One-Time Pod explores the history of cryptography through episodes produced by students in Derek Bruff's first-year writing seminar at Vanderbilt University. Each episode considers a different code or cipher, how it works, and why it's interesting.
by Angela Brinckerhoff
In today’s world, it’s not very hard to find information about anyone, no matter how personal. Our posts, public records, employment history, etc. can all be uncovered within a few clicks. A University of Washington team of researchers created a project called Vanish to address this, making it possible to permanently erase personal data. This project brings up the central debate of the “right to be forgotten” movement, discussing the legality and prospect of deleting data from public databases and web searches. This podcast discusses the system behind Vanish and the different sides of the “right to be forgotten” debate. Special thanks to Amelia Muir, Henoc Zinga, and Justin Terry for their contributions.
References
Auxier, B. (2020, August 17). Most Americans support right to have some personal info removed from online searches. Pew Research Center. Retrieved from https://www.pewresearch.org/fact-tank/2020/01/27/most-americans-support-right-to-have-some-personal-info-removed-from-online-searches/
DeWeerdt, S. (2021, April 15). A Welcome Disappearing Act. Retrieved from
https://www.washington.edu/alumni/columns/dec09/findings-forget.html
Geambasu, Roxana et. al. (2021, April 15). Enhancing the Privacy of the Web with
Self-Destructing Data. Retrieved from https://vanish.cs.washington.edu/
Heilweil, R. (2018, March 05). How Close Is An American Right-To-Be-Forgotten? Forbes. Retrieved from
https://www.forbes.com/sites/rebeccaheilweil1/2018/03/04/how-close-is-an-american-right-to-be-forgotten/
Markoff, J. (2009, July 20). New Technology to Make Digital Data Self-Destruct. Retrieved from https://www.nytimes.com/2009/07/21/science/21crypto.html
Audio Sources:
https://orangefreesounds.com/swing-drum-beat-loop-with-piano-melody-132-bpm/
https://orangefreesounds.com/funk-guitar-intro/
https://orangefreesounds.com/electronic-background-music/
https://orangefreesounds.com/ocean-waves-crashing-on-beach/
https://orangefreesounds.com/mysterious-piano/
https://orangefreesounds.com/downtempo-chill-out-track/
Image: “Footprints in the sand,” Susanne Nilsson, Flickr CC BY-SA
by Rishabh Gharekhan
This podcast explains the story of Edward Snowden and the PRISM program. In 2013, Snowden leaked classified government secrets exposing the National Security Agency’s widespread mass surveillance programs. PRISM was one of these. Using discreet legal pathways, the NSA was tapping directly into the servers of American companies including Apple, Google, Microsoft. Snowden’s revelations shocked the American public due to the violations of privacy. The exposure of this program led to quick damage control. However, the damage had already been done which has continued to raise questions over how safe our data is online.
Works Cited:
Fitzpatrick, A. (2013, June 7). NSA Leak: Internet Giants Let Government Tap Your Data. Mashable. https://mashable.com/2013/06/06/prism-tech-companies-data-mining/?europe=true
Greenwald, G., & MacAskill, E. (2017, December 29). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
Greenwald, G., MacAskill, E., & Poitras, L. (2021, March 24). Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance
Lee, T. (2013, June 6). How Congress unknowingly legalized PRISM in 2007. The Washington Post. https://www.washingtonpost.com/news/wonk/wp/2013/06/06/how-congress-unknowingly-legalized-prism-in-2007/
Seifert, D. (2013, June 7). Secret program gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data. The Verge. https://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism
Snowden Timeline. (2019, January 9). Government Accountability Project. https://whistleblower.org/snowden-timeline/
West, A. (2013, July 9). 17 disturbing things Snowden has taught us (so far). The World from PRX. https://www.pri.org/stories/2013-07-09/17-disturbing-things-snowden-has-taught-us-so-far
Whittaker, Z. (2013, June 8). PRISM: Here’s how the NSA wiretapped the Internet. ZDNet. https://www.zdnet.com/article/prism-heres-how-the-nsa-wiretapped-the-internet/
Audio:
Orange Free Sounds:
Bensound:
Fesliyan Studios:
Obama Clip:
News Clip (June 6, 2013 – 100 Seconds of News):
Further Reading:
Image: “Edward Snowden,” Mike Mozart, Flickr CC BY
by Thomas Riker
The attacks on September 11th, 2001 deeply affected America and its citizens. In its aftermath came the USA PATRIOT act, a far-reaching piece of legislation that was passed both in the Senate and the House of Representatives by an overwhelming majority. The act contained many provisions that expanded the scope of the government and its agencies in the hopes of catching terrorists, so as to prevent the next 9/11 from ever occurring. This podcast discusses the Patriot Act generally and its effects, mostly on regular American citizens, and raises questions about the debate between personal privacy and national security.
Bibliography
Ahmed, A., & Senzai, F. (2017, August 5). The USA Patriot Act: Impact on the Arab and Muslim American Community. Institute for Social Policy and Understanding.
Duignan, B. (2020). Reauthorizations. Encyclopædia Britannica. https://www.britannica.com/topic/USA-PATRIOT-Act/Reauthorizations#ref302044
Jenks, R. (2001, December). The USA PATRIOT Act of 2001. Center for Immigration Studies. https://cis.org/Report/USA-PATRIOT-Act-2001
Staff, A.C.L.U. (2011). Surveillance Under the Patriot Act. American Civil Liberties Union. https://www.aclu.org/issues/national-security/privacy-and-surveillance/surveillance-under-patriot-act.
Staff, A.C.L.U. (2015, May 12). End Mass Surveillance Under the Patriot Act. American Civil Liberties Union. https://www.aclu.org/issues/national-security/privacy-and-surveillance/end-mass-surveillance-under-patriot-act.
Staff, A.C.L.U. (2021). Surveillance Under the USA/PATRIOT Act. American Civil Liberties Union. https://www.aclu.org/other/surveillance-under-usapatriot-act.
Welling, A. (2001, October 24). Man admits setting fire at curry eatery. https://www.deseret.com/2001/10/24/19613237/man-admits-setting-fire-at-curry-eatery.
Audio Sources:
1* A story read by Rishabh Gharekhan taken from the website:
Welling, A. (2001, October 24). Man admits setting fire at curry eatery. https://www.deseret.com/2001/10/24/19613237/man-admits-setting-fire-at-curry-eatery.
2* A story told to me by my AP English Language teacher during my senior year at Canisius High School, read by my friend Mia.
https://www.free-stock-music.com “Above the Clouds”
Image: “NSA Data Center,” Cory Doctorow, Flickr CC BY
by Nathan Chang
This podcast gives insight into the progression of the Fourth Amendment of the United States Constitution through time via two court cases, Carpenter v. United States and Smith v. Maryland. These two cases were both integral to how the advancement of technology has affected American legislation by addressing intrusive surveillance technology such as pen registers and CSLI, or cell-site location information. With new technology constantly springing up, our privacy has never been more vulnerable.
Works Cited
Carpenter v. United States. (n.d.). Oyez. Retrieved April 7, 2021, from
https://www.oyez.org/cases/2017/16-402
Cedarbaum, J., Cahill, N., & McHale, S. (2019, June 20). Digital Data Privacy One Year After Carpenter. Retrieved April 8, 2021, from
https://www.law360.com/articles/1170123/digital-data-privacy-one-year-after-carpenter
Kerr, O. [@OrinKerr]. (2018, June 22). It occurs, to me, though, that a ton of work is being done in the opinion by the Court’s lack [Tweet]. Twitter. https://twitter.com/OrinKerr/status/1010181227045933056
Matsakis, L. (2018, June 22). Carpenter v. United States decision Strengthens digital privacy. Retrieved April 08, 2021, from
https://www.wired.com/story/carpenter-v-united-states-supreme-court-digital-privacy/
Smith v. Maryland. (n.d.). Oyez. Retrieved April 17, 2021, from https://www.oyez.org/cases/1978/78-5374
Wessler, N. (2017, April 11). Cell phone records can show where you sleep and where you pray. Retrieved April 08, 2021, from
https://www.aclu.org/blog/privacy-technology/internet-privacy/cell-phone-records-can-show-where-you-sleep-and-where-you
Audio Sources
Retrieved from https://www.fesliyanstudios.com/
● Big Glass Breaking Combo Sound Effect
● AR10 7.62×51 308 Close Single Gunshot A Sound Effect
● Rifle Burst Fire D Sound Effect
● Suspenseful Dialogue
● Too Crazy
● Sentimental Dialogue
● Time Alone
Image: “Analog,” Derek Bruff, Flickr, CC BY-NC
by Thomas Ditsworth
While many people rely on the internet for everything from casual emails to secure banking transactions, most don’t understand the security behind it. In this podcast, we will discuss a computer science problem that is the basis behind our most current methods of encryption. In turn, we will explore where the encryption is used, the math behind why it is so secure, and how further innovation could put it all in jeopardy.
References:
Baumhof, A. (2019, June 13). Andreas Baumhof. QuintessenceLabs.
https://www.quintessencelabs.com/blog/breaking-rsa-encryption-update-state-art
Hackerdashery. (2014, August 26). P vs. NP and the Computational Complexity Zoo
[Video]. YouTube. https://www.youtube.com/watch?v=YX40hbAHx3s&t=515s
Hardesty, L. (2009, October 29). Explained: P vs. NP. MIT News | Massachusetts
Institute of Technology. https://news.mit.edu/2009/explainer-pnp
Lake, J. (2021, March 18). What is RSA encryption and how does it work? Comparitech. https://www.comparitech.com/blog/information-security/rsa-encryption/
Pavlus, J. (2020, April 2). What Does ‘P vs. NP’ Mean for the Rest of Us? MIT
Technology Review. https://www.technologyreview.com/2010/08/19/262224/what-does-p-vs-np-meanfor-the-rest-of-us
The Millennium Prize Problems | Clay Mathematics Institute. (2021, April 19). Clay
Mathematics Institute. https://www.claymath.org/millennium-problems/millennium-prize-problems
Watson, J. (2017, March 16). Public key cryptography: What is it, how it works and how to use it in email and file encryption. Comparitech. https://www.comparitech.com/blog/vpn-privacy/what-is-public-key-cryptography/
Audio From
Royalty Free Music by Bensound | Stock Music. (n.d.). BenSound. Retrieved March 31, 2021, from https://www.bensound.com/
For more information check out the following links to other resources about topics discussed in this podcast:
P vs NP and the Computational Complexity Zoo
Are you Ready for the Quantum Computing Revolution?
Image: Screenshot from “P vs. NP and the Computational Complexity Zoo.”
by Sebastian Garaycochea
On January 4th 2012 a mysterious post appears on the infamous 4chan website, leaving everyone “puzzled”. The post says that they are looking for highly talented individuals and that there is a message hidden within it. From this stems one of the most intricate scavenger hunt of recent history, stemming to three highly complex puzzles and the search for the mysterious group behind the post. This episode talks about this mystery and the secret group of 3301 that’s behind it. The episode aims to answer the questions Who is 3301? What is their purpose? And finally, What has led them to exist? In this podcast we will also be analyzing and solving the puzzles posted by 3301. If you are interested in creepy mysteries, be sure to give this podcast a listen and follow me into this rabbit hole.
Works Cited
Kushner, D. (2015, January 15). Cicada: Solving the Web’s Deepest Mystery. Rolling Stone. https://www.rollingstone.com/culture/culture-news/cicada-solving-the-webs-deepest-mystery-84394/
Åhlén, J. (n.d.). Cicada 3301 First Puzzle Walkthrough | Boxentriq. Boxentriq. Retrieved April 16, 2021, from https://www.boxentriq.com/code-breaking/cicada-3301-first-puzzle-walkthrough
Andrei, M. (2021, February 1). Cicada 3301: A puzzle for the brightest minds, posted by an unknown, mysterious organization. ZME Science. https://www.zmescience.com/other/feature-post/cicada-3301-puzzle-brightest-minds-posted-unknown-mysterious-organizationt/
Agate Level Up. (2019, March 22). ARG’s Power to Spread Brand Awareness. https://agatelevelup.id/ar-to-spread-brand-awareness/
Corcoran, K. (2018, January 16). GCHQ is using this puzzle to recruit aspiring female spies – try it out. Business Insider. https://www.businessinsider.com/gchq-puzzle-recruitment-female-spies-try-it-out-2018-1?international=true&r=US&IR=T
Bergen, M. (2015, August 26). “Puzzles Are Fun. Search On”: Google Cops to Secret Recruiting Tool Baked Inside Search. Vox. https://www.vox.com/2015/8/26/11618060/puzzles-are-fun-search-on-google-admits-secret-recruiting-tool-in
Bell, B. C. (2013, November 25). The internet mystery that has the world baffled. The Telegraph. https://www.telegraph.co.uk/technology/internet/10468112/The-internet-mystery-that-has-the-world-baffled.html
Hern, A. (2020, April 3). Cicada 3301: I tried the hardest puzzle on the internet and failed spectacularly. The Guardian. https://www.theguardian.com/technology/2014/jan/10/cicada-3301-i-tried-the-hardest-puzzle-on-the-internet-and-failed-spectacularly
Xaxanon. (2012, January 20). 00008.MTS [Video]. YouTube. https://www.youtube.com/watch?v=LdzSuKrTISc
LEMINO. (2018, May 19). Cicada 3301: An Internet Mystery [Video]. YouTube. https://www.youtube.com/watch?v=I2O7blSSzpI
Nox Populi. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5
Audio Sources
Great Big Story. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5
habitres. (2012, January 10). Voice On Phone – Cicada 3301 [Video]. YouTube. https://www.youtube.com/watch?v=k24ZrFR2IUQ
Anon Ymous. (2013, January 5). Cicada 3301 Song: The Instar Emergence (761) [Video]. YouTube. https://www.youtube.com/watch?v=YA1fONCH-CY
Background Music
All music from Orange Free Sounds (https://orangefreesounds.com/)
Track 1: Alexander Blu. (2019, December 8). Creepy Music Box. Orange Free Sounds. https://orangefreesounds.com/creepy-music-box-background-music/
Track 2: Alexander Blu. (2019, September 10). Halloween Creepy Music. Orange Free Sounds. https://orangefreesounds.com/creepy-music-box-background-music/
Additional Information
Bassil, M. (2020, May 28). Cicada 3301: the coders still working on the internet’s strangest mystery. The Face. https://theface.com/life/cicada-3301-the-codebreakers-still-working-on-the-internets-strangest-mystery
https://uncovering-cicada.fandom.com/wiki/Uncovering_Cicada_Wiki
Image: Cicada 3301 Logo, creator unknown
by Isaac Taylor
Did you know that border protection agents have near-free rein over your personal belongings if you’re traveling into the United States? Does that seem shocking or even a little invasive? How did this come to be? This episode of One-Time Pod aims to answer those questions by addressing the origin of the border exception as well as to raise new ones regarding our attempts to maintain our privacy in an ever-changing world.
Citations:
Alasaad v. McAleenan: Federal District court RULES suspicionless searches of smart phones at U.S. ports of ENTRY UNCONSTITUTIONAL. (2020, January 05). Retrieved April 30, 2021, from https://jolt.law.harvard.edu/digest/alasaad-v-mcaleenan-federal-district-court-rules-suspicionless-searches-of-smart-phones-at-u-s-ports-of-entry-unconstitutional
ALASAAD v. Nielsen – Exhibit 1: Declaration of Plaintiff GHASSAN ALASAAD. (2021, April 23). Retrieved April 30, 2021, from https://www.aclu.org/legal-document/alasaad-v-nielsen-exhibit-1-declaration-plaintiff-ghassan-alasaad
The border search muddle. (2019, June 01). Retrieved April 30, 2021, from https://harvardlawreview.org/2019/06/the-border-search-muddle/
Dec 23, 2. (2019, December 30). Federal, state court rulings on whether BIOMETRICS protected by Fifth Amendment GET murky: Biometric update. Retrieved April 30, 2021, from https://www.biometricupdate.com/201912/federal-state-court-rulings-on-whether-biometrics-protected-by-fifth-amendment-get-murky
Ghassan and Nadia Alasaad. (n.d.). Retrieved April 30, 2021, from https://www.aclu.org/bio/ghassan-and-nadia-alasaad
Keller, J. (2020, May 30). How to quickly disable face ID and Touch ID on iPhone and iPad. Retrieved April 30, 2021, from https://www.imore.com/how-quickly-disable-face-id
Meyers, J. (2018, August 06). How to quickly Disable FINGERPRINTS & smart lock in Android pie for extra security. Retrieved April 30, 2021, from https://android.gadgethacks.com/how-to/quickly-disable-fingerprints-smart-lock-android-pie-for-extra-security-0183475/
Audio Sources:
Links to Helpful Websites:
Image: “Report to US Customs and Border Protection,” Tony Webster, Flickr, CC BY-SA
by P. C.
Chinese citizens are always being watched by their police and government. The government claims it is to ensure that their citizens are as safe as can be. But, what if this power was abused and used for the wrong reasons? Security cameras and AI-driven facial recognition technology are becoming more and more prevalent in China. In this episode, we delve into the complicated truth regarding the surveillance state that is China.
Audio:
● How to Pronounce 谢谢 Xie Xie (say Thank You) in Chinese | speak Mandarin Chinese, https://youtu.be/JMMu9PC2z2o
● Feeling Low (Sad Lofi type Beat) | [Free No Copyright Music], https://youtu.be/1pVy3MHRkWA
● free muisc [No Copyright Music] Folk Chinese, https://youtu.be/SmJMipbcmmE
● Breaking News – Free Sound Effect, https://youtu.be/hAKwHhPvMxs
● No copyright Tape Rewind sound effect || Tape Rewind || No copyright Effects, https://youtu.be/thks8tESe24
● No Copyright Music, Beautiful Chinese Music,Bamboo Flute,Calm Music, Relaxation Music,Meditation, https://youtu.be/H31PRzqlj8s
● Background Music for Videos | Meditation Ambient Relax Yoga Calm, https://soundcloud.com/royalty-free-music-btm/calm-tibet-royalty-free-background-music-for-youtube-videos-relax-meditation-chill-world-chinese
Sources:
Campbell, Charlie. (2019, November 2019). What China’s Surveillance Means for the Rest of the World. Time. https://time.com/5735411/china-surveillance-privacy-issues/.
Davies, D. (2021, January 5). Facial recognition and beyond: Journalist ventures inside china’s ‘surveillance state’. https://www.npr.org/2021/01/05/953515627/facial-recognition-and-beyond-journalist-ventures-inside-chinas-surveillance-sta
Denyer, S. (2018, January 7). China’s watchful eye. The Washington Post.
https://www.washingtonpost.com/news/world/wp/201801/07/feature/in-china-facial-recognition-is-sharp-end-of-a-drive-for-total-surveillance/.
Kobie, N. (2019, June 7). The complicated truth about China’s social credit system. WIRED UK. https://www.wired.co.uk/article/china-social-credit-system-explained.
Ng, A. (2020, August 11). China tightens control with facial recognition, public shaming. CNET. https://www.cnet.com/news/in-china-facial-recognition-public-shaming-and-control-go-hand-in-hand/.
Image: “Disinformation,” Derek Bruff, Flickr, CC BY-NC
by Ethan Barr
In this podcast I bring awareness to the future of surveillance, through gait recognition, while also describing the way it has developed over the recent years. This idea of being identifiable through the way you walk brings up the questions of whether it is an intrusion to one’s privacy or strictly a moral form of surveillance. These questions are left unanswered in the podcast, but through the information available to you, as the audience, think about the stance and how you perceive this type of surveillance. I wanted this podcast to draw those thoughts by being informative and interesting. I hope this podcast can get you thinking about the way you are being watched and how easily identifiable everyone may be in the near future.
Sources:
Giles, J. (2012, September 19). Cameras know you by your walk. New Scientist. Retrieved from https://www.newscientist.com/article/mg21528835-600-cameras-know-you-by-your-walk/
Kang, D. (2018, November 06). Chinese ‘gait recognition’ TECH Ids people by how they walk. Associated Press. Retrieved from https://apnews.com/article/bf75dd1c26c947b7826d270a16e2658a
Xu, S. (2020, August 5). Emotion Recognition From Gait Analyses: Current Research and Future Directions (Rep.). Retrieved from https://arxiv.org/pdf/2003.11461.pdf
Schmelzer, R. (2020, July 1). Can AI Detect Your Emotion Just By How You Walk? Forbes. https://www.forbes.com/sites/cognitiveworld/2020/03/29/can-ai-detect-your-emotion-just-by-how-you-walk/?sh=3607c8f169de.
Image: “Just Walk on By,” Alexa Clark, Flickr, CC BY-NC
by Aliyah Weaver
This episode of One-Time Pod focuses on the 1990s “crypto wars,” a power struggle between the government and the American public. How much privacy does the general American public deserve in terms of encryption, and what are the limits of the government’s surveillance of the American public?
References:
Bankston, K., Kehl, D., Wilson, A. (2015). Doomed to Repeat history? Lessons from the Crypto Wars of the 1990s. New America. https://static.newamerica.org/attachments/3407-doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/Crypto%20Wars_ReDo.7cb491837ac541709797bdf868d37f52.pdf. Accessed March 30, 2021.
Freeh, L. J. (1998). Statement for the Record of Louis J. Freeh, Director Federal Bureau of Investigation Before the Senate Select Committee on Intelligence [Speech transcript]. The Avalon Project by Yale Law School. https://avalon.law.yale.edu/20th_century/t_0011.asp. Accessed March 30, 2021.
Lewis, J. A. (2021). The Crypto Wars Are Over. Center for Strategic and International Studies. https://www.csis.org/analysis/crypto-wars-are-over. Accessed March 30, 2021.
Peterson, A. (2019). Today’s Internet users are still being hurt By ’90s-era U.S. encryption policies. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2015/05/28/todays-internet-users-are-still-being-hurt-by-90s-era-u-s-encryption-policies/. Accessed March 30, 2021.
Sound effects: Apple iMovie stock sound effects
Image: “MYK78 Clipper Chip,” Travis Goodspeed, Flickr CC BY
by Kurt Urban
Here’s a story about a man sentenced to 116 years in prison. He appealed his conviction all the way to the Supreme Court… and won. The court’s controversial ruling dramatically changed a new and fast-growing field of law, one that could shape the future of US society. In this episode of One-Time Pod, how the courts are upending the battle between privacy and surveillance.
Bibliography
Auxier, B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., & Turner, E. (2020, August 17). Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research Center: Internet, Science & Tech. https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/.
Carpenter v. United States, 585 U.S. ___ (2018)
United States v. Moalin, No. 13-50572 (9th Cir. 2020)
Findlaw Attorney Writers. (2018, April 3). Right to Privacy In the Workplace In the Information Age. Findlaw. https://corporate.findlaw.com/law-library/right-to-privacy-in-the-workplace-in-the-information-age.html.
DeMarco, J. V., & Fox, B. A. (2019, April 1). Data rights and data wrongs: Civil litigation and the new privacy norms. https://www.yalelawjournal.org/forum/data-rights-and-data-wrongs.
Kerr, O. S. (2019, October 31). Understanding the Supreme Court’s Carpenter Decision. Lawfare. https://www.lawfareblog.com/understanding-supreme-courts-carpenter-decision.
Kerr, O. S. (2020, September 8). Did the Ninth circuit create a new Fourth Amendment notice requirement for Surveillance Practices? https://reason.com/volokh/2020/09/08/did-the-ninth-circuit-create-a-new-fourth-amendment-notice-requirement-for-surveillance-practices/.
Music:
Hitman by Kevin MacLeod
Link: https://incompetech.filmmusic.io/song/3880-hitman
License: https://filmmusic.io/standard-license
Comfortable Mystery 4 by Kevin MacLeod
Link: https://incompetech.filmmusic.io/song/3530-comfortable-mystery-4
License: https://filmmusic.io/standard-license
Beauty Flow by Kevin MacLeod
Link: https://incompetech.filmmusic.io/song/5025-beauty-flow
License: https://filmmusic.io/standard-license
Floating Cities by Kevin Macleod
Link: https://incompetech.filmmusic.io/song/3765-floating-cities
License: https://filmmusic.io/standard-license
Image: “Call me all the time,” Pulpolux, Flickr, CC BY-NC
Your feedback is valuable to us. Should you encounter any bugs, glitches, lack of functionality or other problems, please email us on [email protected] or join Moon.FM Telegram Group where you can talk directly to the dev team who are happy to answer any queries.