Jupiter BroadcastingTechnology

Value for Value ⚡️


Episode Summary

We get frustrated with Nintendo. Then, dig into the 30-year-old backdoor that was recently exploited and the hard lesson we should learn from it. Then, we'll break down some "hot tips" that promise to make you the next DevRel star.Sponsored By:Annual Membership - Jupiter Party: Put your support on auto-pilot and get one month for free!Support Coder RadioLinks:💥 Gets Sats Quick and Easy with Strike — Strike is a lightning-powered app that lets you quickly and cheaply grab sats in over 100 countries. Easily integrates with Fountain.fm. Setup your Strike account, and you have one of the world's best ways to buy sats.🇨🇦 Bitcoin Well — Enable your independence with the fastest and safest way to buy bitcoin in Canada and the USA. Focused on Bitcoin excellence, enabling true financial independence 🥇📻 Boost with Fountain.FM — Boost from Fountain.FM's website and keep your current Podcast app. Or kick the tires on the Podcasting 2.0 revolution and try out Fountain.FM the app! 🚀Ryujinx Switch Emulator Project Shuts Down Under Nintendo Pressure — Open source Nintendo Switch emulator Ryujinx has thrown in the towel under pressure from Nintendo. Lead developer 'gdkchan' was reportedly contacted by the gaming giant on Monday. He was given the opportunity to stop working on the project and shut down everything under his control, presumably to avoid further action. The project's repo on GitHub has already been deleted. 'Modded Hardware' Defendant Denies Nintendo's Copyright Claims in Court — The alleged operator of Modded Hardware has filed an answer to Nintendo's copyright complaint, denying any wrongdoing. The defendant, who represents himself in court, counters with a long list of affirmative defenses including fair use. The case will now move forward to the discovery process. Meanwhile, the Modded Hardware site has gone private. The 30-year-old internet backdoor law that came back to bite — The wiretap systems, as mandated under a 30-year-old U.S. federal law, are some of the most sensitive in a telecom or internet provider’s network, typically granting a select few employees nearly unfettered access to information about their customers, including their internet traffic and browsing histories. Meredith Whittaker on Masto — Case in point: there's no way to build a backdoor that only the "good guys" can use. Chinese hackers access US telecom firm
... Show More

    No results