POPULARITY
Hvor var tegneserien i 2024? Hvad kunne den? Hvad var dens udfordringer? Vi lever i ‘interessante tider' som det lyder i den gamle kinesiske forbandelse og Radio Rackham kigger tilbage på det forgangne års op- og nedture: Fyringer, en boblende undergrund, kunstig intelligens, tegneroprør, nostalgivarer til ‘mænd i en vis alder', men også anbefalinger til årets bedste udgivelser. Vi analyserer det danske marked, er det bare en skæg og hyggelig hobby at lave tegneserier og hvor meget skal en tegneserie sælge for at være en succes? Er der tale om et ‘institutionelt kollaps' når tegneserier næsten ingen opmærksomhed får i den offentlige samtale og hvilken betydning har det? Vi kigger også nærmere på det franske marked hvor en tegneserie solgte 300.000 på en måned, hvad kan man lære af det? Det er en episode sprængfyldt med pep der trodser krisetegn med god energi og kærlighed til tegneserien. De medvikrende er tegner, forfatter og oversætter, Stine Spedsbjerg, forfatter Benni Bødker, forlægger, redaktør og CEO fra Cobolt, Pernille Arvedsen. Der er også bidrag fra anmelder og uddannelsesleder Erik Barkman, tegneserieekspert Xavier Guibert, tegner Nat fra Snackbag Studios, tegner og forfatter Lars Kramhøft, samt et par gode læseoplever fra lytterne.
OBS - denne episode er udkommet som video og kan ses på vores YouTube-kanal, Video Rackham. Denne podcast er derfor kun lyden, billederne skal ses andetsteds. Vi markerer episode nr. 100 med en nærlæsning af tegneserien, der startede det hele: Hergés dobbeltalbum i serien om Tintin: Enhjørningens hemmelighed og Rackham den Rødes skat. Kendt og elsket, det er et værk, der byder på spænding, eventyr og ramasjang, men under overfladen ligger åbenbaringen. Vi afdækker den. Og det gør vi i selskab med to legender i dansk tegneseriekultur: Søren Vinterberg, mangeårig kritiker ved Politiken med speciale i tegneserier, af hvilke han også er et af landets bedste oversættere, og Carsten Søndergaard, forlægger hos Cobolt, og før det Carlsen, og derfor ansvarlig for udgivelsen af Tintin herhjemme, såvel som et utal af andre udgivelser: omvandrende tegneserieleksikon og generel nøgleperson i kulturen. Nærlæsningen af Hergés hovedværk fra 1942-43 er samtidig vores første fuldblods-videoafsnit, et format vi længe har puslet med lanceringen af og som vil indgå i vores repertoire fremover. Vi tager forbehold , og undskylder for, foreskellige tekniske ujævnheder af den slags, der nødvendigvis følger pionergerning, men satser på, at det tjener oplysningen. Video Rackham.
In this episode, Steven Scott and Shaun discuss various topics related to assistive technology, including the Glide Mobility Aid, user experiences, and the importance of confidence in new mobility solutions. Listener emails also bring up the topic of living with hearing loss as well as blindness, and the challenges of using hearing aids alongside assistive technology, plus how cochlear implants can be useful to so many people.There's also much discussion on the latest kitchen gadgets made accessible by specialist tech companies and organisations out there, starting with an interview recorded at SIght Village in London, UK with Simon Cox from Cobolt Systems. We learn about their new talking dual drawer air fryer and talking microwave/oven.Shaun also catches us with Bram Caron from CNIB to hear about their new talking microwave that has just come to the market across the country.Get in touch with Double Tap by emailing us feedback@doubletaponair.com or by call 1-877-803-4567 and leave us a voicemail. You can also now contact us via Whatsapp on 1-613-481-0144 or visit doubletaponair.com/whatsapp to connect. We are also across social media including X, Mastodon and Facebook. Double Tap is available daily on AMI-audio across Canada, on podcast worldwide and now on YouTube.Chapter Markers:00:00 Intro01:19 Exploring the Glide Device11:24 Banking Apps and Accessibility21:25 Cochlear Implants and Neuralink Discussion24:00 Exploring Neuralink and Sensory Integration26:22 Personal Experiences with Hearing and Vision Loss29:53 Talking Air Fryer and Microwave from Cobolt Systems36:24 Introducing the CNIB Talking Microwave
In the latest episode of Talking Technology the team discuss all the latest updates from Apple‘s new iOS 18 release and ask the question why aren't we getting Apple Intelligence in Ireland for ages.Cobalt join us to talk about some of the appliances in Their range, and share their views on smart tech as the company turns 40. David and Joe listen to your voice notes learning all about the Pan Pickle in the process, and with Daniel's assistant failing to save the day, he attempts the ultimate accessibility tongue twister. Join the conversation with a WhatsApp voice note now. Send us a message to 086 199 0011.Support the show
In this episode of Double Tap, hosts Steven Scott and Shaun Preece talk about a range of stories and go hands on with the new Cobolt Talking Air Fryer courtesy of listener Alan. They chat about Microsoft's new CoPilot+ PCs that have launched this week and find out about some of the cool accessibility features built in as well as available separately. The guys also discuss a new feature in Chrome on Android devices that allow you to listen to webpages. You can read more via the help guide here: https://support.google.com/chrome/answer/14768725?hl=en Also, there's a demonstration of the new talking air fryer from Cobolt in the UK brought to us by listener Alan from Scotland. And there's excitement from Steven about a brand new keyboard from Logitech called Keys-To-Go 2. Keep in touch by emailing us feedback@doubletaponair.com or call 1-877-803-4567 and leave us a voicemail. You can also find us on social media.
Hello little bumblebees and welcome to episode 99. This week we welcome back guest host Brian Dalton. Brian joined the Blind Guys on a school trip to the Dublin Royal Convention Centre last Saturday. Yes, we've hit the big time - BGC were invited to speak at the Retina International World Congress 2024 about assistive technology and how it helps us in our daily lives. What a thrill it must have been for those 6 million attendees to see us in real life, eh?! Ah no, seriously, we had a wonderful time at this excellent event, and it was an honour to be involved. You can hear our presentation on this week's show where you will hear us talk about IBM's Apollo screen reader, the EmBraille, Cobolt air fryers, and much more. A special thanks to Fighting Blindness who hosted RIWC24, AV Partners who allowed Clodagh behind the velvet rope to monitor the tech end of things, and to all the fab volunteers who worked at the event across the 4 days. Also, on the show we talk about another field trip we took recently to Google's new Accessible Discovery Centre in Dublin. Brian, Clodagh, Óran and Larry went to have a look at all the cool stuff they have. Óran was particularly impressed with a low-tech device called a social barometer pin, while Larry was happy to see another doggy in the building. It was a great experience and the people at Google were fantastic. The guys thoroughly recommend you visit ADC Dublin. You can book your tour via this email address: adc-dublin@google.com. Tell them Blind Guys Chat sent you! So, take an ice cream out of the freezer, pop out to the garden and soak up the wonderfully refreshing UV rays from the best podcast of the summer: Blind Guys Chat! 17 out of 20 conference centres prefer it to providing catering. Links for items we talked about: Google ADC: adc-dublin@google.com Freedom Scientific training: freedomscientific.com/training Cobolt air fryer: https://cobolt.co.uk/products/talking-air-fryer Envision: https://www.letsenvision.com/glasses/home Support Blind Guys Chat by contributing to their tip jar: https://tips.pinecast.com/jar/blind-guys-chat
Katarzyna Sałacińska i Dariusz Linde opisują działanie tych kuchennych urządzeń, w drugiej części programu rozmawiamy również nieco ogólniej na temat dostępności sprzętu AGD. Zapoznaj się z tekstową wersją odcinka The post Udźwiękowiona Płyta Indukcyjna I Kuchenka Mikrofalowa Cobolt first appeared on TyfloPodcast.
This week we tell you about a brand-new way that you can interact with Talking Technology. You can now send us a voice note on WhatsApp by using the number 086 199 0011. We can't wait to hear your thoughts. We also unbox the new Talking air fryer from Cobolt. Could this be the most accessible air fryer yet?It's audio description from Google and safer Internet day in tech news. And we chat more about accessible cooking in quick pics. Support the show
Soul Provider – Summer Sessions – Cobolt Join Matt on a journey through the best in Soulful, Deep, and Retro House Tracklisting: 1. What About the People – Rockers Revenge... LEARN MORE The post Soul Provider – Summer Sessions – Cobolt appeared first on Soul Provider.
Dans l'actu des nouvelles technologies et accessibilité cette semaine : Du côté des applications et du web SonarVision, lancement de la Version 2 à Paris.. L'application “La Bavarde”, pour rendre accessibles les films aux aveugles. L'application ChatGPT devient un assistant vocal. ChatGPT dans l'AppStore. ChatGPT dans Google Play. Le reste de l'actu La nouvelle version de la tablette braille insideONE+ de Insidevision. Ocutrx annonce un nouveau casque de réalité augmentée pour les malvoyants. Une friteuse sans huile parlante chez Cobolt. ORCAM TECHNOLOGIES DÉVOILE ORCAM READ 3. Casque ARxWear. Une pétition pour que le réseau social Télégram soit accessible aux aveugles. Foire Aux Questions Cette semaine, une question de Azzedine à propos d'application de prise de note. Sof propose l'application Drafts. Une démo en anglais ici. Le coup de coeur de Sof La chaine Youtube L'univers de Diko. Remerciements Cette semaine, nous remercions Caroline, Samantha et Sebastian pour leurs infos ou leur dons. Si vous souhaitez vous aussi nous envoyer de l'info ou nous soutenir : Pour nous contactez ou nous envoyez des infos, passez par le formulaire de contact sur le site. Pour faire un don sur PayPal c'est par l'adresse courte paypal.me/oxytude. Faites vos achats sur Amazon en passant par le lien oxytude.org/amazon, ça nous aide sans augmenter le prix de vos achats. Pour animer cet épisode Alain, Philippe et Sof.
Bitbucket Patch, Cracked Cobolt Versions, Discord takeover, Meta internal threat & BEC Cybersecurity News CyberHub Podcast November 21st, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Atlassian Patches Critical Vulnerabilities in Bitbucket, Crowd 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild New ransomware encrypts files, then steals your Discord account Omron PLC Vulnerability Exploited by Sophisticated ICS Malware Meta Reportedly Fires Dozens of Employees for Hijacking Users' Facebook and Instagram Accounts US charges BEC suspects with targeting federal health care programs Story Links: https://www.securityweek.com/atlassian-patches-critical-vulnerabilities-bitbucket-crowd https://thehackernews.com/2022/11/google-identifies-34-cracked-versions.html https://www.bleepingcomputer.com/news/security/new-ransomware-encrypts-files-then-steals-your-discord-account/ https://www.securityweek.com/omron-plc-vulnerability-exploited-sophisticated-ics-malware https://thehackernews.com/2022/11/meta-reportedly-fires-dozens-of.html https://www.bleepingcomputer.com/news/security/us-charges-bec-suspects-with-targeting-federal-health-care-programs/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: Your BRAND here - Contact us for opportunities today! ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
Apache Commons Zeroday, Cobolt Strike, TLS Handshake Fix, & Hong Kong Attack Cybersecurity News CyberHub Podcast October 18th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical Apache Commons Text Flaw Compared to Log4Shell, But Not as Widespread Critical RCE Vulnerability Discovered in Popular Cobalt Strike Hacking Software Zoom for macOS Contains High-Risk Security Flaw Microsoft fixes Windows TLS handshake failures in out-of-band updates Hackers compromised Hong Kong govt org's network for a year Story Links: https://www.securityweek.com/critical-apache-commons-text-flaw-compared-log4shell-not-widespread https://thehackernews.com/2022/10/critical-rce-vulnerability-discovered.html https://www.securityweek.com/zoom-macos-contains-high-risk-security-flaw https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-tls-handshake-failures-in-out-of-band-updates/ https://www.bleepingcomputer.com/news/security/hackers-compromised-hong-kong-govt-orgs-network-for-a-year/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: Your BRAND here - Contact us for opportunities today! ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 s Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
On this episode of Tech Talk we hear about making university applications more accessible with UCAS, Dave catches up with Cobolt Systems and we talk about how technology can affect your health and wellbeing. You can listen to the show live in the UK every Tuesday at 1pm on Freeview Channel 730, online at www.rnibconnectradio.org.uk , or on your smart speaker. You'll hear new episodes of the Tech Talk Podcast every Friday so make sure you're subscribed to never miss an episode. We'd love to hear your thoughts on accessible technology, drop us an email at techtalk@rnib.org.uk or tweet us @RNIBRadio with the hashtag #RNIBTechTalk
This will be the century of clean energy transition and mineral constraints says Matt Watson, founder, and president of Precious Metals Commodity Management LLC. Matt Watson Specialises in precious metals markets and its supply chain, Matt assists clients ranging from Mining, Investors, Industrial Precious Metals Users, Processors, and Recyclers and coaches industrial clients on how to reduce costs, design thrift, and anticipate market changes. Matt has also worked with the Silver Institute in studying the ever‐increasing industrial demands on silver. Matt Watsons says that this will be the century of clean energy and mineral constraints. Silver's use as a key conductive energy collecting vehicle for the Solar PV market is an example of one of these potentially constraining clean energy mineral limits. Matt Watson also goes on to explain in great detail how the shift to clean energy will create massive mineral constraints due to the high demand such as Copper, Nickel, Cobolt, ruthenium, iridium, platinum, and palladium. 0:00 to 1:10 Introduction 1:11 to 2:33 How Matt Watson got started in the precious metal space in silicon valley. 2:34 to 7:29 The century of clean energy transition and mineral constraints. 7:30 to 12:20 Huge expansion in mining requirements to meet EV battery demands. 12:21 to 18:05 The environmental impact of the extra mining requirements. 18:06 to 22:05 The massive amounts of battery metals required for the EV transition. 22:06 to 23:17 The minerals required for fuel cell-powered transportation. 23:18 to 26:16 What is fuel cell technology (hydrogen-based fuel). 26:17 to 28:00 Why isn't there more discussion into the extra mining required? 28:01 to 29:04 We will have to grow our global power grid by 50% by 2050. 29:05 to 30:46 What is the life cycle of EVs and their batteries? 30:45 to 31:32 IEA predicts critical mineral constraints. 31:33 to 32:50 Hydrogen fuel cell could be a viable alternative solution. 32:51 to 36:23 Solar demand to consume 50% of the silver market by 2050. 36:24 to 40:27 Subsidising access to clean energy while failing to increase the supply side. 40:28 to 42:35 Why do they turn solar off in California almost daily, and what it could be used for? 43:00 to 46:30 Raising the question where will all the clean energy come from? 46:30 to 53:32 The clean transition will create fantastic long-term investment opportunities. 53:33 to 57:18 The recycling space will have to increase also creating opportunities. 57:23 to 1:00:44 How you can learn more about Matt Watson and where to follow him. Hope you enjoy and have a wonderful day. The FYR team. Resources and Links: Precious Metals Commodity Management Website Precious Metals Commodity Management in the Media Connect with Matt Watson on LinkedIn Matt Watsons 2021 Silver Report Fund Your Retirement Website Follow Fund Your Retirement on Linkedin Watch the video version on our YouTube channel Fund Your Retirement is an investment research and online financial media publisher. Providing the strategies and insights about finance, the markets, and the many different solutions for funding your long-term retirement, by showcasing experts in the field of finance and wealth-building strategies, including our market and economic insights and ideas. Disclaimer: This presentation is for educational purposes only. All opinions and information are for demonstrational purposes and do not constitute investment advice. Trading and investing carries a high level of risk and are not right for everyone. If you need financial advice, consult with a regulated financial adviser in your country before making any decisions.
We begin with a reminder about some upcoming events. On Thursday, September 30, Lisa Salinger joins us for a discussion of the new changes and updates in iOS 15. This is our monthly free event, and is open to everyone. Just make sure you're on our Events mailing list to get the joining info. Beginning October 4 learn about the various ways to listen to and enjoy podcasts. This four-week class includes a live Q&A session, as well as a mailing list for interacting with other participants. Finally, learn to create your own podcast later in October in our detailed live event. We discuss everything from coming up with your podcast topic, to hosting, recording, interviewing guests, and so much more. We'd love to have you. Kim's parents and some friends were recently here to bring a trailer of her stuff from NC, and that led to us cleaning out a bunch of space. Between that and unpacking lots of Kim's stuff, we unearthed a few treasures we wanted to share with you. These include the Bop It Action game with three classic moves and ten fun new ones, including cradle it, golf it and answer it. We also found a talking pedometer, an APH Color tester (what an amazing find), and a really cool Cobolt talking clock, all of which we demo here. We also found a Fingerlings giraffe, a neat little interactive toy, and a Bluetooth speaker from Music Angel, which sadly appears to be unavailable now. We hope you enjoy our explorations. We also take a little detour part way through to talk about our trip to Niagara Falls, and share some nice audio Chris recorded of the water. Thanks, as always, for listening.
Dette afsnit var planlagt til at være et kort afsnit på måske 30 minutter. Det kunne vi ikke rigtigt holde, for der var meget at tale om. Allerførst strør vi roser ud over den danske forlagsbranche for endeligt at udgive tegneserier på dansk til børn noget vi længe har skreget efter. bl.a. Raina Telgemeiers "Kvalme" fra Cobolt. Herefter går vi lidt mere i dybden med Nicolas Keramidas "Åben Hjertet" som Árni har oversat og som snart udkommer.
This week on Rodcast we're reviewing the Favourite Cobolt 9ft CBL902M, in our Tackle-On-Test feature. As we then look at the very fish the Cobolt spinning rod would be used for, the wonderful Bass, in our species section.---A Create Podcast Hosted on Acast. See acast.com/privacy for more information.
U ovoj epizodi razgovaram s Jasminom Kuhar, predstavnicom tvrtke Cobolt koja već dugi niz godina proizvodi i prodaje pomagala za slijepe i slabovidne.
In this weeks Talking Tech, David celebrates his 30 years at the RBS of NSW and now Vision Australia by discussing some of the tech highlights over his time working as a technology specialist. With these notes, you get the whole list, enjoy. Unusual or Meaningful Tech Over the Last 30 years When I started work for the then RBS of NSW (now Vision Australia) on June 4 1990, my tech on my desk was a Keynote PC Plus based on a Toshiba 1000, a Braille & Speak note taker, and of course a telephone land line. Tech sitting on my desk 2020 for general everyday stuff, iPhone, QBraille Braille Display, iPad, MacBook Pro, Surface Pro, Google Home, Amazon Echo, and HomePod: plus my audio studio setup for podcasting and my radio program. In no particular order, this is a list of all the tech that I have personally used for both home and work over the last 30 years covering my time at both Royal Blind Society of NSW then Vision Australia). Where amazingly some of the tech still exists when it first came out and where it has evolved to current, I’ve put the updated version in the current lists as well. Interestingly, there are over 10 products that are Assistive Tech related that have lasted the test of time and are in the old and current tech sections. Where some of the products may not be that well known (at least according to me smile), I’ve put a very short blurb next to them. Oddly or not, I wish some of the devices that are no longer around still were, as they did some great specific things. For me, I think the main technology advances were: Microsoft Windows 3.1 access (keeping in mind Outspoken had been out for a while for Macs) in the 1990’s, Mobile and Smart phone access in the 2000’s (Talkback for Synbian and VoiceOver for iPhone) plus VoiceOver for the Mac in 2005, Smart speakers and Smart home tech in 2010-2020. Things we still need to conquer: Ongoing message and change for accessibility across mobile/desktop apps, and the huge one, the web. Access to self service kiosks. Indoor navigation. Accessibility in white goods. Accessible EFTPOS terminals (Apple Pay sort of gets around this). More audio described content on free to air. Hate to pick out out Foxtel, but they sort of deserve it, an accessible Foxtel box. One final point, we should be careful about assigning accessibility based on the fact that it works with one specific type of software, particularly in the screen reader industry. Old Tech If you haven’t heard of some of this stuff, use good old Google, should still be some info floating around. If it brings back hopefully good memory’s I’m glad. Keynote PC Plus (Toshiba 100 laptop with Keynote note taking software and insult speech). Keynote for DOS. Keynote across portable devices (current today - BrailleNote Touch)). Braille & Speak (Braille keyboard based simple note taker with speech). Braille Lite (Braille & Speak with a 40 cell Braille Display). Type & Speak (Braille and Speak with a QWERTY keyboard). Inca QWERTY Keyboard for DOS (with two Braille display lines). Navigater Braille display. OutSpoken for Mac for System 6.07, 7 and 8. OutSpoken for Windows. Enlarge for Mac. Closeview for Mac. Artic Business Vision MSDOS screen reader. Artic Business Vision internal PC Card. Artic Transport (you could upload the screen reader to the MSDOS PC from the external synthesiser). Artic Gizmo Pad (an external navigation keyboard for Artic). Arctic Winvision for Windows. Double Speak (external synthesiser). Accent SA (external synthesiser). Keynote Gold PCMCIA, PC or Keynote Gold external synthesiser (had driver to be made available to other screen readers). Apollo external synthesiser. Hal MSDOS screen reader (worked with the Apollo Synthesiser). Hal for Windows (eventually became Supernova for Windows current today). DECTalk Classic(very large external speech synthesiser. DECTalk PC internal synthesiser card. DECTalk Express external synthesizer. DECTalk Access software synthesiser. ASAP (As Soon As Possible) MSDOS screen reader. ASAW ASAP for Windows). JAWS For DOS MSDOS screen reader. JAWS for Windows (current today). Eloquence software synthesiser (Made famous when first worked with JAWS For Windows V3.2). Vocal-Eyes MSDOS screen reader (could be configured). Window-Eyes for Windows. Master Touch MSDOS screen reader (could read direct video writes). Master Touch Touch Tablet (25 line by 80 column tablet for navigating with Master touch cursor). Dragon for DOS. Dragon For Windows (current today). Braille to Print for Perkins Brailler. Jot A Dot (small Braille writer). Kurzweil PC Reader (internal PC Card supporting the KPR OCR software). Arkenstone Easy Reader OCR software. OpenBook for Windows OCR software (current today). Versa Braille (20 cell Braille note taker using cassette tapes). Pac Mate note taker with 40 cell Braille Display. Blazy Personal Embosser Rainbow Reader (stand alone reading machine). Eureka A4 (personal Braille input keyboard note taker). Oddly had a vault metre, and thermometer.. MountBatten Brailler, Braille Writer, embosser etc (current Today). Mimic for MountBatten, LCD display (current Today). Braille Mate (single Braille cell on a notetaker). Light Probe (detects light source - current today). ABC Courier (deaf/blind Communicator). Telebraille, deaf/blind communicator. Talking keyboard plug in box (made any keyboard speak that was plugged in to it). Nomad tactile and talking diagrams. Vista plug in PC screen magnifier for MSDOS, had own mouse. ViewPoint Split PC/CCTV. Magic for DOS. Magic for Windows (no longer being upgraded). Zoomtext for Dos. Zoomtext for Windows (current Today). Road Runner text reader. Book Sense (book reader). Plextalk Pocket (seems to be no longer available). Parrot or later Voice Mate (record notes and appointments). Voice Diary (record notes and appointments). Olympus DM5 Digital Recorder (with inbuilt speech menus). Business Memo (voice recorder). IBM OS 2 Screen Reader for OS 2 and Windows 3.11 with dedicated external number pad keyboard which could also be programmed). Home Page Reader (from IBM for reading the web - self voicing application for Windows). PW WebSpeak (self voicing application for reading the web in Windows). Narrator for Windows XP screen reader for Windows, used to be joked about that this was an example of a screen reader that wasn’t a screen reader. Narrator for Windows 10 (current Today). Talking Microwave late 90’s LG. Talking Microwave 2020 Cobolt (current Today). Talking Caller ID for land line. Nokia Communicator 9210 with Talks for later Nokia phones. Nokia N82 and other Nokia’s running Talks and the Symbian operating system. Freedom Box talking interface to Windows - self voicing application, name later changed to System Access Mobile network. System Access Screen reader for Windows (could also run off a USB stick). SAToGo (run System Access from a Webpage). System Access Remote Access Manager (remote PC support). Guide Connect early 2000’s, later sold to Dolphin Systems. Guide Connect (Dolphin Systems, simple to use menu driven self voicing application for Windows, current Today). Speaking menus on iPod nano/Shuffle (speech came from PC). Talking set top box (Hills Set Top Box). I can’t remember the name of this, but before land lines had a hands free speaker phone so you could instruct someone over the phone, there was a gadget that you placed the receiver of the phone on and it turned the phone in to a hands free phone for microphone and loud speaker. Current Tech A few main stream bits and Bobs in here as well. The first 13 or so products below, are listed in both sections and whilst they have ben updated or changed, are still around amazingly. Keynote across portable devices (current today - BrailleNote Touch)). JAWS for Windows. JAWS Tandom (part of JaWS but fantastic tool for remote PC support). Window-Eyes for Windows (this has only recently been discontinued). Non Visual Desktop (NvDA) screen reader for Windows. Can be completely run as a stand alone screen reader. Supernova screen reader for Windows. Hal for Windows (eventually became Supernova for Windows). Dragon For Windows. OpenBook for Windows. MountBatten Brailler. Mimic for MountBatten. Magic for Windows (no longer being upgraded). Zoomtext for Windows. Narrator for Windows 10 (happy to now call it a screen reader smile). Guide Connect Dolphin Systems. Dolphin Pod (use your TV to access entertainment options of Dolphin Guide Connect - plug in box). Light Probe. Plextalk Pocket (seems to be no longer available). Victor Reader Stream. Victor Reader Trek GPS. Envoy Connect (basic daisy player. Focus 14 and 40 Braille displays. VoiceOver for Mac from 10.4. VoiceOver for iPad nano, iPhone, iPod touch, iPad, Apple Watch, and Apple Tv. Various iPod nano (latest version had version of VoiceOver on it before device was discontinued). Various iPhones. Various iPads. Various iPod touch. Various Apple TV. Various Apple Watch . Various AirPods. Magic Trackpads and Magic Keyboards. Wireless chargers. Various Fitbits. Be My eyes and Aira using 2 way video communication via Smart phone for assistance. Various tablet/phone stands. Xbox One/One S (with Narrator). Talkback for Android. Voice Assistant on Samsung phones/Tablets, and Galaxy Watch. Symapptic software for Android. Various Macs (all Mac since 2005 with work laptop and current Surface Pro tablet). Kindle eBook stand alone Readers. Samsung Tab One (originally to drive my App driven coffee machine in 2017 and iOS version of the app was not accessible). Samsung Galaxy S10 smart phone. Surface Pro (Windows tablet). Smart TVS (Samsung in particular). RIVO keyboard (custom keyboard to navigate mobile platforms for iOs/VoiceOver, Android/Talks, and Samsung/Voice Assistant). Orbit Reader 20 (first cost effective Braille Display). Brailliant BI14 small Braille Display. ElBraille Windows 10 docking station with a Focus 14 or 40 Braille Display. InsideOne Windows Braille TAblet with 32 cell Braille Display. Tap With Us Wearable Keyboard supporting VoiceOver for iOS. Dot Watch (smart Braille watch). Sunu Band (wearable sonar device for O&M). Mini guide (hand held sonar O&M device). Buzz Clip (attach to clothing or cane sonar O&M device). O6 (navigate iOS with VoiceOver). Orcam OCR etc wearable device. Accessible Radio (Sangean Accessible Radio). Accessible Power Bank (Engergrid). Large print USB keyboards black/white, white/black, yellow/black. Code Jumper from APH for teaching coding. Swift Playgrounds on iPad/Mac for teaching coding. 3D printing (Ballyland 3D objects to teach coding). Dash robots for Swift Playgrounds Tello Edu Drones for Swift Playgrounds. Bose Frames (3D Audio Reality sun glasses). Bone Conduction Head Phones (Aftershokz). ID Mate Bar code scanner. QBraille braille display and BT keyboard. ViewPlus Embraille personal embosser. Amazon Echo Dot, Echo Plus, and Echo Show. Google Home, Google Mini, and original Google Hub. HomePod. Olitech EasyFlip 4G Mobile Phone with speech/physical keyboard. Smart Vision 2 Android phone with speech/physical keyboard. Smart Home Tech: eg AC Controller for Split AC, video doorbell, switch’s, weather sensors, vacuum cleaner etc. Tile Tag Tracking devices. Beyond the usual assistive tech of screen readers. Screen magnifiers, Braille displays, Braille note takers, reading machines or OCR software etc etc, the devices that have stood out for me have been (and a few add ins here): Outspoken for Mac, Braille & Speak, The ABC Courier, Artic Business Vision/Winvision. Vocal-Eys for MSDOS. Master Touch. IBM OS/2 Screen Reader, Nomad Tactile Talking Diagrams. Road Runner, Arkenstone Easy Reader, Mountbatten Brailler, Talking Microwave, Victor Reader Stream, Victor Reader Trek, ID Mate, Talkback for Synbian, Speaking menus in Nano, VoiceOver for Mac and iOS, Apple TV, Macbooks, iPhones, iPads, Apple Watch, AirPods Swift Playgrounds. Code Jumper, 3D printing, Olitech 4G Easy Flip Phone. Magic keyboards and Magic Trackpad, App Store’s for iOS, Android, Mac, and Windows. QBraille, Dot Watch, Orcam, RIVO Keyboard, Tap With Us wearable keyboard, Sunu Band and Mini Guide, Aftershotkz Bone Conduction head phones, Bose Frames. JAWS For Windows and Eloquence, Narrator for Windows 10, Smart Speakers, Smart TVS. Be My Eyes and Aira. Wireless charging. Tile Tracking Tags. The End
Resources:Eric's book, Security from ZeroEric's company, Brindle ConsultingEric's TwitterAmelia's TwitterNate's TwitterWelcome to the podcast. Our show is a conversation with experienced software engineers where we discuss new technology, career advice, and help you be amazing at work.I'm Nate Murray and I'm Amelia Wattenberger and today we're talking with ex-Google engineer Eric Higgins who is the founder of Brindle Consulting and co-author of the book Security from Zero.https://www.brindleco.com/In this episode we talk about how to think about security as developer and how to take the responsibility we have seriously. We talk about how to take a preventative and proactive approach to your security, and that means we cover:How to deal with extortion threats by having a bug bounty programHow to think about automation tools when it comes to securityWhat resources you should read if you want to get better at securityHow much does a web developer need to know about security, really?Eric has worked in security for a long time and he does a great job at being pragmatic to make sure the security goals are in line with the business goals. Amelia and I really enjoyed our conversation with Eric and I'm sure you will, too. Let's get started. Eric Higgins PodcastNate: [00:00:00] All right. So Eric, welcome to the show. Just kidding. Thanks for having me, Nate. Your company is brittle consulting, so tell us about it.Eric: [00:00:07] Brindle consulting. I basically help my clients who work in the tech sector and have customers, have been customers. They're profitable, but they've.Avoided working on security for a little bit too long, and now they are finally starting to realize that they have some problems that they need to address, and it's becoming overwhelming. So I help them create a very practical security program so they can start to address these things so that they stop from feeling like they're reacting to all this stuff and start taking some proactive approaches.Nate: [00:00:37] What kind of stage company are we talking about here? . On Bug BountiesEric: [00:00:39] the types of stages of clients that I thought I would get are very different than what I've actually had to work with.here's like the common denominator in all these cases.Usually they'll start to get emails to a gall, have like a security@mycompany.com email address set up where people can report security issues and they. Inevitably, we'll start to receive these emails from security researchers. I'm quoting here, security researchers, and it's usually people who are running these scripts that look for common vulnerabilities against like somebody's website, and.They're basically trying to extort these companies for money to pay out because they don't have a bug bounty program in place. And what that really means is that they don't have a policy in place to say that for these types of vulnerabilities that we're willing to, pay, you'd report to us responsibly.This is how much we pay, right? And this is the rules by which this game is played. So they start to get overwhelmed because they constantly get hit by all these things or all these emails from these researchers, and they start to feel overwhelmed. And it gets to the point where the individuals who are responding to all these emails or all of these security related issues start to realize that like they can't get any of their normal work done because they're just buried in all these security related requests and they realize like it just like, and any other company for any other position, you need somebody to be doing this stuff so that you're not the one doing it. So then they come to me and they say, how do we avoid this problem? Maybe we're not at the stage yet where we can hire somebody to work on security full time for a variety of reasons, but maybe we can do some things to make sure that we don't feel like we're buried in this work and we're not constantly getting distracted from working on our product, but still making sure that we maintain a certain level of security and know how to respond when these things come up.Nate: [00:02:26]Yeah. I want to talk about the bug bounty programs a little bit. So going back, you're saying you used air quotes around security researchers.The implication is they're maybe not really researchers, but maybe they, what's the idea that they have, they're using automated scripts or something to find these vulnerabilities and they're just trying to. Collect bounties? Are they actually trying to say like, we found the security hole and we're going to exploit it.You don't pay us a ransom. What are you implying here?Eric: [00:02:49] So it's a little bit more of the former, I mean, I guess there's a hint of the ladder in there. So here's what I really mean by this. So not to admonish anyone, because I think that there, I mean, I know that there are a lot of real security researchers out there who play by the rules, but there's a certain class of individuals.And there seems to be a network of them that they tend to come from like third world countries or where they have internet access and like they're just looking for some way to make money. Right. So, you know, it's noble cause I suppose, but they specifically seem to target companies that don't have a published.Responsible disclosure policy. So responsible disclosure is really like the umbrella term for what a bug bounty policy is, or a bug bounty program. It's a way to report security issues to accompany in a responsible way, which is the opposite, would be like they just publish about it on like Reddit or hacker news or a blog or something and make it public to the world without telling you first.Right? So the old school mentality. Or approach to this that a lot of companies used to take was if you reported security issues to us, we would assume that you were a hacker and we would start to litigate against you, right? We would take you to court and Sue you cause you're hacking us. So that approach doesn't really work like that stupid and nobody should do it.And I have a firm position on that instead. The way that the landscape has shifted is now there's actually companies. In existence that will help you create and run above bounty program where it's an incentivized responsible disclosure program. That's what the bug bounty is. And you basically say, like for this class of security issues, we'll pay you X amount of dollars.So just to give you some examples. So Google I think has different classes of bounties that they'll pay out. And I think the highest is something like $100,000 and that's if you can find a security, like a major security issue in like the Chrome browser or Android operating system for their phones.Right? So there's a very high level of payout for very like deeply technical and like widely exploitable type of security issue. More commonly for like the class of companies that I work with, they'll have some kind of web application. It will be vulnerable to like SQL injection or something else. It's like relatively common that these, I would say the lower tier of security researchers, they're looking for all these low hanging fruit that they can run some kind of software and scan for these things and find them pretty quickly.Then they contact the companies by email and say, Hey, I thought all these issues, I would love to get paid for my work. So the problem with this is that there's, I guess a few problems with this. The first is like they're not really. Doing a lot of work, right? They're bringing it to your attention, which is great.But as soon as those companies, and this has happened to a number of my clients, as soon as you pay out with one of them, they tell all of their friends and their network that this company pays out. Then like you start to get inundated, you get pile on with all these security reports and they may have run the scan once and like are sharing all these different security issues with their friends so they can all kind of get paid.So it's a little problematic and it's problematic because. The companies haven't said, these are the rules and here's what we're willing to pay. So when it comes time to like reward these researchers who are reporting these issues, they don't have any guidelines to follow to save. This is how much we're going to pay for this type of vulnerability or this type of vulnerabilities out of scope.You can't stalk our employees on Facebook or LinkedIn and try to extort us for higher payment because you disagree with, because there's no written policy to say, these are what the rules are and we use what the payments are. That's kind of where they get stuck, right? Like they. Not having the policy in place is really like the key driver to this and these researchers, the air quote, researchers are starting to target those kinds of companies because they know that they can get payment and kind of extort them for a little bit higher.Nate: [00:06:21] What are the types of classes of like the tiers for the types of bugs that the people typically pay out for? And also who gets to decide? Is it just like the company gets to decide somewhat arbitrary early and they say, like we said, that if you find SQL injection, we'll pay out, you know, $1,000 or there are many cases where it's ambiguous what the actual vulnerability was.Eric: [00:06:40] I would say it used to be more ambiguous than it is now because bug bounty programs are. Much more prolific than they used to be. It's become almost standardized to say, like for this class of vulnerability, this is the payment tier we're going to pay out. So here's the common case. So it is set by the companies.To answer your direct question, the payment tiers are set by the company and usually goes along with what stage they're at and like what their financials look like. So they'll set some kind of a budget for the year to say, this is the max we want to pay for security issues through this bug bounty program for the year.So let's say it's. I don't know, $10,000 or $30,000 whatever it happens to be, it's usually pretty low around that ballpark. So then they can say, well, we're going to expect in the first year to get, based on our priors, however many we've had from these researchers, maybe twice that many, because now we're like publishing that this thing's available.So we'll expect it to see more for a specific. Type of vulnerability, like let's say it's low hanging fruit, you're using an older version of some Java script library. Then maybe has some kind of weird vulnerability in it or the vulnerability one, its dependencies or something like that, but the effects of that aren't very great.Like the impact isn't great to your web application. It just happens to be like, Oh, this isn't a best practice. The threat level is pretty low. So thanks for reporting it. Here's like $100 like so the lower end is usually like maybe a hundred bucks, something like that, maybe $50 it all depends on the company, what they decide to set.So at the higher end of the types of security vulnerabilities that the companies are looking for are things like remote code execution. Like you can. Fill out some form on our web application and somehow run code on our server that we didn't expect you to run. Or you can somehow access everything that's in our database so you're not supposed to be able to access.So the classes for security issues. Are fairly well documented. There's like, you know, five or six general categories they fall into, but it's really the level of impact that that security vulnerability that the reporting has and whether or not it can be reproduced and it's well documents and all of a sudden things kind of play into whether or not it's actually granted as a true vulnerability or a valid report.So the level of impact that the security issue has is being recorded usually ties directly to the level of payment. So, you know, a company that's first starting off, I usually recommend a couple of things. First. your payment size pretty low, especially for the first year, because you're going to get a ton of low hanging fruit and you're not going to want to pay like $10,000 per whatever, weird JavaScript vulnerability that it's relatively low.So, so Kevin, pretty low for the first couple of years. And then the second piece of advice I usually give that they don't always follow is to use a managed bug bounty program. And what that means is you pay these companies who provide the software. It's almost like. I'll use get hub as an example, like their get hub.In this scenario, they're offering the software that hosts this bug bounty program. So that's where the security reports go to and are listed and are managed by teams of manage bug bounty program is where that company also provides. So their employees to review and triage the tickets and make sure that they're like written in the proper format, they're reproducible and all these things before they actually come to your teams.That really helps to reduce the amount of noise because especially at the very beginning, what you go public with, your bug bounty program. You tend to get a really, really poor signal to noise ratio and you want to try and improve that level. So I usually set the caps pretty low, make sure it's managed for like the first year because you're going to have to manage all the noise and then as time goes on, you start to increase your budget, you increase the tiers, you can increase the scope, and if you hire people who can manage this thing, then maybe you don't have to pay that company, whatever they charge for somebody to manage it for you.Managed Bug Bounty ProgramsNate: [00:10:19] What are the major players in that space? who are the companies that, or maybe the defaults to go to?Eric: [00:10:25] The two main ones right now at the time of recording our hacker one and the other is called bug crowd. For all intents and purposes, they offer nearly the exact same services. Their marketing material in their sales team will tell you that there is slight differences between them and there are, there are some differences.There's differences for the types of integrations their software provides. They'll tell you that there's a different number of. Security researchers in their platform, and in a lot of ways it's very similar to Uber versus Lyft. Hacker one was first in the same way that the Uber was first and Lyft came later.Same is true. Both crowded came later, and also in that same way, I would say that based on my experience, hacker one is a little bit more aggressive with like their sales and marketing techniques. In the same way that Uber is a little bit more aggressive with their sales and marketing techniques. That being said, it work successfully with both these companies.I'm not trying to like bash any of them by making a negative correlation between any of these companies based on, you know, whatever your predilections happened to be about Uber and Lyft. So those are the main players. Now, interestingly. At my previous role at Optimizely, we use a company called Cobolt who also did, or also offered a bug bounty program as software package, like as a service.And recently when I reached out to them to see if they're still doing this, they have transitioned away from that model and more towards almost like an automated model where it's. They scan your systems from the inside and try and look for these vulnerabilities. At least that's the way that I am remembering my understanding of it.It seemed kind of complicated and expensive when I talked to them. Maybe it's a great product, but it was interesting that they had completely pivoted away from the previous model where they were kind of competing with hacker one and bug crowd to something that's completely new. The Role of Automation in the Future of Cyber SecurityAmelia: [00:12:01] How much of this space do you think is going to be automated in the next few 10 years?Eric: [00:12:06] So my background, I should clarify, is as a software developer, so I tried to think of the question of automation in terms of a software developer, like what's possible to automate. And I'm like, what should be automated? So, so this is actually a really interesting question because I've started to see in the last couple of years a lot more tools that.Offer automation for all these kinds of problems. Like the security space is just like one aspect of this, and I'm sure that like, you know, by next year we're going to have all kinds of crazy blockchain distributed Kubernetes, AI driven security tools that are out there trying to sell us products.Whether or not they work, I think is a different question. And if you think about the last few years, like there was this huge push like, Oh man, machine learning is going to solve all these problems for us and is going to solve all these problems for us. And then a couple of years later people start to realize like, Oh, you machine learning is a cool tool for a specific set of problems, like finding patterns and making sure that you're including things in the same kind of pattern.So more for AI. Like there's certain things that they're really good at, but it is not like general AI. Like it doesn't. Do all of the things that a human being can do very simply. So you have to kind of back away from that. And like we've started to see people sort of backing away from these like very grandiose claims about what those things can do or what they're capable of.So I think to answer your question, I think the same is really true as it currently stands for security software. There's a lot of companies who are offering crazy AI driven, automated tools to do all these things, but whether or not they actually do the things they say, like I think is a different question.And. It's really up to the companies buying whether or not they want to go through a pilot program and see if it works for them. What are they willing to pay for it? I think fundamentally, the question for any kind of software as a service comes down to what am I paying for this and how does that correlate to the number of employees that I would normally have to hire to do that job?Right? Are they automating something that. Is easy to automate that we could do ourselves. Like is it, you know, just trying to match them patterns that we know and like could just add a filter to Splunk or whatever logging software we have, or they're doing something more advanced where we're like, we would have to build out a huge crazy complex platform, two ingress, all this data and then, you know, run a bunch of code against it to find like weird patterns that we would not normally see.How much time does that save us? Not only like at the initial, but also like over the longterm. And I think the same answer is true for a lot of software as a service. Like if you're going to charge a company $30,000 a year for software, but it would cost them an engineer. Per year to do that same job, like an engineer is going to cost them $100,000 or more.So they're saving a ton of money by using the software instead of hiring an engineer to do that job. So maybe that's a roundabout way of answering your question, but like that's the way that I think about these things. I don't have a lot of firsthand experience with a lot of the newer automation tools that are coming out.Maybe they're great. Maybe they're junk. I mean, I haven't seen evidence in either direction yet, but my gut reaction to me, I've just like worked in security too long, so I'm always like a little bit skeptical. I'm usually pretty skeptical about what they're offering, like whether or not it's worth the price that they're asking.How You Detect HacksNate: [00:15:03] You mentioned using Splunk to track logs and to find abnormal behavior. One of the things that I've noticed when I've seen blog posts about security incidents, they might say, you know, we had an employee who had their admin panel password hacked and the attacker had access to all these accounts for like three days and you know, we were able to track them down and shut them down. What tools would you use to actually detect that? Because for pretty much every company I've worked for, if a hacker got access to an admin's password, no one would ever know, like ever. Like we would never find out that that had happened.So like what tools and processes and monitoring do you put in place to catch something like that?Eric: [00:15:46] You opened that really interesting can of worms. And here's why. So the question that you asked is how do you detect this? Which. In the question itself, you're already telling me that it's too late because it's already happened.So this is really the type of thing that I focus on with my clients is How do you prevent this from happening? How do you make sure this doesn't happen? Because if you can make sure that it never happens or is nearly impossible to happen, or is such a great burden for an attacker. To go after that approach.They're going to do something else. They're going to do something that's easier instead so then like, maybe you don't need a crazy monitoring solution for this kind of hard problem in place because even if you had it now, you know it's too late. They already have it. Right? So how long would it take them if they had ad admin access to your systems to copy all that data?Right? Even if you can shut them out, maybe it took them 30 seconds and like it took 30 seconds just for you to get that email and read it. And they already have your data, so it's too late. Right. So I would rephrase the thought process too. How do you prevent these things from happening in the first place so that you don't have to worry about like, Oh my God, like what are we going to do if this happens?Cause that's a much harder problem. So I focused on the easy thing. So the easy thing is how do you keep people out of the admin. Handle it, of your systems to have access to everything. And just as a preface, I want to point out that I think a lot of my clients and a lot of people I talked to tend to think that attackers are going to try and go through your web application or your mobile application to try and hack your company.But that's a pretty limited approach. And I think threat actors in the space have already started to realize this. So the targets that they're choosing instead are developer machines or developer systems. So. If you have Jenkins running all your CIC CD systems, your continuous integration, continuous deployment, that system probably has keys for all of your servers as keys for all your source code.It probably has rewrite access to your database. It probably has admin level access to everything so that it isn't blocked. So that's a really ripe target. And usually when people set up. The systems, like they just set it up just to the point where it's working, but not necessarily secure. Right. And it's just like an admin.Yeah. Right. It's very common. And that's the thing. And that's kind of the reason, the realization I had when I started consulting is that everybody has the same problems. Everybody's making the same mistakes. So there's a pattern that's pretty easy to solve for in, it's really just a matter of education.So that's kind of what I focus on. So getting back to the question of how do you prevent this from happening. There's a variety of ways, like the easy one that I usually recommend is for anything that requires admin level access. I review who has access to it with my clients and say, do all of these people actually need admin level access on a day to day basis for their jobs?Often the answer's no. Right? There might be a couple people who day to day need admin level access to do their jobs in whatever that system happens to be. For everyone else, they can get a lower level. Admin privilege or whatever it happens to be, or lower level permission. But I admin like they don't need rewrite access to literally everything.So that's the first thing I focused on is who has access to this and this. So this model is called least privilege. So you're offering the least privilege to most people by default. So that one comes up a lot, right? And then the second thing is for the people who have admin access or any access at all, can you enable some type of multifactor off like two factor auth using, you know, the Google authenticator on your phone or like a YubiKey or some other kind of system to make sure that even if your admin password was published on the internet, nobody could really do anything with it.There's something else preventing them from logging in. Just those two things like limiting who has access to admin levels in systems. Enabling multi-factor off. Get you most of the way there. Like you're almost to the point where like it is a really hard target now to get into those systems. Now I could kind of fearmonger you and say like, well, you know, it's an had been a little system in like the person who's the admin is kind of sloppy and they set up SMS for their two factor auth instead of like a, you know, authentication app and maybe their phone gets spooked and now like it's possible it's a compromise that there's all these weird ways to kind of work around these things, but it's a much higher bar.Than it was before where maybe laptop got stolen, right? Or like somebody just like look over their shoulder and saw them log in, or you know, maybe they like sniff their cookie or something like that, and then now they have access to this system. So it raises the bar for that kind of thing just by putting these preventative measures in place.But to answer your question more directly, which was. How do you know about these things after the fact? Normally, any types of systems that have admin paddles, not always, but they will often offer some kind of like auditing system when it, any kind of administrator logs in, it will keep a separate log for all the actions of that person.So click, who logged in, where do they log in from? Like in the world, what was their IP address? What actions did they perform? So if you are talking about like the AWS. Council or like the Google cloud console, they usually offer this kind of system. I think Splunk does as well. So this gives you a couple of things, like you've prevented the ability or not the ability, but you've raised the bar for getting access to these admin systems, or if you've made it much harder to get in, and you also have some kind of system in place to say like for anybody that's in there.What are they doing? Like do we have some kind of record for what actions have been performed so that we know that if somehow one of those logins were compromised, we have some record of what actually took place act that happened. So hopefully that helps to answer your question. That gives you a little bit more insight into like the kind of things I'd be looking for.Amelia: [00:21:03] It kinda sounds like there is no incentive for actually monitoring the logs.Like you can only get bad news that you can't act on. So if I were a little bit more nefarious, I might just never look atthem.Eric: [00:21:16] That's a good point to bring up. I would say that it depends on the logs you're talking about. If we're talking about like the audit logs that are considered any action that is contained within Ottawa, we assume that it's somebody internal to our company, like somebody who should have access to this, except for the worst case where maybe somebody.Shouldn't have access, does have access to like they're doing something weird. Right? So the audit logs are, they're definitely going to be reactive in the, in that case. But if you think about logging more generally, like if you think about your server logs for your website, right? That actually can be a good leading indicator that an attack.Might be happening or somebody probing your systems. So you can look for all kinds of interesting things in your logs. You can look at like the login page, like all the login URLs and see like is one IP address trying a bunch of different logins and failing? Are they trying one login? And it's constantly feeling like they're trying to brute for somebody's password.So there's a lot of things you can do and get a signal that like. An attack is happening and understand what they're trying to attack in your systems just by looking at the log in without actually having been compromised. So let's say the, in that more general case, you're getting a leading indicator instead of a trailing indicator.So I think both of the things you said are true, but I think it depends on the system that you're talking about.Nate: [00:22:32] Looking at the logs after an attack is sort of reactive. Taking more proactive steps of making sure that you review who has admin access in your review that everyone has two factor auth.That's more of like a proactive approach. Would that fall under the more general umbrella of threat modeling? we're looking at this and saying, okay, how could we get attacked? We could be attacked by one of our employees losing their credentials somehow, or leaking their credentials. What are some of the other things we might look at to have a process to prevent things before they happen.Eric: [00:23:02] Oh, this is a great question and I'm glad that you brought up threat modeling. So threat modeling is an exercise, and by far, what are the best values for getting the most information to the least amount of time that I do with my clients. So I want to try to explain threat modeling to help you wrap your head around it and like give you some examples like what it is and what it means.It'll help you to answer this question for yourself and the way that you would sort of like think about. The general problem, which is like we have this system in place. What could possibly go wrong with it? Which is the shortest version of like what threat modeling is. So here's the most simple real world example of threat modeling, let's say, and this is something that people do on a day to day basis.So here's a simple example, like you want to go out to lunch from work. And meet up with a friend for lunch right now. There's a lot of considerations that your mind processes before you actually go out to lunch. Is it raining? Do I need to take an umbrella? Right? The thing that could go wrong is like, am I going to get rained on the preventative measures?Like, do I need a rain jacket? Do I need an umbrella or. Another thing that comes up is like, you know, are there any dietary restrictions I have to keep in mind for myself or the person I'm going out to lunch with. If there are like, how are we going to resolve that? Where are we going to choose to go to lunch?Do I have to be back at exactly one o'clock for a meeting with my boss and I can't be late? Like we can't go somewhere that's too far away. So it's really, this is this process by which you think about problems and think about all the different things that could possibly go wrong and then come up with.Different ways of solving them so that you avoid as many of those problems as possible. Now, some of the risks are. You don't want to get caught in like analysis process where you think like, Oh my God, whatever we're trying to do, there are so many things that could go wrong. Like maybe we should just not do it.My advice is to say like the approaches you take is usually the one that has the most pros and the fewest cons rather than no cons cause you'll just never get anything done. If you try and take that approach for threat modeling as it applies to security and it applies to software. Let's think about.Something that's a little bit more practical than like going out to lunch. So let's say we have. I dunno, a basic software system. There's some kind of web application running in production. It has a database somewhere, and we want to say like, what could possibly go wrong with this? Like how could it be compromised or abused?So the approach for this exercise is you get a bunch of. People who work at your company or work with you on this project in the same room together and you just have that conversation. Like I usually start with a different question though. I say like, what are the biggest risks for our company? What could really just ruin us or like put us in a bad situation?And it might be, we've got a lot of really bad PR at this point. We would really struggle to recover from it because we lose a lot of customer trust. We'd end up on the front page of the New York times with all this negative press, and like it would really hurt our brand and they'd go to our competitors and said, so that might be the worst case scenario.So like, how would an attacker. Compromise you in such a way that would make it a really bad PR campaign. Or it could be like, we have a lot of this really sensitive data in the database, like maybe it's personally identifiable information, PII, like people's credit card numbers, or it's their address along with their names and email addresses.All this stuff. Like we cannot allow this data to get leaked because like our customers, again, like they wouldn't trust us. It'd be a huge problem for our company. Going forward. And that's a hard problem to recover from. Like once I data's out on the internet, you can't unleash information. Like that's a hard one to recover from.So you really have to think about how you can prevent it in the first place. Similar to the problem of admin credentials, like after it's done, it's too late, right? You enough solve these problems before it's too late. So just to give you a third one, like maybe the worst case scenario for our company is.Financial, right? What would happen if these attackers got access to our bank accounts? Or you know, maybe we deal in like Bitcoin. Like what if people like could somehow compromise our system and like steal everybody's money. So that would also be problematic. So there's all these different scenarios you could think about that would be worst case scenarios or maybe like, not necessarily worst case, totally disaster, but like hard recover from problems.And then you think about like what ways would an attacker or a malicious actor. Achieve that goal based on everything that we know about how our systems and our software works today. And sometimes this goes beyond. Again, like as I said before, it isn't just your web application or just how your database works.It could be something much more sinister, like maybe you have. A bunch of laptops and people who work from home work from cafes, like you know, Starbucks and a laptop gets stolen and that laptop belonged to a cofounder and the drive wasn't encrypted. Right? So now an attacker like who stole this laptop?Maybe they didn't know what they stole, but they find out and now they have access to the bank account information and login four, your company's bank. Like it's a bad scenario. So how do you prevent that kind of thing from happening? Or maybe something else, like how would they get admin access to one of our systems?Can we prevent that in some way? So it's this way of sort of thinking about the problem and preventing it in advance. And then once you leave, you should have a list, Oh, here's all the things that an attacker could do. And it normally boils down into like a handful of very common things, like all these different threads of attacks.Have you a few things in common, like, you know. We don't have to factor off the Naval, not on all these systems, really, too many people have access to it or drives aren't encrypted or whatever it happens to be. It's usually a handful of things that are common amongst all those attacks. And those are the things that you focus on fixing first because you, I fixed one thing that solves three possible tax, right?So you're really like getting a great value for the time that you're spending and you're also focusing on the right problems instead of like the things that might happen. Maybe like it's a low. Likelihood and maybe low impact if they do happen. Like that's not really where you want to spend your time.You want to focus on the things that are potentially big problems for your company and take the least amount of effort to achieve. So hopefully that helps to answer the question. I would say that the one other thing about threat modeling is, I can give you a recent example from the news where like this kind of went horribly wrong.So I think this was maybe last year. There is a company called Strava who does like fitness trackers. The way that struggle works is like people attach them like a Fitbit and they run around it. It maps out like everywhere they run. So then like the people who were running King see where they ran, what their route was, and then they can keep track of their miles, which is great.But the other thing that Strava did was it would. Publish on a public map everywhere that you were running, which, you know, privacy concerns start to bubble up with this, but people start having fun with it, right? They start drawing like the Nike swoosh with their running patterns, or they draw, you know, spaceships or Darth Vader or tie fighters and all this stuff.People will start to do this more and more, and like this feature gets really popular. But the other thing that happens is that the U S military has soldiers. Who are using these fitness trackers while they're exercising, but they're doing it secret bases around the world. And now you look at Strava map and you have all these little hotspots that show up in the middle of Africa, or you know, somewhere where there's nothing else.And there's this little tiny hotspot and. The effect is that Strava has just now leaked the specific locations of all these secret us military bases around the world. So huge problem, right? How do they not think about this in advance? This ends up on the front page of the New York times, you know, Strava leaks, location of all these secret us military bases.If your Garmin, a competitors' Strava who offers nearly the identical product and has the same problem, you might think like we really dodged a bullet. Because we're not on the front page of the New York times. But three days later or whatever it happened to be like they also were, because they had the exact same issue.It's kind of interesting to me that like they didn't immediately like, we need to fix this now. I'm like, delete this from the internet so that we're not also caught in the same place, but it just goes to show that. I don't know what the root cause was that they both ended up having the exact same problem where they didn't think about what the consequences were, their actions.A more lighthearted example through our modeling is the Boaty McBoatface example. So there is this like online voting system in the UK where they're going to name some military ship or whatever happened to be, and the top voted ship name by far is. Boaty McBoatface right. And really like that's kind of an abuse of the platform.Those weren't the answers that they were hoping to get, but is the answers that they got, what the mitigations were for preventing that? Like maybe the consequences weren't that great for Boaty McBoatface but the consequences for leaking the secret location view as how us military bases is pretty high by comparison.So you have to think of these abuse patterns in addition to how could we actually be hacked. Like Strava wasn't hacked. They like leaked this information out because like. Like the system was working as designed by, it was a use case they hadn't thought about in advance and it was like it published on by default, I assume.So anyway, like those are just some simple examples of threat modeling and like the ways to think about these things from a larger perspective. And I think the last thing I would say about through modeling is it depends who you invite. To this meeting where you conducted the right modeling exercise.Because if I were to ask a database engineer, what's the worst thing that could happen to your company? A database engineer is going to tell you all about the worst things that can happen to their database. Cause like that's their world. So the best person to ask this question to and is usually somebody in executive leadership because they're going to have the best perspective.I'm like. What the company I'd a broader vision is doing, like what the real business risks are. They don't necessarily have to attend a meeting and hear all the nitty gritty details about how the database works with the web application works or two factor off, but they should provide those initial answers to the question of like, what's the worst case scenario for our company?And then everyone else who's more technical can think about their own systems. Either it. You know, managing all the laptops of the company or the database engineer, managing all the data storage systems or the web application engineer running all the Node.js Or Python code. Whatever happens, all those people should have one representative in the room to think about their own systems and how it can contribute to the threat modeling exercise.Security in Today's WebAmelia: [00:32:48] I feel like your examples have highlighted something about how the web itself has evolved over. I don't know, the past 30 years where it used to be this scrappy connection of people in different parts of the world and we get to do weird things and it's all fun and lighthearted and now it feels like we have to grow up because we can't just have fun anymore.People will use our fun.Yeah.Eric: [00:33:14] That's a really interesting way to phrase that. Arguably, fun has always been profitable to some degree, but I think we're not quite as carefree as we once were. It's certainly true that the old internet, as I remember it, like there were still plenty of problems, like security problems, the ability to really like.Make widespread chaos and the old school internet was much harder. And like there's a lot of ways I could speculate or reasons. I can speculate why that's true or more true now than it used to be. So one is like the way that you phrase it was like it was a bunch of small little interconnected websites, right?Like maybe people were hosting on their servers and like when they turn their computer off at night, that website went down until like the next morning when they turned it backAmelia: [00:33:55] on, the store is closed.Yeah.Eric: [00:33:57] The store is closed. Exactly like. And I've had that experience plenty of times when I've seen that for a website I was looking at at 3:00 AM, but now if you think about it, because of the way the industry has grown in evolves, there's servers run all the time and it's cheap.I mean, it's practically free to run a web service. And most of them, a lot of them are consolidated on three major platforms. . AWS and Google cloud, and they're on all the time. And you know, if there happens to be a fundamental security flaw in Google cloud or AWS or Azure, that affects almost everybody, right?And we've seen this come up a few times, I would say like the last seven years. So, you know, when I worked to optimize the is when we had. A number of industry-wide security vulnerabilities come to light. So Heartbleed was one of them. Shell shock was another, and if you were working at the time in the industry, you probably remember like it was all hands on deck.We had to patch all of our systems in like prevent this because the fundamental problem, these cases was that in some version of bashes insecure Nick, you could compromise it remotely. And then the other one was, there was some kind of. Underlying security vulnerability with open SSL, which is the library used by like every Linux server, which is most of the servers on the planet.And this is a huge problem. So everyone had to go out and like patch all servers the exact same time. So for a couple of weeks during these periods of time, nobody was writing code. Everyone is trying to patch their systems to make sure that they weren't the ones that were hacked. And the other thing that is.Also happened is not just that the targets have sort of like shifted from being, well, I could compromise this computer, but it's like off from midnight until 5:00 AM it's just one computer. Right? But now it can compromise all these computers. Right? So the, the targets are much bigger because connectivity has improved.The sharing of information has improved, which is like by far has. More positive effects than it has negative, like there's GitHub and all these ways to share code. But now like the things that can also be shared are, here's a tool called that allows you to just click on button in, like run some kind of crazy massive attack.Or here's the source code for the myriad worm, which shut off most of the internet. And when was this like 2015 I can't remember exactly. So they can share the, the nasty code, the dangerous code, as well as like the good code that, you know, people write day to day. And I think for the most part, people just want to do the right thing, but there's always going to be malicious actors out there.And it's certainly true that like now they have easier access to some of these tools and it's problematic. But. The good news is that everyone's getting smarter about security. They understand what the attacks are as technology improves, like the attacks, the types of attacks are going to also like mature and evolve with technology, but people are more wise to it now.As has always been true of history, we learned from the mistakes of our past, or at least we should, and hopefully like the technology we build tomorrow is better than the technology we built yesterday. How much should a responsible Web Developer know about security?Amelia: [00:36:51] I bet your experience of these attacks is a very different experience than the experience I as a software developer has.So when Heartbleed came out, I remember all I knew was it's a big deal. We're freaking out and everybody should be upset,Eric: [00:37:08] andAmelia: [00:37:09] maybe I can spend three hours reading up about it to try to understand. So as a software developer who doesn't work in security. How much should I know about security? What are some basic things that I know and how does that differ from, say someone who isn't a software developer?Do they need to know anything.Eric: [00:37:27] Oh, these are both excellent questions and thanks for sharing your experience about Heartbleed. I just want to clarify the, at that time I had a lot of different roles. What I worked to optimize the and security is just like one small portion of that. All of the things I had to focus my time on.And it was really like a group effort of everyone coming together at the company, all the engineers and it professionals to come together as this sort of like make sure that we did the right thing and patch our systems and like communicated to everyone that. patch things as quickly as we could and to the best of our knowledge, like nothing was compromised.So I think we did everything we could in that situation. We worked as a team to kind of solve the problem. Just like you said, it was kind of pants on fire, like everybody knew, like, Oh my God, this is everyone. It isn't just like some companies, it's everyone except for the few people out there who run Microsoft based servers out there.I'm sure they're laughing at us, but that's okay. We get to laugh at them the rest of the time, I would say. Yeah. So your question was, what should you think about as a software developer about security. On a maybe a regular basis or how do you learn more is, am I remembering correctly? Yeah.Amelia: [00:38:26] How much do I need to know?Like how much should I feel responsible to understand?Eric: [00:38:31] I would say that my general advice, which is less specific about security, is. Take in as much information as you're comfortable with, like, you know, read some more diverse sources. Like I think it's common for, for engineers, especially those who are like just starting out to really focus on how do I write better code.Like that's the one thing they kind of focus on is like, how do I write the best possible code? Like how can I learn all these interesting coding design patterns and like make my code run faster and like have fewer bugs. And I would say that the more diverse sources you can read, the better you'll be at your job on the whole.So. Here's some examples, like try to understand the perspective of like the product and program managers at your company or like the marketing departments. What is their job look like or the support team, what does their job look like? What kind of questions are they getting from your customers on the support team?How are they helping the customers? Like what does that system look like? How do they do their jobs? Do they have to provide technical support? And some companies I've worked at. We were allowed to sit on sales calls like with potential customers and just sit there and listen to the concerns, sometimes security concerns, but sometimes just like the product concerns about from potential customers.We could also sit in on calls with customer, like existing customers in here about their problems. And it really helps to like understand your perspective or a change of perspective to understand their perspective about like, you know, what are the things that actually concern them cause they're going to be different than what you assume they are.Which I think really helps. As far as security goes. Like the same thing is true if you have the opportunity to participate in your company's security program, if they have one, I would say the right way for a company to run a security program is one that's inclusive instead of exclusive, which is to say that like you have office hours, you invite people to join and participate.Instead of saying like security is our world. And like, we're trying to protect you. Just stay back and let us do our jobs. Right? I vehemently disagree with that approach by disagree with this exclusive approach where like they played the new sheriff in town to like, they're trying to protect everybody and no one else can really play the game because it, it has a number of problems with the main two that come to mind right now are nobody likes to be told what to do.They like to understand what they're being asked to do. They can comprehend like, okay, there is a good reason why I have to do this other work instead of like Joe over and it just like, you have to do this, whatever security thing is now. Like that's annoying. Okay. I guess I'll do it. Cause they wrote a new policy.And the other thing is that. By being inclusive, it helps to spread like education and awareness about security. So for example, if you worked at a company, they had an inclusive, you know, anybody contribute security program, you would probably have the opportunity to go in and maybe participate in the threat modeling exercise and you'd have a better understanding for like, you know, what are the threats our company actually faces?Which might inform you later on if you're creating a new feature or a new product for that company. Oh, I know that. If I, you know, create this web service, these are the kinds of threats that. It might face, cause you've experienced that threat modeling exercise before. So I know that I can't use X, Y, and Z type of database.I don't know. Just some random stupid example. So it's really just about like getting. More information in your mind, in a different perspectives in your mind, in all of this stuff will not necessarily be immediately useful. It'll just be one of those things like that later in your life it'll become apparent like, Oh man, I'm so glad that like I participated in that and I'm so glad I learned that thing.Cause like now it actually makes sense and I finally get it. So I would say like I could point you to several different security related blogs and you know, newsletters and Twitter accounts and all this stuff, but you're just going to get so inundated with all these like. Technical details and it's going to drag you down mentally.Cause a lot of them are just like aggregators for like, here's another company that got breached and here's how they got breached and you're going to think that the world is falling apart. I would say that like that's not going to like bring up your spirits about security and like the state of the world.So instead I would focus on like the things that you can learn in your most local community, your local environment. So if your company doesn't have a security program, there might be a local Oh wasp chapter. So ops is like a open security organization. They're around the world. Most cities have like some kind of local chapter.I know the here in Portland, there's like monthly meetings you can go and attend. They usually have some kind of like guest speaker who will give a talk about some thing related to security. So I think engaging those types of communities can be really beneficial as well. You know, if you want to, the other thing you could do is just like attend a security conference.I wouldn't necessarily, I recommend starting with black hat or Devcon in Las Vegas. Those are very intense and very like, I would say deeply technical and like. Culturally heavy. I would say that there's something a little bit more lightweight though. It'd be beneficial. Like if you went to a JavaScript conference and like somebody was talking about JavaScript security, attend that talk, see what you can learn.I think they would probably help you on a more on a day to day basis and going head first into like the deep rabbit hole of security.Amelia: [00:43:14] Right. Don't start with the black diamond ski slope.Eric: [00:43:18] Right? Exactly. Exactly. That's a great analogy. I don't ski, but I get the reference.Amelia: [00:43:23] I also love your answer because I realize that as a front end developer, I don't have to worry about what other people within my company know.Whereas within security. I feel like you have to worry about your coworkers, whether they open a malicious email or the security could be attacked through people, which I think I would find terrifying.Eric: [00:43:46] It's certainly true. So as far as like the nasty email example that you gave, that's such a great one.And like I've seen this firsthand where emails were sent to a company I worked for, there were spooks, so it looked like a legitimate email from one of my coworkers. It looked like any other. Email that you would get if they were like sharing a Google doc with you, right? It would say like, here's the name of the stock.Whatever happens to be in, there's a link in the email and you click on it, you open it. But the clever thing about it, there's two, like the one is like spoofing their email addresses, which is not technically challenging. It's pretty trivial. There's a few things you can do to mitigate that. The clever bit was.They make it look like a legitimate email. We're like, nobody would really be the wiser on a day to day basis. But you open it, you click on the link and it takes you to a page that looks exactly like the modern Google walkin. So now if you type in your password. They have your password and they know your email address.So it's a pretty clever way to fish people and they can get a whole bunch of logins and passwords relatively easily. And I think the other thing that you do that's kind of clever is they've gotten wise, they're not running from their home. Machines, like all these web servers and stuff they have to run are these scripts that they use to target different companies or servers.They just run them on like compromise AWS accounts. So you can't black list like the IP addresses for AWS because then all of your code shuts off. Right. So it's pretty clever the way that they're kind of using the same systems that we use to the right, normal white hat code. As far as your, the concern about, you know, if you work in security, you have to worry about everyone.I think that's true. Like you're going to be worried a lot like, but that's your job. Your job is to be the one worrying so that other people don't have to. But that's kind of the motivating factor. Like if it's keeping you awake at night, then that should lead you into action and like to do something to make sure that that one thing can't happen.So you can spend your nights being awake, worrying about something else, and maybe you can't control. Right. And then you think, you know, if I can't control this thing, what can I do.How Do We Think About Security and New Hardware?Amelia: [00:45:43] So you mentioned this example before, which is smartwatches, which haven't been around for that long. How much do you have to keep up to date with new technology? Like we have Google homes and our houses and their smartwatches, and there's something new every year.How much do you worry about new devices that come out or have to keep up to date with new tech?Eric: [00:46:05] Maybe you have a Google home in your house, but I don't have one in mind. Well, I guess there's a lot I could say on this, and I'll try and keep it. More succinct. So at a philosophical level, the same problems always persist in the security threats.Simply follow along and mature and evolve with the technological changes that we have. If you had a computer before and you didn't have an iPhone or you know, a smart home, there is still possibility that like your computer could be compromised remotely and the camera could be taken over. The microphone could be taken over and that could lead to.Some kind of disastrous result for you and I, the day to day, like that's not that big of a deal. Like if our computer gets compromised, like, okay, like what's really the worst case cap? If they see me okay. I don't often sit naked in front of my computer, but even if I did, like nobody really is going to want anything to do with that.Let me give another example though. The risks are much higher in the federal government in the Pentagon. They have a policy where if you go into a conference room, you cannot bring a cell phone. You cannot bring a laptop, you can't bring anything that has the ability to record information and has a battery in it or transmit information.It has a battery. Like that's the policy. What that means is. Is that if you want to give a presentation at the Pentagon, you have to print out all of the slides for your presentation on paper and then give a copy of that to every attendee that's in the meeting, and then at the end of the meeting, those all have to get shredded securely.I know this because I have a friend who works in the Pentagon one day. This person who was like. Very concerned because they had to give a presentation the next day. I think it was like right after, right before the government shutdown, all of the printers at the Pentagon, which is the only place they were allowed to print off these classified documents.All the printers at the Pentagon were out of ink. So how do they give their presentation? Right? So it's weird problems that you take on for the sake of security, where for the sake of national security, you can't take any kind of these types of devices that we take for granted. Like, you know, if you. Told somebody in Silicon Valley that you had to print off a proper presentation.They couldn't bring their laptops and phones into a meeting. You would get fired. They would think you're crazy and like kick you out of the company probably, or just tell you that you're paranoid. So I used to live in DC and I worked in a similar environment that, so for me, like having lived on both coasts and in both of the DC area, then also in Silicon Valley, the differences are so stark.It's really crazy. But it also goes to show like. The vast differences are the vast levels of security that people take on based on the level of risk. So I would say like that's the fundamental thing to keep in mind is what are the risks that you want to avoid if you're going to like enable internet of things devices in your home.I may not have a Google home in my house, but I do have a nest thermostat. And I know that the nest thermostat doesn't have a microphone in it and like, you know, could it be compromised remotely? Probably we're going to do make it too hot or cold in my house. Big deal. Right? But it's a nest thermostat is so much better than like a non nest thermostat.They're like, why would I not have a net service set? There's so great. Just a couple of days ago, the ring doorbell company, like it was published that there was like, these podcasts are so like taking over people's ring doorbells in their house and like harassing people across the country. With the ring doorbells.Right. Which is crazy. So I don't have a ring doorbell because I know that their security is pretty low. And that's really the problem with the internet of things stuff, is that they want to make these things cheap, which means they have to compromise on something. And the one thing they usually compromise is the security of their product.And that's actually how the myriad worm spread is. They didn't pay for a bunch of servers that had really high bandwidth. They compromised a bunch of internet of things devices and use them like a swarm to take down like internet servers around the world, which is crazy. It was just like people's cameras and stuff in their houses.They use it as like a zombie to like send more traffic to things. Those are the kinds of things I think about. Like, you know, you could have those things, no big deal, but just be aware of what the risks are and whether or not you trust the company behind the device that you were just right.Amelia: [00:50:00] It seems like it's so as a trade off between convenience.And money and security.Eric: [00:50:05] I'm glad that you said that. So at my first job back in 2001 I remember stating, and I don't know if I was just trying to be clever, but I said like security is inversely proportional to convenience, and I think that is still true today. But going back to the seatbelt example that I gave you earlier.It is, you could argue inconvenient to get into a car and have to book your seatbelt. It's inconvenient to have a seatbelt on. If you want to like take off your jacket or put a jacket on, you're too high or too cold. It's it convenient to have a seatbelt on if you are in the back seat and you dislike over, but it's a trade off between the level of security that provides.It might be inconvenient. You might be a little cold or a little hot early cancer site across the car or whatever. But it's better than flying out of the windshield if you happen to get an accent. Right. So it's constantly this trade off where like convenience versus security. I think it's still true. I would say that because technology is improving so much, they are lowering how inconvenient it is.So here's some good examples or recent examples. Like I have an Android phone and it has a fingerprint reader on the back and it's great. I can unlock that thing in a split second and it just, boom, there it is. I don't have to type in a password or put in a code. And same thing is true for like the neuro iPhones that are in like the new pixel phones is, they have like face unlock.So you just look at the thing and unlocks where you. If you're a James Bond and you are tied up on a chair somewhere and they want to like unlock your phone, they just pointed your face and now you know, if you're under arrest, like you can't prevent that from happening. But like, you know, most of us aren't James Bond.So I don't think that that isn't necessarily like the primary concern that you want you to have, but is the way that I would usually recommend thinking about these things. The Dangers of Wireless Security and SerendipityAmelia: [00:51:40] Your seatbelt example brings up the point of I think about how dangerous it is to drive versus how dangerous it is to take a flight cross country and driving is way more dangerous, but I still get really scared every time I take a long flight because it feels so much scarier.So I bet in the security world there are things that don't feel like big risks are and things that are big risks, but they feel like not a big deal when you think about them.Eric: [00:52:08] Here are a couple things that come to mind. The first one is wifi. So why fi wireless internet is like something that's so prevalent now.That we assume that when we go to the airport, there's going to be free wifi. We assume that when we go to a restaurant, there's going to be free wifi. We assume that what we go to work, there'll be a wifi. We can catch you. So our phones have service. We assume that there's going to be wifi, like everywhere we go and when there isn't, it seems like a huge problem.Because there's free wifi everywhere. That means there's a network that you're connecting to. Who knows who else is on that network, right? When you go to the airport, who knows who else is on the network at the airport? Who knows if they're monitoring all the traffic that's going through computer, who knows if they compromise the router at the airport.That's a bigger problem than I think people realize like wifi, security. Even though you have like your crazy long password on your router and you keep it up to date all the t
Listen To Your Audio With The Detail It Deserves!
Listen To Your Audio With The Detail It Deserves!
Michael Farr har skrevet den fremragende bog: Tintin – en rejse gennem Hergés univers, og da vi fik mulighed for at lave et interview med ham, sagde vi ja med det samme.Dette er dog egentlig mere en samtale en et interview. For hvad sker der, når to Tintin-nørder får besøg af én af verdens førende Tintin-eksperter, der også var personlig ven med Hergé? En særdeles underholdende samtale, hvor du selvfølgelig kan høre hvilke Tintin-albums, der er Michaels favoritter, og hvilke der er de værste. Vi får også vendt, hvordan Hergé var som person, hans betagelse af flotte damer, hans fremragende brug af virkelige politiske situationer i sine historier og hans begejstring for Pink Floyd.Tak til Forlaget Cobolt for at sætte interviewet op, og tak til Michael for at være verdens flinkeste Tintin-ekspert.
Vi slutter, hvor vi startede anden sæson af Tintin Podcast. Det sorte guld er det album, som Hergé var længst tid om at færdiggøre, fordi det blev afbrudt af Nazi-Tysklands besættelse af Belgien under 2. Verdenskrig. Men efter krigen, og 10 år efter Det sorte guld startede med at udkomme, kan Hergé endelig afslutte denne historie. Det sorte guld er Dupond(t)ernes album. Sammen med Tintin vender de tilbage til ørkenen, og de to fantastiske uduelige detektiver har aldrig strålet bedre i deres inkompetence.
2. Verdenskrig nærmer sig sin afslutning, og det får store konsekvenser for både Tintin og Hergé. Fordi Hergé arbejdede på kollaboratøravisen Le Soir, får han efter krigen forbud mod at tegne, og Tintin må holde en ufrivillig pause i to år. Den trykkende stemning under 2. Verdenskrig mærkes tydelig i dette album, der er ét af det helt store Tintin-værker, hvor spænding, humor og dystre overnaturlige ellementer er med til at skabe en fantastisk velkomponeret historie.
Vi afslutter Hergés marritime fase med bravur. Et fantastisk underholdende kammerspil ombord på skibet Sirius, hvor Tintin, Terry og Kaptajn Haddock får selskab af Dupond og Dupont og en særdeles tunghør professor i jagten på Rackham Den Rødes skat. I dette album dukker Tryphon Tournesol op. En distræt professor, der med en tunghør og selektiv hørelse er kulminationen af de tidligere skøre videnskabsmænd i Tintin-universet. Vi kommer også omkring svenskernes svar på Titanic, og hvorfor det er så forfærdeligt at være en futmælkspirat.
Varmen er ulidelig, vejene smelter og rotterne forlader kloakerne - Jordens undergang er sikker.Men da den meteor, der uundgåeligt ville have udslettet planeten, alligevel gik forbi jorden, sendes Tintin, Terry og afholdsmanden Haddock afsted til Grønlandshavet på jagt efter en flig af meteoren og et nyt og hidtil ukendt metal. De er dog ikke alene i denne jagt og meteoren viser sig også at have mystiske egenskaber. Det mest mystiske album i Tintin-universet er måske ikke så ringe alligevel? For er Den mystiske stjerne i virkeligheden en allegori på datidens rædsler og frygt under 2. Verdenskrig? Lauge og Mads tager i denne episode dansklærer-brillerne på og overfortolker det album, som var det første der blev udgivet i Danmark. Og det sætter Den mystiske stjerne i et helt andet perspektiv.
Kaptajn Haddock. I en dunst af alkohol bandede og svovlede han med sine underfundige bandeord lige ind i vores hjerter. Denne episode sætter selvfølgeligt stor fokus på vores elskede kaptajn, der træder ind i Tintin-universet med et tordenbrag. Men faktisk var Hergé gået i gang med et helt andet Tintin-album, der dog måtte udskydes adskillige år på grund af Nazi-Tysklands besættelse af Belgien.
I december måned har vi erstattet vores månedlige program med 4 adventsudsendelser, hvor vi tager ud af studiet og hjem til 4 danske niche-forlag, for at give dig litterær inspiration til hvad du skal distrahere dig selv fra julemanien med. Denne gang besøger vi tegneserieforlaget Cobolt, der både udgiver klassiske og moderne tegneserier. Forlægger Pernille Arvedsen anbefaler: Batman: The Dark Knight Returns af Frank Miller og Skamlebben af Anne Mette Kærulf Lorentzen. I redaktionen: Josefine Maria Hansen, Astrid Rifbjerg og Nana Kofoed. Produktion: Josefine Maria Hansen. Musik: Sanne Dalgaard Møller.
Die langjährigen Experten für sprechende Haushaltsgeräte aus Großbritannien zeigen ihren Induktionsherd mit taktilem Bedienfeld und Sprachführung.
The UK's long-standing experts in talking household devices present an induction hob with tactile controls and speech Feedback.
Prezentujemy trzecią i ostatnią część audycji, w której Robert Łabędzki opisuje kilka mówiących zegarów.
In which our heroes get our match-making skills out, take turns on the Love Tester and write up a pros and cons list to determine which of the 80s horror villain would make the best boyfriend. We look at how these potential boyfriends would handle kids, who would be a good listener and the problems of entering into a relationship with a doll who has the soul of a serial killer, his doll wife and their ready-made doll family. Jackson thinks Michael Myers is a fixer-upper, Zammit can’t get past facial deformities and Duscher has a traumatic camp story to bond with Jason. It’s a formula for love compatibility as we rank your favourite villains. Want to help villains find love too? Head to http://www.patreon.com/sanspantsradio and for as little as $1 a month, you can help make a specialised dating app. Hankering for some sweet geeky loot every month? Do us a favour and go to http://www.geekfuel.com/sanspants and sign up to receive your (possible) The Thing today! In the mood for some Young Adult reading? Just search for Keys of Cobolt on amazon.com today or follow the link http://tinyurl.com/keys-of-cobolt to enjoy some sweet man vs god vs demon vs the undead adventures. See acast.com/privacy for privacy and opt-out information.
In which our heroes take a trip to 1407 Graymalkin Lane for an official inspection, meet a charming man with a luscious head of hair and give it a solid A++ for being outstanding and never once question why Professor X’s School for Xtraordinary Children has been shut down. We look at how government officials would approach the school, why Wolverine shouldn’t be a teacher and work out to how to control mutant teenagers. Jackson doesn’t think Professor X would get a Working with Children’s Check, Zammit is hiding students in broom cupboards and Duscher just wants to teach at the school. It’s a number of checks and balances as we pin everything down to mind powers and promptly forget everything we’ve just seen. Want to help governments regulate predatory schools? Head to http://www.patreon.com/sanspantsradio and for as little as $1 a month, you can help make sure Professor X does all the relevant paperwork. Hankering for some sweet geeky loot every month? Do us a favour and go to http://www.geekfuel.com/sanspants and sign up to receive your (possible) Wolverine today! In the mood for some Young Adult reading? Just search for Keys of Cobolt on amazon.com today or follow the link http://tinyurl.com/keys-of-cobolt to enjoy some sweet man vs god vs demon vs the undead adventures. See acast.com/privacy for privacy and opt-out information.
Belinda gives an overview of the product range and introduces the new talking central heating remote control.
Rafał Charłampowicz prezentuje to urządzenie, które pomaga osobom niewidomym w identyfikacji kolorów.