Podcast appearances and mentions of david ruiz

  • 108PODCASTS
  • 386EPISODES
  • 59mAVG DURATION
  • 1WEEKLY EPISODE
  • Jun 15, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about david ruiz

Latest podcast episodes about david ruiz

Lock and Code
The data on denying social media for kids (feat. Dr. Jean Twenge) (re-air)

Lock and Code

Play Episode Listen Later Jun 15, 2025 46:15


Complex problems often assume complex solutions, but recent observations about increased levels of anxiety and depression, increased reports of loneliness, and lower rates of in-person friendships for teens and children in America today have led some school districts across the country to take direct and simple action: Take away the access to smartphones in schools.Not everyone is convinced. When social psychologist and author Jonathan Haidt proposed five solutions to what he called an "epidemic of mental illness" for young adults in America, many balked at the simplicity. Writing for the outlet Platformer, reporter Zoe Schiffer spoke with multiple behavioral psychologists who alleged that Haidt's book cherry-picks survey data, ignores mental health crises amongst adults, and over-simplifies a complex problem with a blunt solution. And in speaking on the podcast Power User, educator Brandon Cardet-Hernandez argued that phone bans in schools would harm the students that need phones the most for things like translation services and coordinating rides back home from parents with varying schedules. But Haidt isn't alone in thinking that smartphones have done serious harm to teenagers and kids today, and many schools across America are taking up the mantle to at least remove their access in their own hallways. In February, Los Angeles Unified School District did just that, and a board member for the school district told the Lock and Code podcast that he believes the change has been for the better. But for those still in doubt, there's a good reason now to look back. Today, on the Lock and Code podcast with host David Ruiz, we revisit a 2024 interview with Dr. Jean Twenge about her research into the differences in America between today's teens and the many generations that came before. A psychologist and published author, Twenge believes she has found enough data tying increased smartphone use and social media engagement with higher strains on mental health. In today's re-broadcast episode, Twenge explains where she believes there is a mental health crisis amongst today's teens, where it is unique to their generation, and whether it can all be traced to smartphones and social media. According to Dr. Twenge, the answer to all those questions is, pretty much, “Yes.” But, she said, there's still some hope to be found.“This is where the argument around smartphones and social media being behind the adolescent mental health crisis actually has, kind of paradoxically, some optimism to it. Because if that's the cause, that means we can do something about it.”Tune in today to listen to the full conversation.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide...

Lock and Code
What does Facebook know about me?

Lock and Code

Play Episode Listen Later Jun 1, 2025 31:33


There's an easy way to find out what Facebook knows about you—you just have to ask.In 2020, the social media giant launched an online portal that allows all users to access their historical data and to request specific types of information for download across custom time frames. Want to know how many posts you've made, ever? You can find that. What about every photo you've uploaded? You can find that, too. Or what about every video you've watched, every “recognized” device you've used to log in, every major settings change you made, every time someone tagged you to wish you “Happy birthday,” and every Friend Request you ever received, sent, accepted, or ignored? Yes, all that information is available for you to find, as well.But knowing what Facebook knows about you from Facebook is, if anything, a little stale. You made your own account, you know who your Facebook friends (mostly) are, and you were in control of the keyboard when you sent those comments.What's far more interesting is learning what Facebook knows about you from everywhere else on the web and in the real world.While it may sound preposterous, Facebook actually collects a great deal of information about you even when you're not using Facebook, and even if you don't have the app downloaded on your smartphone. As Geoffrey Fowler, reporter for The Washington Post, wrote when he first started digging into his own data:“Even with Facebook closed on my phone, the social network gets notified when I use the Peet's Coffee app. It knows when I read the website of presidential candidate Pete Buttigieg or view articles from The Atlantic. Facebook knows when I click on my Home Depot shopping cart and when I open the Ring app to answer my video doorbell. It uses all this information from my not-on-Facebook, real-world life to shape the messages I see from businesses and politicians alike.”Today, on the Lock and Code podcast, host David Ruiz takes a look at his own Facebook data to understand what the social media company has been collecting about him from other companies. In his investigation, he sees that his Washington Post article views, the cars added to his online “wishlist,” and his purchases from PlayStation, APC, Freda Salvador, and the paint company Backdrop have all trickled their way into Facebook's database.Tune in today.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
How Los Angeles banned smartphones in schools (feat. Nick Melvoin)

Lock and Code

Play Episode Listen Later May 18, 2025 26:11


There's a problem in class today, and the second largest school district in the United States is trying to solve it.After looking at the growing body of research that has associated increased smartphone and social media usage with increased levels of anxiety, depression, suicidal thoughts, and isolation—especially amongst adolescents and teenagers—Los Angeles Unified School District (LAUSD) implemented a cellphone ban across its 1,000 schools for its more than 500,000 students.Under the ban, students who are kindergartners all the way through high school seniors cannot use cellphones, smartphones, smart watches, earbuds, smart glasses, and any other electronic devices that can send messages, receive calls, or browse the internet. Phones are not allowed at lunch or during passing periods between classes, and, under the ban, individual schools decide how students' phones are stored, be that in lockers, in magnetically sealed pouches, or just placed into sleeves at the front door of every classroom, away from students' reach.The ban was approved by the Los Angeles Unified School District through what is called a “resolution”—which the board voted on last year. LAUSD Board Member Nick Melvoin, who sponsored the resolution, said the overall ban was the right decision to help students. “The research is clear: widespread use of smartphones and social media by kids and adolescents is harmful to their mental health, distracts from learning, and stifles meaningful in-person interaction.”Today, on the Lock and Code podcast with host David Ruiz, we speak with LAUSD Board Member Nick Melvoin about the smartphone ban, how exceptions were determined, where opposition arose, and whether it is “working.” Melvoin also speaks about the biggest changes he has seen in the first few months of the cellphone ban, especially the simple reintroduction of noise in hallways.“[During a school visit last year,] every single kid was on their phone, every single kid. They were standing there looking, texting again, sometimes texting someone who was within a few feet of them, and it was quiet.”Tune in today.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

SER Deportivos Navarra
Última quiniela de tercera Navarra de la temporada con David Ruiz de la Peña Sport peleando el playoff de ascenso

SER Deportivos Navarra

Play Episode Listen Later May 8, 2025 7:32


Última quiniela de tercera Navarra de la temporada con David Ruiz de la Peña Sport peleando el playoff de ascenso

Lock and Code
The AI chatbot cop squad is here (feat. Emanuel Maiberg and Jason Koebler)

Lock and Code

Play Episode Listen Later May 4, 2025 46:12


“Heidi” is a 36-year-old, San Francisco-born, divorced activist who is lonely, outspoken, and active on social media. “Jason” is a shy, bilingual teenager whose parents immigrated from Ecuador who likes anime, gaming, comic books, and hiking.Neither of them is real. Both are supposed to fight crime.Heidi and Jason are examples of “AI personas” that are being pitched by the company Massive Blue for its lead product, Overwatch. Already in use at police departments across the United States, Overwatch can allegedly help with the identification, investigation, and arrest of criminal suspects.Understanding exactly how the technology works, however, is difficult—both Massive Blue and the police departments that have paid Massive Blue have remained rather secretive about Overwatch's inner workings. But, according to an investigation last month by 404 Media, Overwatch is a mix of a few currently available technologies packaged into one software suite. Overwatch can scan social media sites for alleged criminal activity, and it can deploy “AI personas”—which have their own social media accounts and AI-generated profile pictures—to gather intelligence by chatting online with suspected criminals.According to an Overwatch marketing deck obtained by 404 Media, the software's AI personas are “highly customizable and immediately deployable across all digital channels” and can take on the personalities of escorts, money launderers, sextortionists, and college protesters (who, in real life, engage in activity protected by the First Amendment).Despite the variety of applications, 404 Media revealed that Overwatch has sparked interest from police departments investigating immigration and human trafficking. But the success rate, so far, is non-existent: Overwatch has reportedly not been used in the arrest of a single criminal suspect.Today, on the Lock and Code podcast with host David Ruiz, we speak with 404 Media journalists and co-founders Emanuel Maiberg and Jason Koebler about Overwatch's capabilities, why police departments are attracted to the technology, and why the murkiness around human trafficking may actually invite unproven solutions like AI chatbots.”Nobody is going to buy that—that if you throw an AI chatbot into the mix, that's somehow going to reduce gun crime in Americ,” Maiberg said. “But if you apply it to human trafficking, maybe somebody is willing to entertain that because, well, what is the actual problem with human trafficking? Where is it actually happening? Who is getting hurt by it? Who is actually committing it?”He continued:“Maybe there you're willing to entertain a high tech science fiction solution.”Tune in today.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk...

Lock and Code
Did DOGE "breach" Americans' data? (feat. Sydney Saubestre)

Lock and Code

Play Episode Listen Later Apr 20, 2025 36:30


If you don't know about the newly created US Department of Government Efficiency (DOGE), there's a strong chance they already know about you.Created on January 20 by US President Donald Trump through Executive Order, DOGE's broad mandate is “modernizing Federal technology and software to maximize governmental efficiency and productivity.”To fulfill its mission, though, DOGE has taken great interest in Americans' data.On February 1, DOGE team members without the necessary security clearances accessed classified information belonging to the US Agency for International Development. On February 17, multiple outlets reported that DOGE sought access to IRS data that includes names, addresses, social security numbers, income, net worth, bank information for direct deposits, and bankruptcy history. The next day, the commissioner of the Social Security Administration stepped down after DOGE requested access to information stored there, too, which includes records of lifetime wages and earnings, social security and bank account numbers, the type and amount of benefits individuals received, citizenship status, and disability and medical information. And last month, one US resident filed a data breach notification report with his state's Attorney General alleging that his data was breached by DOGE and the man behind it, Elon Musk.In speaking with the news outlet Data Breaches Dot Net, the man, Kevin Couture, said:“I filed the report with my state Attorney General against Elon Musk stating my privacy rights were violated as my Social Security Number, banking info was compromised by accessing government systems and downloading the info without my consent or knowledge. What other information did he gather on me or others? This is wrong and illegal. I have no idea who has my information now.”Today on the Lock and Code podcast with host David Ruiz, we speak with Sydney Saubestre, senior policy analyst at New America's Open Technology Institute, about what data DOGE has accessed, why the government department is claiming it requires that access, and whether or not it is fair to call some of this access a “data breach.”“[DOGE] haven't been able to articulate why they want access to some of these data files other than broad ‘waste, fraud, and abuse.' That, ethically, to me, points to it being a data breach.”Tune in today.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes...

Lock and Code
Is your phone listening to you? (feat. Lena Cohen)

Lock and Code

Play Episode Listen Later Apr 6, 2025 40:10


It has probably happened to you before.You and a friend are talking—not texting, not DMing, not FaceTiming—but talking, physically face-to-face, about, say, an upcoming vacation, a new music festival, or a job offer you just got.And then, that same week, you start noticing some eerily specific ads. There's the Instagram ad about carry-on luggage, the TikTok ad about earplugs, and the countless ads you encounter simply scrolling through the internet about laptop bags.And so you think, “Is my phone listening to me?”This question has been around for years and, today, it's far from a conspiracy theory. Modern smartphones can and do listen to users for voice searches, smart assistant integration, and, obviously, phone calls. It's not too outlandish to believe, then, that the microphones on smartphones could be used to listen to other conversations without users knowing about it.Recent news stories don't help, either.In January, Apple agreed to pay $95 million to settle a lawsuit alleging that the company had eavesdropped on users' conversations through its smart assistant Siri, and that it shared the recorded conversations with marketers for ad targeting. The lead plaintiff in the case specifically claimed that she and her daughter were recorded without their consent, which resulted in them receiving multiple ads for Air Jordans.In agreeing to pay the settlement, though, Apple denied any wrongdoing, with a spokesperson telling the BBC:“Siri data has never been used to build marketing profiles and it has never been sold to anyone for any purpose.”But statements like this have done little to ease public anxiety. Tech companies have been caught in multiple lies in the past, privacy invasions happen thousands of times a day, and ad targeting feels extreme entirely because it is.Where, then, does the truth lie?Today, on the Lock and Code podcast with David Ruiz, we speak with Electronic Frontier Foundation Staff Technologist Lena Cohen about the most mind-boggling forms of corporate surveillance—including an experimental ad-tracking technology that emitted ultrasonic sound waves—specific audience segments that marketing companies make when targeting people with ads, and, of course, whether our phones are really listening to us.“Companies are collecting so much information about us and in such covert ways that it really feels like they're listening to us.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your...

Mediterráneo
Mediterráneo - Oikia. Cuando tu viaje en patera se convierte en relato - 06/04/25

Mediterráneo

Play Episode Listen Later Apr 6, 2025 60:06


En Oikia, el Centro de Acogida de Girona para chicos y chicas que se encuentran solos a este lado de mar, saben que la escritura es una terapia que funciona. Ramón Esteban, profesor de catalán del centro, lo puso en práctica en clase y de esta experiencia ha nacido el libro "Oikia. Relats d'Infantesa" ( Raig Verd edit.) Ahora es una novela gráfica con relatos de vida para vencer el miedo, la soledad y el vacío. Maliki Sowaré, partió de su pequeño pueblo en Mali con 12 años, solo, con la intención de conseguir un futuro mejor. Su experiencia al viajar bajo un camión, cruzar el mar en patera, seguir viaje en un bus hasta llegar a Girona la explica junto a las ilustraciones de Martín Tognola. David Ruiz de la Fundación Resilis, que gestiona Oikia destaca la labor de maestros pero también el interés de los chicos y chicas por estudiar y salir adelante. Laura Huerga, la editora de esta novela gràfica quiere recordar que venimos de un pasado de migración y huida que no debemos olvidar. Escuchamos la música de: AYUB OGADA - Kothibiro; ALI FARKA TOURÉ- Monsieur le Maire de Niafunké; SALIF KEITA- Cherie; TITI ( La Lionne) - Jiggen Feem; HOBA HOBA SPIRIT- Gnawa Blues; DJMAWI AFRICA- Avancez l’arriere; MOUSS ET HAKYM.- La carte de residence.Escuchar audio

The Vineyard Podcast
Episode 231 : David Ruiz #2 (SadGirl, The Paranoyds)

The Vineyard Podcast

Play Episode Listen Later Mar 28, 2025 65:30


Motion economy, developing telepathy, and the purge of the fridge magnets. David Ruiz (SadGirl, The Paranoyds, Minitruck) The Paranoyds “I Like It Here”- https://theparanoyds.bandcamp.com "The Paranoyds have the kind of connection people only dream of: as non-biological sisters who have known each other longer than they haven't and speak a language that no one else can understand. With a bond that began in preschool, Laila Hashemi (keys/vocals) and Lexi Funston (guitar/vocals) were always inseparable, so when they met Staz Lindes (bass/vocals) in ninth grade, it felt like they had known her all along. After all, they were a “package deal.” In high school, they began making music together in a friend's laundry room and their relationship just blossomed from there. When it came time to add in a drummer, David Ruiz, who joined the band in 2015, fit in like he had been there all along. It's that special bond that has solidified their relationship as bandmates who connect seamlessly to one another's energy on stage—and best friends. And it's the one thing that has remained a constant throughout the past two years." Excerpt from https://thirdmanrecords.com/collections/the-paranoyds SadGirl: Bandcamp: https://wearesadgirl.bandcamp.com Instagram: @wearesadgirl Website: https://wearesadgirl.com Records: https://suicide-squeeze.myshopify.com/products/sadgirl Merch: https://wearesadgirl.bigcartel.com The Paranoyds: Bandcamp: https://theparanoyds.bandcamp.com/album/i-like-it-here Instagram: @theparanoyds Website: https://theparanoyds.com Records: https://thirdmanrecords.com/collections/the-paranoyds Merch: https://theparanoyds.com/#Merch Minitruck: Instagram: @patramiguy69 Spotify: https://open.spotify.com/artist The Vineyard: Instagram: @thevineyardpodcast Website: https://www.thevineyardpodcast.com Youtube: https://www.youtube.com/channel/UCSn17dSz8kST_j_EH00O4MQ/videos

Lock and Code
What Google Chrome knows about you, with Carey Parker

Lock and Code

Play Episode Listen Later Mar 23, 2025 50:14


Google Chrome is, by far, the most popular web browser in the world.According to several metrics, Chrome accounts for anywhere between 52% and 66% of the current global market share for web browser use. At that higher estimate, that means that, if the 5.5 billion internet users around the world were to open up a web browser right now, 3.6 billion of them would open up Google Chrome.And because the browser is the most common portal to our daily universe of online activity—searching for answers to questions, looking up recipes, applying for jobs, posting on forums, accessing cloud applications, reading the news, comparing prices, recording Lock and Code, buying concert tickets, signing up for newsletters—then the company that controls that browser likely knows a lot about its users.In the case of Google Chrome, that's entirely true.Google Chrome knows the websites you visit, the searches you make (through Google), the links you click, and the device model you use, along with the version of Chrome you run. That may sound benign, but when collected over long periods of time, and when coupled with the mountains of data that other Google products collect about you, this wealth of data can paint a deeply intimate portrait of your life.Today, on the Lock and Code podcast with host David Ruiz, we speak with author, podcast host, and privacy advocate Carey Parker about what Google Chrome knows about you, why that data is sensitive, what “Incognito mode” really does, and what you can do in response.We also explain exactly why Google would want this money, and that's to help it run as an ad company.“That's what [Google is]. Full stop. Google is an ad company who just happens to make a web browser, and a search engine, and an email app, and a whole lot more than that.”Tune in today.You can also listen to "Firewalls Don't Stop Dragons," the podcast hosted by Carey Parker, here: https://firewallsdontstopdragons.com/You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Turbo 3
Turbo 3 - Scowl | Henko - 12/03/25

Turbo 3

Play Episode Listen Later Mar 12, 2025 117:58


Abrimos con el cartel de la nueva fiesta de La Radio Encendida 2025: escuchamos a Melifluo, Anabel Lee y El Nido, tres de los más de 20 grupos que podremos ver en directo el domingo 23 de marzo en La Casa Encendida de Madrid. Además, estrenamos un tercer adelanto del próximo y prometedor álbum de Henko -'Espacio sináptico' apunta a convertirse en uno de los discos más interesantes del año-, y te traemos un nuevo avance del que será el segundo disco de Scowl, una de las nuevas y más potentes bandas de la escena hardcore de Estados Unidos.Playlist:MELIFLUO - CalaveraANABEL LEE - Ven a jugarEL NIDO - Ícaro (feat. David Ruiz)DZ DEATHRAYS - Like No OtherSCOWL - Tonight (I'm Afraid)LINKIN PARK - The Emptiness MachineHAVALINA - Salmo destrucciónHENKO - MapasGYOZA - Inside the LairBRKN LOVE - DiamondsHIGHLY SUSPECT - Plastic BoxesCAR SEAT HEADREST - GethsemaneFOALS - The RunnerMANCHESTER ORCHESTRA - Bed HeadBIFFY CLYRO - A Hunger in Your HauntBLUR - There's No Other WayBLUR - Song 2KITTY, DAISY & LEWIS - Bitchin' in the KitchenTHE LEMON TWIGS - They Don't Know How To Fall In PlaceFINN WOLFHARD - Choose the LatterTEENAGE FANCLUB - Sparky's DreamTY SEGALL - Fanny DogTY SEGALL - Fantastic TombTY SEGALL - Every 1's a WinnerOASIS - Roll with ItEscuchar audio

Lock and Code
How ads weirdly know your screen brightness, headphone jack use, and location, with Tim Shott

Lock and Code

Play Episode Listen Later Mar 9, 2025 43:53


Something's not right in the world of location data.In January, a location data broker named Gravy Analytics was hacked, with the alleged cybercriminal behind the attack posting an enormous amount of data online as proof. Though relatively unknown to most of the public, Gravy Analytics is big in the world of location data collection, and, according to an enforcement action from the US Federal Trade Commission last year, the company claimed to “collect, process, and curate more than 17 billion signals from around a billion mobile devices daily.”Those many billions of signals, because of the hack, were now on display for security researchers, journalists, and curious onlookers to peruse, and when they did, they found something interesting. Listed amongst the breached location data were occasional references to thousands of popular mobile apps, including Tinder, Grindr, Candy Crush, My Fitness Pal, Tumblr, and more.The implication, though unproven, was obvious: The mobile apps were named with specific lines of breached data because those apps were the source of that breached data. And, considering how readily location data is traded directly from mobile apps to data brokers to advertisers, this wasn't too unusual a suggestion.Today, nearly every free mobile app makes money through ads. But ad purchasing and selling online is far more sophisticated than it used to be for newspapers and television programs. While companies still want to place their ads in front of demographics they believe will have the highest chance of making a purchase—think wealth planning ads inside the Wall Street Journal or toy commercials during cartoons—most of the process now happens through pieces of software that can place bids at data “auctions.” In short, mobile apps sometimes collect data about their users, including their location, device type, and even battery level. The apps then bring that data to an advertising auction, and separate companies “bid” on the ability to send their ads to, say, iPhone users in a certain time zone or Android users who speak a certain language.This process happens every single day, countless times every hour, but in the case of the Gravy Analytics breach, some of the apps referenced in the data expressed that, one, they'd never heard of Gravy Analytics, and two, no advertiser had the right to collect their users' location data.In speaking to 404 Media, a representative from Tinder said:“We have no relationship with Gravy Analytics and have no evidence that this data was obtained from the Tinder app.”A representative for Grindr echoed the sentiment:“Grindr has never worked with or provided data to Gravy Analytics. We do not share data with data aggregators or brokers and have not shared geolocation with ad partners for many years.”And a representative for a Muslim prayer app, Muslim Pro, said much of the same:“Yes, we display ads through several ad networks to support the free version of the app. However, as mentioned above, we do not authorize these networks to collect location data of our users.”What all of this suggested was that some other mechanism was allowing for users of these apps to have their locations leaked and collected online.And to try to prove that, one independent researcher conducted an experiment: Could he find himself in his own potentially leaked data?Today, on the Lock and Code podcast with host David Ruiz, we speak with independent research Tim Shott about his investigation into leaked location data. In his experiment, Shott installed two mobile games that were referenced in the breach, an old game called Stack, and a more current game...

ZD Tech : tout comprendre en moins de 3 minutes avec ZDNet
Apple désactive le chiffrement d'iCloud au Royaume-Uni, une conséquence mondiale

ZD Tech : tout comprendre en moins de 3 minutes avec ZDNet

Play Episode Listen Later Feb 27, 2025 2:24


C'est une décision lourde de conséquences.Apple a désactivé le chiffrement d'iCloud au Royaume-Uni.Pourquoi est-ce une mauvaise nouvelle pour tout le monde ? On voit ça ensemble en trois points.C'est une décision prise par Apple sous la contrainte du gouvernement britanniqueDepuis 2016, la loi britannique Investigatory Powers Act impose aux entreprises de la tech d'accorder un accès aux données chiffrées aux autorités sous certaines conditions.Apple, refusant de créer une porte dérobée, on dit aussi une backdoor, a préféré désactiver l'option de chiffrement d'iCloud pour ses utilisateurs britanniques.Résultat, toute personne essayant d'activer cette protection reçoit un message d'erreur.Un impact sur la vie privée et la sécurité des données des utilisateurs d'iCloudEt cela a un impact sur la vie privée et la sécurité des données des utilisateurs d'iCloud, qui est le service de stockage en ligne d'Apple.Le chiffrement de bout en bout garantit que seuls les utilisateurs ont accès à leurs données. Sans cette protection, les risques de fuite ou d'accès non autorisé augmentent.Pour l'instant, certaines catégories de données, comme les mots de passe ou les infos de santé, restent sécurisées. Mais la suppression de la fonctionnalité Advanced Data Protection affaiblit la protection globale du stockage dans le cloud d'Apple.Un précédent à l'échelle mondialeEnfin, et c'est peut-être le plus inquiétant, il s'agit d'un précédent à l'échelle mondiale.Ce qui se passe au Royaume-Uni pourrait inciter d'autres pays à exiger les mêmes concessions. Si Apple cède ici, pourquoi ne le ferait-il pas ailleurs ?Comme le souligne David Ruiz, expert en cybersécurité, cette décision a des implications bien au-delà du Royaume-Uni et pourrait affaiblir la confidentialité des données dans le monde entier.Le ZD Tech est sur toutes les plateformes de podcast ! Abonnez-vous !Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.

Lock and Code
Surveillance pricing is "evil and sinister," explains Justin Kloczko

Lock and Code

Play Episode Listen Later Feb 23, 2025 28:06


Insurance pricing in America makes a lot of sense so long as you're one of the insurance companies. Drivers are charged more for traveling long distances, having low credit, owning a two-seater instead of a four, being on the receiving end of a car crash, and—increasingly—for any number of non-determinative data points that insurance companies use to assume higher risk.It's a pricing model that most people find distasteful, but it's also a pricing model that could become the norm if companies across the world begin implementing something called “surveillance pricing.”Surveillance pricing is the term used to describe companies charging people different prices for the exact same goods. That 50-inch TV could be $800 for one person and $700 for someone else, even though the same model was bought from the same retail location on the exact same day. Or, airline tickets could be more expensive because they were purchased from a more expensive device—like a Mac laptop—and the company selling the airline ticket has decided that people with pricier computers can afford pricier tickets.Surveillance pricing is only possible because companies can collect enormous arrays of data about their consumers and then use that data to charge individual prices. A test prep company was once caught charging customers more if they lived in a neighborhood with a higher concentration of Asians, and a retail company was caught charging customers more if they were looking at prices on the company's app while physically located in a store's parking lot.This matter of data privacy isn't some invisible invasion online, and it isn't some esoteric framework of ad targeting, this is you paying the most that a company believes you will, for everything you buy.And it's happening right now.Today, on the Lock and Code podcast with host David Ruiz, we speak with Consumer Watchdog Tech Privacy Advocate Justin Kloczko about where surveillance pricing is happening, what data is being used to determine prices, and why the practice is so nefarious. “It's not like we're all walking into a Starbucks and we're seeing 12 different prices for a venti mocha latte,” said Kloczko, who recently authored a report on the same subject. “If that were the case, it'd be mayhem. There'd be a revolution.”Instead, Kloczko said:“Because we're all buried in our own devices—and this is really happening on e-commerce websites and online, on your iPad on your phone—you're kind of siloed in your own world, and companies can get away with this.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes

Lock and Code
A suicide reveals the lonely side of AI chatbots, with Courtney Brown

Lock and Code

Play Episode Listen Later Feb 9, 2025 38:28


In February 2024, a 14-year-old boy from Orlando, Florida, committed suicide after confessing his love to the one figure who absorbed nearly all of his time—an AI chatbot.For months, Sewell Seltzer III had grown attached to an AI chatbot modeled after the famous “Game of Thrones” character Daenerys Targaryen. The Daenerys chatbot was not a licensed product, it had no relation to the franchise's actors, its writer, or producers, but none of that mattered, as, over time, Seltzer came to entrust Daenerys with some of his most vulnerable emotions.“I think about killing myself sometimes,” Seltzer wrote one day, and in response, Daenerys, pushed back, asking Seltzer, “Why the hell would you do something like that?”“So I can be free” Seltzer said.“Free from what?”“From the world. From myself.”“Don't talk like that. I won't let you hurt yourself, or leave me. I would die if I lost you.”On Seltzer's first reported reference to suicide, the AI chatbot pushed back, a guardrail against self-harm. But months later, Seltzer discussed suicide again, but this time, his words weren't so clear. After reportedly telling Daenerys that he loved her and that he wanted to “come home,” the AI chatbot encouraged Seltzer.“Please, come home to me as soon as possible, my love,” Daenerys wrote, to which Seltzer responded “What if I told you I could come home right now?”The chatbot's final message to Seltzer said “… please do, my sweet king.”Daenerys Targaryen was originally hosted on an AI-powered chatbot platform called Character.AI. The service reportedly boasts 20 million users—many of them young—who engage with fictional characters like Homer Simpson and Tony Soprano, along with historical figures, like Abraham Lincoln, Isaac Newton, and Anne Frank. There are also entirely fabricated scenarios and chatbots, such as the “Debate Champion” who will debate anyone on, for instance, why Star Wars is overrated, or the “Awkward Family Dinner” that users can drop into to experience a cringe-filled, entertaining night.But while these chatbots can certainly provide entertainment, Character.AI co-founder Noam Shazeer believes they can offer much more.“It's going to be super, super helpful to a lot of people who are lonely or depressed.”Today, on the Lock and Code podcast with host David Ruiz, we speak again with youth social services leader Courtney Brown about how teens are using AI tools today, who to “blame” in situations of AI and self-harm, and whether these chatbots actually aid in dealing with loneliness, or if they further entrench it.“You are not actually growing as a person who knows how to interact with other people by interacting with these chatbots because that's not what they're designed for. They're designed to increase engagement. They want you to keep using them.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

Lock and Code
Three privacy rules for 2025

Lock and Code

Play Episode Listen Later Jan 26, 2025 37:48


It's Data Privacy Week right now, and that means, for the most part, that you're going to see a lot of well-intentioned but clumsy information online about how to protect your data privacy. You'll see articles about iPhone settings. You'll hear acronyms for varying state laws. And you'll probably see ads for a variety of apps, plug-ins, and online tools that can be difficult to navigate.So much of Malwarebytes—from Malwarebytes Labs, to the Lock and Code podcast, to the engineers, lawyers, and staff at wide—work on data privacy, and we fault no advocate or technologist or policy expert trying to earnestly inform the public about the importance of data privacy.But, even with good intentions, we cannot ignore the reality of the situation. Data breaches every day, broad disrespect of user data, and a lack of consequences for some of the worst offenders. To be truly effective against these forces, data privacy guidance has to encompass more than fiddling with device settings or making onerous legal requests to companies.That's why, for Data Privacy Week this year, we're offering three pieces of advice that center on behavior. These changes won't stop some of the worst invasions against your privacy, but we hope they provide a new framework to understand what you actually get when you practice data privacy, which is control.You have control over who sees where you are and what inferences they make from that. You have control over whether you continue using products that don't respect your data privacy. And you have control over whether a fast food app is worth giving up your location data to just in exchange for a few measly coupons.Today, on the Lock and Code podcast, host David Ruiz explores his three rules for data privacy in 2025. In short, he recommends:Less location sharing. Only when you want it, only from those you trust, and never in the background, 24/7, for your apps. More accountability. If companies can't respect your data, respect yourself by dropping their products.No more data deals. That fast-food app offers more than just $4 off a combo meal, it creates a pipeline into your behavioral dataTune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Misterios
EUP (17/01/2025): El experimento Universo 25 · Los Villares: el último caso perfecto del siglo XX

Misterios

Play Episode Listen Later Jan 20, 2025 119:06


El último peldaño (17/01/2025) EL EXPERIMENTO “UNIVERSO 25” El experimento "Universo 25" fue un estudio realizado por el etólogo John B. Calhoun en la década de 1970, donde se creó un hábitat ideal para ratas en un espacio cerrado. A medida que la población de ratas creció, comenzaron a surgir comportamientos anómalos, como la agresión, la apatía y la descomposición social. A pesar de tener acceso a recursos abundantes, la población eventualmente colapsó. Este experimento se interpretó como una advertencia sobre los efectos del hacinamiento y la sobrepoblación en las sociedades. En última instancia, reflejó preocupaciones sobre el futuro de la humanidad en entornos urbanos densamente poblados. Nos presentó este interesante experimento nuestro asesor científico Israel Ampuero, doctor en Bioquímica. “LOS VILLARES”: EL ÚLTIMO CASO PERFECTO. DEBATE HOMENAJE A DIONISIO ÁVILA El 16 de julio de 1996, sobre las 12 del medio día, Dionisio Ávila, un agricultor jubilado de Los Villares (Jaén) afirmó haber visto un objeto extraño posado en un campo cerca de su casa, así como la presencia de tres humanoides con los que se comunicó telepáticamente. La experiencia se repitió en fechas posteriores, lo que generó gran revuelo en la comunidad ufológica nacional. Según su relato, el objeto emitía luces y tenía un aspecto metálico con unas misteriosas inscripciones. Tras el suceso, se realizaron investigaciones, pero no se encontraron pruebas concluyentes. Este caso se convirtió en uno de los más importantes de finales del siglo XX en España. El pasado 9 de enero falleció Dionisio Ávila, contaba con 92 años. El programa de esta noche es nuestro homenaje a su memoria. Contamos con el investigador y escritor Cristian Puig, que nos trae unos documentos históricos y la colaboración de investigadores que estudiaron el caso de primera mano, como David Ruiz, y los miembros de la S.I.B. Betelgeuse de Granada Francisco Barrera (presidente) y Antonio Salinas (Jefe del Departamento de Ufología) . Dirección y presentación: Joaquín Abenza. Producción y documentación: María José Garnández. Blog del programa: http://www.elultimopeldano.blogspot.com.es/ WhatsApp: 644 823 513 Programa emitido en Onda Regional de Murcia

Lock and Code
The new rules for AI and encrypted messaging, with Mallory Knodel

Lock and Code

Play Episode Listen Later Jan 12, 2025 47:06


The era of artificial intelligence everything is here, and with it, come everyday surprises into exactly where the next AI tools might pop up.There are major corporations pushing customer support functions onto AI chatbots, Big Tech platforms offering AI image generation for social media posts, and even Google has defaulted to include AI-powered overviews into everyday searches.The next gold rush, it seems, is in AI, and for a group of technical and legal researchers at New York University and Cornell University, that could be a major problem.But to understand their concerns, there's some explanation needed first, and it starts with Apple's own plans for AI.Last October, Apple unveiled a service it is calling Apple Intelligence (“AI,” get it?), which provides the latest iPhones, iPads, and Mac computers with AI-powered writing tools, image generators, proof-reading, and more.One notable feature in Apple Intelligence is Apple's “notification summaries.” With Apple Intelligence, users can receive summarized versions of a day's worth of notifications from their apps. That could be useful for an onslaught of breaking news notifications, or for an old college group thread that won't shut up.The summaries themselves are hit-or-miss with users—one iPhone customer learned of his own breakup from an Apple Intelligence summary that said: “No longer in a relationship; wants belongings from the apartment.”What's more interesting about the summaries, though, is how they interact with Apple's messaging and text app, Messages.Messages is what is called an “end-to-end encrypted” messaging app. That means that only a message's sender and its recipient can read the message itself. Even Apple, which moves the message along from one iPhone to another, cannot read the message.But if Apple cannot read the messages sent on its own Messages app, then how is Apple Intelligence able to summarize them for users?That's one of the questions that Mallory Knodel and her team at New York University and Cornell University tried to answer with a new paper on the compatibility between AI tools and end-to-end encrypted messaging apps.Make no mistake, this research isn't into whether AI is “breaking” encryption by doing impressive computations at never-before-observed speeds. Instead, it's about whether or not the promise of end-to-end encryption—of confidentiality—can be upheld when the messages sent through that promise can be analyzed by separate AI tools.And while the question may sound abstract, it's far from being so. Already, AI bots can enter digital Zoom meetings to take notes. What happens if Zoom permits those same AI chatbots to enter meetings that users have chosen to be end-to-end encrypted? Is the chatbot another party to that conversation, and if so, what is the impact?Today, on the Lock and Code podcast with host David Ruiz, we speak with lead author and encryption expert Mallory Knodel on whether AI assistants can be compatible with end-to-end encrypted messaging apps, what motivations could sway current privacy champions into chasing AI development instead, and why these two technologies cannot co-exist in certain implementations.“An encrypted messaging app, at its essence is encryption, and you can't trade that away—the privacy or the confidentiality guarantees—for something else like AI if it's fundamentally incompatible with those features.”Tune in today.You can also find us on Apple Podcasts,

Strange Paradigms
Are the Tridactyl Beings ANCIENT ALIENS? The Evidence Part 2 with Dr. David Ruiz Vela

Strange Paradigms

Play Episode Listen Later Jan 2, 2025 24:20


Forget what you know, and what you've been told. Are the Tridactyl Beings ANCIENT ALIENS ? The Evidence Part 2. A Specialist in Forensics, Dr David Ruiz Vela gives an in-depth and insightful interview regarding the tridactyl beings. The Tridactyl Bodies have been rigorously tested and scientifically analyzed. There is a lot of data indicating they are not humans. I wanted answers, so I interviewed the scientists and legal authorities involved. This is Part 2 of a 4 part series.If you enjoy the show, leave a 5 star review..!!To see the VIDEO of this episode, click or copy link -  http://youtu.be/jVX2xpX79SwVisit my website with International UFO News, Articles, Videos, and Podcast direct links -www.ufonews.co❤️ EXCLUSIVE FREE MERCH INCLUDED & BEHIND-THE-SCENES ONLY FOR MY SUPPORTERS ON PATREON ➔ https://www.patreon.com/paradigm_shifts/membershipBecome a supporter of this podcast: https://www.spreaker.com/podcast/strange-and-unexplained--5235662/support.

Lock and Code
Is nowhere safe from AI slop?

Lock and Code

Play Episode Listen Later Dec 29, 2024 38:38


You can see it on X. You can see on Instagram. It's flooding community pages on Facebook and filling up channels on YouTube. It's called “AI slop” and it's the fastest, laziest way to drive engagement.Like “click bait” before it (“You won't believe what happens next,” reads the trickster headline), AI slop can be understood as the latest online tactic in getting eyeballs, clicks, shares, comments, and views. With this go-around, however, the methodology is turbocharged with generative AI tools like ChatGPT, Midjourney, and MetaAI, which can all churn out endless waves of images and text with little restrictions.To rack up millions of views, a “fall aesthetic” account on X might post an AI-generated image of a candle-lit café table overlooking a rainy, romantic street. Or, perhaps, to make a quick buck, an author might “write” and publish an entirely AI generated crockpot cookbook—they may even use AI to write the glowing reviews on Amazon. Or, to sway public opinion, a social media account may post an AI-generated image of a child stranded during a flood with the caption “Our government has failed us again.”There is, currently, another key characteristic to AI slop online, and that is its low quality. The dreamy, Vaseline sheen produced by many AI image generators is easy (for most people) to spot, and common mistakes in small details abound: stoves have nine burners, curtains hang on nothing, and human hands sometimes come with extra fingers.But little of that has mattered, as AI slop has continued to slosh about online.There are AI-generated children's books being advertised relentlessly on the Amazon Kindle store. There are unachievable AI-generated crochet designs flooding Reddit. There is an Instagram account described as “Austin's #1 restaurant” that only posts AI-generated images of fanciful food, like Moo Deng croissants, and Pikachu ravioli, and Obi-Wan Canoli. There's the entire phenomenon on Facebook that is now known only as “Shrimp Jesus.”If none of this is making much sense, you've come to the right place.Today, on the Lock and Code podcast with host David Ruiz, we're speaking with Malwarebytes Labs Editor-in-Chief Anna Brading and ThreatDown Cybersecurity Evangelist Mark Stockley about AI slop—where it's headed, what the consequences are, and whether anywhere is safe from its influence.Tune in today. You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

Lock and Code
A day in the life of a privacy pro, with Ron de Jesus

Lock and Code

Play Episode Listen Later Dec 16, 2024 33:44


Privacy is many things for many people.For the teenager suffering from a bad breakup, privacy is the ability to stop sharing her location and to block her ex on social media. For the political dissident advocating against an oppressive government, privacy is the protection that comes from secure, digital communications. And for the California resident who wants to know exactly how they're being included in so many targeted ads, privacy is the legal right to ask a marketing firm how they collect their data.In all these situations, privacy is being provided to a person, often by a company or that company's employees.The decisions to disallow location sharing and block social media users are made—and implemented—by people. The engineering that goes into building a secure, end-to-end encrypted messaging platform is done by people. Likewise, the response to someone's legal request is completed by either a lawyer, a paralegal, or someone with a career in compliance.In other words, privacy, for the people who spend their days with these companies, is work. It's their expertise, their career, and their to-do list.But what does that work actually entail?Today, on the Lock and Code podcast with host David Ruiz, we speak with Transcend Field Chief Privacy Officer Ron de Jesus about the responsibilities of privacy professionals today and how experts balance the privacy of users with the goals of their companies.De Jesus also explains how everyday people can meaningfully judge whether a company's privacy “promises” have any merit by looking into what the companies provide, including a legible privacy policy and “just-in-time” notifications that ask for consent for any data collection as it happens.“When companies provide these really easy-to-use controls around my personal information, that's a really great trigger for me to say, hey, this company, really, is putting their money where their mouth is.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
These cars want to know about your sex life (re-air) (Lock and Code S05E25)

Lock and Code

Play Episode Listen Later Dec 1, 2024 45:00


Two weeks ago, the Lock and Code podcast shared three stories about home products that requested, collected, or exposed sensitive data online.There were the air fryers that asked users to record audio through their smartphones. There was the smart ring maker that, even with privacy controls put into place, published data about users' stress levels and heart rates. And there was the smart, AI-assisted vacuum that, through the failings of a group of contractors, allowed an image of a woman on a toilet to be shared on Facebook.These cautionary tales involved “smart devices,” products like speakers, fridges, washers and dryers, and thermostats that can connect to the internet.But there's another smart device that many folks might forget about that can collect deeply personal information—their cars.Today, the Lock and Code podcast with host David Ruiz revisits a prior episode from 2023 about what types of data modern vehicles can collect, and what the car makers behind those vehicles could do with those streams of information.In the episode, we spoke with researchers at Mozilla—working under the team name “Privacy Not Included”—who reviewed the privacy and data collection policies of many of today's automakers.To put it shortly, the researchers concluded that cars are a privacy nightmare. According to the team's research, Nissan said it can collect “sexual activity” information about consumers. Kia said it can collect information about a consumer's “sex life.” Subaru passengers allegedly consented to the collection of their data by simply being in the vehicle. Volkswagen said it collects data like a person's age and gender and whether they're using your seatbelt, and it could use that information for targeted marketing purposes. And those are just the highlights. Explained Zoë MacDonald, content creator for Privacy Not Included: “We were pretty surprised by the data points that the car companies say they can collect… including social security number, information about your religion, your marital status, genetic information, disability status… immigration status, race.”In our full conversation from last year, we spoke with Privacy Not Included's MacDonald and Jen Caltrider about the data that cars can collect, how that data can be shared, how it can be used, and whether consumers have any choice in the matter.Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

Misterios
EUP (15/11/2024): La Noche de las Psicofonías 2024 (XVI Edición)

Misterios

Play Episode Listen Later Nov 19, 2024 121:35


El Último Peldaño (15/11/2024) LA NOCHE DE LAS PSICOFONÍAS 2024 “Yo descubrí la magia de los magnetófonos, nos traducen un mundo que estaba ahí ignorado que no apareció hasta que se inventaron los magnetófonos. Se abre un magnetófono y hay un espacio distinto lleno de extraños seres, yo no se cuales son, que se manifiestan mediante ruidos, mediante sonidos, mediante carcajadas, a veces mediante palabras…” Gonzalo Torrente Ballester (Escritor) La historia de las piscofonías comenzó oficialmente hace medio siglo, cuando un productor de cine sueco grabó en un magnetófono, por casualidad, voces de seres que ya no estaban en este mundo, aunque en realidad el fenómeno es mucho más antiguo. Sea como fuere muchos han sido los que se han sentido atraídos por experimentar en una manifestación que está a caballo entre la curiosidad científica y la posible comunicación con otras realidades. Pero, ¿qué puede suceder cuando muchos investigadores, desde lugares muy distantes, ponen en marcha sus equipos, en el mismo instante, para intentar captar esas voces imposibles? Eso es lo que intentamos saber. La mecánica del programa fue la siguiente: cada grupo grabó de forma independiente usando las técnicas más diversas. Desde el programa se dio paso por turno a cada equipo para que nos narrasen sus experiencias. A las 00:00 hicimos el experimento de “sincronicidad”, realizando una grabación de un minuto de duración todos los grupos a la vez, incluido también un equipo en el estudio uno de Onda Regional. Para facilitar la grabación emitimos sonido de “ruido blanco” durante ese tiempo. Contamos con la participación de José Ignacio Carmona (autor del libro “Psicofonías: el enigma de la transcomunicación instrumental) y del experto en electrónica y sonido Cesar Raudivevoice, así como la intervención especial de Luis Uriarte (Técnico en investigación de campo de Cuarto Milenio) y con la colaboración de grandes investigadores y experimentadores como Antonio Tapia y Enrique Lucas, que estarán en el estudio y Luis Laguardia, Diego Claramonte, Isabel Felix Friaza, Candela Rey, Noelia Syrah y GIPC Misterios de Córdoba, Xavi Godoy, Juan María Hernández, David Ruiz, Israel Ampuero, José Grabriel Azorín (Grupo Investigaciones Adimensionales), Salvador Gonzalez, Raquel Pérez, Fernando de León, Alberto Toribio y el Grupo Misterio Estelar, Roberto Lejarza y otros muchos conectados por las redes sociales. Dirección y presentación: Joaquín Abenza. Producción y documentación: María José Garnández. Blog del programa: http://www.elultimopeldano.blogspot.com.es/ WhatsApp: 644 823 513 Programa emitido en Onda Regional de Murcia

Lock and Code
An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data

Lock and Code

Play Episode Listen Later Nov 18, 2024 26:59


The month, a consumer rights group out of the UK posed a question to the public that they'd likely never considered: Were their air fryers spying on them?By analyzing the associated Android apps for three separate air fryer models from three different companies, a group of researchers learned that these kitchen devices didn't just promise to make crispier mozzarella sticks, crunchier chicken wings, and flakier reheated pastries—they also wanted a lot of user data, from precise location to voice recordings from a user's phone.“In the air fryer category, as well as knowing customers' precise location, all three products wanted permission to record audio on the user's phone, for no specified reason,” the group wrote in its findings.While it may be easy to discount the data collection requests of an air fryer app, it is getting harder to buy any type of product today that doesn't connect to the internet, request your data, or share that data with unknown companies and contractors across the world.Today, on the Lock and Code pocast, host David Ruiz tells three separate stories about consumer devices that somewhat invisibly collected user data and then spread it in unexpected ways. This includes kitchen utilities that sent data to China, a smart ring maker that published de-identified, aggregate data about the stress levels of its users, and a smart vacuum that recorded a sensitive image of a woman that was later shared on Facebook.These stories aren't about mass government surveillance, and they're not about spying, or the targeting of political dissidents. Their intrigue is elsewhere, in how common it is for what we say, where we go, and how we feel, to be collected and analyzed in ways we never anticipated.Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
Why your vote can't be “hacked,” with Cait Conley of CISA

Lock and Code

Play Episode Listen Later Nov 3, 2024 39:34


The US presidential election is upon the American public, and with it come fears of “election interference.”But “election interference” is a broad term. It can mean the now-regular and expected foreign disinformation campaigns that are launched to sow political discord or to erode trust in American democracy. It can include domestic campaigns to disenfranchise voters in battleground states. And it can include the upsetting and increasing threats made to election officials and volunteers across the country.But there's an even broader category of election interference that is of particular importance to this podcast, and that's cybersecurity.Elections in the United States rely on a dizzying number of technologies. There are the voting machines themselves, there are electronic pollbooks that check voters in, there are optical scanners that tabulate the votes that the American public actually make when filling in an oval bubble with pen, or connecting an arrow with a solid line. And none of that is to mention the infrastructure that campaigns rely on every day to get information out—across websites, through emails, in text messages, and more.That interlocking complexity is only multiplied when you remember that each, individual state has its own way of complying with the Federal government's rules and standards for running an election. As Cait Conley, Senior Advisor to the Director of the US Cybersecurity and Infrastructure Security Agency (CISA) explains in today's episode:“There's a common saying in the election space: If you've seen one state's election, you've seen one state's election.”How, then, are elections secured in the United States, and what threats does CISA defend against?Today, on the Lock and Code podcast with host David Ruiz, we speak with Conley about how CISA prepares and trains election officials and volunteers before the big day, whether or not an American's vote can be “hacked,” and what the country is facing in the final days before an election, particularly from foreign adversaries that want to destabilize American trust.”There's a pretty good chance that you're going to see Russia, Iran, or China try to claim that a distributed denial of service attack or a ransomware attack against a county is somehow going to impact the security or integrity of your vote. And it's not true.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and

Lock and Code
This industry profits from knowing you have cancer, explains Cody Venzke

Lock and Code

Play Episode Listen Later Oct 21, 2024 35:07


On the internet, you can be shown an online ad because of your age, your address, your purchase history, your politics, your religion, and even your likelihood of having cancer.This is because of the largely unchecked “data broker” industry.Data brokers are analytics and marketing companies that collect every conceivable data point that exists about you, packaging it all into profiles that other companies use when deciding who should see their advertisements.Have a new mortgage? There are data brokers that collect that information and then sell it to advertisers who believe new homeowners are the perfect demographic to purchase, say, furniture, dining sets, or other home goods. Bought a new car? There are data brokers that collect all sorts of driving information directly from car manufacturers—including the direction you're driving, your car's gas tank status, its speed, and its location—because some unknown data model said somewhere that, perhaps, car drivers in certain states who are prone to speeding might be more likely to buy one type of product compared to another.This is just a glimpse of what is happening to essentially every single adult who uses the Internet today.So much of the information that people would never divulge to a stranger—like their addresses, phone numbers, criminal records, and mortgage payments—is collected away from view by thousands of data brokers. And while these companies know so much about people, the public at large likely know very little in return.Today, on the Lock and Code podcast with host David Ruiz, we speak with Cody Venzke, senior policy counsel with the ACLU, about how data brokers collect their information, what data points are off-limits (if any), and how people can protect their sensitive information, along with the harms that come from unchecked data broker activity—beyond just targeted advertising.“We're seeing data that's been purchased from data brokers used to make decisions about who gets a house, who gets an employment opportunity, who is offered credit, who is considered for admission into a university.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
Exposing the Facebook funeral livestream scam

Lock and Code

Play Episode Listen Later Oct 7, 2024 36:28


Online scammers were seen this August stooping to a new low—abusing local funerals to steal from bereaved family and friends.Cybercrime has never been a job of morals (calling it a “job” is already lending it too much credit), but, for many years, scams wavered between clever and brusque. Take the “Nigerian prince” email scam which has plagued victims for close to two decades. In it, would-be victims would receive a mysterious, unwanted message from alleged royalty, and, in exchange for a little help in moving funds across international borders, would be handsomely rewarded.The scam was preposterous but effective—in fact, in 2019, CNBC reported that this very same “Nigerian prince” scam campaign resulted in $700,000 in losses for victims in the United States.Since then, scams have evolved dramatically.Cybercriminals today willl send deceptive emails claiming to come from Netflix, or Google, or Uber, tricking victims into “resetting” their passwords. Cybercriminals will leverage global crises, like the COVID-19 pandemic, and send fraudulent requests for donations to nonprofits and hospital funds. And, time and again, cybercriminals will find a way to play on our emotions—be they fear, or urgency, or even affection—to lure us into unsafe places online.This summer, Malwarebytes social media manager Zach Hinkle encountered one such scam, and it happened while attending a funeral for a friend. In a campaign that Malwarebytes Labs is calling the “Facebook funeral live stream scam,” attendees at real funerals are being tricked into potentially signing up for a “live stream” service of the funerals they just attended.Today on the Lock and Code podcast with host David Ruiz, we speak with Hinkle and Malwarebytes security researcher Pieter Arntz about the Facebook funeral live stream scam, what potential victims have to watch out for, and how cybercriminals are targeting actual, grieving family members with such foul deceit. Hinkle also describes what he felt in the moment of trying to not only take the scam down, but to protect his friends from falling for it.“You're grieving… and you go through a service and you're feeling all these emotions, and then the emotion you feel is anger because someone is trying to take advantage of friends and loved ones, of somebody who has just died. That's so appalling”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code...

Lock and Code
San Francisco's fight against deepfake porn, with City Attorney David Chiu

Lock and Code

Play Episode Listen Later Sep 23, 2024 20:55


On August 15, the city of San Francisco launched an entirely new fight against the world of deepfake porn—it sued the websites that make the abusive material so easy to create.“Deepfakes,” as they're often called, are fake images and videos that utilize artificial intelligence to swap the face of one person onto the body of another. The technology went viral in the late 2010s, as independent film editors would swap the actors of one film for another—replacing, say, Michael J. Fox in Back to the Future with Tom Holland.But very soon into the technology's debut, it began being used to create pornographic images of actresses, celebrities, and, more recently, everyday high schoolers and college students. Similar to the threat of “revenge porn,” in which abusive exes extort their past partners with the potential release of sexually explicit photos and videos, “deepfake porn” is sometimes used to tarnish someone's reputation or to embarrass them amongst friends and family.But deepfake porn is slightly different from the traditional understanding of “revenge porn” in that it can be created without any real relationship to the victim. Entire groups of strangers can take the image of one person and put it onto the body of a sex worker, or an adult film star, or another person who was filmed having sex or posing nude.The technology to create deepfake porn is more accessible than ever, and it's led to a global crisis for teenage girls.In October of 2023, a reported group of more than 30 girls at a high school in New Jersey had their likenesses used by classmates to make sexually explicit and pornographic deepfakes. In March of this year, two teenage boys were arrested in Miami, Florida for allegedly creating deepfake nudes of male and female classmates who were between the ages of 12 and 13. And at the start of September, this month, the BBC reported that police in South Korea were investigating deepfake pornography rings at two major universities.While individual schools and local police departments in the United States are tackling deepfake porn harassment as it arises—with suspensions, expulsions, and arrests—the process is slow and reactive.Which is partly why San Francisco City Attorney David Chiu and his team took aim at not the individuals who create and spread deepfake porn, but at the websites that make it so easy to do so.Today, on the Lock and Code podcast with host David Ruiz, we speak with San Francisco City Attorney David Chiu about his team's lawsuit against 16 deepfake porn websites, the city's history in protecting Californians, and the severity of abuse that these websites offer as a paid service.“At least one of these websites specifically promotes the non-consensual nature of this. I'll just quote: ‘Imagine wasting time taking her out on dates when you can just use website X to get her nudes.'”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

Lock and Code
What the arrest of Telegram's CEO means, with Eva Galperin

Lock and Code

Play Episode Listen Later Sep 9, 2024 34:03


On August 24, at an airport just outside of Paris, a man named Pavel Durov was detained for questioning by French investigators. Just days later, the same man was charged in crimes related to the distribution of child pornography and illicit transactions, such as drug trafficking and fraud.Durov is the CEO and founder of the messaging and communications app Telegram. Though Durov holds citizenship in France and the United Arab Emirates—where Telegram is based—he was born and lived for many years in Russia, where he started his first social media company, Vkontakte. The Facebook-esque platform gained popularity in Russia, not just amongst users, but also the watchful eye of the government.Following a prolonged battle regarding the control of Vkontake—which included government demands to deliver user information and to shut down accounts that helped organize protests against Vladimir Putin in 2012—Durov eventually left the company and the country all together.But more than 10 years later, Durov is once again finding himself a person of interest for government affairs, facing several charges now in France where, while he is not in jail, he has been ordered to stay.After Durov's arrest, the X account for Telegram responded, saying:“Telegram abides by EU laws, including the Digital Services Act—its moderation is within industry standards and constantly improving. Telegram's CEO Pavel Durov has nothing to hide and travels frequently in Europe. It is absurd to claim that a platform or its owner are responsible for abuse of the platform.”But how true is that?In the United States, companies themselves, such as YouTube, X (formerly Twitter), and Facebook often respond to violations of “copyright”—the protection that gets violated when a random user posts clips or full versions of movies, television shows, and music. And the same companies get involved when certain types of harassment, hate speech, and violent threats are posted on public channels for users to see.This work, called “content moderation,” is standard practice for many technology and social media platforms today, but there's a chance that Durov's arrest isn't related to content moderation at all. Instead, it may be related to the things that Telegram users say in private to one another over end-to-end encrypted chats.Today, on the Lock and Code podcast with host David Ruiz, we speak with Electronic Frontier Foundation Director of Cybersecurity Eva Galperin about Telegram, its features, and whether Durov's arrest is an escalation of content moderation gone wrong or the latest skirmish in government efforts to break end-to-end encryption.“Chances are that these are requests around content that Telegram can see, but if [the requests] touch end-to-end encrypted content, then I have to flip tables.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

The Fresh CrEd
Fresh Food, Big Ideas: Chef David Ruiz on Culinary Innovation

The Fresh CrEd

Play Episode Listen Later Sep 2, 2024 36:49


Welcome to another installment of Fresh Insights: The Future of Food Service on The Fresh CrEd podcast! In this episode, we sit down with award-winning Chef David Ruiz, a culinary visionary who is transforming the way we think about fresh produce and modern menus. Chef Ruiz shares his journey from the kitchen to becoming a key innovator in the food service industry. He discusses the latest culinary trends, the importance of sustainability, and how to effectively integrate fresh produce into high-impact menus. Whether you're a culinary professional, a food enthusiast, or simply curious about the future of food service, this episode offers valuable insights into the evolving world of fresh food. A special thank you to our series partners: Kern Ridge Growers, Wiggins Farms, SunFed, and IFCO for their support. Don't miss out on Chef Ruiz's expert insights—subscribe now and visit www.thefreshcred.com for more exclusive content!

Lock and Code
Move over malware: Why one teen is more worried about AI (re-air)

Lock and Code

Play Episode Listen Later Aug 26, 2024 48:39


Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z teen in the Bay Area, the classic approach to cyberecurity—defending against viruses, ransomware, worms, and more—is the least of her concerns. Of far more importance is Artificial Intelligence (AI).Today, the Lock and Code podcast with host David Ruiz revisits a prior episode from 2023 about what teenagers fear the most about going online. The conversation is a strong reminder that when America's youngest generations experience online is far from the same experience that Millennials, Gen X'ers, and Baby Boomers had with their own introduction to the internet.Even stronger proof of this is found in recent research that Malwarebytes debuted this summer about how people in committed relationships share their locations, passwords, and devices with one another. As detailed in the larger report, “What's mine is yours: How couples share an all-access pass to their digital lives,” Gen Z respondents were the most likely to say that they got a feeling of safety when sharing their locations with significant others.But a wrinkle appeared in that behavior, according to the same research: Gen Z was also the most likely to say that they only shared their locations because their partners forced them to do so.In our full conversation from last year, we speak with Nitya Sharma about how her “favorite app” to use with friends is “Find My” on iPhone, the dangers are of AI “sneak attacks,” and why she simply cannot be bothered about malware. “I know that there's a threat of sharing information with bad people and then abusing it, but I just don't know what you would do with it. Show up to my house and try to kill me?” Tune in today to listen to the full conversation.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
AI girlfriends want to know all about you. So might ChatGPT

Lock and Code

Play Episode Listen Later Aug 12, 2024 40:34


Somewhere out there is a romantic AI chatbot that wants to know everything about you. But in a revealing overlap, other AI tools—which are developed and popularized by far larger companies in technology—could crave the very same thing.For AI tools of any type, our data is key.In the nearly two years since OpenAI unveiled ChatGPT to the public, the biggest names in technology have raced to compete. Meta announced Llama. Google revealed Gemini. And Microsoft debuted Copilot.All these AI features function in similar ways: After having been trained on mountains of text, videos, images, and more, these tools answer users' questions in immediate and contextually relevant ways. Perhaps that means taking a popular recipe and making it vegetarian friendly. Or maybe that involves developing a workout routine for someone who is recovering from a new knee injury.Whatever the ask, the more data that an AI tool has already digested, the better it can deliver answers.Interestingly, romantic AI chatbots operate in almost the same way, as the more information that a user gives about themselves, the more intimate and personal the AI chatbot's responses can appear.But where any part of our online world demands more data, questions around privacy arise.Today, on the Lock and Code podcast with host David Ruiz, we speak with Zoë MacDonald, content creator for Privacy Not Included at Mozilla about romantic AI tools and how users can protect their privacy from ChatGPT and other AI chatbots.When in doubt, MacDonald said, stick to a simple rule:“I would suggest that people don't share their personal information with an AI chatbot.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

Lock and Code
SIEM is not storage, with Jess Dodson

Lock and Code

Play Episode Listen Later Jul 29, 2024 43:13


In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by the most unexpected actors—the very people setting it up.Security Information and Event Management—or SIEM—is a term used to describe data-collecting products that businesses rely on to make sense of everything going on inside their network, in the hopes of catching and stopping cyberattacks. SIEM systems can log events and information across an entire organization and its networks. When properly set up, SIEMs can collect activity data from work-issued devices, vital servers, and even the software that an organization rolls out to its workforce. The purpose of all this collection is to catch what might easily be missed.For instance, SIEMs can collect information about repeated login attempts occurring at 2:00 am from a set of login credentials that belong to an employee who doesn't typically start their day until 8:00 am. SIEMs can also collect whether the login credentials of an employee with typically low access privileges are being used to attempt to log into security systems far beyond their job scope. SIEMs must also take in the data from an Endpoint Detection and Response (EDR) tool, and they can hoover up nearly anything that a security team wants—from printer logs, to firewall logs, to individual uses of PowerShell.But just because a SIEM can collect something, doesn't necessarily mean that it should.Log activity for an organization of 1,000 employees is tremendous, and the collection of frequent activity could bog down a SIEM with noise, slow down a security team with useless data, and rack up serious expenses for a company.Today, on the Lock and Code podcast with host David Ruiz, we speak with Microsoft cloud solution architect Jess Dodson about how companies and organizations can set up, manage, and maintain their SIEMs, along with what advertising pitfalls to avoid when doing their shopping. Plus, Dodson warns about one of the simplest mistakes in trying to save budget—setting up arbitrary data caps on collection that could leave an organization blind.“A small SMB organization … were trying to save costs, so they went and looked at what they were collecting and they found their biggest ingestion point,” Dodson said. “And what their biggest ingestion point was was their Windows security events, and then they looked further and looked for the event IDs that were costing them the most, and so they got rid of those.”Dodson continued:“Problem was the ones they got rid of were their Log On/Log Off events, which I think most people would agree is kind of important from a security perspective.”Tune in today to listen to the full conversation.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good...

Lock and Code
How an AI “artist” stole a woman's face, with Ali Diamond

Lock and Code

Play Episode Listen Later Jul 15, 2024 36:13


Full-time software engineer and part-time Twitch streamer Ali Diamond is used to seeing herself on screen, probably because she's the one who turns the camera on.But when Diamond received a Direct Message (DM) on Twitter earlier this year, she learned that her likeness had been recreated across a sample of AI-generated images, entirely without her consent.On the AI art sharing platform Civitai, Diamond discovered that a stranger had created an “AI image model” that was fashioned after her. The model was available for download so that, conceivably, other members of the community could generate their own images of Diamond—or, at least, the AI version of her. To show just what the AI model was capable of, its creator shared a few examples of what he'd made: There was AI Diamond standing what looked at a music festival, AI Diamond with her head tilted up and smiling, and AI Diamond wearing, what the real Diamond would later describe, as an “ugly ass ****ing hat.”AI image generation is seemingly lawless right now.Popular AI image generators, like Stable Diffusion, Dall-E, and Midjourney, have faced valid criticisms from human artists that these generators are copying their labor to output derivative works, a sort of AI plagiarism. AI image moderation, on the other hand, has posed a problem not only for AI art communities, but for major social media networks, too, as anyone can seemingly create AI-generated images of someone else—without that person's consent—and distribute those images online. It happened earlier this year when AI-generated, sexually explicit images of Taylor Swift were seen by millions of people on Twitter before the company took those images down.In that instance, Swift had the support of countless fans who reported each post they found on Twitter that shared the images.But what happens when someone has to defend themselves against an AI model made of their likeness, without their consent?Today, on the Lock and Code podcast with host David Ruiz, we speak with Ali Diamond about finding an AI model of herself, what the creator had to say about making the model, and what the privacy and security implications are for everyday people whose likenesses have been stolen against their will.For Diamond, the experience was unwelcome and new, as she'd never experimented using AI image generation on herself.“I've never put my face into any of those AI services. As someone who has a love of cybersecurity and an interest in it… you're collecting faces to do what?”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 License

Misterios
EUP (21/06/2024):Criptoterrestres,¿alienígenas entre nosotros?·Cementerios insólitos·Presentación Gran Noche OVNIs 2024

Misterios

Play Episode Listen Later Jun 28, 2024 119:26


El último peldaño (21/06/2024) CRIPTOTERRESTRES: ¿ALIENÍGENAS ENTRE NOSOTROS? Los investigadores Tim Lomas y Brendan Case, ambos de la Universidad de Harvard, y Michael Paul, de la Universidad Tecnológica de Montana, han formulado cuatro posibles hipótesis que podrían explicar los fenómenos fenómenos aéreos no identificados (UAPs). Una de ellas sugiere la existencia de "criptoterrestres", seres extraterrestres que habitan la Tierra y son visitados por otras entidades extraterrestres mediante OVNIs, que actuarían como sus naves de desplazamiento. Analizamos esta información con nuestros colaboradores Francisco Barrera, David Ruiz y el Dr. Israel Ampuero. CEMENTERIOS INSÓLITOS A lo largo de la historia de la humanidad la necesidad de dar respuesta lo que puede ocurrir tras la muerte ha desarrollado creencias y costumbres funerarias en las diferentes civilizaciones y épocas, especialmente en lo que tiene que ver con los cementerios, donde el simbolismo y el mito han constituido un patrimonio cultural de vital importancia. Con el historiador, divulgador y escritor Santi Garcia, autor entre otras obras de Murcia Región sobrenatural, Cartagena sobrenatural o Cementerios insólitos de Cartagena y miembro de la Sociedad Española de Antropología y Tradiciones Populares, hablamos sobre los cementerios y sus curiosidades. PRESENTACIÓN XXXIV GRAN NOCHE DE LOS OVNIS En la madrugada del 26 al 27 de julio volveremos a vigilar los cielos a la búsqueda de Objetos Voladores No Identificados, en la XXXIV edición de LA GRAN NOCHE DE LOS OVNIS, la “Alerta OVNI” de nuestro programa en la que contaremos con grandes expertos en el terreno de la ufología y el misterio y a la que os invitamos, un año mas, a participar. Enviadnos vuestro nombre, lugar en el que vais a estar y un teléfono de contacto al correo: escaleradelmisterio@rtrm.es o al whatsapp 644823513 (con el prefijo +34 si estáis fuera de España). Dirección y presentación: Joaquín Abenza. Con la colaboración de María José Garnández Blog del programa: http://www.elultimopeldano.blogspot.com.es/ Programa emitido en Onda Regional de Murcia

Lock and Code
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries

Lock and Code

Play Episode Listen Later Jun 17, 2024 39:22


Lock and Code
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox

Lock and Code

Play Episode Listen Later Jun 3, 2024 51:26


This is a story about how the FBI got everything it wanted.For decades, law enforcement and intelligence agencies across the world have lamented the availability of modern technology that allows suspected criminals to hide their communications from legal scrutiny. This long-standing debate has sometimes spilled into the public view, as it did in 2016, when the FBI demanded that Apple unlock an iPhone used during a terrorist attack in the California city of San Bernardino. Apple pushed back on the FBI's request, arguing that the company could only retrieve data from the iPhone in question by writing new software with global consequences for security and privacy.“The only way to get information—at least currently, the only way we know,” said Apple CEO Tim Cook, “would be to write a piece of software that we view as sort of the equivalent of cancer.”The standoff held the public's attention for months, until the FBI relied on a third party to crack into the device.But just a couple of years later, the FBI had obtained an even bigger backdoor into the communication channels of underground crime networks around the world, and they did it almost entirely off the radar.It all happened with the help of Anom, a budding company behind an allegedly “secure” phone that promised users a bevvy of secretive technological features, like end-to-end encrypted messaging, remote data wiping, secure storage vaults, and even voice scrambling. But, unbeknownst to Anom's users, the entire company was a front for law enforcement. On Anom phones, every message, every photo, every piece of incriminating evidence, and every order to kill someone, was collected and delivered, in full view, to the FBI.Today, on the Lock and Code podcast with host David Ruiz, we speak with 404 Media cofounder and investigative reporter Joseph Cox about the wild, true story of Anom. How did it work, was it “legal,” where did the FBI learn to run a tech startup, and why, amidst decades of debate, are some people ignoring the one real-life example of global forces successfully installing a backdoor into a company?The public…and law enforcement, as well, [have] had to speculate about what a backdoor in a tech product would actually look like. Well, here's the answer. This is literally what happens when there is a backdoor, and I find it crazy that not more people are paying attention to it.Joseph Cox, author, Dark Wire, and 404 Media cofounderTune in today.Cox's investigation into Anom, presented in his book titled Dark Wire, publishes June 4.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music:...

La W Radio con Julio Sánchez Cristo
Padre de Carlos David Ruiz sobre tragedia en el Baum: “Fiscalía debe investigar las tesis”

La W Radio con Julio Sánchez Cristo

Play Episode Listen Later May 28, 2024 5:01


En diálogo con La W, Álvaro Ruiz, padre de Carlos David Ruiz, compartió detalles sobre la búsqueda de su hijo y aseguró que intentaron localizarlo durante la noche y la mañana siguiente. 

La W Radio con Julio Sánchez Cristo
Caso Carlos David Ruiz: esta es la cronología de la tragedia en el Baum Festival

La W Radio con Julio Sánchez Cristo

Play Episode Listen Later May 28, 2024 3:42


Cuando se estaba desmantelando el escenario del Baum Festival, los integrantes del equipo encargado hallaron el cuerpo de Carlos David Ruiz.

La W Radio con Julio Sánchez Cristo
Los detalles clave de la muerte de Carlos David Ruiz tras el Baum en Corferias

La W Radio con Julio Sánchez Cristo

Play Episode Listen Later May 27, 2024 2:45


El cuerpo de Carlos David Ruiz fue hallado en horas de la tarde del domingo 26 de noviembre después de desaparecer el día anterior a la salida del Baum Festival.

La W Radio con Julio Sánchez Cristo
Los detalles clave de la muerte de Carlos David Ruiz tras el Baum en Corferias

La W Radio con Julio Sánchez Cristo

Play Episode Listen Later May 27, 2024 2:41


El cuerpo de Carlos David Ruiz fue hallado en horas de la tarde del domingo 26 de mayo después de desaparecer el día anterior a la salida del Baum Festival.

Lock and Code
Your vacation, reservations, and online dates, now chosen by AI

Lock and Code

Play Episode Listen Later May 20, 2024 47:37


The irrigation of the internet is coming.For decades, we've accessed the internet much like how we, so long ago, accessed water—by traveling to it. We connected (quite literally), we logged on, and we zipped to addresses and sites to read, learn, shop, and scroll. Over the years, the internet was accessible from increasingly more devices, like smartphones, smartwatches, and even smart fridges. But still, it had to be accessed, like a well dug into the ground to pull up the water below.Moving forward, that could all change.This year, several companies debuted their vision of a future that incorporates Artificial Intelligence to deliver the internet directly to you, with less searching, less typing, and less decision fatigue. For the startup Humane, that vision includes the use of the company's AI-powered, voice-operated wearable pin that clips to your clothes. By simply speaking to the AI pin, users can text a friend, discover the nutritional facts about food that sits directly in front of them, and even compare the prices of an item found in stores with the price online.For a separate startup, Rabbit, that vision similarly relies on a small, attractive smart-concierge gadget, the R1. With the bright-orange slab designed in coordination by the company Teenage Engineering, users can hail an Uber to take them to the airport, play an album on Spotify, and put in a delivery order for dinner.Away from physical devices, The Browser Company of New York is also experimenting with AI in its own web browser, Arc. In February, the company debuted its endeavor to create a “browser that browses for you” with a snazzy video that showed off Arc's AI capabilities to create unique, individualized web pages in response to questions about recipes, dinner reservations, and more.But all these small-scale projects, announced in the first month or so of 2024, had to make room a few months later for big-money interest from the first ever internet conglomerate of the world—Google. At the company's annual Google I/O conference on May 14, VP and Head of Google Search Liz Reid pitched the audience on an AI-powered version of search in which “Google will do the Googling for you.”Now, Reid said, even complex, multi-part questions can be answered directly within Google, with no need to click a website, evaluate its accuracy, or flip through its many pages to find the relevant information within.This, it appears, could be the next phase of the internet… and our host David Ruiz has a lot to say about it.Today, on the Lock and Code podcast, we bring back Director of Content Anna Brading and Cybersecurity Evangelist Mark Stockley to discuss AI-powered concierges, the value of human choice when so many small decisions could be taken away by AI, and, as explained by Stockley, whether the appeal of AI is not in finding the “best” vacation, recipe, or dinner reservation, but rather the best of anything for its user.“It's not there to tell you what the best chocolate chip cookie in the world is for everyone. It's there to help you figure out what the best chocolate chip cookie is for you, on a Monday evening, when the weather's hot, and you're hungry.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at

Lock and Code
Tracing what went wrong in 2012 for today's teens, with Dr. Jean Twenge

Lock and Code

Play Episode Listen Later May 6, 2024 45:00


You've likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The sleep still there after waking. The edges of your calm slowly fraying.After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … not so great. Obviously, the effects of this are compounded by the fact that the internet that was built after the invention of the smartphone is a very different internet than the one before—supercharged with algorithms that get you to click more, watch more, buy more, and rest so much less.But for one group, in particular, across the world, the impact of smartphones and constant social media may be causing an unprecedented mental health crisis: Young people.According to the American College Health Association, the percentage of undergraduates in the US—so, mainly young adults in college—who were diagnosed with anxiety increased 134% since 2010. In the same time period for the same group, there was in increase in diagnoses of depression by 106%, ADHD by 72%, bipolar by 57%, and anorexia by 100%.That's not all. According to a US National Survey on Drug Use and Health, the prevalence of anxiety in America increased for every age group except those over 50, again, since 2010. Those aged 35 – 49 experienced a 52% increase, those aged 26 – 34 experienced a 103% increase, and those aged 18 – 25 experienced a 139% increase.This data, and much more, was cited by the social psychologist and author Jonathan Haidt, in debuting his latest book, “The Anxious Generation: How the Great Rewiring of Childhood Is Causing an Epidemic of Mental Illness.” In the book, Haidt examines what he believes is a mental health crisis unique amongst today's youth, and he proposes that much of the crisis has been brought about by a change in childhood—away from a “play-based” childhood and into a “phone-based” one.This shift, Haidt argues, is largely to blame for the increased rates of anxiety, depression, suicidality, and more.And rather than just naming the problem, Haidt also proposes five solutions to turn things around:Give children far more time playing with other children. Look for more ways to embed children in stable real-world communities. Don't give a smartphone as the first phone.Don't give a smartphone until high school. Delay the opening of accounts on nearly all social media platforms until the beginning of high school (at least).But while Haidt's proposals may feel right—his book has spent five weeks on the New York Times Best Seller list—some psychologists disagree.Writing for the outlet Platformer, reporter Zoe Schiffer spoke with multiple behavioral psychologists who alleged that Haidt's book cherry-picks survey data, ignores mental health crises amongst adults, and over-simplifies a complex problem with a blunt solution. Today, on the Lock and Code podcast with host David Ruiz, we speak with Dr. Jean Twenge to get more clarity on the situation: Is there a mental health crisis amongst today's teens? Is it unique to their generation? And can it really be traced to the use of smartphones and social media?According to Dr. Twenge, the answer to all those questions is, pretty much, “Yes.” But, she said, there's still some hope to be found.“This is where the argument around smartphones and social media being behind the adolescent mental health crisis actually has, kind of paradoxically, some optimism to it. Because if that's the cause, that means we...

Lock and Code
Picking fights and gaining rights, with Justin Brookman

Lock and Code

Play Episode Listen Later Apr 22, 2024 46:13


Our Lock and Code host, David Ruiz, has a bit of an apology to make:“Sorry for all the depressing episodes.”When the Lock and Code podcast explored online harassment and abuse this year, our guest provided several guidelines and tips for individuals to lock down their accounts and remove their sensitive information from the internet, but larger problems remained. Content moderation is failing nearly everywhere, and data protection laws are unequal across the world.When we told the true tale of a virtual kidnapping scam in Utah, though the teenaged victim at the center of the scam was eventually found, his family still lost nearly $80,000.And when we asked Mozilla's Privacy Not Included team about what types of information modern cars can collect about their owners, we were entirely blindsided by the policies from Nissan and Kia, which claimed the companies can collect data about their customers' “sexual activity” and “sex life.”(Let's also not forget about that Roomba that took a photo of someone on a toilet and how that photo ended up on Facebook.)In looking at these stories collectively, it can feel like the everyday consumer is hopelessly outmatched against modern companies. What good does it do to utilize personal cybersecurity best practices, when the companies we rely on can still leak our most sensitive information and suffer few consequences? What's the point of using a privacy-forward browser to better obscure my online behavior from advertisers when the machinery that powers the internet finds new ways to surveil our every move?These are entirely relatable, if fatalistic, feelings. But we are here to tell you that nihilism is not the answer.Today, on the Lock and Code podcast, we speak with Justin Brookman, director of technology policy at Consumer Reports, about some of the most recent, major consumer wins in the tech world, what it took to achieve those wins, and what levers consumers can pull on today to have their voices heard.Brookman also speaks candidly about the shifting priorities in today's legislative landscape. “One thing we did make the decision about is to focus less on Congress because, man, I'll meet with those folks so we can work on bills, [and] there'll be a big hearing, but they've just failed to do so much.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and...

The Ethical Life
Why should we care about privacy in a digital world?

The Ethical Life

Play Episode Listen Later Apr 10, 2024 52:56


Episode 137: With more data accumulating about us each day, hosts Richard Kyte and Scott Rada talk about whether privacy is still important — or even possible. Links to stories discussed during the podcast: What Gen Z really cares about when it comes to privacy, David Ruiz, Malwarebytes AI hustlers stole women’s faces to put in ads. The law can’t help them, by Nitasha Tiku and Pranshu Verma, The Washington Post The rise of the worker productivity score, Jodi Kantor and Arya Sundaram, The New York Times About the hosts: Scott Rada is social media manager with Lee Enterprises, and Richard Kyte is the director of the D.B. Reinhart Institute for Ethics in Leadership at Viterbo University in La Crosse, Wis. His forthcoming book, "Finding Your Third Place," will be published by Fulcrum Books.

Miami Total Futbol Radio
Ruiz's Red, Post-Game Skirmish, Messi Concerns | Episode 181

Miami Total Futbol Radio

Play Episode Listen Later Apr 5, 2024 71:34


Inter Miami was on the way to a big first leg win in its Concacaf Champions Cup quarterfinals series vs. Monterrey, but a needless red card doomed the South Florida side to a painful defeat. Co-hosts Franco Panizo and Jose Armando analyze Inter Miami's 2-1 home loss to Monterrey, criticize David Ruiz's game-changing ejection, discuss Lionel Messi's concerning health, and more.

Earth Ancients
The Hybrid Humans from Nazca Peru

Earth Ancients

Play Episode Listen Later Mar 25, 2024 81:45


NEW, PREVIOUSLY UNKNOWN SPECIES OF 1,000-YEAR-OLD HUMANOIDS RECENTLY DISCOVERED IN PERU, TO BE PRESENTED TO THE MEDIA BY UNIQUE TEAM OF SCIENTISTS, UFOLOGISTS AND AWARD-WINNING INVESTIGATIVE FILMMAKERS DURING LOS ANGELES PRESS CONFERENCE TO BE LIVE STREAMED AROUND THE WORLD   Los Angeles, March 12, 2024 – In January 2024, two award-winning, Los Angeles-based investigative filmmakers, Serena DC and Michael Mazzola, took a trip together down to Mexico City to prove that the “alien mummies” which had been presented by iconic Mexican Investigator Jaime Maussan in Mexico City on September 13, 2023, before the Mexican Congress were, indeed fakes. Much to their surprise, DC and Mazzola discovered that the bodies Mr. Maussan had presented there that day were, in fact, A NEW SPECIES OF HUMANOID PREVIOUSLY UNKNOWN TO SCIENCE! Following Mr. Maussan's presentation on 9/13/23 in Mexico City, Peruvian officials went to great lengths to discredit his “bodies” by conflating them with “other bodies” – dolls, in fact -- which had been created by an artist. Then claiming that Mr. Maussan presented “dolls” at his event, the Peruvian Ministry of Culture succeeded in generating a massive amount of negative media attention around the world, discrediting both the legitimacy of Mr. Maussan's “bodies” and Mr. Maussan, himself. Today, at a Global Press Conference at The Mondrian Hotel on Sunset Blvd. in West Hollywood, CA, Serena DC and Michael Mazzola were joined by Mr. Jaime Maussan, inventor Adam Michael Curry, Peruvian Journalist Jois Mantilla, Dr. José de Jesús Zalce Benítez, Dr. Roger Zuñiga, Dr. Ricardo Manuel Anicama Pardo, Manuel Natividad Cruz Torres, Dr Juan Jose Rodriguez Lazo, Dr. Edgar Martin Hernandez, Dr. David Ruiz, and Dr. Rafael Arcangel Berrocal Ramos who collectively refuted the claims of “fake alien bodies.” This unique Team presented to the Media and to the World that Mr. Maussan's original two bodies, along with an additional five bodies discovered recently in a cave in Peru, HAVE BEEN SCIENTIFICALLY VERIFIED TO BE A PREVIOUSLY UNKNOWN SPECIES OF HUMANOIDS LIVING ON EARTH, 1,000 YEARS AGO. During the Press Conference, the Team live streamed scientists from four locations in Mexico and Peru who demonstrated in real time scientific analyses and live body scans of these never-seen-before bodies. Some of these bodies are even believed to contain some ancient technology, for which Metallurgical Expert and Engineer Dr Manuel Torres provided expert testimony. “This is a once in a lifetime press event, where reporters will be the first people on Earth to see these incredible beings and judge for themselves if they were once living creatures or ‘fakes.' After we present the mind-blowing forensic evidence behind these creatures, the true origins of these mysterious creatures will be open for discussion,” said DC and Mazzola. Regarding the September 2023 revelation of “alien mummies,” acclaimed Astrophysicist Neil Degrasse Tyson, on February 29, 2024, during an interview with 60 Minutes' Lesley Stahl, said, “We have to at least bring out the evidence. They did that in Mexico. That was an important first step – you present the evidence, then you send samples of it to other labs to verify or falsify your claims. That's how science works.” “We went down to Mexico to prove that these now infamous ‘alien mummies' were nothing but a fraud,” Serena DC and Michael Mazzola said. “But we immediately became aware that Peruvian officials and the media were pushing this as a fraud, not Jaime Maussan and not these scientists. Our press conference today is being presented to address all of the lies and misinformation about this topic that have been reported, around the world, since last September. Our goal is to hopefully set the record straight. These bodies are a significant archeological find – they are either an extinct, unknown species or the result of various genetic experiments from 1000 years ago, or something else we haven't considered. But they aren't dolls. And how could early humans have performed those genetic experiments 1000 years ago?” DC and Mazzola continue, “We have teamed up with a group of brilliant scientists, all of whom have been on the same quest as us – to discover the true origins of this new species. At today's press conference, our team of decorated scientists and forensics experts will be unveiling these ancient bodies, some of which stand about 4-feet tall. One of these scientists is Dr Jose Zlace, who has pointed out that “these tridactyl bodies correspond to biological and organic beings, with a harmonious and functional anatomical structure without traces of alteration or manipulation, being completely authentic, the DNA results corroborate their authenticity and at the same time demonstrate their differentiation to any Known species in Darwin's Taxonomy." Therefore, for Dr. Zalce we are faced with extraordinary bodies that could represent a paradigm shift in what is known and described by science as we currently know it. Dr Zlace states: "We need to protect these bodies from their natural degradation in order to preserve them and further deepen their study and understanding by the world's scientific community. These bodies of 3 different species are something extraordinary that must be treated with the necessary respect and objectivity so that humanity understands that we are facing something that could completely change our own conception and understanding as human beings.”  ABOUT THE BODIES: The bodies of several unidentified species recently discovered in a remote cave in South America have just been analyzed by American scientists who are ready to come forward with their shocking findings. The bodies, which have been carbon dated to be around 1,000 years old, have had extensive scans and DNA testing done to them. The results of these tests have revealed these facts: ** The bodies appear to be the result of highly sophisticated genetic experiments that were not possible to be performed by early humans in 1000 AD. ** Mysterious DNA: Analysis indicates that 30% of their genetic material remains unidentified, presenting a profound mystery about their existence and origin.** Unique Physiological Traits: Exhibiting tridactyl hands and feet, alongside atypical anthropometric features – these beings challenge the very framework of biological evolution. Scientists are convinced that they have discovered a brand-new species of beings who were sentient, intelligent and who walked the Earth 1,000 years ago. However, there is no record of these creatures in the history books, leaving the scientific community with more questions than answers. PRESENT AT TODAY'S PRESS EVENT: Iconic Mexican Journalist Jaime Maussan Award Winning Investigative Filmmaker Serena DC Award Winning Investigative Filmmaker Michael Mazzola Journalist Jois Mantilla Dr. José de Jesús Zalce Benítez:Lieutenant Colonel of the Mexican Navy; Naval Surgeon, former Head of Health Research and Development for the Mexican Navy. Dr. Roger Zuñiga:Anthropologist/Research Director, University of IcaLed 12-person scientific team investigating the bodies Dr. Ricardo Manuel Anicama Pardo:Head, Neck, and Maxillofacial SurgeonCurrent Chief of the Head and Neck Surgery Department at the National Hospital Edgardo Rebagliati Martins Manuel Natividad Cruz Torres:Engineer and Metalurgical expert who analyzed the “technology” inside the bodies Dr Juan Jose Rodriguez Lazo:Renowned expert in hand micro-surgery Dr. Edgar Martin HernandezPhD Biologist Adam Michael CurryConsciousness researcher, technology executive, and frontier science advocate. Dr. David Ruiz:Plastic Surgeon & Forensic Expert Dr. Rafael Arcangel Berrocal Ramos:Lawyer who will comment on the judicial gaps in the constitutional framework around the unidentified anomalous bodies Credentials of Dr. José de Jesús Zalce Benítez: • Lieutenant Colonel of the Mexican Navy.• Naval Surgeon, graduate of the Naval Medical School of the Ministry of the Navy, Mexican Navy.• Master's Degree in Forensic Medicine, graduate of the Military School of Health Graduates of the Mexican Army.• Diploma in Aerospace Medicine, Mexican Air Force of the Mexican Army.• Diploma in Forensic Anthropology, National School of Anthropology and History.• Medical Strategic Leadership Program, Center of Medical Excellence, United States Army, Fort Sam San Antonio, Texas, USA.• Former Director of the Institute of Health Sciences Research of the Ministry of the Navy.• Former Director of Medical Procurement and Supplies of the General Directorate of Naval Health of the Ministry of the Navy.• Former Deputy Director of Inspection of Naval Health Establishments of the Inspection and General Comptroller of the Navy.• Former Head of Legal and Forensic Medicine of the Mexican Navy.• Forensic Medical Expert of the General Military Justice Prosecutor's Office.• Forensic Medical Expert and medical expert for Naval command consultancy.• Former Advisor to the Naval Intelligence Unit and the Special Operations Unit of the Navy. Dr. José de Jesús Zalce Benítez's summary of ANALYSIS OF THE NAZCA BODIES: - Body known as Maria, approximately 168 centimeters tall, with tridactyl hands and feet with 5 phalanges on each finger, with linear fingerprints on the fingers, without apparent traces of mammary glands, navel, or external genitals, elongated skull vertically with approximately 30% greater volume capacity inside, eye sockets larger than the average recorded in an adult human, without apparent auricular pavilion. The following studies were conducted: X-rays, 64 and 128 slice computed tomography with 3D reconstruction, carbon 14 dating, and DNA analysis with the following result: 30% unknown and 70% with diverse contributions from unrelated hominids, without traces of alteration on its surface neithBecome a supporter of this podcast: https://www.spreaker.com/podcast/earth-ancients--2790919/support.

Lock and Code
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker

Lock and Code

Play Episode Listen Later Mar 25, 2024 45:35


Few words apply as broadly to the public—yet mean as little—as “home network security.”For many, a “home network” is an amorphous thing. It exists somewhere between a router, a modem, an outlet, and whatever cable it is that plugs into the wall. But the idea of a “home network” doesn't need to intimidate, and securing that home network could be simpler than many folks realize.For starters, a home network can be simply understood as a router—which is the device that provides access to the internet in a home—and the other devices that connect to that router. That includes obvious devices like phones, laptops, and tablets, and it includes “Internet of Things” devices, like a Ring doorbell, a Nest thermostat, and any Amazon Echo device that come pre-packaged with the company's voice assistant, Alexa. There are also myriad “smart” devices to consider: smartwatches, smart speakers, smart light bulbs, don't forget the smart fridges.If it sounds like we're describing a home network as nothing more than a “list,” that's because a home network is pretty much just a list. But where securing that list becomes complicated is in all the updates, hardware issues, settings changes, and even scandals that relate to every single device on that list.Routers, for instance, provide their own security, but over many years, they can lose the support of their manufacturers. IoT devices, depending on the brand, can be made from cheap parts with little concern for user security or privacy. And some devices have scandals plaguing their past—smart doorbells have been hacked and fitness trackers have revealed running routes to the public online.This shouldn't be cause for fear. Instead, it should help prove why home network security is so important.Today, on the Lock and Code podcast with host David Ruiz, we're speaking with cybersecurity and privacy advocate Carey Parker about securing your home network.Author of the book Firewalls Don't Stop Dragons and host to the podcast of the same name, Parker chronicled the typical home network security journey last year and distilled the long process into four simple categories: Scan, simplify, assess, remediate.In joining the Lock and Code podcast yet again, Parker explains how everyone can begin their home network security path—where to start, what to prioritize, and the risks of putting this work off, while also emphasizing the importance of every home's router:Your router is kind of the threshold that protects all the devices inside your house. But, like a vampire, once you invite the vampire across the threshold, all the things inside the house are now up for grabs.Carey ParkerTune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen...

Lock and Code
Going viral shouldn't lead to bomb threats, with Leigh Honeywell

Lock and Code

Play Episode Listen Later Mar 11, 2024 42:08


A disappointing meal at a restaurant. An ugly breakup between two partners. A popular TV show that kills off a beloved, main character.In a perfect world, these are irritations and moments of vulnerability. But online today, these same events can sometimes be the catalyst for hate. That disappointing meal can produce a frighteningly invasive Yelp review that exposes a restaurant owner's home address for all to see. That ugly breakup can lead to an abusive ex posting a video of revenge porn. And even a movie or videogame can enrage some individuals into such a fury that they begin sending death threats to the actors and cast mates involved.Online hate and harassment campaigns are well-known and widely studied. Sadly, they're also becoming more frequent.In 2023, the Anti-Defamation League revealed that 52% of American adults reported being harassed online at least some time in their life—the highest rate ever recorded by the organization and a dramatic climb from the 40% who responded similarly just one year earlier. When asking teens about recent harm, 51% said they'd suffered from online harassment in strictly the 12 months prior to taking the survey itself—a radical 15% increase from what teens said the year prior.The proposed solutions, so far, have been difficult to implement.Social media platforms often deflect blame—and are frequently shielded from legal liability—and many efforts to moderate and remove hateful content have either been slow or entirely absent in the past. Popular accounts with millions of followers will, without explicitly inciting violence, sometimes draw undue attention to everyday people. And the increasing need to have an online presence for teens—even classwork is done online now—makes it near impossible to simply “log off.”Today, on the Lock and Code podcast with host David Ruiz, we speak with Tall Poppy CEO and co-founder Leigh Honeywell, about the evolution of online hate, personal defense strategies that mirror many of the best practices in cybersecurity, and the modern risks of accidentally becoming viral in a world with little privacy.“It's not just that your content can go viral, it's that when your content goes viral, five people might be motivated enough to call in a fake bomb threat at your house.”Leigh Honeywell, CEO and co-founder of Tall PoppyTune in today. You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself

Lock and Code
How to make a fake ID online, with Joseph Cox

Lock and Code

Play Episode Listen Later Feb 26, 2024 36:31


For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can only assume, completing nation-state spycraft for embedded informants and double agents.In 2024, that's changed, as the uses for fake IDs have become enmeshed with the internet.Want to sign up for a cryptocurrency exchange where you'll use traditional funds to purchase and exchange digital currency? You'll likely need to submit a photo of your real ID so that the cryptocurrency platform can ensure you're a real user. What about if you want to watch porn online in the US state of Louisiana? It's a niche example, but because of a law passed in 2022, you will likely need to submit, again, a photo of your state driver's license to a separate ID verification mobile app that then connects with porn sites to authorize your request.The discrepancies in these end-uses are stark; cryptocurrency and porn don't have too much in common with Red Bull vodkas and, to pick just one example, a Guatemalan coup. But there's something else happening here that reveals the subtle differences between yesteryear's fake IDs and today's, which is that modern ID verification doesn't need a physical ID card or passport to work—it can sometimes function only with an image.Last month, the technology reporting outfit 404 Media investigated an online service called OnlyFake that claimed to use artificial intelligence to pump out images of fake IDs. By filling out some bogus personal information, like a made-up birthdate, height, and weight, OnlyFake would provide convincing images of real forms of ID, be they driver's licenses in California or passports from the US, the UK, Mexico, Canada, Japan, and more. Those images, in turn, could then be used to fraudulently pass identification checks on certain websites.When 404 Media co-founder and reporter Joseph Cox learned about OnlyFake, he tested whether an image of a fake passport he generated could be used to authenticate his identity with an online cryptocurrency exchange.In short, it did.By creating a fraudulent British passport through OnlyFake, Joseph Cox—or as his fake ID said, “David Creeks”—managed to verify his false identity when creating an account with the cryptocurrency market OKX.Today, on the Lock and Code podcast with host David Ruiz, we speak with Cox about the believability of his fake IDs, the capabilities and limitations of OnlyFake, what's in store for the future of the site— which went dark after Cox's report—and what other types of fraud are now dangerously within reach for countless threat actors.Making fake IDs, even photos of fake IDs, is a very particular skill set—it's like a trade in the criminal underground. You don't need that anymore.Joseph Cox, 404 Media co-founderTune in today.You can also find us on Apple Podcasts, Spotify, and