Episode 591

FOSS does what Nintendont

00:00:00
/
00:37:07

October 16th, 2024

37 mins 7 secs

Your Hosts
Tags

About this Episode

We get frustrated with Nintendo. Then, dig into the 30-year-old backdoor that was recently exploited and the hard lesson we should learn from it. Then, we'll break down some "hot tips" that promise to make you the next DevRel star.

Support Coder Radio

Episode Links

  • πŸ’₯ Gets Sats Quick and Easy with Strike — Strike is a lightning-powered app that lets you quickly and cheaply grab sats in over 100 countries. Easily integrates with Fountain.fm. Setup your Strike account, and you have one of the world's best ways to buy sats.
  • πŸ‡¨πŸ‡¦ Bitcoin Well — Enable your independence with the fastest and safest way to buy bitcoin in Canada and the USA. Focused on Bitcoin excellence, enabling true financial independence πŸ₯‡
  • πŸ“» Boost with Fountain.FM — Boost from Fountain.FM's website and keep your current Podcast app. Or kick the tires on the Podcasting 2.0 revolution and try out Fountain.FM the app! πŸš€
  • Ryujinx Switch Emulator Project Shuts Down Under Nintendo Pressure — Open source Nintendo Switch emulator Ryujinx has thrown in the towel under pressure from Nintendo. Lead developer 'gdkchan' was reportedly contacted by the gaming giant on Monday. He was given the opportunity to stop working on the project and shut down everything under his control, presumably to avoid further action. The project's repo on GitHub has already been deleted.
  • 'Modded Hardware' Defendant Denies Nintendo's Copyright Claims in Court — The alleged operator of Modded Hardware has filed an answer to Nintendo's copyright complaint, denying any wrongdoing. The defendant, who represents himself in court, counters with a long list of affirmative defenses including fair use. The case will now move forward to the discovery process. Meanwhile, the Modded Hardware site has gone private.
  • The 30-year-old internet backdoor law that came back to bite — The wiretap systems, as mandated under a 30-year-old U.S. federal law, are some of the most sensitive in a telecom or internet provider’s network, typically granting a select few employees nearly unfettered access to information about their customers, including their internet traffic and browsing histories.
  • Meredith Whittaker on Masto — Case in point: there's no way to build a backdoor that only the "good guys" can use.
  • Chinese hackers access US telecom firms, worrying national security officials — US investigators believe the hackers potentially accessed wiretap warrant requests, two of the sources said, but officials are still working to determine what information the hackers may have obtained. US broadband and internet providers AT&T, Verizon and Lumen are among the targets, the sources said.
  • Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack - WSJ — AT&T and Verizon are among the broadband providers that were breached
  • Unlocking the β€˜aha’ moment: Developer relations for startups — Developer relations (DevRel) can be a cornerstone of product adoption and growth for early-stage companies, but too often early-stage companies end up focusing on the wrong things. The linchpin for success lies in how quickly developers reach their first "aha" moment
  • Mermaid | Diagramming and charting tool — JavaScript based diagramming and charting tool that renders Markdown-inspired text definitions to create and modify diagrams dynamically.
  • Integrations | Mermaid