Files
hpr-knowledge-base/hpr_transcripts/hpr1075.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

175 lines
15 KiB
Plaintext

Episode: 1075
Title: HPR1075: tgtm-news-75-20120912
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1075/hpr1075.mp3
Transcribed: 2025-10-17 18:31:29
---
You're listening to Talk Geek 3 News, number 75, record for September the 12th, 2012.
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast
including political, commentary and other controversial topics, please visit www.talkgeektme.us.
Here are the vials statistics for this program. Your feedback matters to me. Please send
your comments to dgatdeepgeek.us. The webpage for this program is at www.talkgeektme.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is dgtgtm as in DeepGeek Talk Geek to me.
Right now, the Tech Roundup. From torrentfreak.com, dated September 6, 2012 by Ernesto,
Pirate Bay found a arrest related to tax hack, not piracy.
Last week police arrested Pirate Bay co-founded Gottfried Swathom in the Cambodian capital
of Phnom Penh. Initially, Lil was known about the reasons for the arrest, but after a few
days the authorities confirmed that Sweden was the driving force behind the actions, according
to his spokesperson for the Cambodian police, Swathom's detainment is connected to alleged
cyber crimes. His arrest was made at the request of the Swedish government for crime related
to information technology, he said. Finally statement was assumed that information technology
referred to Swathom's involvement with the Pirate Bay. However, several sources now dispute
this and say that Swathom's arrest is related to a hacking operation that made date back
to 2010. The hack targeted Swedish IT company Logica, which supplies services to the Swedish
tax office. Earlier this year, the hack made the headlines when the tax numbers of 9,000
Swedes leaked online. In the months that filed, two Swedish citizens in their 30s were arrested
in connection with the hack. One of the suspects in question was a member of Pirate Byron,
the group that founded the Pirate Bay back in 2003, and was disbanded two years ago. Swathom
would be the third suspect in the hacking case, which was previously described by the International
Public Prosecution Office as a big and sensitive investigation. A source told Turret Freak
that Swathom is not awaiting his deportation in prison, but is being held at the interior
ministry's counterterrorism department. This is confirmed by former Pirate-based spokesman
Peter Sund, and the sources of Swedish news site dn.se. On Twitter, Peter Sund adds that
Swathom, aka Anacada, has not been offered a lawyer, and that the Swedish Foreign Ministry
is not helping the Pirate-Founder either. Swedish Foreign Ministry has not offered Anacada
legal help, so they must do that in Sweden, but ignore it when they are behind the warrant,
Sund says. Swathom is being held in an office space accompanied by personnel from the interior
ministry, and is currently awaiting the authorities' next steps on Monday,
Cambodian officials confirmed that the Pirate-Bay Founder will eventually be deported.
From inthesetimes.com
Bye, David Suota.
David, September 7, 2012. Big Brother in your car.
Your chipper, TV friend, flow, otherwise known as progressive,
insurance as ubiquitous as shell. Once you to be excited, very excited,
as you've probably learned from her ever since commercials. She had her big brothers,
and the insurance business want you to see their new tracking devices for your car,
not as a privacy-destroying step to justify racing your government mandate car insurance
premiums. Instead, they want you to see the gizmos which record your vehicles every move
as a great innovation to get your premium discounts for safe driving.
Yet, despite the happy TV ads, questions are nonetheless swirling around the so-called
telematics-based insurance. Questions that flow doesn't want you to ask because the tracking
system is so frantically invasive and arbitrary. To appreciate that disturbing reality consider
how the system operates. For an interview with a progressive manager, FoxNews.com reports
that the tracking technology works on algorithms that use your driving style to predict how likely you
are to have an accent and how expensive it will be if it happens, among the myred data points
that could be collected are breaking frequencies and commuting routes. This may seem innocuous,
but the potential use of such data makes the film minority reports seem less like fantasy than
spot on prophecy, and in that flick humans have developed technology to fight pre-crime that
is to stop crimes before they occur and punish people for allegedly preparing to commit said crimes.
Telemax-based insurance could easily become the insurance industry realization of that technology.
It could help insurers charge you higher rates for embracing driving styles and geographic routes
that supposedly mean you are about to incur a collision course, even if you have an actually
incurred said course, and even if you never will incur a said course in the future.
Put another way rather than charge you higher premiums after you incur a course.
The companies can use this technology to preemptively punish you beforehand,
a law department of pre-crime. To read the rest of the song, follow links in the show notes.
From EFF.org, date September 7, 2012 by Hany Fakori, EFF asks the peel court to rehere a
cell site tracking case. Location privacy generally and cell site tracking specifically have been
to hot issues this year, particularly since the Supreme Court's January ruling in United States versus
Jones, that installing a GPS device on a call without a search warrant violated the Fourth Amendment.
After Jones, we were optimistic that both courts and legislatures would begin to take location
privacy seriously and demand warrants before granting law enforcement access to a map of
movements over and extended period of time, but it hasn't turned out that way. In August,
the Six Circuit Court appeals issued a very bad decision, ruling law enforcement did not need
a search warrant to track a cell phone in real time. So this week, EFF and a number of other
civil liberties organizations joined together in Amicus briefed to ask the Six Circuit to reconsider
its decision. The Six Circuit heard argument in the case just a few days before the Supreme Court
issued its opinion in Jones, without the benefit of an in-depth discussion of the impact of that
critical decision, the Six Circuit's opinion naturally failed to appreciate the changing legal
landscape and gutting privacy protections for millions of people to read the rest of the
followings in the show notes. From EFF.org did September 7, 2012 by Kurt Uppsall and
Parker Higgins, Copyright's Robot Wars heat up as algorithms block live streams first and ask
questions later. Copyright's Robot Wars have burst onto the scene of streaming video sites
silencing live feeds with bogus infringement accusations and no human oversight. Two examples
from just the past week show the danger that lies ahead of copyright enforcement is left
to bots alone and sit alongside last month's smallest lander takedown as embarrassing
results of the unchecked and lopsided algorithmic copyright cops that are becoming increasingly common
online. On Sunday, the live use stream feed of the annual Hugo Science Fiction Awards
ceremonies was cut off in midstream after Aaron Clips from non-minated TV programs including Dr.
and Community. These clips were provided by the studios behind the programs and would have been
a clear fair use even without that explicit permission, but still the stream went down and didn't
come back. Then on Tuesday, just after the speeches at the Democratic National Convention had concluded,
YouTube showed a copyright error message on the stream, rendering the prominently embedded
video temporarily unplayable. According to a YouTube spokesman, the message was a result of an
incorrect error message on the page and did not interfere with the live stream during the speech.
Nevertheless, this highlights the potential danger of bots at one of the most prominent political
events of the presidential campaign season and error carried with all the hallmarks of a copyright
takedown. We have asked YouTube for more information on why the error text had copyright messaging.
In the case of the Hugo's, this wasn't about running off the rails. In fact, the system was
working exactly as expected. Mobile, the third-party copyright filtering system used by
use stream identified a matching clip from its database and lacking the context that an
human oversight could have provided about fair use and licenses decided the stream's fate
in a microsecond, termination, and because these bots generally operate outside of the Digital
Millennium Copyright Act, there is little accountability or opportunity for the uploader to remedy
the situation. Most copyright takedowns on the web are handled under the notice and takedown
procedures set out, the DMCA, which provides a legal safe harbor from liability for service providers
that comply. While the DMCA is far from perfect and is itself subject to abuse, it still requires
a human to swear under a penalty of perjury that there is infringement and allows for the
material to return after a counter notice. But, the automated copyright filters in used by use stream
YouTube and others go beyond the requirements of the DMCA and thus operate outside of it.
As a result, users are left without the standard appeals process and have only the recourse provided
by the video platform. YouTube has an appeal system built into its content ID system,
but it has its own host of problems. For use streams plot, it realized the error during the
program but was by its own admission, unable to lift the block in time to restart the stream.
Use stream has since apologized and promised to ensure fair use of copyright as permitted by
the law to read the rest of this article, follow links in the show notes. From torrentfreak.com
By Ernesto Day September 4th 2012, anti-piracy block lists don't keep BitTorrents buys out.
When people use BitTorrent to download copyright material, there's a good chance that their IP
addresses are being logged by anti-piracy groups. Just last week, we showed that two of these
companies were snooping on thousands of torrents. Many piracy conscious BitTorrent uses a well
aware of this kind of monitoring activity and take measures to remain anonymous. The preferred way
for many is to use a VPN or proxy, which conceals their ISP IP address.
Another group of BitTorrent uses prefer a free option in the form of a block list. These block lists
prevent a BitTorrent client from connecting to IP addresses that presumably belong to anti-piracy
outfits. While these block lists do provide some security, they are not foolproof.
Some anti-piracy groups are not recognized by the block list and therefore not blocked.
This means that users who rely on them as their only means of protection are at risk of being logged.
In a new paper titled, The Unbearable Lightness of Monitoring, Direct Monitoring in BitTorrent,
researchers from the University of Birmingham try to quantify this problem.
The researchers developed a methodology to detect which peers in a swarm are likely to be
anti-piracy monitors. The research looked at 60 public torrent files and over a period of time they
found 856 peers on five subnets that showed strong characteristics of monitoring agencies.
This data allowed them to compare their findings to the IP addresses that are blocked by the popular
i-block list block list to see how effective it is at keeping BitTorrent spies out. Perhaps not
surprisingly the block list doesn't offer complete security. 69% of the IP addresses of monitoring companies
were blocked but the other 31% were not. In other words, nearly one three logging attempts bypassed
the block list. Our Direct Monitoring Analysis produced 595 peers out of 156 that appear in subnets listed
in the anti-infringement list. In addition, our analysis identifies 263 peers that
albeit displaying the same behavior as monitoring peers do not currently appear in block lists,
the researchers write. BitTorrent users should therefore not rely solely on such speculative
block lists to protect their privacy they add, suggesting that these BitTorrent users should add
block lists based on empirical research. In addition to examining the effectiveness of i-block list,
the researchers also identified the prevalence of indirect versus direct detection methods.
In the past, indirect methods where modern companies obtained lists of IP addresses without
connecting to the downloaders have been heavily criticized. The main problem that these lead to
a higher number of false accusations, for example, research has shown that due to shoddy techniques
even a network printer can be accused of sharing copyrighted files on BitTorrent.
In the paper the researchers found that direct methods where the anti-piracy group confirms that
downloaders are actually sharing are also widely used now. Their paper is first to provide evidence
of direct monitoring, suggesting that modern companies are upping for their accuracy.
For U.S. Internet subscribers, the topic is relevant as the six tracks anti-piracy scheme will
be rolled out later this year. The Center for Copyright Information has yet to announce the names
of the companies that will do the spying for the six tracks system and when they do it will be
interesting to see what data gathering methods they use. But whatever the answer, the block list
alone is not going to prevent BitTorrent users from running into trouble.
News from tech.com, Maggie McNeil.wordpress.com, and in these times.com used under a range permission.
News from torrentfreak.com and EFF.log used under permission of the creative commons by attribution
license. News from democracy.now.org used under permission of the creative commons by attribution
non-commercial node derivatives license. News sources retain their respective copyrights.
Twitter. My username there is dgtgtm as in deep geek talk geek to me.
This episode of talk geek to me is licensed under the creative commons attribution share like
3.0 on poor license. This license allows commercial reuse of the work as well as allowing you to
modify the work so long as you share a like the same rights you have received under this license.
Thank you for listening to this episode of talk geek to me.
You have been listening to Hacker Public Radio at Hacker Public Radio does our.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by an HBR listener like yourself.
If you ever consider recording a podcast, then visit our website to find out how easy it really is.
Hacker Public Radio was founded by the digital dog pound and near the phenomenal computer club.
HBR is funded by the binary revolution at binref.com. All binref projects are crowd-responsive
by lunar pages. From shared hosting to custom private clouds, go to lunarpages.com for all your
hosting needs. Unless otherwise stasis, today's show is released under a creative commons,
attribution, share alike, 3.0 license.