Trending

#dict

Latest posts tagged with #dict on Bluesky

Latest Top
Trending

Posts tagged #dict

Post image

How to submit gas station complaints through the eGovPH app The launch comes ahead of a staggered, big-time hike on pump prices beginning Tuesday, March 10 The Department of Energy (DOE) and Depart...

#Business #Consumer #Issues #Newsbreak #Rappler #IQ […]

[Original post on rappler.com]

0 0 0 0
Post image

DICT withdraws proposal to ban Telegram The Department of Information and Communications Technology (DICT) said banning Telegram in the Philippines is no longer being considered. The... The post DI...

#News #Software #cybersecurity #philippines #dict […]

[Original post on yugatech.com]

0 0 0 0
Preview
PH Government Averts Idea to Ban Telegram Through DICT Safety Agreement The Department of Information and Communications Technology (DICT) has scratched the idea of banning Telegram in the Philippines after forging an agreement

Under the agreement, Telegram has to comply with certain conditions - A 24/7 helpdesk with immediate responses to illegal content reports, monthly takedown metrics, and zero tolerance for child abuse, gambling, and fraud. #Telegram #DICT

0 0 1 0
Preview
Telegram Escapes Ban After Last Minute Talks w/ DICT & CICC ## Telegram Avoids Ban But Faces Strict New Conditions From Government TELEGRAM – Just days after authorities considered blocking Telegram, the messaging giant secured an agreement that changed everything. The popular online messaging platform Telegram has been spared from a potential ban by the Department of Information and Communications Technology (DICT) and the Cybercrime Investigation and Coordinating Center (CICC) following a series of discussions aimed at ensuring a safer digital space for the public. According to a statement released by the DICT on Friday, February 27, the decision not to ban Telegram came after its management reached out and coordinated with authorities. The talks were reportedly led by Ronak Singh and Abhimanyu Yadav, representing the platform’s leadership. Photo Source: Digit.fyi The government agency outlined several key agreements that resulted from the dialogue. First is the establishment of a 24/7 Helpdesk Response system to immediately address complaints related to illegal content circulating on the platform. This move is expected to significantly speed up the handling of user reports and government referrals involving unlawful activities. Second, Telegram committed to Regular Reporting, which involves providing monthly updates to the DICT and CICC. These reports will include data on takedowns and other relevant metrics, allowing regulators to closely monitor compliance and enforcement efforts. Third, the platform pledged Zero Tolerance for serious online offenses. Authorities emphasized that there would be firm and consistent action against Online Sexual Abuse and Exploitation of Children (OSAEC), illegal gambling operations, and other abusive activities. The agreement underscores a stricter approach in addressing harmful and criminal behavior within the app. Photo Source: Inquirer It can be recalled that the DICT previously announced on Wednesday, February 25, that it was considering banning Telegram due to alleged widespread violations of regulations. _“Kapag may nakita pa kami na talagang talamak at walang pagbabago, iba-iban na lang natin ang Telegram. Marami namang other options na puwedeng puntahan,”_ warned DICT Sec. Henry Aguda. For now, Telegram remains accessible in the Philippines, but authorities made it clear that continued compliance with the agreed measures will determine whether it can keep operating without facing stricter government action in the future. **READ ALSO:**Denise Laurel Warns Public vs Her Poser in Telegram, YouTube

Telegram Escapes Ban After Last Minute Talks w/ DICT & CICC Telegram Avoids Ban But Faces Strict New Conditions From Government TELEGRAM – Just days after authorities considered blocking Tele...

#News #Abhimanyu #Yadav #CICC #DICT #OSAEC #Ronak #Singh #Telegram

Origin | Interest | Match

0 0 0 0

DICT sinopla ni ex-Usec Jeffrey Ian Dy sa internet censorship Nagbabala si ex-Usec Jeffrey Ian Dy laban sa internet censorship ng DICT matapos ang planong pagbabawal sa Telegram at iba pang messagi...

#News #DICT #internet #censorship #Jeffrey #Ian #Dy

Origin | Interest | Match

0 0 0 0
Preview
PH Government Eyeing Ban on Telegram Over Illicit Activity Concerns Telegram has emerged as a popular multi-platform messaging app in the Philippines, positioning itself as an alternative to services like Viber, Messenger, and

The platform is said to be a preferred venue for illicit activities due to the extra layer of anonymity that it offers. Question is, do you agree with this solution? #Telegram #DICT

0 0 1 0
Original post on interaksyon.philstar.com

‘Unfair’ to legit users? DICT mulls banning Telegram Concerns were raised following the Philippine government’s consideration to ban the messaging platform Telegram an attempt to curb pornog...

#Trends #+ #Spotlights #deepfake #DICT #Henry #Aguda […]

[Original post on interaksyon.philstar.com]

0 0 0 0
Post image

DICT eyes ban on Telegram in the Philippines Telegram, a popular instant messaging app, could soon be banned in the Philippines. The Department of Information and Communications Technology (DICT) i...

#Government #DICT #Telegram

Origin | Interest | Match

0 0 0 0
Post image

DICT eyes ban on Telegram in the Philippines Telegram, a popular instant messaging app, could soon be banned in the Philippines. The Department of Information and Communications Technology (DICT) i...

#Government #DICT #Telegram

Origin | Interest | Match

0 0 0 0
Post image

How to Convert a Python Dict to JSON In my Python development journey, I have dealt with thousands of data conversions. One of the most common tasks I face is turning a Python dictionary into a JSO...

#Python #Programming #Tutorials #Python #Tutorials […]

[Original post on pythonguides.com]

0 0 0 0
Preview
Philippine Telecommunication Summit 2026 YouTube video by RTVMalacanang

Ph Telcom Summit 2026
#DICT
www.youtube.com/live/ALscalV...

0 0 0 0
Preview
The Department of Information and Communications Technology on January 14 released department circular HRA-002, which laid down the revised and consolidated guidelines, rules, and regulations on vulnerability disclosures and the country’s safe harbor policy and bug bounty program. DICT Secretary Henry Aguda even went to the Rootcon hacking conference last year for the purpose of advertising this development, saying that the country’s hackers should be using their skills “to protect, not to destroy.” To that end, the institution of the Safe Harbor Policy and Bug Bounty Program (SHPBBP) should be a welcome note for those with the right set of skills, as it tries to incentivize responsible cybersecurity disclosures for government services. Let’s look at what this all means, especially if you haven’t heard of this development. ##### Ethical hackers, bug bounties, and safe harbor policies Ethical hacking is the process by which a cybersecurity professional, also known as a white-hat hacker, identifies and helps fix vulnerabilities in apps, systems, or technologies before that vulnerability can be used maliciously by an unethical, or black-hat, hacker. As such, ethical hacking simulates real-world cyberattacks to assess a system’s risks so the given systems can be improved upon or otherwise strengthened in security. To make ethical hacking rewarding for white-hat hackers, bug bounty programs are organizational structures set up to assess and offer financial compensation for the work of uncovering and responsibly turning over vulnerabilities to the people developing the systems that have been hacked. This is so the security of said systems can be improved upon. Bug bounty programs often come with protections for hackers to do their work. These safe harbor policies are designed to protect white-hat hackers or security researchers from administrative, civil, or criminal liability should they find something in the process of hunting down bugs, so long as they properly disclose their research according to the specifics of a given bug bounty program. ##### What is DICT’s SHPBBP circular about? The SHPBBP of the DICT outlines the protections and requirements needed to participate in the DICT’s bug bounty program. Now, you might be wondering then if anyone can participate in a bug bounty. For the purposes of the DICT’s circular, you have to, at the very least, be a professional cybersecurity researcher to participate. You also have to register yourself under a Know Your Contributor (KYC) procedure to even be eligible to get rewarded from a bug bounty. Specifically though, the circular said it applies to the following: * All national government agencies under the Executive Branch, including Government-Owned and -Controlled Corporations and their subsidiaries, Government Financial Institutions, and State Universities and Colleges, including those under the *.gov.ph domain and DICT-managed platforms; * The Philippine Congress, the Judiciary, Independent Constitutional Commissions, the Office of the Ombudsman, and Local Government Units are highly encouraged to adopt this Circular; * Private entities voluntarily enrolled under the DICT’s Public-Private Cybersecurity Partnership Program; * Critical Information Infrastructure (CII) operators, as identified under the National Cybersecurity Plan (NCSP); and * Cybersecurity Researchers that are responsible for identifying and analyzing potential threats to an organization’s network and systems. Safe harbor protections will only apply, meanwhile, if you’re a security researcher who is testing only the systems declared within the scope of bug bounties; you do not commit any sort of unauthorized data exfiltration, alteration, or service disruption; you report vulnerabilities responsibly and privately to the DICT or the authorized entity; and you keep your findings private and do not disclose them until such time as the issue you’ve found has been resolved or you’ve been permitted to discuss it publicly. ##### How does it all work? You may be curious how this works in practice, so here’s how it would generally play out. A security researcher applies to join the DICT’s initiative through the Know Your Customer procedure mentioned above. They have to complete the entire process and be accepted to be eligible for cash rewards. Conflicts of interest — for instance, DICT personnel and third-party service providers engaged by the DICT — disqualify potential applicants from participating in these bug bounties. The bug bounty program will have its bounties set by participating entities, namely the government agencies needing help, or government partners who want to set a bounty of their own. Funding to make this circular work “shall be charged against the existing budget of the covered agency or institution, and such other appropriate funding sources as the Department of Budget and Management may identify, subject to relevant laws, rules, and regulations.” These bounties — including what sites or services and what aspects of those said sites and services are in need of testing — are listed on a vulnerability disclosure program portal (VDPP), a website dedicated to hunting the bugs and reporting them. This is hosted and maintained by the DICT’s cybersecurity bureau. Bugs and issues properly reported to the VDPP can fall under four possible security scenarios ranging from Critical, High, Medium, and Low, with potential payouts based on industry rates depending on the reports and their severity. The DICT’s cybersecurity bureau will validate the reports, and will give those with validated reports “appropriate certificate/recognition for the researcher’s contribution in reporting and/or resolution of the validated vulnerability.” Private sector participating entities, after coordinating with the DICT cybersecurity bureau, may give appropriate monetary rewards or incentives based on the structured incentive mechanisms outlined in the VDPP. Aside from monetary rewards, there is also the standing involved as responsible disclosures get some time in the government spotlight. Rewards include digital and printed certificates, public acknowledgment on the VDPP, and Inclusion in other DICT citations, as per the circular. ##### A much-needed development A national bug bounty program with defined rules for engaging in the process is good news and a much-needed development in the cybersecurity space, as it should help incentivize ethical hacking in the long-run while improving government systems in the now. If you’re a burgeoning cybersecurity professional, this can be a good way into the industry, so long as you know what you’re doing and do the work required for responsible disclosures. Check out the circular linked here for details and get involved. You could be helping to improve government security from some bad people. **– Rappler.com**

[Tech Thoughts] DICT’s bug bounties and ethical hacking at a glance The institution of the Safe Harbor Policy and Bug Bounty Program should be a welcome note for those with the right set of skill...

#Editors' #Pick #Tech #Features #Technology #cybersecurity #DICT

Origin | Interest | Match

0 0 0 0
Preview
The Department of Information and Communications Technology on January 14 released department circular HRA-002, which laid down the revised and consolidated guidelines, rules, and regulations on vulnerability disclosures and the country’s safe harbor policy and bug bounty program. DICT Secretary Henry Aguda even went to the Rootcon hacking conference last year for the purpose of advertising this development, saying that the country’s hackers should be using their skills “to protect, not to destroy.” To that end, the institution of the Safe Harbor Policy and Bug Bounty Program (SHPBBP) should be a welcome note for those with the right set of skills, as it tries to incentivize responsible cybersecurity disclosures for government services. Let’s look at what this all means, especially if you haven’t heard of this development. ##### Ethical hackers, bug bounties, and safe harbor policies Ethical hacking is the process by which a cybersecurity professional, also known as a white-hat hacker, identifies and helps fix vulnerabilities in apps, systems, or technologies before that vulnerability can be used maliciously by an unethical, or black-hat, hacker. As such, ethical hacking simulates real-world cyberattacks to assess a system’s risks so the given systems can be improved upon or otherwise strengthened in security. To make ethical hacking rewarding for white-hat hackers, bug bounty programs are organizational structures set up to assess and offer financial compensation for the work of uncovering and responsibly turning over vulnerabilities to the people developing the systems that have been hacked. This is so the security of said systems can be improved upon. Bug bounty programs often come with protections for hackers to do their work. These safe harbor policies are designed to protect white-hat hackers or security researchers from administrative, civil, or criminal liability should they find something in the process of hunting down bugs, so long as they properly disclose their research according to the specifics of a given bug bounty program. ##### What is DICT’s SHPBBP circular about? The SHPBBP of the DICT outlines the protections and requirements needed to participate in the DICT’s bug bounty program. Now, you might be wondering then if anyone can participate in a bug bounty. For the purposes of the DICT’s circular, you have to, at the very least, be a professional cybersecurity researcher to participate. You also have to register yourself under a Know Your Contributor (KYC) procedure to even be eligible to get rewarded from a bug bounty. Specifically though, the circular said it applies to the following: * All national government agencies under the Executive Branch, including Government-Owned and -Controlled Corporations and their subsidiaries, Government Financial Institutions, and State Universities and Colleges, including those under the *.gov.ph domain and DICT-managed platforms; * The Philippine Congress, the Judiciary, Independent Constitutional Commissions, the Office of the Ombudsman, and Local Government Units are highly encouraged to adopt this Circular; * Private entities voluntarily enrolled under the DICT’s Public-Private Cybersecurity Partnership Program; * Critical Information Infrastructure (CII) operators, as identified under the National Cybersecurity Plan (NCSP); and * Cybersecurity Researchers that are responsible for identifying and analyzing potential threats to an organization’s network and systems. Safe harbor protections will only apply, meanwhile, if you’re a security researcher who is testing only the systems declared within the scope of bug bounties; you do not commit any sort of unauthorized data exfiltration, alteration, or service disruption; you report vulnerabilities responsibly and privately to the DICT or the authorized entity; and you keep your findings private and do not disclose them until such time as the issue you’ve found has been resolved or you’ve been permitted to discuss it publicly. ##### How does it all work? You may be curious how this works in practice, so here’s how it would generally play out. A security researcher applies to join the DICT’s initiative through the Know Your Customer procedure mentioned above. They have to complete the entire process and be accepted to be eligible for cash rewards. Conflicts of interest — for instance, DICT personnel and third-party service providers engaged by the DICT — disqualify potential applicants from participating in these bug bounties. The bug bounty program will have its bounties set by participating entities, namely the government agencies needing help, or government partners who want to set a bounty of their own. Funding to make this circular work “shall be charged against the existing budget of the covered agency or institution, and such other appropriate funding sources as the Department of Budget and Management may identify, subject to relevant laws, rules, and regulations.” These bounties — including what sites or services and what aspects of those said sites and services are in need of testing — are listed on a vulnerability disclosure program portal (VDPP), a website dedicated to hunting the bugs and reporting them. This is hosted and maintained by the DICT’s cybersecurity bureau. Bugs and issues properly reported to the VDPP can fall under four possible security scenarios ranging from Critical, High, Medium, and Low, with potential payouts based on industry rates depending on the reports and their severity. The DICT’s cybersecurity bureau will validate the reports, and will give those with validated reports “appropriate certificate/recognition for the researcher’s contribution in reporting and/or resolution of the validated vulnerability.” Private sector participating entities, after coordinating with the DICT cybersecurity bureau, may give appropriate monetary rewards or incentives based on the structured incentive mechanisms outlined in the VDPP. Aside from monetary rewards, there is also the standing involved as responsible disclosures get some time in the government spotlight. Rewards include digital and printed certificates, public acknowledgment on the VDPP, and Inclusion in other DICT citations, as per the circular. ##### A much-needed development A national bug bounty program with defined rules for engaging in the process is good news and a much-needed development in the cybersecurity space, as it should help incentivize ethical hacking in the long-run while improving government systems in the now. If you’re a burgeoning cybersecurity professional, this can be a good way into the industry, so long as you know what you’re doing and do the work required for responsible disclosures. Check out the circular linked here for details and get involved. You could be helping to improve government security from some bad people. **– Rappler.com**

[Tech Thoughts] DICT’s bug bounties and ethical hacking at a glance The institution of the Safe Harbor Policy and Bug Bounty Program should be a welcome note for those with the right set of skill...

#Tech #Features #Technology #cybersecurity #DICT

Origin | Interest | Match

0 0 0 0
Preview
[Tech Thoughts] Mandatory social media identity verification: A shortcut open to abuse? The DICT is seeking comments and inputs on the matter of mandatory identity verification of user accounts on social media platforms. Here's some of the arguments against it.
0 1 0 0
Preview
DICT lifts Grok ban after ‘corrective actions’ taken on explicit deepfake generation The Grok chatbot block lasts less than a week
0 3 0 0
Preview
PH seeks to block AI chatbot Grok due to explicit deepfakes While Grok's footprint in the Philippines is small, the process of blocking the AI chatbot would still take coordination with internet service providers, DICT Secretary Henry Aguda says
0 3 0 0
Preview
劇伴作曲家・石塚玲依の新たなピアノソロ作品「Noctoblack」が配信開始! 人気作曲家・石塚玲依の最新ピアノソロ作品『Noctoblack』が2026年1月1日に登場。新音楽文化に向けた期待の一作です。

劇伴作曲家・石塚玲依の新たなピアノソロ作品「Noctoblack」が配信開始! #DICT #石塚玲依 #Noctoblack

人気作曲家・石塚玲依の最新ピアノソロ作品『Noctoblack』が2026年1月1日に登場。新音楽文化に向けた期待の一作です。

0 0 0 0
Preview
石塚玲依の新作ピアノソロ『Noctoblack』がリリース、共創音楽の新潮流! 劇伴作曲家・石塚玲依が2026年1月1日に最新ピアノソロ作品『Noctoblack』を配信リリース。共創音楽の新しい試みについてもご紹介!

石塚玲依の新作ピアノソロ『Noctoblack』がリリース、共創音楽の新潮流! #DICT #石塚玲依 #Noctoblack

劇伴作曲家・石塚玲依が2026年1月1日に最新ピアノソロ作品『Noctoblack』を配信リリース。共創音楽の新しい試みについてもご紹介!

0 0 0 0
Preview
菊池広輔の新EPリリース!クリエイティブな共創を拡げる音楽の世界 11月26日にデビューシングルをリリースした菊池広輔が本日、新たにEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信。注目の理由とは?

菊池広輔の新EPリリース!クリエイティブな共創を拡げる音楽の世界 #DICT #石塚玲依 #菊池広輔

11月26日にデビューシングルをリリースした菊池広輔が本日、新たにEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信。注目の理由とは?

0 0 0 0
Preview
菊池広輔が世界初録音のEPを発表、石塚玲依作品を演奏 ピアニスト菊池広輔がEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信リリース。ガイド音楽の新たな展開を紹介します。

菊池広輔が世界初録音のEPを発表、石塚玲依作品を演奏 #DICT #菊池広輔 #痕跡

ピアニスト菊池広輔がEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信リリース。ガイド音楽の新たな展開を紹介します。

0 0 0 0
Preview
菊池広輔が初EP「Kosuke Kikuchi Plays Rei Ishizuka Piano Works」を配信開始! 菊池広輔がデビューシングルに続き、EP「Kosuke Kikuchi Plays Rei Ishizuka Piano Works」を12月26日に配信。新たな音楽の魅力を体感しよう。

菊池広輔が初EP「Kosuke Kikuchi Plays Rei Ishizuka Piano Works」を配信開始! #DICT #石塚玲依 #菊池広輔

菊池広輔がデビューシングルに続き、EP「Kosuke Kikuchi Plays Rei Ishizuka Piano Works」を12月26日に配信。新たな音楽の魅力を体感しよう。

0 0 0 0
Preview
菊池広輔が新EPをリリース!石塚玲依作品集に挑む 11月のデビューシングルに続き、菊池広輔がEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』をリリース!新たな音楽の魅力を伝えます。

菊池広輔が新EPをリリース!石塚玲依作品集に挑む #DICT #菊池広輔 #表現者

11月のデビューシングルに続き、菊池広輔がEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』をリリース!新たな音楽の魅力を伝えます。

0 0 0 0
Preview
菊池広輔がデビューEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信リリース ピアニスト菊池広輔が自身の初EP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信開始。石塚玲依の作品を4曲収録し、多彩な音楽表現を楽しめる。

菊池広輔がデビューEP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信リリース #DICT #石塚玲依 #菊池広輔

ピアニスト菊池広輔が自身の初EP『Kosuke Kikuchi Plays Rei Ishizuka Piano Works』を配信開始。石塚玲依の作品を4曲収録し、多彩な音楽表現を楽しめる。

0 0 0 0
Preview
作曲家石塚玲依が贈る新たな音楽体験『ネバーランド組曲』配信開始! 石塚玲依の新作ピアノ組曲『ネバーランド組曲』が本日リリース。12の幻想的な小品が、あなたを異世界へと誘います。

作曲家石塚玲依が贈る新たな音楽体験『ネバーランド組曲』配信開始! #石塚玲依 #DICT #ネバーランド

石塚玲依の新作ピアノ組曲『ネバーランド組曲』が本日リリース。12の幻想的な小品が、あなたを異世界へと誘います。

0 0 0 0
Preview
音楽で巡る幻想の世界『ネバーランド組曲』がついに配信スタート 人気作曲家・石塚玲依が手がけたピアノ独奏作品『ネバーランド組曲』が配信開始。幻想的な12の小品で構成された新作音楽の全貌に迫ります。

音楽で巡る幻想の世界『ネバーランド組曲』がついに配信スタート #DICT #石塚玲依 #ネバーランド組曲

人気作曲家・石塚玲依が手がけたピアノ独奏作品『ネバーランド組曲』が配信開始。幻想的な12の小品で構成された新作音楽の全貌に迫ります。

0 0 0 0
Preview
新しいクラシック音楽文化を創造する演奏会、革新的コミュニティ発足を祝う 音楽家の自走を促し、新たなクラシック音楽文化を育成するサンドボックスコミュニティ「DICT Music DAO Classics」の設立を祝う演奏会が盛況のうちに開催されました。

新しいクラシック音楽文化を創造する演奏会、革新的コミュニティ発足を祝う #DICT #クラシック #新音楽

音楽家の自走を促し、新たなクラシック音楽文化を育成するサンドボックスコミュニティ「DICT Music DAO Classics」の設立を祝う演奏会が盛況のうちに開催されました。

0 0 0 0
Preview
新たな共創イノベーションの拠点へと進化するDICTの挑戦 社会実験コミュニティ「DICT」が、分散型共創へと移行。新しい価値創造のために国内外で連携を強化します。

新たな共創イノベーションの拠点へと進化するDICTの挑戦 #兵庫県 #豊岡市 #DICT #Web_3.0 #分散型共創

社会実験コミュニティ「DICT」が、分散型共創へと移行。新しい価値創造のために国内外で連携を強化します。

0 0 0 0
Preview
風ノ翔馬、同世代シンガーとのコラボで昭和の名曲を新たに彩る 演歌芸人の風ノ翔馬が自らの名を冠したEP『Z世代のSHOWA』をリリース!同世代の栄五とのコラボレーションにより、昭和の名曲が新たな魅力を持って甦ります。

風ノ翔馬、同世代シンガーとのコラボで昭和の名曲を新たに彩る #DICT #風ノ翔馬 #栄五

演歌芸人の風ノ翔馬が自らの名を冠したEP『Z世代のSHOWA』をリリース!同世代の栄五とのコラボレーションにより、昭和の名曲が新たな魅力を持って甦ります。

0 0 0 0
Preview
元吉本芸人・風ノ翔馬が演歌で新たな挑戦!EP『Z世代のSHOWA』配信開始 元吉本興業所属の演歌芸人風ノ翔馬が昭和の名曲をカバーしたEP『Z世代のSHOWA』を配信リリース。多様な表現力が試される4曲に注目!

元吉本芸人・風ノ翔馬が演歌で新たな挑戦!EP『Z世代のSHOWA』配信開始 #DICT #風ノ翔馬 #栄五

元吉本興業所属の演歌芸人風ノ翔馬が昭和の名曲をカバーしたEP『Z世代のSHOWA』を配信リリース。多様な表現力が試される4曲に注目!

0 0 0 0
Preview
新たな演歌の風を吹き込む風ノ翔馬のEPリリース決定 演歌界の新星、風ノ翔馬が昭和の名曲をカバーしたEP『Z世代のSHOWA』をリリース!その魅力を徹底解説します。

新たな演歌の風を吹き込む風ノ翔馬のEPリリース決定 #DICT #風ノ翔馬 #栄五

演歌界の新星、風ノ翔馬が昭和の名曲をカバーしたEP『Z世代のSHOWA』をリリース!その魅力を徹底解説します。

0 0 0 0