Files
hpr-knowledge-base/hpr_transcripts/hpr0920.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

418 lines
28 KiB
Plaintext

Episode: 920
Title: HPR0920: TGTM Newscast for 2012/02/08
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0920/hpr0920.mp3
Transcribed: 2025-10-08 04:58:58
---
music
You're listening to Talk Geek 3 News, number 59, required for February 8, 2012.
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast,
including political, commentary, and other controversial topics.
Please visit www.talkgeektme.us.
Here are the vials statistics for this program.
Your feedback matters to me, please send your comments to dgatdeepgeek.us.
The webpage for this program is at www.talkgeektme.us.
You can subscribe to me on Identica, as the username DeepGeek, or you could follow me on Twitter.
My username there is dgtgtm, as an DeepGeek Talk Geek to me.
Now the tech round up.
Data January 20, 2012, from eff.org, ACLU and EFF, to appeal secrecy ruling in Twitter WikiLeaks case,
Richmond, Virginia.
Find to make public government efforts to obtain internet users' private information without
a warrant, today the American Civil Liberties Union, the ACLU, and the Electronic Frontier
Foundation, the EFF, planned to file an appeal in the legal battle over the records of several
Twitter users in connection with the government's WikiLeaks investigation.
The ACLU and EFF represent Icelandic parliament member, Bergetta Hans Dattier, the appeal filed
jointly with other Twitter users, Jacob Applebaum, and Rob Gungrip.
In challenges US District Court, Liam O'Grady's November decision refusing to unseal or publicly
list all orders that may have been sent to companies other than Twitter and any related
motions and court orders.
Quote, these people want to try to protect their privacy and their First Amendment rights,
and the government should not be able to prevent that by hiding court records, our courts
or public.
Secret court orders and secret court docket should not be permitted, except in extraordinary
circumstances, said Aiden Fine, staff attorney with the ACLU speech Privacy and Technology
Project.
This case is just one example of the unfortunate recent trend to make our court processes less
open and transparent.
In light of the District Court's denial of stay, Hans Dattier and the other Twitter users
involved in the case did not appeal the judge's decision, requiring Twitter to turn over their
records.
Attorneys for Hans Dattier and Fine of the ACLU Rebecca Glenberg of the ACLU of Virginia
and Cindy Cohen, Lee Tien, and Masha Hoffman of EFF.
The motions were joined by attorneys from the law firm Kekir and Van Neste LLP and
the law office of John Decline on behalf of Jacob Applebaum and Ron Gangship, respectively
as well as local counsel in Virginia.
Editorial comment, after the ruling the Icelandic Member of Parliament, Ms. Berketa Hans Dattier
broke silence on the matter of this case, so I included in the other headlines section
links to her blog entry about it, as well as a link to a Radio Netherlands International
English podcast that includes an interview with her.
From EFF.org, dear January 28, 2012, by Jillian C. Ork, the right to an anonymity is a matter
of privacy.
Throughout history there have been a number of reasons why individuals have taken to
writing or producing art under a pseudonym.
In the 18th century, James Madison, Alexander Hamilton, and John Jay took on the pseudonym
Publius to publish the Federalist Papers.
In 19th century England, pseudonyms allowed women, like the bronze sisters, who initially
published under Kura Ellis and Acton Bell, to be taken seriously as writers.
Today, pseudonyms continue to serve a range of individuals and for a variety of reasons.
At EFF, review anonymity as both a matter of free speech and privacy, but in light of
the International Privacy Day, January 28, this peaceful focus mainly on the later, including
at the ways in which the right to anonymity or pseudonymity is truly a matter of privacy.
Human beings are complex creatures with multiple interests, as such many professionals use pseudonyms
online to keep their employment separate from their personal life.
One example of this is the guardian columnist, girl scientist, spelled GRL, who, upon discovering
her Google Plus account, had been deleted for violating their common name policy, penned
a piece explaining her need for privacy.
Another example is prominent Moroccan blogger, Hisham Kribchi, who has explained his use of
a pseudonym, stating, quote,
When I first started blogging, I want my identity to remain secret because I didn't want my
online activity to interfere with my professional life.
I want to keep both as separate as possible.
I also want to use a fake name because I wrote about politics and I was critical of my
own government.
A pseudonym would shield me and my family from personal attacks.
I want to have a comfortable space to express myself freely without having to worry about
the police when I visit my family back in Morocco.
Although Kribchi's reasoning is too fold, his primary concern even stronger than his
need for protection from his government was keeping his online life separate from his
employment.
Even Wail Gonam, the now famous Egyptian, who helped launch a revolution conducted
his activism under a pseudonym, not to protect himself from the Egyptian government,
but rather because he was an employee of Google and wanted to maintain an air of neutrality.
In 2008, an Alaskan blog, known as Alaska Muckraker or AKM, rose to fame for her vocal
criticism of fellow Alaskan and then McCain running mate Sarah Palin.
Later, after invading against a rude email sent to constituents by Alaska State Representative
Michael Dugan, AKM was outed by Dugan, who wrote that his, quote, own theory about public
process is you can say what you want as long as you are willing to stand behind it using
your real name, unquote.
AKM, a blogger decidedly committing an act of journalism could have had any number of
reasons to remain anonymous as she later wrote, quote, I might be a state employee, I might
not want my children to get grief at school, I might be fleeing from an ex partner who
was abusive and would rather he not know where I am, my family might not want to talk
to me anymore, I might alienate my best friend, maybe I don't feel like having a brick
phone through my window, maybe my spouse might work for the Palin administration, maybe
I'd rather people not know where I live or where I work, or none of those things may
be true, none of my readers nor Mike Dugan had any idea what my personal circumstances
might be.
Though Dugan claimed that AKM gave up her right to anonymity, when her blog began influencing
public policy he's wrong, in the United States the right to anonymity is protected by the
first amendment and must remain so to ensure both the free expression and privacy rights
of citizens, similarly in 2009 Ed Wielins, a former official with the Department of Justice
out anonymous blogger John Blevins, a professor at the South Texas College of Law, in the
National Review calling him irresponsible and a coward, Blevins took the fall gracefully
later explaining why he had chosen to blog under a pseudonym.
Unlike Kryptchi, Blevins reasons were numerous, he feared losing tenure and legal clients,
but he also feared putting the jobs of family members in the political space at risk.
A friend of mine, let's call him Joe, is the sibling of a famous celebrity, but while
he's very proud of his sibling Joe learned early on that not everyone has his best interests
at heart.
Therefore Joe devised a pseudonym to use online in order to protect the privacy of himself
and his family.
In Joe's case the threat is very real, celebrities are regularly stalked, their houses broken
into, his pseudonym keeps him feeling normal in his online interactions while simultaneously
protecting his sibling and the rest of his family from invasions of privacy.
Anonymity and pseudonymity may seem increasingly difficult to achieve online, not only to
companies like Facebook restrict your right to use a pseudonym, but even when you do think
you're anonymous you might not be, as blogger Rosemary Port found in 2009 after Google
turned her over her name in response to a court order.
While we should continue to fight for our privacy under the law.
The best thing we can do as users who value their right to anonymity is to use tools
like TOR.
Anonymous bloggers can use global voices, advocacy, online guide to blogging anonymously with
WordPress and TOR.
And all internet users should educate themselves about what is and isn't private on their online
accounts and profiles.
From TORNFREAK.com by EnigmaX, they generate 20th 2012.
What made it a rogue site worthy of destruction?
File hosting services all around the world will have looked on in horror yesterday as
Mega Upload, one of the world's largest cyberlocker services was taken apart by the FBI.
Foreign citizens were arrested in foreign lands and at least $50 million in assets seized.
So what exactly prompted this action?
TORNFREAK read every word of the 72 page indictment so you don't have to.
And we were surprised by its contents.
Yesterday a massive operation took down Mega Upload, one of the world's leading file storage
services and one of the world's biggest sites period.
While the timing came as a huge post-soap of protest surprise, the fact that the site
was targeted was not.
For many months there have been rumblings behind the scenes that something might be done
about Mega Upload, nevertheless the manner in which the action was taken and the language
used by the authorities in doing so was utterly unprecedented.
So the key question this morning is this, what made Mega Upload a rogue site which deserved
to be completely dismantled and its key staff arrested.
The answers lie in the 72 page indictment and showed just how the authorities with the
massive assistance of the MPAA no doubt framed Mega's activities in such a way as to strip
it of any protection under the DMCA.
In the U.S., online service providers are eligible for safe harbor under the DMCA from
copyright infringement suits by meeting certain criteria, however the indictment states
that a member of the mega-conspiracy capital M capital C no less do not meet these criteria
because quote, they willfully infringing copyrights themselves on these systems have actual
knowledge that the materials on their systems aren't infringing or alternatively know facts
or circumstances that would make infringing material apparent, receive a financial benefit
directly attributable to copyright infringing activity where the provider can control that
activity and have not removed or disabled access to known copyright infringing material from
service they control.
End quote.
Let's cover the last point first, the apparent a non-removable of known copyright material
from Mega Upload servers first, a little background on how Mega Upload's user uploading system
worked because this is absolutely crucial to the case against the site.
Mega had developed a system whereby files set to be uploaded by users were hashed and
order to discover if a copy of the file already exists on the Mega Service.
If a file existed, the user did not have to upload his copy and was simply given a unique
URL in order to access the content in future.
Like this meant in practice is that there could be countless URLs owned by various users
but which all pointed to the same file.
Mega Upload's abuse tool to which major copyright holders were given access enabled the removal
of links to infringing works hosted on Mega Upload's servers.
However, the indictment claims that it quote did not actually function as DMCA compliance
tool as the copyright owners were led to believe unquote and here's why.
The indictment claims that when a copyright holder issued a takedown notice for content
referenced by its URL, only the URL was taken down, not the content to which it pointed.
So although the URL in question would report that it had been removed and would no longer
resolve to infringing material, URLs issued to others would remain operational.
Furthermore, the indictment states that a low Mega Upload staff referred to as members
of the conspiracy, discussed how they could automatically remove child pornography from
their systems, given a specific hash value.
The same standards weren't applied to complaint about copyright works.
In June 2010, it appears that Mega Upload was subjected to something of a test by the
authorities.
The company was informed pursuant to a criminal search warrant from the US District Court
for the Eastern District of Virginia that 39 infringing movies were being stored on their
service in Copatia, hosting in the Eastern District of Virginia.
Quote, a member of the Mega Conspiracy informed several of his co-conspirators at that time
that he located the named files using internal searches of their system.
As of November 18, 2011, more than a year later, 36 of the 39 infringing motion pictures
were still being stored on the service controlled by the Mega Conspiracy.
Unquote, the indictment reads.
The paperwork goes on to accuse Mega Upload of running a program between September 2005
and July 2011, which rewarded users for uploading infringing material.
A citation from an internal Mega Upload email from February 2007 titled Reward Payments
claims to show that at least two key staff members knew that cash payments were being paid
to users who uploaded infringing material, including, quote, full popular DVD rips, unquote,
and software with key generators wears.
Then, the indictment starts to throw up some very interesting questions, especially
how the authorities managed to get hold of not just one, but many of Mega Uploads internal
company emails, dating back to 2006, to use in the case against them.
It's certainly possible that the authorities were monitoring Mega Uploads correspondence,
but there are also at least two mentions in the indictment of an unnamed person described
as quote, an unindicted co-conspirator unquote, while prosecutors sometimes use this term
to describe people who have been excluded from an indictment on evidentiary concerns.
They also use it to describe individuals who have been granted immunity from prosecution.
In any case, these emails are being heavily relied upon since many appeared to indicate
knowledge among staff that copyright works were held on the company's service.
Here's a sample.
The email from 2006 claims to show how Mega Upload attempted to download large amounts
of content from YouTube and appeared by April that year to have obtained 30% of the site's
content.
A follow-up email in 2007 claimed that quote, Kim, Mega Uploads, found a really wants to
copy YouTube one-to-one unquote.
To read the rest of the samples of the email correspondence between internal staffers
of Mega Upload, you may read the full article at the show notes.
However, later on in the article, in one email, Kim.com reportedly said, this is a serious
threat to our business.
Please look into this and see how we can protect ourselves.
Adding should remove our domain to another country, Canada, or even Hong Kong.
The indictment separately lists several movies being distributed from Mega Uploads servers
in the United States, all of which were not yet commercially available.
There is no indication, however, that Mega Uploads operators knew they were there.
On face value, it would seem that in a handful of site instances, staff at the company did
indeed link each other to copyright works, but when the massive scale of the Mega Upload
operation is set besides them, their significance is put into a different perspective.
The issue of not taking down content is a fascinating one.
Mega Upload is not on its own when a hash's content then allows users to access already
stored versions of the same files, nevertheless, while taking down a specific URL and not the
content itself be enough to appease the courts.
Finally, and despite the assertions of the MPAA, RAAA, and the authorities, Mega Upload
carried a huge amount of non-infringing content, giving the service itself substantial non-infringing
users, nevertheless, all content has now been seized, leaving millions of people and
companies without their personal data.
Cyberlocker services and potential stops all around the world will be watching this
case like Hawks.
SizeMick doesn't really come close.
A tutorial comment there has been a lot of coverage of the Mega Upload case, both on
TorrentFreak, TechDirt.com, and OzTechnica.
I suggest you file this case as much as I will be following it, however, I can't read
everything into these podcasts, so you may want to follow articles, follow links, do searches
of the three aforementioned sites on your own.
However, it is fascinating how the e-leagles operated.
Mega Upload had both people legally operating and e-leal operating, and now because of the
rap musicians who have historically been short-changed by the big record labels, the big name
wants for moving the content to Mega Upload and getting paid as they were automatically
major sources of downloads and advertising revenues.
So the deal offered from Mega Upload to rap artists who were famous was better than
the deal offered by the RIAA and Kim.com in his last guest article written for TorrentFreak.com
said that he found a way to pay them 90% of the time, regardless of whether or not their
download is paid, preceded this attack.
You are not, you want to believe that the FBI is merely acting for their bosses, the RIAA
and MPAA or not, I submit that for your consideration, but I do want to turn now to another Mega Upload
article that details how the e-leagles operated as I found the patterns fascinated.
And then finally, to end up the tech segment, I will read about a foreign social networking
site to give an example of how people are reacting to the United States-America's fascist
and heavy-handed attitude toward the internet.
So that further ado, from TorrentFreak.com, day of January 28th, 2012, by a NIGMEX,
Mega Aftermath, upheaval in Pirate Warrersland.
While last week's shutdown of Mega Upload is a huge interest in itself, but a wave of
aftershocks and side effects are proving equally fascinating to watch, in addition to causing
all sorts of problems for legitimate users of file-sharing services, there is no avoiding
the fact that certain elements of the piracy scene are in a mess, amazingly still the beat
goes on.
Despite its rogue-stite status and various other warnings, when Mega Upload went down
last week, it still came as a shock.
But what came next was unprecedented, a dramatic reaction in Cyberlockerland that took out vast
libraries of digital content and capacity, the perception of the established ground rules
had been changed without passing of a single new door.
FBI are rest by huge numbers of police, enormous cash and asset seizures overseas, reward program
scrutiny, knowledge of payouts to persistent uploaders of infringing content, extradition.
These are things that changed the game.
Quote, if the US government can come forward Kim.com, it can happen to almost anyone, unquote,
a file-hosting operator told Torrent Freak on condition of anonymity.
I'm trying to think of everything I did positively wrong in the last three years and worrying
about that and the next three years also, if we even have that long.
For many hosting sites, it was time to react quickly.
Over this week, we documented the drastic actions taken by services such as file Sonic
and file serve, who shut down all third party sharing and, like many of this close down
their affiliate payout programs.
Later, we showed how file hosting competitors, such as foreshared, rapid share, and hot
file, had grown as users hunted for spare capacity.
In the space of a week, and the Mega Upload shut down aside, huge libraries of both
legitimate and pirate material were wiped out as file host after file host deleted and
impossible to calculate number of files and closed down thousands of suspected infringing
accounts.
And this is where it gets quite interesting.
For more than half a decade Hollywood and the recording industry have spent millions
of dollars, not so much on actually eliminating illegal content, but getting rid of links to
content, such as those found on BitTort.
This week, without a single cease and desist being sent, cyber lockers across the globe
not only self-deleted vast quantities of files, but in doing so made millions of links across
thousands of linking sites completely useless too.
For the operators of these linking sites and their uploaders this week has been a very
hard work indeed, for some sites it was all too much and the shutters have simply come
down.
The problem it seems is money.
While there is money to be made in torrent sites, the content shares there are largely
altruistic.
The cyber lockers scene is more complex and incestuous, with revenue being generated in a
handful of basic ways on both legal and illegal content.
Through reward programs, uploaders get paid on the number of times people subsequently
download content.
Typically, release sites can upload the content themselves and get paid like a regular uploader
when people download.
We want programs are important for cyber lockers too, since they attract customers away from
competitors and also give them an incentive to supply content.
Release sites and wears forms and uses the cyber lockers to get content, and when they
get there they are faced with a choice.
But a little, relatively slowly but for free, or pay for a premium account and get lots
as quickly as possible.
In many cases, choosing the first option means that cyber lockers also make more money
from advertising.
While various sites shut their rewards programs this week, those uploading purely for the money
were hit hard.
In fact, many who had cash mounting up in their accounts lost at all.
Some cyber lockers simply kept the accrued money, while the victims were livid.
Those who hate financially motivated sharing commented that just as had been served.
But while it's clear that some uploaders often young and in less well off countries are
sharing small time for a few bucks, for some the reward payouts are more important.
For many release sites, those rewards pay the server bills.
Quote, we needed to pay out and when, file host named redacted on request, shut down
sharing, we were all but finished, unquote, one admin of a release site told Torrent
Freak.
Quote, 90% of our content was hosted there.
Then they deleted all our files and closed the account.
They won't even speak with us about it.
A whole year's work gone, we shut at the end of the month, unquote.
But like working aunts, whose nest has just been smashed apart by angry humans, others
are utterly unfazed and just want to know which hosts are still paying out.
Despite the climate of fear, quite a few hosts say they are and it's evident from the
links being posted on release blogs that the upload for cash crew have noticed them quickly.
Things however are still in a state of flux.
Some of the file hosts still paying out appeared to be offering tiered rewards systems with
just about every country in the world getting a reasonable deal, but with the United States
right at the very bottom.
Another interesting rumor, which at the time of writing we have been unable to confirm,
is that one of the file hosts who banned third-party downloads earlier this week is now
re-enabling them.
This is something to look out for, without third-party links being operational, users are
extremely unlikely to sign up for a premium account, and this is where the cyber lockers
can make good money.
So finally, one has to ask, whether the mega upload shutdown has damaged the internet
piracy infrastructure, providing an answer is not easy.
The amount of material coming online has not really reduced.
Content feeding from the scene is business as usual.
Torrent sites are watching on closely, but the public ones tend not to host content.
Their users do.
Cyber lockers are in a mess, but already recovering.
Release sites are continuing albeit with a reduced number of multiple links to the same content.
Perhaps the best test is whether it's now very hard or impossible to find and download
popular content.
Not even close.
From Venezuelaanalysis.com, by Tamara Pearson of Venezuelaanalysis.com, new Venezuelan
social network takes off.
Mi Rida, January 25, 2012.
The new Venezuela social network, called Plaxed, which allows streams of short posts to
100 characters, as well as event invitation polls and questions, was created as an alternative
site so that the files or personal details found on the network, quote, aren't blocked,
erased, or followed, unquote, by U.S. Laws, said its creator, Cesar Coaches, a systems
and a nearing student.
The idea for a website began one and a half years ago, but was on trial a long time.
Then the project became a success.
We had 10,000 people registered in just one day, which collapsed our servers, unquote,
Cotiz, said, quote, we want a social network specifically for Venezuela, for phones and
desktops, and that is completely free.
Anyone can create a social network, be it for personal use or business, unquote, Cotiz,
said.
Plaxed is still under development, based on the freeware status net.
It still contains a lot of English, which is gradually being replaced.
It has no advertising, and its name, according to Cotiz, doesn't mean anything.
It's important that Venezuelians gradually take on new technology and create new social
networks, in order to start to eliminate this dependence that we have on websites made
in other countries, which fall under the law of those countries, so they can take the
information we put there at any time and do whatever they want with it, unquote.
Cotiz explained that Venezuelians could take Plaxed to court.
Should it do something on-tward with its information it has, because it falls under Venezuelian
laws, where they could not do that in the case of other social networks, like Facebook
or Twitter.
Social networking in Venezuela has experienced growth in recent years in Venezuela, as
internet usage has risen 40%, while President Hugo Chavez's Twitter account has the most
followers in the country.
According to report by Tendencius and Digitalis, Venezuela is third in Latin America for social
networking media use, with 30% of internet users registering on Facebook and 21% on Twitter.
Last year, the United Nations Institute UNESCO award Venezuelist info centers the King
Hamid bin Issa Al-Khalifa prize for their work in providing free internet access as well
as training, especially to people who were previously excluded due to poverty or location.
In 2010, there were 668 info centers, and since then many more have been built.
Other headlines in the news?
My Twitter case and thought crime.
This is Brigitte Hans Dattier's official blog post entry on the Twitter case.
The state were in Freedom's Road.
This is the English Podcasts from Rio Nellins and to National it features the interview
with Brigitte Hans Dattier.
News from Havana at times.org.org.gov.com and dissidentvoice.org use under a range permission.
News from EFF.org and twartfreak.com use under permission of the Creative Commons by Attribution
Non-Commercial.no-derivorous license.
News from renisreliaanalysis.com is copy-left audio-interlude moment of clarity number 112.
Use under permission of Lee Camp.
News sources retain their respective copyrights.
Thank you for listening to this episode of Talk Geek to Me.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The web page for this program is at www.talkgeektoMe.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DGTGM as a deepgeek talk geek to me.
This episode of Talk Geek to Me is licensed under the Creative Commons Attribution share
like 3.0 on poor license.
This license allows commercial reuse of the work as well as allowing you to modify the
work as long as you share a like the same rights you have received under this license.
Thank you for listening to this episode of Talk Geek to Me.
You have been listening to Hacker Public Radio or Hacker Public Radio does not.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by an HBR listener by yourself.
If you ever consider recording a podcast, then visit our website to find out how easy
it really is.
Hacker Public Radio was founded by the digital.com and the economical and computer cloud.
HBR is funded by the binary revolution at binref.com.
All binref projects are proudly sponsored by Lina Pages.
From shared hosting to custom private clouds, go to LinaPages.com for all your hosting needs.
Unless otherwise stasis, today's show is released under a Creative Commons Attribution
share a like 3.0 license.