant for all private online messages,
|
|
more could be done to bolster the law. The bill should go beyond the status quo.
|
|
Missing in the bill is a suppression remedy. In the current draft, if law enforcement
|
|
obtained your email without a warrant and violation of the revised law, nothing would prevent that
|
|
illegally obtained evidence from being admitted in a criminal trial. A suppression remedy is a
|
|
common sense addition to the bill, ensuring that its impact is equal to its intent, ensuring all
|
|
private virtual messages, just like any other private physical message, are available to the
|
|
government only with a warrant based on probable cause. In United States V. Warshack, 2010,
|
|
the sixth circuit ruled that the 180-day rule, as written, was unconstitutional. At a hearing last
|
|
month, the DOJ Office of Legal Policy finally admitted that emails older than 180 days should
|
|
logically be protected by a warrant. That statement suggests that the DOJ will be seeking
|
|
warrants for all private online messages going forward.
|
|
But even before the DOJ's admission, many companies already require a warrant before they allow
|
|
law enforcement access to a user's private messages.
|
|
In the Hill, Google, Microsoft, and Yahoo, the three largest webmail providers,
|
|
said they require the government obtain a search warrant before accessing private content.
|
|
In addition, Facebook and Twitter also require a warrant for private messages.
|
|
Our Who Has Your Back campaign lists even more companies. Senators Leahy and Lee provided a good
|
|
start for Eckber reform. Likewise, the DDP coalition has done tremendous work to move the bill
|
|
forward, but Eckber reform must do more than codify the status quo. At the minimum, any bill passed
|
|
by Congress should have a suppression remedy. From torrentfreak.com by Andy, dated May 11th.
|
|
Why private torrent sites have strict copyright enforcement rules?
|
|
Private torrent sites have a much lower profile than, say, the Pirate Bay. But there are hundreds,
|
|
possibly thousands of them online, going about their business behind closed invite-only walls.
|
|
However, when it comes to providing access to content, private trackers are quite different
|
|
from their public counterparts. Instead of a Pirate Bay style free for all, access to pirate content
|
|
is held back by site admins and only unlocked when members contribute to the health of the community.
|
|
When asked to come up with an example of a torrent site, most tech savvy internet users might
|
|
cite a public and open site such as the Pirate Bay. However, thousands of file shares,
|
|
many of whom consider themselves to be experts, might reference a private invite-only site like
|
|
what.cd, whht.cd. The argument over which is better will continue forever, but the differences
|
|
between private and public sites are clear. Public sites offer content for free on a level playing field.
|
|
It doesn't matter who you are or where you're from. You can access the site's content for free.
|
|
There are no barriers to entry and there are no rules. Generally, private sites first require
|
|
potential users to obtain an invitation and these vary from fairly easy to extremely difficult to
|
|
get hold of. Once in, users are expected to play by a set of often very strict rules in order to
|
|
be guaranteed continued access to content. Screw up and the user is out and sometimes banned forever.
|
|
In short, and as strange as it might sound, to a certain extent operators of private torrent
|
|
sites implement an intellectual property protection regime to restrict access to content
|
|
and according to a research paper just published by Badal Balaz at Budapest University of Technology
|
|
and Economics, these voluntary IP regimes can go even further.
|
|
Balaz begins with a recollection of his attempts to gain an invite to a private tracker via the
|
|
site's IRC channel. He was immediately booted by a bot which explained that his entire country
|
|
had been banned from the site due to users from Hungary proving bad for the community in the past.
|
|
Quote, I laughed out loud. In the last few years, I got used to the black YouTube screens
|
|
telling me that this video was not available in your country. But it was completely unexpected to
|
|
see that the pirates are also locking me out from their musical archives and, quote, he writes.
|
|
Not that Balaz does not appreciate the need for control. He understands that by being closed,
|
|
these sites gain a stability that sites like the Pirate Bay cannot hope to achieve,
|
|
and he recognizes the need for rules in order to maintain a flourishing community.
|
|
Quote, most of the rules are there to ensure the long-term survival of the common resource pool
|
|
of shared files in an increasingly hostile, legal, and technological environment.
|
|
They also make sure that the collection is as comprehensive as possible and maintains the
|
|
highest achievable standards in terms of technical quality, and, quote, Balaz explains.
|
|
Quote, other rules establish internal administrative hierarchies, decision-making processes,
|
|
and conflict resolution methods. In other words, they establish the foundations of a self-governing
|
|
community, and, quote, throughout his paper, Balaz references several private sites,
|
|
but redacts their names to protect their privacy. We'll continue with his wishes,
|
|
but suffice to say this offers them very little extra security.
|
|
We recognize the sites immediately from his descriptions.
|
|
One, a site specializing in non-mainstream movies, told Balaz an interesting story about how they
|
|
handle copyright issues in order to keep their community healthy. Rather, then a straightforward
|
|
takedown response to a complaint, the site admin described an interesting negotiation,
|
|
where the complainant was paid off, not with money, but with ratio, the main currency available
|
|
on a private tracker. Ratio is the comparison between the quantities of data a user downloads
|
|
versus what he uploads. The more he does of the latter, the more he is allowed to do of the
|
|
former. Site admins have the ability to manipulate these stats to give users more relaxed access to,
|
|
quote, free, end, quote, content. Quote, most often, the producer will ask for his content to be
|
|
removed until a certain date or until they break even on the film. We have also paid, in ratio,
|
|
producers to keep their work on the site and, quote, the admin explained.
|
|
Balaz notes that, quote, backroom dealings, end, quote, like these, seem to be better received by
|
|
the site operators and provide an avenue for negotiated settlement rather than the alternative
|
|
of sending in the lawyers. Torrent Freak spoke to the admin of another private tracker specializing
|
|
in music, who confirmed that deals were in place with at least two dozen artists and label
|
|
workers who agree to keep the piece in exchange for ratio. With issues over outstanding influences
|
|
aside, private tracker rules are put in place to keep the community healthy. Balaz argues that
|
|
these revolve around keeping quality high, maintaining the completeness of the overall library,
|
|
and keeping the file sharing community strong. These factors take priority, even if that means
|
|
significantly reducing the usefulness of the site to the individual user.
|
|
One of the biggest complaints from users on private sites is that they are restricted by ratio
|
|
rules, while these are necessarily put in place to protect site's libraries and quality of service,
|
|
transfer speeds. For the rest of the community, they also amount to a copy protection system
|
|
enforced by the site admins, which effectively introduces a price for consumption, download,
|
|
and a price for labor, upload. It is important to note that private
|
|
trackers are not free markets, and the prices are not automatically defined by supply and demand.
|
|
On the contrary, prices are set by the not-so-invisible hands of the site administrators to
|
|
signal preferred behavior and to address certain shortcomings of the P2P activity. And quote,
|
|
Balaz notes, quote, by rewarding the sharing of certain content and penalizing the sharing of
|
|
others, such pricing mechanisms are able to ensure that older, less popular, niche, fringe,
|
|
or otherwise archival content stays accessible at all times within the community.
|
|
By setting download prices to zero, free leech, these sites play an important role in
|
|
directing attention to certain works and authors. Such mechanisms help admins to, quote,
|
|
curate the collection, end quote, and shape the cultural canon within the network. End quote.
|
|
Content producers are often accused of failing to adjust to the reality that online content
|
|
is no longer scarce. The internet allows infinite digital copies of content to be made at virtually
|
|
no cost. Balaz writes that while this is the case for open-torrent trackers, private trackers
|
|
counter with the implementation of rules that reintroduce artificial scarcity. Nevertheless,
|
|
users of private trackers are generally happy to play by the site rules, and their admins seem
|
|
to be more open to deal with rights holders, even as they break many of the rules laid down in
|
|
copyright law. Balaz notes, however, that these decisions are less to do with the rule of law
|
|
and more to do with the code of ethics negotiated within private site communities.
|
|
Quote, as long as the main question of the intellectual property field is not how people can be
|
|
forced to obey the law, but rather under what conditions they choose to respect the wishes of
|
|
authors and ensure the reproduction of different cultural fields. The survival of different social
|
|
practices will be a factor of their ethical disposition rather than their legality, and, quote,
|
|
Balaz writes, quote, in other words, we should expect ethically robust practices to persist,
|
|
even if their legality remains in question, and unethical practices will face considerable
|
|
public opposition, even if they are found to be legal. And, quote, finally, on the issue of private
|
|
trackers and their restrictions, Balaz closes with the following thoughts. Quote, voluntary
|
|
IP restrictions and peritical communities are probably the most effective enforcement mechanisms
|
|
up to date. Closed file sharing communities have developed tools of social control in spaces
|
|
where statutory copyright is irrelevant. The enforcement efforts that target these networks
|
|
destroy not just the resource pools and the communities that built them, but also destroy
|
|
the social controls that are in place, and, quote, Balaz notes. Quote, paradoxical as this may sound,
|
|
the aforementioned peritical communities may be the enforcement allies that rights holders have
|
|
been seeking all this time. In any case, it is apparent that they both have at least one
|
|
interest in common, a substantial cultural ecosystem. So maybe it is time to ask ourselves,
|
|
should we set the foxes to watch the geese? And, quote, from techdirt.com by Tim Cushing,
|
|
dated May 10th. Blogger issues DMCA notice to take down posts for infringing his How-To-Infringed
|
|
Post. From the Yo-Dog, I heard you liked infringement department. And your ad gauche is a blogger who
|
|
would like to have some infringing posts removed from the web. See if you can spot the point when
|
|
Goshi's irony detector malfunctions. Quote, copyright claim number zero. My article, How-To-Play
|
|
Nintendo DS Games on Android is infringed by the text exerted on the site. Beginning with the
|
|
text, did you know that your Android device can play NDS games? With the help of an emulator,
|
|
yes, there is a free open source DS emulator out there on Google Play. You can play games like
|
|
Phoenix Wright, Dragon Quest 9, and touch detective on your phone, end quote.
|
|
Original work URL, HTTP colon, frontslash, frontslash, and URAG2008.hubpages.com slash hub slash How-To-Play-Tentendo-DS-Games-On-Android.
|
|
To paraphrase, yeah, it looks like some people have infringed my post about infringing,
|
|
so if you could do me a solid and take those out, that would be great.
|
|
Goshi's post titled How-To-Play Nintendo Games on your Android does exactly what it says on the
|
|
tin, pointing readers towards a free open source emulator, providing instructions on installing
|
|
an NDS BIOS and directing readers towards Google to search for .NDS ROMs. Goshi has thoughtfully
|
|
included the following warning on his post. Quote, downloading ROMs and BIOS files is illegal.
|
|
I don't support piracy, and this guide is only for entertainment purpose. Reader discretion
|
|
is advised, end quote. The discussion about whether emulation equals infringement can wait for
|
|
another day, but I'm very definitely sure Nintendo considers emulation of current gen hardware
|
|
and software to be infringing. In fact, Nintendo seems to get a bit irate about it when questioned
|
|
about it, according to its extensive FAQ on emulation. Quote, how does Nintendo feel about
|
|
the emergence of video game emulators? The introduction of emulators created to play
|
|
illegally copied Nintendo software represents the greatest threat to date to the intellectual
|
|
property rights of video game developers. As is the case with any business or industry,
|
|
when its products become available for free, the revenue stream supporting that industry is threatened.
|
|
Such emulators have the potential to significantly damage a worldwide entertainment software
|
|
industry, which generates over $15 billion annually and tens of thousands of jobs.
|
|
How come Nintendo does not take steps towards legitimizing Nintendo emulators?
|
|
Emulators developed to play illegally copied Nintendo software promote piracy.
|
|
That's like asking, why doesn't Nintendo legitimize piracy?
|
|
It doesn't make any business sense. It's that simple and not open to debate. End quote.
|
|
Wow, Tasty, Gosh knows it too, hence the disclaimer.
|
|
Now, Gosh may have a legitimate complaint that his post is being scraped or reposted without
|
|
his consent, but complaining about infringers infringing on your post about infringement is more
|
|
than a little like sending an official notice informing Google that listed kettles are black
|
|
and infringing on your original pot's blackness. Perhaps the offending scrapers could just put up
|
|
a little warning stating that they copied Gosh's post for entertainment purposes only.
|
|
It certainly entertained me. Additional headlines in the news. To read this story,
|
|
follow the link in the show notes. US government attack on mega upload bears hallmarks of
|
|
digital gitmo. And now for a talk geek to me news original piece. The brick and mortar store
|
|
staples has for a while now given customers a rebate on used ink cartridges of $2 per cartridge.
|
|
Staples is now changing that policy to give customers $2 back on ink cartridges only when they've
|
|
spent at least $30 on ink or toner in the previous 180 days. Since a lot of people don't use a whole
|
|
lot of ink anymore, it could be a lot more than 180 days since the last time they purchased ink.
|
|
This is going to cut into the rebates that people have been expecting from staples on their
|
|
used up ink cartridges. On the upside, they've doubled the monthly limit, but that doesn't help people
|
|
don't use a lot of ink. If you're one of those folks who was used to recycling ink and getting
|
|
a rebate from staples, you're probably going to want to hang onto your used cartridges until just
|
|
after you purchase replacement cartridges. Staffed and produced by the TGTM news team
|
|
at a turtle selection by DeepGeek, views of the soy authors reflect their own opinions and not
|
|
necessarily those of TGTM news. News from techdirt.com and these times.com and allgov.com used under
|
|
range permission. News from turntfreak.com and EFF.org used on the permission of the Creative
|
|
Commons by Attribution Licensed. News from venezuelaanalysis.com and democracynow.org used on the
|
|
permission of the Creative Commons by Attribution non-commercial no-dirters license. News sources
|
|
retain their respective copyrights. Thank you for listening to this episode of Talk Geek To Me.
|
|
Here are the vials statistics for this program. Your feedback matters to me. Please send your comments
|
|
to dg at deepgeek.us. The web page for this program is at www.talkgeektoMe.us. You can
|
|
subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter. My username
|
|
there is dggtm as in DeepGeek Talk Geek To Me. This episode of Talk Geek To Me is licensed
|
|
under the Creative Commons Attribution ShareLike3.0 on Port License. This license allows commercial
|
|
reuse of the work as well as allowing you to modify the work so long as you share
|
|
alike the same rights you have received under this license. Thank you for listening to this episode
|
|
of Talk Geek To Me. You have been listening to Hacker Public Radio or Hacker Public Radio
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
|
Today's show, like all our shows, was contributed by a HPR listener like yourself. If you ever
|
|
consider recording a podcast, then visit our website to find out how easy it really is.
|
|
Hacker Public Radio was founded by the Digital Dark Pound and New Phenomicon Computer Club.
|
|
HPR is funded by the binary revolution at binref.com. All binref projects are
|
|
crowd-responsive by linear pages. From shared hosting to custom private clouds,
|
|
go to lunarpages.com for all your hosting needs. Unless otherwise stasis,
|
|
today's show is released under a Creative Commons Attribution ShareLike3.0 on License.
|