- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
300 lines
28 KiB
Plaintext
300 lines
28 KiB
Plaintext
Episode: 3756
|
|
Title: HPR3756: Verify yourself on Mastodon with PGP and Keyoxide
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3756/hpr3756.mp3
|
|
Transcribed: 2025-10-25 05:01:05
|
|
|
|
---
|
|
|
|
This is Hacker Public Radio Episode 3756 from Monday the 26th of December 2022.
|
|
Today's show is entitled, Verify Yourself on Mastodon with PGP and Kioxide.
|
|
It is hosted by Klaatu and is about 32 minutes long, it carries a clean flag.
|
|
The summary is Verify Your Mastodon account using newpg and Kioxide.org.
|
|
Hi everybody, this is Klaatu and wow is Mastodon popular all of a sudden.
|
|
I want to talk about getting verified, there are air quotes around Verified on Mastodon.
|
|
This is a kind of a big topic because as people look at Mastodon as a potential platform
|
|
for their micro blogging needs, they apparently want to make sure that they are the only one
|
|
of them on that platform, which if you think about it is kind of funny.
|
|
As often as there are emails, email addresses, I mean as easy as it is to get an email address
|
|
under anybody's name, it seems to me like people would not be that scared of a thing
|
|
that didn't have complete certainty that you were the only one of you on the platform.
|
|
There's potential for tricking people into thinking that I am someone else online,
|
|
a plenty, it's not something that's unique to Mastodon and quite obviously it wasn't unheard of
|
|
on what people are going to Mastodon to get away from, which is of course Twitter.
|
|
But I guess Twitter had a system by which someone somewhere would award you a blue circle
|
|
with a white checkmark in it as long as you could convince them that you were who you said you were.
|
|
If you got the blue circle with a white checkmark, then everyone on the internet had to agree
|
|
under legal obligation that you were, that account was really you and of course that obviously
|
|
doesn't truly check out. That's not a system of verification. That is a system of claiming
|
|
an identification. There's no guarantee ever that the person on the other side of the computer
|
|
that you are reading the tweets from was the physical DNA specimen that you believe that it was.
|
|
But people seem to have a lot of confidence in that blue circle with a white checkmark in it.
|
|
And so they want to see something similar on Mastodon. Mastodon does not have a blue circle
|
|
with a white checkmark or rather it does if you want to add it to your profile name.
|
|
You can find an emoji of that symbol and type it into your profile name and then you suddenly
|
|
have a blue circle with a white checkmark in it. But Mastodon does in your profile award green
|
|
checkmarks. Well, I say Mastodon. Mastodon doesn't really do anything. It's just a platform.
|
|
You are able to give yourself a green checkmark. How do you do that? Well, the easy way
|
|
is to go into your profile, go to edit your profile, scroll down through the different
|
|
preferences until you find something called verification. Under verification, there is a link.
|
|
It's just a normal AH ref. So it's an HTML tag that takes you, that points actually back to Mastodon.
|
|
It's a link to your profile. The significant thing about it, though, is that it has a special
|
|
attribute called Rell, R-E-L, equals quote, me, close quote. So left angle bracket, A, space,
|
|
H ref equals quote, in my case, HTTPS, colon slash slash Mastodon.xyz slash at symbol clatu,
|
|
close quote, space, Rell equals quote, me, close quote, right, right angle bracket. Follow me
|
|
on social media, left angle bracket slash A, right angle bracket. So it's just a normal old HTML
|
|
link hyperlink, except it has the special attribute that claims that Rell equals me. And of
|
|
course, the H ref attribute is pointing to your Mastodon profile that you want the green checkmark
|
|
to be awarded to. What do you do with this link? Well, you go and put it on a website that people
|
|
on the internet agree that you control or that you actually do control. I mean, I guess it doesn't
|
|
actually matter that people on the internet acknowledge that, but you can, if you have the ability
|
|
to put that link on a website, then you put that link on that website. You tie these two together,
|
|
the Mastodon profile, and the random website that you control enough to put that website link onto.
|
|
You tie them together by pasting the URL where that link appears into your Mastodon profile.
|
|
And then the Mastodon interface sees that there's a web address in your profile. It checks the
|
|
location, the destination of that web address. If it finds A, H, F, Blah, Rell equals me at that
|
|
location, then it puts a green checkmark by that web address. So all you're doing is confirming
|
|
that the same entity controlling your Mastodon account is the same entity controlling a website.
|
|
And really, honestly, I mean, that's practically as good as online verification gets. You can
|
|
confirm through this that the same person did two different things at two different places, more or
|
|
less. And you can't confirm that that person is the same person that you shook hands with
|
|
at that one technical conference. They might have someone doing their bidding. You don't know,
|
|
but you do know that they have at least that they have knowledge. This person has knowledge of both
|
|
knowledge and control over both of these web locations. That's pretty good verification for
|
|
internet stuff. About as good as you can get. And I do say about. I was having a conversation with
|
|
someone on Mastodon about these concepts. And I found out through this conversation that there's
|
|
a new project, I say new, new to me, a project called Key Oxide. That's K-E-Y-O-X-I-D-E.org. Key
|
|
Oxide and Key Oxide is a way is a project that wants to sort of tether your PGP key or
|
|
GNU PG whatever. You're pretty good privacy cryptographic key. It wants to tether that key between
|
|
or rather to your Mastodon profile. This way, you can now confirm to your own encrypted key,
|
|
your, well, the public key to which you hold the secret key. So Key Oxide just makes it easy,
|
|
well, I say easy, it is attempting to make it easy for you to make changes to your encrypted
|
|
key chain that can then be verified by other online applications. The documentation is a little
|
|
bit rough. There's no sense of a sort of a workflow. So I'm going to attempt to distill all of that
|
|
here now into easy to follow steps so that if you want to verify your Mastodon account or some
|
|
other account by your encrypted key, then you're able to do that. The advantage to this by the way
|
|
before we get started is of course the web of trust that PGP encourages you to build. Now if
|
|
you're like me and you haven't built a web of trust, really it's kind of useless, all you're
|
|
doing. Actually, I say I haven't built a web of trust. I've built, I've built a small web of trust,
|
|
although I haven't had that web of trust sign my key. It's been a purely functional web of trust.
|
|
Certain people do email me with PGP encrypted emails using my key and my public key and I email
|
|
them back using their public key. So there is trust there. It's simply that I haven't, I can't prove to
|
|
you, dear listener, that there's trust because I haven't had anyone sign my key. So that's,
|
|
but that's my shortcoming. And anyway, the point is if you want to build a ring of trust,
|
|
you know, a web of trust in your key ring, then you can do that. And then people can look at your
|
|
PGP, look at your Mastodon account and other things that you've linked back to your PGP, your key
|
|
oxide profile page and kind of confirm that again, the entity controlling this encrypted key,
|
|
who other people believe to be authentic because they've met them and signed their key to a test
|
|
that yes, this this human does have access to this key. That bolsters trust in that key. And so now
|
|
it does start to seem like, yeah, that probably is the same human doing things online because they
|
|
keep pointing back to this key, which other humans have confirmed was physically present as it were
|
|
along with the actual human whose hand they shook when they were signing the key. Okay, so how do
|
|
you work with key oxide? Key oxide, the documentation is there. If you can make heads or tails of it,
|
|
congratulations. Here's what I've got for you though. I'm going to take you through the whole process
|
|
assuming that without assuming that you have even a key created. Now if you do have a key created,
|
|
you should assume you should pretend like you don't have a key created. I'm not saying create a
|
|
new key. I'm just saying listen to every step because there were some surprises along the way that
|
|
I mean, just really really shocked me because I thought I had GPG as figured out as anybody else could.
|
|
I mean, it's a pretty big system. It's a lot to take in. But I mean, I use it a lot. I feel
|
|
relatively comfortable with the commands. I felt like I knew where to look when I needed to
|
|
reference a command component that I didn't know. And yet there were still surprises. So please,
|
|
if you want to go down this path, just pretend like you're completely new to all of this.
|
|
You will think yourself later. Okay, so the first thing that you do is you generate,
|
|
you want to generate a key. And like I say, if you already have a key generated, then you don't have
|
|
to do that. But I'll just pretend like you don't just so we hear all the steps. Okay, so the first
|
|
thing you do is let's use GPG 2. I find that easier to use myself. So I'm going to do GPG
|
|
dash, dash, full, dash, generate, dash, key. This is the, so these are all the prompts.
|
|
And the first question is going to be RSA and RSA, which is the default or you can do DSA
|
|
in El Gamal or DSA Sign Only or RSA Sign Only. I'm just going to go one, which is the default.
|
|
And then it asks me how, what kind of key do I want? It can be from 1024 to 4096 long. It says
|
|
what key size do you want? And the default is 3072. I'm just going to go for broke 4096.
|
|
Should this key expire? I'm going to say no. I'll revoke it if I need it to expire. Is this correct?
|
|
Yes. Okay, now it needs information about me. So I'm going to put down that my real name is
|
|
clatu. My email is clatuatexample.com. A comment. I don't need a comment. Is everything okay? Yes,
|
|
everything's okay. Now I need a passphrase for this thing. Bogus 123. Bogus 123. And now it's
|
|
asking me to generate some entropy by moving my mouse around and moving windows around. If you're in
|
|
a modern system, it doesn't take long. It used to take quite a while. There we go. Looks good. Spits
|
|
out sort of a report for me. And that is that I have now a key. And there's this big long string
|
|
of numbers 2, 2, 4, 2, 0, e, 4, 4, 3, 8, and so on. That's the that's an identifier for your key.
|
|
You're going to need that. So don't don't close your terminal yet. You're going to you're going to use
|
|
that next. But before we do that, I'm going to I'm going to pause and I'm going to say what if
|
|
you already had a key? If you've already got a key, then all you need to do really is find out
|
|
the the big long number, that fingerprint. If you if you don't have that already, it's easy to get
|
|
you just do a GPG 2 dash dash list dash secret dash keys. And it gives you a report on all the
|
|
secret keys that you hold. Find the one if you have more than one secret key. And you may you
|
|
might have a secret key for K wallet, a secret key for your personal emails, a personal key for
|
|
your work email. Who knows? So find the one that you actually want to use. Here's the here's
|
|
clatsuitexample.com. I'll select that and it shows you the the big long number. So this is good.
|
|
That's that's an identifier that you can use pretty consistently throughout this process.
|
|
So now you need to we're going to edit this key that we just created. So GPG 2 dash dash edit dash
|
|
key. And then you're going to paste in the big long number, the fingerprint. I'll call that the
|
|
fingerprint from now on. All right. So that kind of dumps us into a GPG prompt. And right above the
|
|
prompt are some details about this about this key. It's telling us things like what is it telling us?
|
|
I don't know a secret key. It's a SEC not a PUB public secret. So this is an SEC key that we're
|
|
looking at. RSA 4096. Great. Created today. Expires never and so on. So it gives us some
|
|
information. What we need to do is add something called a notation. Now I didn't know notation existed.
|
|
I didn't know that was a thing until this process. So that's that's one of those things that I
|
|
learned from from doing this. So that was kind of cool. But the way that we we do that is we just
|
|
type in, well, actually, you know what? Right now you probably only have one user. If you just
|
|
created this key, you probably only have one user ID associated with this account. And you see the
|
|
name of that user ID. It says ultimate one dot clatu clatuette example dot com. So that's that's
|
|
indicating to you that there's one email address associated with this secret key. And that's pretty
|
|
typical. Me, I have lots of email addresses associated with my keys because I've either changed
|
|
emails or I have different emails for different audiences or whatever, or I have different versions
|
|
of the same email. My work email has both my first name and my my first and my last name. I have
|
|
both available at my work. So you know, you might have more than one UID. You need to proclaim,
|
|
you need to appoint one as the primary user. So if you if if you need to do that, you type in UID,
|
|
UID. Oh, okay. Well, I can't do it because I only have one. So you type in UID, you hit return,
|
|
and then no, you know what? Maybe I can do it. Yes. Okay. UID space one. That's what you type. Sorry.
|
|
UID space one or whatever, you know, one, two, three. Let's say you have three clatuette example,
|
|
clatuonzelgonger at example, and clatuettehackerpublicradio.org. Whichever one of those that I want to have
|
|
as the primary user of this key, and I do need to designate one, I would do UID space and then the
|
|
number of that of that user ID. You then get a little asterisk by that number. That's the selected UID.
|
|
Now at the prompt, you just type the word primary. It's asking me for confirmation. So I type in my
|
|
password, and I've just designated myself as the primary user of this key. That is significant. You
|
|
should do it. Okay. Next, I'm going to add notation. This is the part that key oxide specifically
|
|
requires for it, for key oxide to function correctly. This is the thing that key oxide looks at,
|
|
actually. So notation, enter the notation. It says, all right. So this is special code that key
|
|
oxide recognizes. It is the word proof, pr 0 0f, as in prove it, proof, proof at ariadne, aridna. That's
|
|
alpha Romeo indigo alpha delta november echo dot ID. That's indigo delta equals the path
|
|
to your mastodon profile. So it could be HTTPS colon slash slash mastodon dot xyz slash at symbol
|
|
clatu. That's me on on mastodon. By the way, follow me if you'd like to. That takes you to a profile
|
|
page. You need to know your mastodon handle, which is, you know, the at and then some some word. That's
|
|
kind of your account. And you need to know the server on which your mastodon account is hosted.
|
|
That's the mastodon instance. And there are lots out there. There's mastodon dot social. There's
|
|
mastodon dot xyz. There's mastodon tech hub dot dot org or com or something lots of social. I don't
|
|
lots are out there. You'll know what it is because that's the site you go to to log into mastodon.
|
|
So you're just pointing this proof at ariadne.id to your mastodon user page, the one that you want to
|
|
authenticate or rather verify using this key. All right. So I've just hit return again. So
|
|
so that's been taken. You don't get to see your notation to see the notation. If you don't believe
|
|
that it's there, it hasn't been saved yet, by the way. So to see it, you can do show preff.
|
|
All one string show preff s h o w p r e f. Hit return. And then you get to see extra data about your
|
|
your key, including notations. So you will see the notation there. I'm going to type save. And that
|
|
also that that saves what I've just done. And it it boots me out of gpg. Now I'm back to my normal
|
|
terminal prompt. Now stop. If you're familiar with gpg and and you're like me, you probably think
|
|
you know what to do next. You think you're going to type in a command to update your key to a key
|
|
server somewhere. Don't do that. Honestly, you have to do it a different way. If if if you are
|
|
glutton for punishment, please, by all means, do it some other way and let me know what happens
|
|
because I had a bunch of failed attempts at this. But and it didn't it didn't work until I did
|
|
exactly the steps that I'm about to give you. But I had so many failed attempts that I can't figure
|
|
out if the failures were because I was not doing what I'm saying. You should do or whether I was
|
|
just doing what I was doing incorrectly. But I honestly think that this is exactly what you have to
|
|
do. You have to go to keys.openpgp.org. Now, I mean, everything in me says that there shouldn't
|
|
be anything special about that about that about that particular server. And as far as I know,
|
|
there isn't. But you do need to, I think, first of all, don't listen to me. There's something special
|
|
about that server. You have to do it at openpgp.org or none of this will work. That's what I want to say.
|
|
Or that's what I need to say because that that was my result. That's the provable result. I've
|
|
done this once and then I got tired of the the the equation and just decided that I was going to use
|
|
that as the canonical correct way to do this. You should be able to go to pgp.net.nz colons 11371
|
|
or any any of your favorite key servers and do this same process. I'm just telling you that what
|
|
worked for me was going to openpgp.org. So if you try a different server and it works, let me know
|
|
and just confirm that that I was just doing something wrong all along. But the the the the thing about
|
|
keys.openpgp.org is that you can upload a key. And I know you're thinking no class who I don't
|
|
need to do this. I've already done this. I've done and I've done a send I've sent it to the servers
|
|
in the terminal. It's fine. I'll just do it my way. I'm telling you don't do that. Go to keys.openpgp.org.
|
|
Click upload. Even if you've already uploaded your key, click upload. And then it's going to tell
|
|
you to upload your key. Well, in order to do that, you need a nice little tidy key file to
|
|
to to upload. So back in your terminal, you're going to do gpg dash dash or I think you can do gpg
|
|
to dash dash armor dash dash export. And then the the email of the you know the user ID that you
|
|
want to to export. So that's or of the key that you want to export. So that's class who at example
|
|
for instance in in this scenario. Redirect to pubkey.asc. That's the correct way to export all the
|
|
metadata out of your key chain or your key box into a little self contained file. Okay. Now you've
|
|
got that. So you can click upload on keys.openpgp.org. Select that.asc file and upload it. If it already
|
|
has a key that matches that key, don't worry. It will just update your existing key or whatever it
|
|
does. I don't know. I've never run a key server, but overwrite it or patches it or whatever it does.
|
|
It's not like you're going to have duplicates on there or anything. You'll just the the most recent
|
|
version will be there. When once your file is uploaded and it doesn't take put a moment, it's
|
|
very small file. Once it's uploaded, keys.openpgp.org gives you the option to get a confirmation email.
|
|
This is the thing that was new to me. I've never seen this before in my life. Didn't know it was a
|
|
thing. Didn't know it was possible. I don't know if it's something specific to open pgp.org. I don't
|
|
know, but you can click on the confirmation email thing. It will send an email to the email address
|
|
that you've got in that key and and then you can respond to that email and then there's confirmation
|
|
that yes, that key exists and yes, it actually does have the authority to lay claim to that email
|
|
address. Do that. That's the missing component. For me, that was the missing component for about a
|
|
day. I kept uploading my key manually in a terminal with the gpg2 option to upload the key
|
|
or send dash key and that just wasn't doing it. It wasn't sending you the notation. It wasn't
|
|
sending. I think the primary user, there was a bunch of stuff that it just wasn't sending. So
|
|
don't don't do that. You got to do it through openpg.keys.openpgp.org or else this whole thing
|
|
will be for not. All right, so once you've got that, go go grab a cup of coffee and if you've heard
|
|
my podcast, canoeworldorder.info, you'll know that I always tell people to go get a cup of coffee
|
|
about halfway through the show, but in this case, I actually mean go get a cup of coffee because
|
|
you're going to have to wait for the email, the confirmation email to come through, then you're
|
|
going to have to wait for the key servers to synchronize around the globe. So this could take
|
|
a wee while. It won't take all day, I don't think, but it could, it'll take a cup of coffee.
|
|
So go get a cup of coffee and then come back and complete the mission. What's the mission again?
|
|
Oh yes, we're trying to tie this key oxide thing to our mastodon profile. What have we done so far?
|
|
Well, we've generated a key. You may or may not have already had a key, so maybe you skip that step,
|
|
it's fine. We've added notation to our existing key and we've set a primary user for our existing
|
|
key. We have uploaded the key to keys.openpgp.org. We have clicked a button to get a confirmation email.
|
|
We have responded to the confirmation email by by clicking the link, you know, in the email,
|
|
the little confirmation link. That's where we are right now. This is an exciting moment because
|
|
this is where it all comes together. Remember the key fingerprint that I had you remember earlier.
|
|
Well, don't worry if you don't. That's fine. It's probably in your history, first of all,
|
|
but you can, you can also just do at any, at any time, you can do a GPG2 space dash, dash, show, no,
|
|
list, dash, secret, dash, keys. And that'll list your secret keys. Look through there, find the one
|
|
associated with your, with the email address in question. And notice that there is a big,
|
|
long number just under the, just above the user ID section. That's your, your fingerprint. So
|
|
copy that and now go to key and go to keyoxide.org slash hkp slash. And then you paste in the
|
|
fingerprint. You see a little profile page for yourself. Now notice you haven't like opened
|
|
an account with key oxide. You haven't registered for key oxide. All it's doing is verifying.
|
|
It's looking at your key and it's verifying or it's, it's parsing that information. That's all it's
|
|
doing. So you are, you're, you're telling keyoxide to go look up that key by that fingerprint.
|
|
It is reading the key that it finds and it's parsing it. It's finding out the user ID, the primary
|
|
user of that key. It's finding out the email address. It's finding the, the, the fingerprint. And then
|
|
I guess most importantly in, in this scenario, it is also finding the link, the proof, proof at
|
|
aryadna.id data that you've put into the notation field. And as I look at mine, it does appear here.
|
|
In fact, it's, it's a little bit weird looking right now. It just says dash dash dash clad to
|
|
at mastodon.xyz. What's the dash dash dash? It looks like some weird signature file or something.
|
|
No, this is essentially an unused proof. This, this, this is notation that you've put into your key,
|
|
but you haven't utilized anywhere yet. How do you utilize this? Well, go up to the URL bar of your
|
|
browser. Just copy. It's keyoxide.org slash hk p slash and then the, the fingerprint go to your
|
|
mastodon profile where you got your little verification link in the other exercise. So I'm
|
|
just going to go to go to mastodon, click edit profile and then scroll down to a section called
|
|
profile metadata. There's four different fields label, label, label, label, content, content, content,
|
|
content. And so I'll just type in, I don't know, GPG. And then in the content, I'm going to just
|
|
paste the keyoxide link, keyoxide.org slash hk p slash a big long fingerprint looks good. And then
|
|
I'm going to click the saved changes, go back to go back to mastodon, click on my, click on my
|
|
name. And sure enough, my profile now has a GPG property with a little green tick mark by my keyoxide.org
|
|
slash hk p blah, blah, blah. And that's a clickable link too. So if someone was to click on that
|
|
and because they don't know what key oxide is yet, they can click on it and they'll, there's my
|
|
profile. Like there's the, there's the data from my key. And certainly if, if they're savvy enough
|
|
to, to, to know what that means to, to care about that, then they can take that fingerprint.
|
|
They can look that up on the key server in within GPG and add that my public key to their,
|
|
to their key chain. They can look at who else assigned my key, nobody. And, and, and make a judgment
|
|
call, they can decide whether this means that I am more or less trustworthy than had I just
|
|
taken a verification link from mastodon profile and put it on a website that I control is one worth
|
|
more than the other. Well, like I say, in my case, in its current state, I don't really feel like
|
|
this is worth anything beyond what just having a link on a website would offer because I don't
|
|
have a ring of trust that I've built. I need to go to a key signing party. I need to meet people.
|
|
I need to tell them my actual identity. I need to present them with a key bearing that name
|
|
and then have them sign it and, and, and, and so on. That's what I need to do and I haven't done that.
|
|
So, so I don't have a web of trust built up around my, my cryptographic key. It's not a worth a
|
|
whole lot. Anyone could make a cryptographic key, put my email into it and, and then they would have
|
|
a profile on key oxide that claims to be me. Now, would I personally ever link to that key? No,
|
|
I wouldn't. And so, there would be the break in, in trust there, the fact that I never reference
|
|
that key oxide instance or that, that GPG key. And the same goes, frankly, for a website, right? I mean,
|
|
anyone can get a website, put my information into it and say that it's my website. But then
|
|
if my mastodon account never links back to that website and vice versa, then, or, or rather, yeah,
|
|
then, then, then, then there's no reason to believe that my mastodon instance or my mastodon account
|
|
recognizes that website. So this is, in both cases at, at, at their most basic, it's just mutual
|
|
confirmation that yes, I acknowledge the existence of this and I can prove to, to, to, to a high level
|
|
that I have control over both of these things. But if you go the key oxide slash PGP route,
|
|
then you can go out and use the system built into PGP to get other humans to vouch for you,
|
|
cryptographically. I hope this has been useful. I think that this is a really kind of important
|
|
topic. Verification on the, on the internet is a really tricky subject. I think a lot of people,
|
|
I will, I know a lot of people don't really think about it that often. The fact that Twitter
|
|
was able to be the deciding factor in who was real or suspect for, for years. I mean, we lived
|
|
with Twitter for years. I guess we're still technically living with it. And, and they were the
|
|
sole arbiter of whether you got a check mark by your name and, and who was it? Who, who was Twitter?
|
|
Why, who, what was the process? There's no transparency there. There's, there's no real trust built
|
|
in around Twitter. So at least, at least with GPG, PGP, you have, you do have trust that you can
|
|
build in. So this is an important topic. I think it's a big one. So definitely if, if you're,
|
|
if you're using GPG or if you're interested in starting to use GPG or pretty good privacy,
|
|
then by all means, and you're using mastodon, by all means, have a look at key oxide. The process
|
|
is, is not well explained on the website. I have hopefully explained it to you a little bit better
|
|
now. Use it, verify. I think you'll be glad that you did. Thanks for listening.
|
|
You have been listening to Hacker Public Radio as Hacker Public Radio does work. Today's show was
|
|
contributed by a HBR listener like yourself. If you ever thought of recording podcasts,
|
|
you click on our contribute link to find out how easy it really is. Hosting for HBR has been
|
|
kindly provided by an honesthost.com, the internet archive and our sings.net. On the Sadois
|
|
status, today's show is released on their creative commons, attribution, 4.0 International
|