How well-connected are you? Drew Streib can tell you to four decimal places. Drew, who now runs an OpenPGP keyserver in addition to his other thankless tasks, is currently publishing monthly reports on how closely OpenPGP users are connected to the Web of Trust. His math, based on earlier calculations by Neal McBurnett, is complicated, but the result is a current map of the community's Web of Trust.
Closest to the center of the Web are crypto luminaries and organizers of keys-signing events, including Peter N. Wan, Ingmar Camphausen and Theodore Ts'o. Philip R. Zimmermann, who wrote the original PGP, is only number 24.
Drew's report comes at an exciting time for encrypted mail. GNU Privacy Guard, a free OpenPGP implementation, is available in common distributions, support in popular mailers such as mutt makes encryption convenient to use and the FBI's much-publicized Carnivore snooping system certainly hasn't hurt.
Signing people's keys to do better in Drew's rankings might seem like a pointless game, but it really does expand the Web of Trust. You can never lose juice by exchanging signatures with someone else, and it helps everyone's ability to send trusted, encrypted mail. Even if you sign the key of some “lamer” at the bottom of the list, you'll both move up next month. (As for me, I got a Theodore Ts'o! Look out next month.)
On Monday, July 30, 2001 the US Copyright Office convened the Copyright Arbitration Royalty Panel (yes, CARP, loc.gov/copyright/carp) to make a decision shortly on conditions under which webcasters will be required to make royalty payments. The results could be highly inconvenient for webcasters of all kinds. Howard Greenstein, a webcasting pioneer, puts it this way in his weblog:
Webcasters, many of whom have been accounting for what they have estimated they would have to pay under a negotiated compulsory license (and putting aside revenue for years) are about to find out (within 60 days) what it will cost them. Unless, of course, they are an “interactive” station. If you're a standard station under the Digital Millenium Copyright Act, you play music in a certain way. You don't give people much choice about what they hear.
Yet the number of streaming sources on the Net runs into uncounted thousands (or perhaps millions). What's more, many of these are far more interactive than traditional broadcasting has ever been or can even comprehend. What's the news for them? Easy: work outside the system.
That's what KPIG has been doing since it became the first commercial radio station ever to broadcast on the Web. KPIG broadcasts from (no kidding) Freedom, California on 107-oink-5 on the FM band. On the Web, however, KPIG is a virtual Idaho. Its 128KB MP3 stream is one of the Web's hi-fi music beacons. So are the half-dozen or so other streams the station puts out at various speeds for various clients and bandwidths (and with content other than KPIG alone). Naturally (their site reports) they digitize that content on a Linux PC with an open-source LAME MP3 encoder (mp3dev.org/mp3).
KPIG, which once described its format as “mutant cowboy rock and roll”, is one of the few remaining commercial stations where the disc jockeys still choose the music, and community ties are so close it's hard to tell where the station ends and its constituency begins. As a successful business (it has always done pretty well in the ratings and sells plenty of advertising), KPIG also has managed to remain both artist- and industry-friendly. Every song the station plays is listed live on the Web, along with links that make it easy to buy the CD, research the artist or follow a tour schedule. Without a doubt, KPIG owns the high-mud mark for combining commercial success, community involvement, resourceful use of free and open-source software and adaptiveness to a surreally perverse environment.
The hacker in chief at KPIG is “Wild Bill” Goldsmith, one of KPIG's Founding Farmers and the proprietor of RadioParadise.com. Unencumbered by the need to participate in the fully regulated environment of commercial broadcasting, Radio Paradise is beating a path through the uncharted wilderness where artists and technically smart connoisseurs will rebuild their own industry from the outside in. Asked for the technical angle on Radio Paradise, Bill writes:
[Radio Paradise is] based on a set of software tools—for picking and scheduling music and doing voice tracks from anywhere over the Net, and for accepting and organizing listener feedback on my playlist. Everything I'm doing software-wise is 100% open source: Linux, PHP, Perl, Postgres, and Icecast.
I am convinced that what you see at radioparadise.com represents the future of radio, or of quality radio, anyway: very interactive, tightly controlled artistically (no random segues, everything happens for a reason)--completely free from the influences of the radio/music industry hype machine (to the best of my ability, anyway)--and supported primarily by voluntary contributions from listeners.
This isn't a game plan that's going to make anyone rich. But it can make it possible for anyone with talent to make a very comfortable living without compromizing their integrity in any way—and that's all I for one have ever wanted.
I'm an old radio freak and have been a fan of KPIG and its ancestors going back to the Sixties. Living, breathing radio stations like KPIG, run by people who love the business more for the good it does than for the money it makes, have gone out like candles in the rain—first one by one, then by the dozens and finally by the thousands.
It's not surprising to find a hacker starting a bonfire with the last candle that stands.
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- The True Internet of Things
- Using tshark to Watch and Inspect Network Traffic
- September 2015 Issue of Linux Journal: HOW-TOs
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- Firefox Security Exploit Targets Linux Users and Web Developers
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag