Podcasts about Fido

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Share on LinkedIn
Copy link to clipboard
  • 691PODCASTS
  • 1,172EPISODES
  • 40mAVG DURATION
  • 1DAILY NEW EPISODE
  • Jun 30, 2022LATEST

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about Fido

Show all podcasts related to fido

Latest podcast episodes about Fido

Root Causes: A PKI and Security Podcast
Root Causes 230: What Is Apple Passkey?

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Jun 30, 2022 15:54


Apple recently announced its Passkey functionality, which will allow passwordless authentication between Apple devices and supporting web services through key exchange. In this episode we discuss how this works, the user experience, the significance of FIDO and WebAuthn, and implications for consumer-facing sites.

My Zen Pet
Calm Fearful Fido During Fireworks

My Zen Pet

Play Episode Listen Later Jun 29, 2022 8:28


DOG GONE CALM, Vol. 1 FULL ALBUM ON ALL STREAMING CHANNELS:Click to listen on your favorite streaming appDOG GONE CALM FIREWORKS PREP CONCERTJuly 3 at 2 PT / 5 ET  Dogs invited on Zoom JOIN THE DOG  GONE CALM CLUB WAITLIST:WaitlistMUSIC ON THIS EPISODE:In full: Massenet Mélodie arranged for left hand only by Lisa Spector Excerpts (intro and outro) Vivaldi Largo Winter from Four Seasons, Arranged for Left Hand by Lisa SpectorHOW TO LEAVE A REVIEW:Gina shows you here YOUR TREAT AT MYZENPET.COM:Training Tips for Canine Sound TherapyPET LOVER'S SUMMIT: June 27 - July 17Featuring Creating A Healthy Soundscape For Your Pet with Lisa Spector on July 14OTHER LINKS:Instagram: @My_Zen_Pet   @LisaSpectorPianoFacebook:       My Zen Pet      LisaSpectorPianistPodcast Website: MyZenPet.com/podcastLisa Spector's Website: LisaSpector.comClubhouse: @lisaspectorYouTube: LisaSpector

The Cloudcast
A 2022 Mid-Year Cloud Update

The Cloudcast

Play Episode Listen Later Jun 29, 2022 55:22


Aaron, Brian and Brandon Whichard (@bwhichard, Co-Host of @SoftwareDefTalk) talk about all the big stories, trends and transactions in the cloud in the first half of 2022. SHOW: 630CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:New Relic (homepage)Services down? New Relic offers full stack visibility with 16 different monitoring products in a single platform.CloudZero - Cloud Cost Intelligence for Engineering TeamsSHOW NOTES:Software Defined Talk - go subscribe to Brandon's podcast!Topic 1 - VMware WTF!?Would VMware be a different company if it was never acquired by EMC/Dell?Nearly every successful Enterprise Software company becomes legacy at some point, was this always VMware's destiny?If VMware was an independent company, would the rise of Containers (Docker) have been any different?Should some other company buy VMware and if so, who?Topic 2 - I really liked the recent analysis on Clouded Judgement Substack about subscription vs. consumption in an economic downturn. (link) If SaaS is the future, does the consumption model really matter as long as value is there?Topic 3 - Is there any aspect of the crypto industry that hasn't been proven to be a sham this year? Decentralized (no). DAOs for governance (no). Controlled by the community (no). Secure (no). Not linked to fiat currencies (no). Good technology (no). A16z propaganda (no).Topic 4 - Are passwords finally dying? Companies like strongDM/Teleport are pushing certificate based authentication and FIDO is gaining adoption in Windows and macOS. Will there be a time when we don't need passwords?Topic 5 - We always talk about skills and keeping up with the industry waves on the show. SaaS is less about building skills and more about operating. How does you get/keep up to speed about SaaS and what's the future? Is the Cloud Architect going the way of the Infrastructure Admin?Topic 6 - Did the big 3 cloud providers all fire their marketing teams? I feel like there hasn't been one big announcement from any of them this year. FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnetDev InterruptedBehind every successful tech company is an engineering org. We tell their story.Listen on: Apple Podcasts Spotify

Help Me With HIPAA
No More Passwords FIDO - Ep 361

Help Me With HIPAA

Play Episode Listen Later Jun 24, 2022 49:39


We use passwords for everything. Creating a unique, secure password for every website and application is hard to remember, right? So, why hasn't someone figured out how to get rid of passwords? Well, today we are going to talk about the FIDO password killer solution. More info at HelpMeWithHIPAA.com/361

No Tenemos Nombres Bíblicos
En la mía - T3E12 - No Tenemos Nombres Bíblicos

No Tenemos Nombres Bíblicos

Play Episode Listen Later Jun 23, 2022 71:23


Somos Gime (@olivaresgimena), John (@joango1985) y Leo (@leandrin84); junto con Fido (@ismaeltoledook) en la operación técnica y Samy (@sammalen) en las redes, hacemos el mejor podcast de toda Latinoamérica unida. Seguinos en nuestras redes sociales: Instagram: @notenemosnombres Youtube: No Tenemos Nombres Bíblicos Facebook: facebook.com/notenemosnombresbiblicos Este podcast se realiza con el apoyo de la iglesia Centro Cristiano Amanecer en la localidad de El Palomar y de los pastores Jorge y Juana Di Nápoli. Si querés conocernos, podes entrar en: Facebook: /CCAmanecerOficial/ Instagram: @centrocristianoamanecer Youtube: Centro Cristiano Amanecer Ficha Técnica: Conducción, ideas y Guión: Gimena Olivares, Joan Godoy y Leandro Ferreiro. Operación Técnica, Mezcla y Edición: Ismael "Fido" Toledo. Grabado en estudios "Selah Producciones" en la localidad de El Palomar, Buenos Aires.

Hardware Podcast
Adios a las contraseñas en 2023 con FIDO

Hardware Podcast

Play Episode Listen Later Jun 22, 2022 11:12


AFILIADOS podcastSuscribete al podcast en: https://pod.link/1529497823Mis links https://allmylinks.com/jossgreenNord VPN patrocina este contenido: https://bit.ly/3FC4nsISi vives en España o Estados Unidos puedes apoyar al podcast comprando en Amazon, a ti no se te cobra nada extra y a mi me llega una pequeña comisión Amazon USA https://amzn.to/3kW76oRAmazon España https://amzn.to/3hahpV5Si lo tuyo son las Criptomonedas te paso mis enlaces de AfiliadoBinance: https://accounts.binance.me/es-LA/register?ref=310748129Lite https://www.binance.com/es-LA/activity/referral/offers/claim?ref=CPA_00PK2DHKU6ID de Referido: 310748129Bitso https://bitso.com/?ref=cthwlBitsgap, el robot que compra y vende criptos: https://bitsgap.com/?ref=1f706da1-botCada que compres usa el enlace que yo estaré eternamente agradecido :)

JossGreen Live
Adios a las contraseñas en 2023 con FIDO

JossGreen Live

Play Episode Listen Later Jun 22, 2022 11:12


AFILIADOS podcastSuscribete al podcast en: https://pod.link/1529497823Mis links https://allmylinks.com/jossgreenNord VPN patrocina este contenido: https://bit.ly/3FC4nsISi vives en España o Estados Unidos puedes apoyar al podcast comprando en Amazon, a ti no se te cobra nada extra y a mi me llega una pequeña comisión Amazon USA https://amzn.to/3kW76oRAmazon España https://amzn.to/3hahpV5Si lo tuyo son las Criptomonedas te paso mis enlaces de AfiliadoBinance: https://accounts.binance.me/es-LA/register?ref=310748129Lite https://www.binance.com/es-LA/activity/referral/offers/claim?ref=CPA_00PK2DHKU6ID de Referido: 310748129Bitso https://bitso.com/?ref=cthwlBitsgap, el robot que compra y vende criptos: https://bitsgap.com/?ref=1f706da1-botCada que compres usa el enlace que yo estaré eternamente agradecido :)

Craig Peterson's Tech Talk
How Private is Crypto? What About WhatsApp and Signal?

Craig Peterson's Tech Talk

Play Episode Listen Later Jun 18, 2022 82:20


How Private is Crypto? What About WhatsApp and Signal? Cryptocurrencies were thought to be like the gold standard of security, of having your information stay private. Maybe you don't want to use regular currency and transactions. It's all changed. [Automated transcript follows.] [00:00:14] We have had such volatility over the years when it comes to what are called cryptocurrencies. [00:00:21] Now I get a lot of questions about cryptocurrencies. First of all, let me say, I have never owned any cryptocurrencies and I do not own any crypto assets at all. Most people look at crypto currencies and think of a couple of things. First of all, an investment. An investment is something that you can use or sell, right? [00:00:42] Typically investments you don't really use. It's like a house. Is it an investment? Not so much. It's more of a liability, but people look at it and say listen, it went from what was a 10,000. Bitcoins to buy a pizza to, it went up to $50,000 per Bitcoin. There's a pretty big jump there. [00:01:03] And yeah, it was pretty big. And of course, it's gone way down and it's gone back up and it's gone down. It's gone back up. But the idea of any kind of currency is can you do anything with the currency? You can take a dollar bill and go and try and buy a cup of coffee. Okay. A $10 bill and buy a cup of coffee in most places anyways. [00:01:26] That sounds like a good idea. I could probably use a cup of coffee right now and get a tickle on my throat. I hate that. But if you have something like Bitcoin, where can you spend it? You might remember Elon Musk was saying, yeah, you can use Bitcoin to buy a Tesla. Also Wikipedia would accept donations. [00:01:45] Via Bitcoin, there were a number of places online that you could use. Bitcoin. In fact, there's a country right now in south central America that has Bitcoin as its currency. That's cool too. When you think about it, what is, so what are you gonna do? Latin American country? I'm trying to remember what it is. [00:02:05] Oh yeah. It's all Salvador. The first country in the world to adopt Bitcoin is an official legal tender. Now there's a number of reasons they're doing that and he can do it basically. If you got a dictator, you can do almost anything you want to. So in El Salvador, they've got apps that you can use and you can go and buy a tree taco using Bitcoin using their app. [00:02:31] So there you go. If you have Bitcoin, you can go to El Salvador and you can buy all of the tacos and other basic stuff you might wanna buy. But in general, No you can't just go and take any of these cryptocurrencies and use them anywhere. So what good are they as a currency? we already established that they haven't been good as an investment unless you're paying a lot of attention and you're every day buying and selling based on what the movement is. [00:02:59] I know a guy that does exactly that it's, he's a day trader basically in some of these cryptocurrencies, good for. But in reality, is that something that makes sense in a long term? Is that going to help him long term? I don't know. I really don't because again, there's no intrinsic value. [00:03:18] So some of the cryptocurrencies have decided let's have some sort of intrinsic value. And what they've done is they've created what are generally known as stable coins. And a stable coin is a type of cryptocurrency that behind it has the ability to be tied to something that's stable. So for instance, one that really hit the news recently is a stable coin that is tied to the us dollar. [00:03:46] And yet, even though it is tied to the us dollar and the coin is a dollar and the dollar is a coin. They managed to get down into the few pennies worth of value, kinda like penny. so what good was that, it has since come back up, some are tied to other types of assets. Some of them say we have gold behind us. [00:04:09] Kinda like what the United States used to do back when we were on the gold standard. And we became the petrol dollar where countries were using our currency are us dollars, no matter which country it was to buy and sell oil. Things have changed obviously. And we're not gonna talk about. The whole Petro dollar thing right now. [00:04:30] So forget about that. Second benefit. Third benefit is while it's crypto, which means it's encrypted, which means we're safe from anybody's spine on us, anybody stealing it. And of course that's been proven to be false too. We've seen the cryptocurrencies stolen by the billions of dollars. We've seen these cryptocurrencies lost by the billions of dollars as well. [00:04:58] That's pretty substantial. We get right down to it, lost by the billions because people had them in their crypto wallets, lost the password for the crypto wallet. And all of a sudden, now they are completely out of luck. Does that make sense to you? So the basic. Idea behind currency is to make it easier to use the currency than to say, I'll trade you a chicken for five pounds of nail. [00:05:25] Does that make sense to you? So you use a currency. So you say the chicken is worth five bucks. Actually chicken is nowadays is about $30. If it's a LA hen and those five pounds of nails are probably worth about $30. So we just exchanged dollars back and forth. I think that makes a lot of sense. One of the things that has driven up the value of cryptocurrencies, particularly Bitcoin has been criminal marketplaces. [00:05:53] As you look at some of the stats of ransoms that are occurring, where people's computers are taken over via ransomware, and then that person then pays a ransom. And what happens when they pay that ransom while they have to go find an exchange. Pay us dollars to buy cryptocurrency Bitcoin usually. And then they have the Bitcoin and they have to transfer to another wallet, whether or not the bad guys can use the money. [00:06:25] Is a, again, a separate discussion. They certainly can than they do because some of these countries like Russia are going ahead and just exchanging the critical currencies for rubs, which again, makes sense if you're Russia. Now we have a lot of criminals that have been using the Bitcoin for ransoms businesses. [00:06:49] Publicly traded businesses have been buying Bitcoin by the tens of millions of dollars so that they have it as an asset. In case they get ransom. Things have changed. There's a great article in NBC news, by Kevin Collier. And Kevin's talking about this California man who was scammed out of hundreds of thousands of dollars worth of cryptocurrency. [00:07:15] Now this was a fake romance scam, which is a fairly common one. It. It tends to target older people who are lonely and a romance starts online and they go ahead and talk and kind of fall in love. And it turns out she or he has this really almost terminal disease. If only they had an extra, a hundred thousand dollars to pay for the surgery. [00:07:45] You, you know the story, so he was conned out of the money. What's interesting to me is how the investigation and investigative ability has changed over the years. Probably about five years ago, I sat through a briefing by the secret service and. In that briefing, they explained how they had gone and very, quite cleverly tracked the money that was being sent to and used by this dark web operator who ran a site known as a silk road. [00:08:22] And that site was selling illegal things online. Oh, and the currency that they were tracking was Bitcoin. Yes, indeed. So much for cryptocurrency being secure it, five years ago, the secret service was able to do it. The FBI was able to do it and they couldn't do a whole lot about it. But part of the problem is all of your transactions are a matter of public record. [00:08:52] So if someone sends you a fraction of a Bitcoin. That is now in a ledger and that ledger now can be used because when you then spend. Fraction of a Bitcoin somewhere else, it can be tracked. It is tracked is a hundred percent guaranteed to be tracked. And once it's tracked government can get in. [00:09:15] Now, in this case, a deputy district attorney in Santa Clara county, California, was able to track the movement of the cryptocurrency. Yeah. So this district attorney, okay. Deputy district attorney, not the FBI, not the secret service, not the national security agency, a local district attorney in Santa Clara county, California, not a particularly huge county, but. [00:09:44] She was able to track it. And she said that she thinks that the scammer lives in a country where they can't easily extradite them. And so they're unlikely to be arrested at any time soon. So that includes countries like Russia that do not extradite criminals to the United States. Now getting into the details. [00:10:03] There's a great quote from her in this NBC news article, our bread and butter these days really is tracing cryptocurrency and trying to seize it and trying to get there faster than the bad guys are moving it elsewhere, where we can't. Grab it. So she said the team tracked the victim's money as it bounced from one digital wallet to another, till it ended up at a major cryptocurrency exchange where it appeared the scammer was planning to launder the money or cash out, they sent a warrant to the exchange. [00:10:35] Froze the money and she plans to return it to the victim. That is a dramatic reversal from just a few years back when cryptocurrencies were seen as a boon for criminals. Amazing. Isn't it? Stick around. We get a lot more to talk about here and of course, sign up online Craig peterson.com and get my free newsletter. [00:11:01] There have been a lot of efforts by many companies, Microsoft, apple, Google, to try and get rid of passwords. How can you do that? What is a password and what are these new technologies? Apple thinks they have the answer. [00:11:17] Passwords have been the bane of existence for a long while. And if you'd like, I have a special report on passwords, where I talk about password managers, things you can do, things you should do in order to help keep your information safe, online things like. [00:11:34] Bank accounts, et cetera. Just email me, Craig peterson.com and ask for the password special report and I'll get it to you. Believe me it's self-contained it's not trying to get you to buy something. Nothing. It is entirely about passwords and what you can do again, just email me, me@craigpeterson.com and we'll get right back with you. [00:11:56] Give us a couple of days, passwords are a problem. And over the years, the standards for passwords have changed. I remember way back when some of the passwords might be 2, 3, 4 characters long. and back then, those were hard to crack. Then Unix came along. I started using Unix and when was that? [00:12:16] Probably about 81. And as I was messing around with Unix, I. They used to had a couple of changes in how they did passwords. They added assault to it. They used basically the same cipher that the Germans used in world war II, that enigma cipher, which again was okay for the times today, we have much more powerful ciphers and the biggest concern right now, amongst real cybersecurity people. [00:12:43] Government agencies is okay. So what are we going to do when these new quantum computers come along with their artificial intelligence and other things, that's going to be a bit of a problem because quantum computers are able to solve problems in fractions of a second. Even that traditional computers cannot solve it. [00:13:10] It's a whole different thing. I want you to think. Something here. I, if you have a handful of spaghetti now we're talking about hard spaghetti, not cooked spaghetti and they all dried out and they are a varying links. How could you sort those into the smallest to largest, if you will, how could you find which ones were the longest, perhaps? [00:13:37] Which ones were the shortest? There's an analog way of doing that and there's a digital way of doing that. So the digital way for the computer would be. To measure them all and compare the measurements and then identify how long the longest one was. And then maybe you'd have to go back and try and find that. [00:13:55] So you can imagine that would take some time, the analog way of doing that. Cuz there still are analog computers out there and they do an amazing job in certain tasks, but the analog way of doing that is okay. So you take that bundle of various length spaghetti and you slam it on the table. What's gonna happen while those pieces of dried spaghetti are going to self align, right? [00:14:22] The shortest ones are going to be down at the bottom and the tallest one's gonna be sticking out from the top. So there you go. There's your tallest, your longest pieces of spaghetti, and it's done. Instantly. So that's just an idea here, quantum, computing's not the same thing, but that's a comparison really of digital and analog computers, but it's the same type of thing. [00:14:45] Some of these problems that would take thousands of years for digital computer. To work out, can just take a fraction of a second. It's absolutely amazing. So when we're looking at today's algorithms, today's programs for encrypting things like military information, secret telegrams, if you will going back and forth in inside the secretary of state embasies worldwide. [00:15:10] Today they're considered to be quite secure, but with quantum computing what's gonna happen. So there are a lot of people out there right now who are working on trying to figure out how can we come up with an algorithm that works today with our digital computers and can be easily solved by quantum computer. [00:15:34] We have a pretty good idea of how quantum computers are going to work in the future, how they work right now, but this really gets us to the next level, which is cool. Franklin. That's a little bit here about cybersecurity. How about you and your password? How does this all tie in? [00:15:51] There are a few standards out there that people have been trying to pass is it's no longer the four character password you might remember. Oh, it needs to be eight to 10 characters, random mix of upper lowercase, special digits, character numbers. You remember those? And you should change it every 30 days. [00:16:09] And those recommendations changed about three or four years ago when the national Institute of standards and technology said, Hey guys pass phrase is much better than the, what we've been doing because people are gonna remember it and it can be longer. So if you are using I have some past phrases I use that are 30 characters or more. [00:16:33] And I mix up the case and I mix up mix ins on special characters and some numbers, but it's a phrase that I can remember and I have different phrases for different websites. Cause I use a password manager right now. I have about 3,100 entries in my password manager. That's a lot. And I bet you have a lot more passwords or at least a lot more websites and accounts than you realize. [00:17:03] And so that gets to be a real problem. How do you make all of this work and make it easy for people? One of the ways that that. They're looking at using is something called the Fido alliances technique. And the idea behind Fido is actually similar to what I do right now. Cause I use one password.com. [00:17:24] I have an app on my phone and the phone goes ahead and gives me the password. In fact, it'll. Put it in. I have plugins in my browsers. It'll put it right into the password form on the website. And then it'll ask me on my phone. Hey, is that really you? And I'll say yes, using duo and TA I'm logged in it's really quite cool. [00:17:48] Fido is a little different than that, but the same, the whole idea behind Fido is you registered a website and the website will send a request to the Fido app. That's on your phone. So now on your phone, you'll use biometrics or maybe one time pass key, those six digit keys that change every 30 seconds. [00:18:13] And so now you on your phone, you say yeah. That's me. That's good. That's me. Yeah. Okay. And then the app will exchange with the website using public key cryptography. A public key and it's gonna be unique public key for that website. So it'll generate a private key and a public key for that website. [00:18:35] And now TA a, the website does not have your password and cannot get your password. And anytime you log in, it's going to ask you on your smartphone. Is this. And there's ways beyond smartphones. And if you wanna find out more about passwords, I've got, again, that free, special report, just Craig peterson.com. [00:18:59] Email me, just email me@craigpeterson.com and I'll make sure we send that off to you and explains a lot about passwords and current technology. So Fido is one way of doing this and a few different companies have gone ahead and have invested some. Into final registration, because it requires changes on the websites as well in order to. [00:19:25] With Fido. Now you might use a pin, you might use the biometrics, et cetera, but apple has decided they've come up with something even better. Now there's still a lot of questions about what apple is doing, but they are rolling it into the next release of iOS and also of Mac operating system. And you'll be able to use that to secure. [00:19:48] Log into websites. I think Apple's gonna get a lot of traction on this and I think it's gonna be better for all of us involved here. We'll see. There's still a lot of UN unanswered questions, but I'll keep you up to date on this whole password technology stick around. [00:20:08] There are ways for us to communicate nowadays easy ways, but are the easy ways, the best ways, the question here, frankly. And part of this answer has to do with WhatsApp and we'll talk right now. [00:20:23] Many people have asked me about secure messaging. You probably know by now that sending text messages is not secure. [00:20:34] In fact, it could be illegal if you have any personal information about. Patients or maybe employees, you just can't send those over open channels. So what apple has done for instance is they've got their messaging app and if the message is green, it's just reminding you that this is a text message. Now they stuck with green because that was the industry's standard. [00:21:01] Green does not mean safe in the apple world when it comes to iMessage. Blue does. So they've got end to end encryption. So if the message is blue, that means the encryptions in place from side to side, there are on the other end of the spectrum. There are apps like telegram, which are not. Particularly safe. [00:21:22] Now, telegram has pulled up it socks a little bit here, but in order to have end to end encryption and telegram, you have to manually turn it on. It is not on by default. I also personally don't trust telegram because of their background, things that they've done in the past. Avoid that. [00:21:43] WhatsApp is something I've been asked about. I had a family member of a service member who was overseas, ask if WhatsApp was safe for them to communicate on cuz they didn't want third parties picking. Private messages, things you say and do online with friends and family are not necessarily things there are for public consumption. [00:22:06] So the answer that I gave was yeah, you might remember Facebook getting WhatsApp. They bought it and deciding they were going to make some changes to the privacy settings in. now that was really a big mistake. They said we're gonna add advertisements. How are you going to effectively advertise? [00:22:27] If you don't know what we're talking about, have you noticed advertising platforms? If you look up something or someone else in your house looks up something, if your neighbors are looking up, they assume that you might be interested in it as well. So what do they do? They go ahead and show you ads for that brand new pair of socks that you never really cared about, but because the algorithms in the background figured yeah, that's what you've been talking about. [00:22:55] Let's pass out your pair of socks. So if Facebook is going to. Add into WhatsApp, what's going to happen. Are they going to be monitoring what you're saying? And then sending you some of these messages, right? These ads, because of that, a lot of people started looking for a more secure. Platform and that's frankly, where Moxi Marlin spike comes in a fun name, the bloom in this case, but he started a company called signal. [00:23:30] He didn't just start it. He wrote the code for it, the server code, everything. And the whole idea behind signal was to have a guaranteed safe end to end way to communicate. A third party with a friend, a relative, et cetera. So signal is something that I've used in the past. And I used from time to time now, as well, depending on who I'm talking to. [00:23:56] And it does allow you to send messages. It does allow you to talk. You can do all kinds of stuff with it. So now there's an issue with signal. It's disappointing. Moxi has stepped down from running signal. There's a company behind it in January, 2022. And he said, the company's begin off. They can run themselves. [00:24:19] He's still on the board of direct. And the guy who's currently the head of signal is also a very privacy focused guy, which is really good too signal by the way is free. And you can get it for pretty much any platform you would care to have it for a very nice piece of software. I like what they've done. [00:24:38] Now the problem is that some of those people at signal have decided that they should have a way of making payments inside signal. So a few months ago, they went ahead and added into signal, a piece of software that allows you to send. Payments online. Now this is a little concerning and the let's talk about some of the reasons for the concern. [00:25:09] Basically what we're seeing is a cryptocurrency that Moxi himself helped to put in place now, I guess that's good cuz he understands it. It's supposedly a cryptocurrency that is privacy. Focused. And that's a good thing. What type of crypto is it? That's privacy focused. And how good is it going to be? [00:25:34] Those are all good questions, but here's the biggest problem. I think that comes from this. We've got our friends at Facebook, again, trying to add crypto payments to their various messenger and other products. We're seeing that from a lot of these communication systems, cuz they can skim a little off the top legally, charge you a fee and then make their money that way. But. What happens when you put it into an encrypted messaging app? Bottom line, a lot of bad things can happen here because now all of a sudden you come under financial regulations, right? Because you are performing a financial. Function. So now potentially here, there could be criminal misuse of the app because you could have ransomware and they say, reach us on signal. [00:26:33] Here's our signal account. And go ahead and send us crypto. it's called mobile coin by the way, this particular cryptocurrency. So now all of a sudden you are opening up the possibility of all kinds of bad things happening and your app signal, which was originally great for messaging now being used nefariously. [00:26:57] I think that's a real problem. Now, when it comes to money transfer functions with cryptocurrencies to say that they're anonymous, I think is a hundred percent a misnomer because it's really pseudo anonymous. It's never completely anonymous. So now you've increased the legal attack surface here. So now the various regulators and countries around the world can say, Hey. [00:27:26] This is no longer just a messaging app. You are using it to send money. We wanna track all money transactions. And so what does that mean? That means now we need to be able to break the encryption or need to shut down your app, or you need to stop the ability to send money. So the concern right now with signal is we really could have some legal problems with signal. [00:27:53] And we could potentially cause some real life harm. On the other side of, this is what Moi Marlin spike has been really driving with signal over the years, which is we don't want anyone to be able to break into signal. So there's a particularly one Israeli based company that sells tools that you can buy that allow you to break into smartphone. [00:28:20] And they're used by everybody from criminals. You can even buy some of these things on eBay. And they're used also by law enforcement agencies. So he found that there was a bug in one of the libraries that's used by this Israeli soft. To where that causes it to crash. And so he puts some code into signal, at least he threatened to that would cause any of the scanning software that tries to break into your smartphone to fail to crash. [00:28:53] Yeah. Yeah. Cool. Greg Peterson here, online Craig peterson.com and really you are not alone. [00:29:09] I got some good news about ransomware and some bad news about B E C business email compromise. In fact, I got a call just this just this week from someone who had in fact again, had their operating account emptied. [00:29:27] Ransomware is a real problem, but it's interesting to watch it as it's evolved over the years. [00:29:36] We're now seeing crackdowns driving down ransomware profits. Yes, indeed. Ransomware's ROI is dropping the return on investment. And so what we're starting to see is a drive towards more. Business email compromise attack. So we'll talk about those, what those are. And I have a couple of clients now that became clients because of the business email compromises that happened to them. [00:30:10] A great article that was in this week's newsletter. You should have received it Tuesday morning from me. If you are signed up for the free newsletter. Craig peterson.com/subscribe. You'll get these usually Tuesday morning. It's my insider show notes. So you can get up to speed on some of the articles I'm talking about during the week that I talk about on the radio. [00:30:38] And of course talk about here on the radio show and podcast and everything else as well. So what we're seeing here, according to dark readings, editor, Becky Bracken is some major changes, a pivot by the bad guys, because at the RSA conference, they're saying that law enforcement crackdowns try cryptocurrency regulations. [00:31:05] We've been talking about that today and ransomware as a service operator. Downs are driving the return on investment for ransomware operations across the world all the way across the globe. So what is ransomware as a service? I think that's a good place to start because that has really been an Albert Cross around our next for a long time. [00:31:30] The idea with ransomware is they get you to download some software, run some software that you really should not be running. That makes sense to you. So you get this software on your computer, it exfil trades files. So in other words, it takes files that you have sends them. Off to the bad guys. And then once it's done that, so it'll send like any word files, it finds Excel, other files. [00:32:00] It might find interesting once it's done that, then it goes ahead and encrypts those files. So you no longer have access to them and it doesn't just do them on your computer. If you share a drive, let's say you've got a Gdrive or something else on your computer that is being mounted from either another computer or maybe a server. [00:32:24] It will go ahead and do the same thing. With those files. And remember it, isn't just encrypting because if you have a good backup and by the way, most businesses that I've come into do not have a good backup, which is a real problem because their backups fail. They haven't run. I had one case where we helped the business out and it had been a year and a half since they had a successful backup and they had no. [00:32:52] They were dutifully carrying home. These USB drives every day, plug in a new one in, and the backups were not running. Absolutely amazing. So anyhow, ransomware is a service then. So they've encrypted your files. They've exfiltrated. In other words, they've taken your files and then they demand a ran. [00:33:14] So usually it's like this red screen that comes up and says, Hey all your files are belong to us and you need to contact us. So they have people who help you buy Bitcoin or whatever they're looking for. Usually it's Bitcoin and send the Bitcoin to them. And then they'll give you what's hopefully a decryption. [00:33:38] Now what's particularly interesting about these decryption keys is they work about half of the time. So in other words, about half of the time, you'll get all your data back about half the time. You will not, it's just not good. So if you are a small operator, if you are just a small, bad guy and it's you and maybe somebody else helping you, you got your nephew there helping you out. [00:34:03] How are you going to. Help these people that you're ransoming by the cryptocurrency. How are you going to threaten them with release of their documents online? Unless you have a staff of people to really help you out here? That's where ransomware's a service comes in. The whole idea behind RA is. [00:34:25] You can just be a one man shop. And all you have to do is get someone to open this file. So you go ahead and register with the ransomware service provider and they give you the software and you embed your little key in there, so they know it's you. And then you send it off in an email. You might try and mess with those people to get them to do something they shouldn't do. [00:34:49] And. That's all you have to do because once somebody opens up that file that you sent them, it's in the hand of these service guys and ransomwares the service guys. So the, these ransomwares of service people will do all of the tech support. They'll help people buy the Bitcoin. They'll help them pay the ransom. [00:35:11] They'll help them recover files, to a certain extent. Does this make sense to you? Yeah, it's kinda crazy. Now I wanna offer you, I've got this document about the new rules for backup and again, it's free. You can get it. No problem. Just go ahead and email me, me@craigpeterson.com m@craigpeterson.com because the backups are so important and. [00:35:38] Just like password rules have changed. The rules have changed for backups as well. So just drop me an email me@craigpeterson.com and ask for it and we'll make sure we send it off to you and is not trying to sell you more stuff. Okay. It's really is explaining the whole thing for you. I'm not holding anything back. [00:35:54] These ransoms, the service operators, then get the payment from you and then pay a percentage anywhere from 80% to 50%, sometimes even lower to the person who ransom due. Isn't that just wonderful. So our law enforcement people, as well as in other countries have been going after the ransomware as a service providers, because if they can shut down. [00:36:21] These RAs guys just shutting. One of them down can shut down thousands of small ransomware people. Isn't that cool works really well. So they have been shut down. Many of them there's one that just popped its head back up again. After about six months, we'll see how far they get, but it is a very big. [00:36:46] Blow to the whole industry, ransomware really because of these O as a service operators has become a centralized business. So there's a small number of operators responsible for the majority of these thousands of hundreds of thousands of attacks. Really. It's probably worse than. So couple of dis big groups are left the KTI group and lock bit, and they've got more than 50% of the share of ransomware attacks in the first half of 2022. [00:37:18] But now they're going after them. The feds. And I think that makes a whole lot of sense, because who do you go for while you go for the people who are causing the most harm and that's certainly them. So I expect they'll be shut down sometimes soon, too. Ransomware had its moment over the last couple of years, still a lot of ransomware out there, still a lot of problems, but now we're seeing B C business, email compromise tactics, and I did a. [00:37:50] At television appearance, where I was working with the the newsmaker or whatever they call them, talking heads on that TV show and explaining what was happening. And the most standard tactic right now is the gift card swindle. I should put together a little video on this one, but it was all, it's all about tricking employees into buying bogus gift cards. [00:38:18] So this good old fashioned Grif is still working. And what happened in our case is it was actually one of the newscasters who got an email, supposedly from someone else saying, Hey we wanna celebrate everybody. And in order to do that, I wanna give 'em all gift cards. So can you go out and buy gift cards? [00:38:42] And so we messed around with them. It was really fun and said, okay what denomination, how many do you think we need? Who do you think we should give them to? And of course we knew what we were doing. Their English grammar was not very good. And it was really obvious that this was not. [00:38:59] The person they were pretending to be. So that happens and it happens a lot. They got into a business email account, the email account of that newscaster. So they were able to go through their email, figure out who else was in the business, who was a trusted source inside of the business. So they could pretend that that they were that newscaster and send emails to this trusted source. [00:39:31] And today these business email compromise attacks are aimed at the financial supply chain. And once these threat actors are inside, they look for opportunities to spoof vendor emails, to send payments to controlled accounts. And the worst case I know of this is a company that sent $45 million. To a scammer. [00:39:57] And what happened here is the, this woman pretended to be the CEO who was out of the country at the time and got the CFO to wire the money to her. An interesting story. We'll have to tell it to you sometime, but it's a real problem. And we just had another one. We've had them in school districts, look, 'em up online, do a duck dot, go search for them and you'll find them right. [00:40:24] Left and center because social engineering works. And frankly, business email compromise is a clear threat to businesses everywhere. I, as I mentioned, we had one listens to the show, contact us just last week. Again, $40,000 taken out of the operating account. We had another one that had a, I think it was $120,000 taken out of the operating account. [00:40:53] And another one that had about $80,000 taken outta the operating account. Make sure you're on my newsletter. even the free one. I do weekly free trainings. Craig peterson.com. Make sure you subscribe now. [00:41:10] Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [00:41:26] It's going to be a great time today because man. This whole thing with Facebook has exploded here lately. [00:41:35] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes now, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention. [00:42:08] And certainly Facebook can be one of those companies. So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal data? It came from a leaked document. Yeah, exactly. So I, we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:42:38] It basically got sued out of existence, but there's no way that Facebook is gonna be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So of course, if you're older, we used to call those TIAL waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:43:08] So Facebook internally, they, their engineers are trying to figure out, okay, so how do we deal? People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:43:31] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How are they all CATA categorized? Now we've got the European union. With their gen general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:43:56] That's not my specialty. My specialty is the cybersecurity side. But in article five, this European law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected and used for a specific purpose and not reused for another purpose. [00:44:34] So there's an example here that vice is giving in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Eh, so Gizmoto with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice. [00:45:01] Cuz this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online and nothing. [00:45:21] I think I probably even uploaded it back then thinking that'd be nice to see if I got friends here. We can start chatting, et cetera. According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal me memo, this European regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leak document shows that Facebook may not even have the ability to limit. [00:45:53] how it handles users data. Now I was on a number of radio stations this week, talking about this and the example I gave, I is just look at an average business from the time it start, Facebook started how right. You scrape in pictures of young women off of Harvard universities. Main catalog, contact page, and then asking people what do you think of this rate? This person rate that person and off they go, trying to rate them. Yeah. All that matters to a woman, at least according to mark Zuckerberg or all that matters about a woman is how she looks. Do I think she's pretty or not ridiculous what he was doing? [00:46:35] I, it just, oh, that's Zuckerberg, right? That's. Who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then opening up even wider and wider. [00:47:00] And of course, that also created demand cuz you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certain you're starting to collect data and you're making more money than God. So what do you do? You don't have to worry about inefficiencies. [00:47:20] I'll tell you that. One thing you don't have to do is worry about, oh, GE we've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:47:41] And they put together all of the basic information, that, that they want. They are. Pulling it out of this database and that database, and they're doing some correlation writing some really cool sequel queries with some incredible joins and everything else. And now that becomes part of the main code for Facebook. [00:48:02] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says yeah here we go. [00:48:25] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the Obama. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:48:50] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the us Canada of course, has their own Australia, New Zealand think about all the places. [00:49:12] Facebook makes a lot of money. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water. [00:49:34] Okay. And it flows every. The document red. So how do you put that ink back in the bottle, in the right bottle? How do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from it? Apparently they don't even know where they got some of this information. [00:49:58] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It is crazy. So this document that we're talking about was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of a monetization strategy. [00:50:22] And is the engine that powers Facebook's growth. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And I've talked about as well along comes Elon Musk and he says wait a minute now. [00:50:41] Now I can make Twitter way more profitable. We're gonna get rid of however many people it's well over a thousand, and then we are going to hire more people. We're gonna start charging. We're gonna be more efficient. You can bet all of these redundancies that are in Facebook are also there on Twitter. and Twitter also has to comply with all of these regulations that Facebook is freaking out about. [00:51:09] It, for really a very good reason. So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does, but most companies, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be, because it grew organically. You started out with a little consumer firewall, router and wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. [00:51:54] This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. Just straighten them out as well. Hey, stick around. I'll be right back and sign up online@craigpeterson.com. [00:52:13] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian looters. [00:52:30] This is really something, we know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:52:45] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:53:10] I found a great article on the guardian and there's a village. Had been occupied for about a month by Russian troops and the people came back, they are just shocked to see what happened. They're giving a few examples of different towns. They found that alcohol was stolen and they left empty bottles behind food rappers, cigarette butts, thrown all over the place in apartments and homes. [00:53:39] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the clothes. This is a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and lingerie. This is really something. It, the Soviets didn't do this, but now Russian. [00:54:02] Military apparently does. So over the past couple of weeks, there've been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidences suggests looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:54:29] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto Euro trucks, everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioners. [00:54:53] Being shipped back, just you might use ups here, they have their equivalent over there. A lady here who was the head teacher in the school. She came back in, of course, found her home Lood and in the head teacher's office. she found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're gonna destroy it. [00:55:19] They don't only leave anything behind. They found the Russians had taken most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. A little. You might have heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:55:38] So they get into the apple store. They grab laptops on iPads, no longer iPods, cuz they don't make those anymore. And I phones. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they take some parts and use them in stolen equipment. [00:56:03] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:56:26] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, let's say they put 'em on wifi. They don't get a SIM card. They don't. service from T-Mobile or Verizon or whoever it might be. So now they disconnect to the wifi and it calls home, cuz it's gonna get updates. [00:56:45] So on download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erased, et cetera. [00:57:11] Now, police have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Fairday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:57:36] You steal it. It's not gonna do you much. Good. So one of the things the Russian stole when they were in it's called I think you pronounce it. Mela me pole which is again, a Erian city is they stole all of the equipment from a farm equipment dealership and shipped it to Chenia. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:58:06] So they shipped this equipment. We're talking about combines harvesters worth 300 grand a piece. They shipped it 700 miles. and the thieves were ultimately unable to use the equipment, cuz it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:58:33] It's autonomous. It goes up and down the fields. Goes any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:58:58] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a, what not terribly profitable business. It certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they lease it. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:59:26] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not gonna come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:59:51] You see where I'm going with this so that they can get their equipment in the hands of more farmers cuz the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued. Total value here is about $5 million. [01:00:11] They were able to shut it all. And obviously, if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you gonna do? How's that gonna work for you? It. Isn't going to work for you. [01:00:32] And they were able to track it. It had GPS trackers find out exactly where it was. That's how they know it was taken to Chenia and could be controlled remotely. And in this case, how'd they control it. They completely. Shut it off. Even if they sell the harvesters for spare parts, they'll learn some money, but they sure can be able to sell 'em for the 300 grand that they were actually worth. [01:00:57] Hey, stick around. We'll be right back and visit me online@craigpeterson.com. If you sign up there, you'll be able to get my insider show note. And every week I have a quick five. Training right there in your emails, Craig Peter san.com. That's S O N in case you're wondering. [01:01:22] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're gonna talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world. [01:01:38] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [01:01:49] We had improved all of their systems and their security and one of their. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine, all of a sudden TA, guess what it had ransomware on it. One of those big reds. [01:02:12] Greens that say pay up is send us this much Bitcoin. And here's our address. All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up particularly encrypted files using the password that they gave. [01:02:33] and thirdly, we stopped it automatically. It did not spread. We were able to completely restore his computer. Now let's consider here at the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. [01:02:59] So the consequences there they weren't that bad. But how about if it had gotten worse? How about if they ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. Would, do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [01:03:25] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [01:03:52] And if you're interested, I can send you, I've got something. I wrote up. Be glad to email it back to you. Obviously as usual, no charge. and you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [01:04:15] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's two, two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [01:04:38] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can U lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [01:05:00] It could be a very big deal. so there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And we, again, we've got a client that we picked up afterwards. That yes, indeed. They lost all of the money in their operating account. [01:05:24] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [01:05:44] One is by the way, KTI, which is a big ransomware gang that also got hacked after they said we are going to attack anyone that. That doesn't defend Vlad's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [01:06:11] And that was in 2021 to Acer big computer company. Now 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is gonna be costing about $265 billion a year. Now on average Ransomware costs businesses. 1.8, 5 million to recover from an attack. [01:06:41] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a to print money, right? You're selling car model or cars from manufacturer X. And now you have the right to do that and they can remove that. [01:07:03] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, 20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom demand. So about her third paid ransom demand. [01:07:27] Last. It's actually down. Cuz my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it's little better than 50%, but 65% of pain victims recovered their data. [01:07:55] Now isn't that absolutely amazing. Now 57% of companies are able to recover the data using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get backed? Probably took weeks, right? [01:08:19] For a regular computer over a regular internet line. Now restoring from backup's gonna be faster because your down link is usually faster than your uplink. That's not true for businesses that have real internet service ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [01:08:39] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be incredibly expensive for you incredibly. So here you. The number one business types by industry for ransomware tax retail. [01:09:13] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware, conscious of doing what, of keeping their data secure of having a good it team, a good it department. So there's your bottom line. [01:09:40] Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [01:10:06] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to Craig peterson.com. And I'll also send you my special report on how to do passwords stick around will be right back. [01:10:24] You and I have talked about passwords before the way to generate them and how important they are. And we'll go over that again a little bit in just a second, but there is a new standard out there that will eliminate the need for passwords. [01:10:40] I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [01:10:49] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements in, but you had a username. [01:11:18] You had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang. And his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today, it has gotten a lot worse today. We have devices with us all of the time. [01:11:40] You might be wearing a smart watch. That requires a password. You of course probably have a smart phone. That's also maybe requiring a password, certainly after boots nowadays they use fingerprints or facial recognition, which is handy, but has its own drawbacks. But how about the websites? You're going to the systems you're using when you're at work and logging in, they all require passwords. [01:12:10] And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to log. Now that's really an interesting thing, right? [01:12:37] Just looking at it because we're so used to having this password only authentic. And of course the thing to do there is make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe mix. [01:12:59] Upper lowercase a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cuz I use a completely different password for every website and right now, Let me pull it up. [01:13:21] I'm using one password dot com's password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. Entries here in my password manager, 3,100. That is a whole lot of passwords, right? As well as software licenses and a few other things in there. [01:13:48] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really messed. With some of their cybersecurity last year and I lost my faith in it. [01:14:08] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless sign in. and they're gonna make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [01:14:32] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're gonna work with the Fido Alliance and they're gonna create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [01:14:50] This is, I'm just gonna go with the most standard way that this is going to work here in the future. And you can then have a, a. Pass key. This is like a multifactor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, I'm giving a password and then it comes up and it asks me for a code. [01:15:14] So I enter an a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password dot. In order to generate that code. So that's how I log into Microsoft sites and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [01:15:41] We have biometrics tied in as. so to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [01:16:06] Yeah, there's a lot there, but I have to protect my customer's data. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. [01:16:29] I'll send that to you. That's what we're sending out right now for anyone who signs up new@craigpeterson.com. And if you'd like a copy of it and you're already on the list, just go ahead and email me M E. At Craig peterson.com and ask for the password special report where I go through a

Y'd Awake
FIDO FRIDAY! Maggie May From Safe Acres Is Looking For Her Fur-Ever Home!

Y'd Awake

Play Episode Listen Later Jun 17, 2022 2:30


Holmberg's Morning Sickness
06-15-22 - BR - WED - Origin Of The Dog Name Fido - Study On Moods During Zoom Calls - The Age Over 50 We Feel Sexiest Including Sexy Brady - Foods That Are OK After Best By Date

Holmberg's Morning Sickness

Play Episode Listen Later Jun 15, 2022 26:37


Holmberg's Morning Sickness - Brady Report - Wednesday June 15, 2022

M vs M
84: En liten ö i telefonen

M vs M

Play Episode Listen Later Jun 15, 2022 46:18


Något tilltäppta av varsin förkylning filosoferar vi kring Pebble, Matter, Fido och andra mer eller mindre relaterade ämnen.

Enterprise Security Weekly (Video)
What's Happening with SCIM - Paul Lanzi - ESW #275

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 14, 2022 28:49


There are a few IETF standards that make the identity world go 'round. SAML, FIDO and LDAP are ones that we know and love... but there's one particularly un-loved standard that is the glue between most identity systems -- cloud and on-prem -- out there. It's called SCIM and -- good news -- smart people are working on improving this 10+ year old standard. Big changes coming, and here to talk with us about it is Paul Lanzi...   Segment Resources: https://identiverse.com/idv2022/ (Paul on Wednesday)   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw275

Paul's Security Weekly TV
What's Happening with SCIM - Paul Lanzi - ESW #275

Paul's Security Weekly TV

Play Episode Listen Later Jun 14, 2022 28:49


There are a few IETF standards that make the identity world go 'round. SAML, FIDO and LDAP are ones that we know and love... but there's one particularly un-loved standard that is the glue between most identity systems -- cloud and on-prem -- out there. It's called SCIM and -- good news -- smart people are working on improving this 10+ year old standard. Big changes coming, and here to talk with us about it is Paul Lanzi...   Segment Resources: https://identiverse.com/idv2022/ (Paul on Wednesday)   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw275

Identity, Unlocked.
FIDO Multi Device Credentials with Andrew Shikiar and Tim Cappalli

Identity, Unlocked.

Play Episode Listen Later Jun 14, 2022 41:26


On the first episode of the 4th season of Identity Unlocked, host Vittorio Bertocci, Principal Architect at Auth0, is joined by Andrew Shikiar, Executive Director & CMO, FIDO Alliance, and Tim Cappalli, Digital Identity Standards Architect at Microsoft. Vittorio, Andrew and Tim discuss the new FIDO multi device credentials, commonly known as passkey, a new FIDO feature that poses as an alternative to passwords in consumer grade applications.

Yes Was Podcast
#429 - Sfokusowani

Yes Was Podcast

Play Episode Listen Later Jun 14, 2022 58:40


Rozmawiamy sobie o rutynach, o nowych trybach focusowych, o 1Password i FIDO, potem trochę o gierkach i o fotografii analogowej. No takie mamy tematy fajne i różnorodne. Partnerem tego odcinka jest Farnell. Wpisz kod „YES10WAS” w sklepie na https://pl.farnell.com, aby zgarnąć 10% zniżki na zakupy powyżej 300 zł. Voucher jest ważny tylko do 1/08/2022 roku i można go wykorzystać 1 raz na użytkownika. Tutaj lista marek i produktów, których nie dotyczy ta zniżka: https://www.farnell.com/brand-exclusions.html Zostań mecenasem naszego podcastu. Już od 15 zł lub 3$ odblokuj dostęp do półodcinków After Dark dostępnych tylko dla Patronów. Kliknij tu (https://www.patreon.com/ywp) i wspieraj redakcję Yes Was. Linki: - https://www.apple.com/ios/ios-16-preview/ - https://toucharcade.com/2022/06/06/no-mans-sky-ipad-release/ - https://blog.1password.com/1password-is-joining-the-fido-alliance/ - https://www.unrealengine.com/en-US/metahuman Porozmawiaj z nami i naszą cudowną społecznością na forum Yes Was Podcast (https://forum.yeswas.pl). Kanał z dobrymi promkami: YesWasDiscount Możesz być z nami w kontakcie także na: grupie na Telegramie, Twitterze i Facebooku. Prowadzący: Paweł Orzech, Wojtek Wieman Identyfikacja wizualna: Antoni Kwiatkowski Intro: Breakmaster Cylinder 00:00:00 - Intro BMC 00:00:30 - Sponsorem odcinka jest Farnell 00:00:38 - Rutyny są ważne 00:02:22 - Tryby fokus 00:21:32 - 1Password i FIDO 00:25:42 - Chwila dla Farnella 00:27:02 - No Man's Sky na maki 00:27:54 - Stage manager 00:30:32 - Diablo IV beta 00:32:20 - Meta human 00:42:35 - Orzech kupi Macbooka? 00:47:44 - Fotografia analogowa 00:56:52 - Wpadnijcie na Patreon 00:57:24 - Reklama 00:57:54 - Outro BMC

TWiT Bits (Video HI)
TWiT Clip: Apple Supports FIDO Passkey

TWiT Bits (Video HI)

Play Episode Listen Later Jun 13, 2022 6:11


Apple, like Google and Microsoft has embraced FIDO with Passkey to replace using passwords online. Leo Laporte, Rene Ritchie, Philip Elmer-DeWitt, and Patrick Beja explain how this feature works on This Week in Tech Full episode at twit.tv/twit879 Host: Leo Laporte Guests: Patrick Beja, Rene Ritchie, and Philip Elmer-DeWitt You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (MP3)
TWiT Clip: Apple Supports FIDO Passkey

TWiT Bits (MP3)

Play Episode Listen Later Jun 13, 2022 6:09


Apple, like Google and Microsoft has embraced FIDO with Passkey to replace using passwords online. Leo Laporte, Rene Ritchie, Philip Elmer-DeWitt, and Patrick Beja explain how this feature works on This Week in Tech Full episode at twit.tv/twit879 Host: Leo Laporte Guests: Patrick Beja, Rene Ritchie, and Philip Elmer-DeWitt You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (Video HD)
TWiT Clip: Apple Supports FIDO Passkey

TWiT Bits (Video HD)

Play Episode Listen Later Jun 13, 2022 6:11


Apple, like Google and Microsoft has embraced FIDO with Passkey to replace using passwords online. Leo Laporte, Rene Ritchie, Philip Elmer-DeWitt, and Patrick Beja explain how this feature works on This Week in Tech Full episode at twit.tv/twit879 Host: Leo Laporte Guests: Patrick Beja, Rene Ritchie, and Philip Elmer-DeWitt You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

mixxio — podcast diario de tecnología
Privacidad con y sin límites

mixxio — podcast diario de tecnología

Play Episode Listen Later Jun 13, 2022 12:14


Anuncian (medio en broma) la Web 5 / Consultas sobre cifrado en MongoDB / 1Password entra en FIDO / Pestañas en explorador de Windows 11 / Movistar y Orange con Supercookies / Más fallos de Radar Covid Patrocinador: Las hidrolimpiadoras de Karcher son la mejor herramienta para limpiar dentro y fuera de tu casa, ahorrando un 80% de agua. Son muy eficientes gracias a su motor refrigerado por agua, y si compras una hidrolimpiadora K7, K5 o K4 de Kärcher, te regalan hasta 200 € en accesorios. Anuncian (medio en broma) la Web 5 / Consultas sobre cifrado en MongoDB / 1Password entra en FIDO / Pestañas en explorador de Windows 11 / Movistar y Orange con Supercookies / Más fallos de Radar Covid 5️⃣ Jack Dorsey anuncia la Web 5. El fundador de Block (antes Square) y Twitter aprovecha para burlarse de los humos de la Web3 con una propuesta de descentralización de identidades que podrían compartir las aplicaciones descentralizadas. — No hay nada sólido aún, solo una presentación (PDF).

Risky Business
Risky Business #667 -- "Shields Up" for cyber's forever war

Risky Business

Play Episode Listen Later Jun 13, 2022


On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: “Shields Up” advice is now provably meaningless Russia to ditch offshore comms apps like WhatsApp Evil Corp's Lockbit sanctions evasion attempt backfires Binance is a cesspit of shady financial dealings Apple's passkey release foreshadows FIDO mass adoption Much, much more This week's sponsor interview is about Elastic's teardown on some really interesting APT linux malware called BPFdoor. Jake King and Colson Wilhoit joined the show for that interview. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command | Science & Tech News | Sky News White House: cyber activity not against Russia policy | Reuters 'Shields Up': the new normal in cyberspace Governors are being contacted - Newspaper Kommersant No. 95 (7296) dated 06/01/2022 «Вы лично отвечаете за инциденты». Почему 1 мая началась новая эпоха в информационной безопасности - Газета.Ru Киев использовал против России новый принцип кибератак - Ведомости Traffic will be sorted into folders - Newspaper Kommersant No. 102 (7303) dated 06/10/2022 FBI cybercrime seizure takes down one-time Ukraine IT Army collaborator To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions | Mandiant Risky Biz News: LockBit-Mandiant drama, explained How Binance became a hub for hackers, fraudsters and drug sellers Cryptocurrencies were once seen as an unmitigated boon for criminals. Not anymore. Fed cyber officials detail Chinese state hackers using common exploits against telcos Risky Biz News: Russia orders Google to remove Tor Browser from Russian Play Store Bizbudding, Inc. v. 365 Data Centers Services, LLC, 3:22-cv-00715 – CourtListener.com Business Email Compromise Scams Are Poised to Eclipse Ransomware | WIRED Cybercriminal scams City of Portland, Ore. for $1.4 million - The Record by Recorded Future Apple's Passkey Replaces Passwords With iPhone and Mac Authentication | WIRED MongoDB Debuts ‘Queryable Encryption' to Fight Hacks and Leaks | WIRED Zero-Day Exploitation of Atlassian Confluence | Volexity Microsoft Security Intelligence on Twitter: "Multiple adversaries and nation-state actors, including DEV-0401 and DEV-0234, are taking advantage of the Atlassian Confluence RCE vulnerability CVE-2022-26134. We urge customers to upgrade to the latest version or apply recommended mitigations: https://t.co/C3CykQgrOJ" / Twitter Microsoft Follina Vulnerability in Windows Can Be Exploited Through Office 365 | WIRED (3) Martin Sheppard on Twitter: "@riskybusiness And yes, many orgs can disable Macros in documents with the mark of the web without a lot of impact. Policy can be used to not mark documents from certain internal sites with mark of the web, which is one way to allow certain legitimate macros with this setting in place." / Twitter Blockchain, 'Decentralized' Exchange Taken Offline After Hacker Steals Millions ‘Optimism' Crypto Hack Victim Hopes Thief Will Give Back $15 Million PeckShieldAlert on Twitter: "#PeckShieldAlert Wintermute Exploiter has transferred 17 million $OP to @optimismPBC https://t.co/5PpgeZXaId" / Twitter NFT insider trading charges filed against former OpenSea employee Nate Chastain Detecting BPFDoor backdoor payload | Elastic

Daily Tech News Show (Video)
And The Password Is, FIDO – DTNS 4292

Daily Tech News Show (Video)

Play Episode Listen Later Jun 8, 2022


E3 plans on in-person attendance in 2023 but has that ship already sailed for E3? Plus Microsoft is restructuring its Mixed Reality Group as the landscape for mixed reality glasses continues to shift, and Apple’s Passkeys points to a passwordless future. Starring Tom Merritt, Sarah Lane, Scott Johnson, Roger Chang, Joe, Amos MP3 Download Using a Screen Reader? Click here Multiple versions (ogg, video etc.) from Archive.org. Follow us on Twitter Instgram YouTube and Twitch Please SUBSCRIBE HERE. Subscribe through Apple Podcasts. A special thanks to all our supporters–without you, none of this would be possible. If you are willing to support the show or to give as little as 10 cents a day on Patreon, Thank you! Become a Patron! Big thanks to Dan Lueders for the headlines music and Martin Bell for the opening theme! Big thanks to Mustafa A. from thepolarcat.com for the logo! Thanks to our mods Jack_Shid and KAPT_Kipper on the subreddit Send to email to feedback@dailytechnewsshow.com Show Notes To read the show notes in a separate page click here!

Daily Tech News Show
And The Password Is, FIDO – DTNS 4292

Daily Tech News Show

Play Episode Listen Later Jun 8, 2022


E3 plans on in-person attendance in 2023 but has that ship already sailed for E3? Plus Microsoft is restructuring its Mixed Reality Group as the landscape for mixed reality glasses continues to shift, and Apple’s Passkeys points to a passwordless future. Starring Tom Merritt, Sarah Lane, Scott Johnson, Roger Chang, Joe, Amos MP3 Download UsingContinue reading "And The Password Is, FIDO – DTNS 4292"

News/Talk 94.9 WSJM
Conversing with Fido. Daily BuZz!!

News/Talk 94.9 WSJM

Play Episode Listen Later Jun 6, 2022 4:32


Now wait, Girl Scout cookie makeup?! Want to live longer, drink more coffee! And that fish darn near killed that fisherman! That's what Paul Layendecker is Buzzin' about today on The Daily BuZz!!

Y'd Awake
FIDO FRIDAY! Bailey From Steel City Dog Rescue Is Looking For Her Fur-Ever Home!

Y'd Awake

Play Episode Listen Later Jun 3, 2022 2:52


FIDO FRIDAY! This week we have adorable, adoptable Bailey from Steel City Dog Rescue! She came to Steel City Dog Rescue about two weeks ago. Bailey had been a stray for about a year in Pittsburgh. A kind gentleman started to feed her and earning her trust. Finally Bailey was trapped by a volunteer in the Pittsburgh lost dogs group. Once at the rescue as you can imagine she was not happy about being trapped and now everyone is trying to be her friend...she still is unsure...and who wouldn't blame her, you see it was discovered that she had a possible broken jaw. Bailey was not letting anyone touch it and just wanted to be left alone. Bailey was scheduled for surgery on the 30th of May.. luckily her jaw wasn't broke but she did have some type of blunt force trauma to her mouth leaving her with several broken teeth above and within her lower jaw bone. Four broken teeth were removed and she also was spayed. She is feeling so much better, she is now a giving her foster mom hugs and kisses, unlike the first two days. Bailey is about 7 years young... She is picky about what dogs she hangs out with. Only wants non confrontational dogs her size or smaller. She would be fine as an only dog too. Loves car rides and just chillin with her person. If you're interested in Bailey, you can reach out to Steel City directly on Facebook. #adoptdontshop

Apple Coding Daily
FIDO, el futuro de las contraseñas

Apple Coding Daily

Play Episode Listen Later May 31, 2022 15:50


Os contamos qué es la Alianza FIDO que engloba a todos los grandes fabricantes y su intención de acabar con las contraseñas. La alianza FIDO es una unión bajo un estándar abierto de todos los grandes fabricantes y proveedores de servicios con un objetivo común: eliminar las contraseñas y ofrecer formas más seguras de autentificarnos en nuestro día a día. Os contamos en qué consiste y qué podría ser una de las nuevas funciones presentadas por Apple para iOS 16 en la próxima WWDC. Descubre nuestro canal de Twitch en: twitch.tv/applecoding. Descubre nuestras ofertas para oyentes: Cursos en Udemy (con código de oferta) Apple Coding Academy Suscríbete a Apple Coding en nuestro Patreon. Canal de Telegram de Swift. Acceso al canal. --------------- Consigue las camisetas oficiales de Apple Coding con los logos de Swift y Apple Coding así como todo tipo de merchadising como tazas o fundas. Tienda de merchandising de Apple Coding. --------------- Tema musical: "For the Win" de "Two Steps from Hell", compuesto por Thomas Bergensen. Usado con permisos de fair use. Escúchalo en Apple Music o Spotify.

مَنبِت | Manbet
السفاح: جاك الذي هز أركان لندن

مَنبِت | Manbet

Play Episode Listen Later May 24, 2022 18:30


في أوج قوتها .. الإمبراطورية الفيكتورية التي تجتاح العالم، كانت تعاني في البحث داخل عاصمتها لندن عن أخطر قاتل متسلسل. رجل يُدعى جاك .. هز أركان لندن وكسر سطوة الشرطة فيها .. قتل نساءها ومثل بجثثهن. في هذه الحلقة يطير معنا بشر نجار إلى حي وايتشابل الفقير بشرق العاصمة البريطانية ليروي لنا واحدة من أشهر قصص الجريمة في العصر الحديث. كتب هذه الحلقة وقدمها بشر نجار، إنتاج وتحرير أحمد إيمان زكريا، تدقيق بيان عاروري، ترجمة كريستينا كغدو، إخراج صوتي تيسير قباني، فريق النشر والترويج مرام النبالي وبيان حبيب وأُمامَة عُثمان ومعالي الغريب. هذا الموسم من بودكاست منبت من إنتاج صوت ويأتيكم بدعم من مؤسسة ويكيميديا - المؤسسة الأم لويكيبيديا. الآراء الواردة في حلقات البودكاست لا تعبر عن رأي مؤسسة ويكيميديا أو العاملين بها أو انتماءاتها. المصادر: مقال: https://sow.tl/3wjTpqJ Evans, Stewart P.; Skinner, Keith (2000). The Ultimate Jack the Ripper Sourcebook: An Illustrated Encyclopedia. London: Constable and Robinson. ISBN 1-84119-225-2 Begg, Paul (2003). Jack the Ripper: The Definitive History. London: Pearson Education اقتباس من نيويورك تايمز: be/lADBHDg-JtA?t=1007 اقتباس من The Globe: be/lADBHDg-JtA?t=1035 Kershen, Anne J., "The Immigrant Community of Whitechapel at the Time of the Jack the Ripper Murders", in Werner, pp. 65–97; Vaughan, Laura, "Mapping the East End Labyrinth", in Werner, p. 225 مقال: https://sow.tl/3FOrjH2 Honeycombe, The Murders of the Black Museum: 1870-1970, p. 54 Novels and Social Writings ISBN 978-0-521-26213-2 p. 147 Evans and Skinner, Jack the Ripper: Letters from Hell, p. 1; Police report dated 25 October 1888, MEPO 3/141 ff. 158–163, quoted in Evans and Skinner, The Ultimate Jack the Ripper Sourcebook, p. 283; Fido, p. 82; Rumbelow, p. 12 مقال: https://sow.tl/3yBIpXa  مقال: https://sow.tl/3PjgnWt فيديو: https://youtu.be/lADBHDg-JtA?t=1008

Daily News Brief
Daily News Brief for Monday, May 23rd, 2022

Daily News Brief

Play Episode Listen Later May 23, 2022 18:30


This is Garrison Hardie with your CrossPolitic Daily News Brief for Monday, May 23rd. 2022. We’re finally back after a week in the Valley of the Sun, also known as Phoenix Arizona… We were down filming a TV show with our corporate sponsors Aromored Republic, as well as wrapping up our CrossPolitic Liberty Tour, where we discussed the five stones of true liberty… because we have giants to slay in our land. You can find the show on our app, as it was our Sunday Special… and with guys like Jeff Durbin, Delano Squires, and Dr. James White on the stage, you’ll want to check it out. So here’s what you guys missed over the weekend… First, have you guys heard there’s this scary new virus on the loose? The WHO, or World Health Organization seems to think we should be terrified of it. Well according to CNBC, the Monkey Pox is spreading primarily through sex… but not just any sex…. It’s primarily spreading through homosexuals… That’s right folks, monkey pox is here, and we’ve rolled out the rainbow carpet for it… Biden says everyone needs to be concerned… https://www.cnbc.com/2022/05/23/monkeypox-outbreak-is-primarily-spreading-through-sex-who-officials-say.html Monkeypox: 'Everybody should be concerned,' says Joe Biden Play whole clip. Well you heard it there, Biden says everyone should be concerned about it, therefore, it’s probably nothing to be concerned about… the article from CNBC reads, An outbreak of the monkeypox virus in North America and Europe is primarily spreading through sex among men with about 200 confirmed and suspected cases across at least a dozen countries, World Health Organization officials said Monday. The outbreak has quickly advanced across Europe and North America over the last week and is expected to be far more widespread as more doctors look for the signs and symptoms. Two confirmed and one suspected case of monkeypox in the U.K. were reported to the WHO just 10 days ago, the first cases this year outside of Africa where the virus has generally circulated at low levels over the last 40 years, the organization said. European nations have confirmed dozens of cases in what’s become the largest outbreak of monkeypox ever on the continent, according to the German military. The U.S. and has confirmed at least two cases and Canada has confirmed at least five so far. Belgium just introduced a mandatory 21-day quarantine for monkeypox patients. While we’re on it, Belgium recently hosted a gay-fetish festival called The Darklands Festival… Well, organizers of a fetish festival in Belgium are warning attendees of possible exposure to monkeypox after public health officials linked three cases to the event that recently concluded in Antwerp. The Darklands Festival posted the notice on its website on Friday, the same day Belgian public health officials confirmed cases of the rare viral disease. The announcement comes amid growing concern from scientists about the spread of monkeypox, which is commonly found in tropical rainforests in Central and West Africa, and is now being reported in Europe. Darklands is a four-day event catered toward gay men that includes a daytime festival, several nighttime parties, as well as education and shopping that features "an extraordinary selection for fetish retailers at the gear market," according to its website. The festival concluded on May 9. I won’t go into details on this festival, but you can imagine that numerous forms of debauchery and lust, were taking place… Portugal has 21 known cases, most of them were linked to the festival. Spain was also linked to the Monkey Pox with 21 confirmed cases, most of them, linked with a gay sauna… also known as a sauna… Sky News recently released some fear porn of their own, and spoke on the higher chance of gay men getting the virus. Monkeypox: What you need to know Play 1:57-2:54 Ah yes, it has to be balanced with the stigma, of accurate science… The WHO convened an emergency meeting this weekend via video conference to look at the virus, identify those most at risk and study its transmission. The organization will hold a second global meeting on monkeypox next week to more thoroughly study the risks and treatments available to fight the virus. While the virus itself is not a sexually transmitted infection, the most recent surge in cases appears to have been spread among men who have sex with other men, WHO officials said, emphasizing that anyone can contract monkeypox. The virus is spread through close contact with people, animals or material infected with the virus. It enters the body through broken skin, the respiratory tract, the eyes, nose and mouth. Though human-to-human transmission is believed to occur through respiratory droplets as well, that method requires prolonged face-to-face contact because the droplets cannot travel more than a few feet, according to the CDC. It should also be noted, that this particular strain of monkey pox, has a mortality rate, of less than 1%... and by the way, there was an outbreak of monkey pox before! Back in 2003, there were 47 confirmed cases in the U.S., and it was the first time monkey pox was found outside of Africa. The more you know! By the way, the New York Department of Health, is suggesting that masks can help protect from monkey pox… who could’ve seen this coming? I won’t get into it on this show, but you can find the link in the show notes. https://www.independent.co.uk/news/world/americas/monkeypox-new-york-city-virus-masks-b2084287.html Changing topics here… Did you know that more than 75% of those raised in evangelical, Presbyterian, and Reformed churches don’t pursue any kind of Christian higher education? Surprising isn’t it. Cornerstone Work & Worldview Institute is seeking to provide a new, exciting, and affordable option for Christians. Their mission is to build Kingdom culture in the workplace by equipping their students in a Trinitarian worldview and vocational competencies. Their low-cost full-time program offers integrative course modules, internships, and mentoring so their students can finish debt-free with vocational preparation, a robust faith, and financial potential to build strong godly families and homes rooted in their communities and churches long-term. Visit their website at www.cornerstonework.org to find out more about enrolling. Alright, back to the former vice president Joe Biden, Biden says US will 'militarily' defend Taiwan against China if they invade. Whoa… according to the Post Millenial, President Joe Biden stated unequivocally that the US would intervene militarily on behalf of Taiwan should China invade its territory. Biden was speaking in Tokyo at a conference with Prime Minister Fumio Kishida. Noting that the US didn't want to "get involved in the Ukraine conflict militarily for obvious reasons," a reporter asked "are you willing to get involved militarily to defend Taiwan if it comes to that?" Here’s how he responded: Biden: US would defend Taiwan militarily Play full clip: Past presidents have offered what The New York Times calls "strategic ambiguity" when confronted with questions about a military response to a potential Chinese invasion of Taiwan. Apparently Biden's staff was also surprised with the outright admission that the US would offer more than aid to Taiwan, as has been done in Ukraine, but actual military assistance further than arms and resources. The US had been walking a fine line up to this point, with statements about support for Taiwan, without saying exactly what that support would entail. This statement from Biden represents a departure in message from the White House. A statement from the White House sought to backtrack the President's comments, in a move that the press has become accustomed to over the past year and a half since Biden took office. Well hey, if there’s one thing that Taiwan can trust, it’s the words from our government. I mean, look at Afghanistan, or Ukraine… the U.S. never goes back on its word… It was in August that, after a similar statement by Biden that the US "would respond" if there were an attack against Taiwan, staff claimed that Biden was not changing the policy of the US. He had said then that the US has a "commitment" to defend Taiwan. If China were to invade Taiwan while the US were still supplying weapons to Ukraine to fight off their Russian aggressors, the US would be engaged in conflict against their greatest global rivals, Russia and China, at the same time, on two continents. Taiwan was pleased with Biden's remarks. Taiwan's Foreign Ministry expressed "gratitude" for the statement, the Times reported, for Biden's "rock-solid commitment to Taiwan." It was in October that they asked for help, saying that it was preparing for war against China. This was after the Chinese military sent a total of 52 aircraft into Taiwanese air space. In July 2021, Chinese state media published their "three-stage" plan for an invasion of Taiwan. That plan involved ballistic missiles, fighter jet attacks, and amphibious landings on Taiwan's beaches. Japan would perhaps join the US in defending Taiwan should the need arise, though leaders from that nation made no statement so bold as Biden's. The US Congress approved $40 billion in aid and weapons to Ukraine last week, and the Pentagon approved an additional $100 million in arms. This year our national conference is in Knoxville, TN October 6th-8th. The theme of this year’s conference is Lies, Propaganda, Storytelling and the Serrated Edge. Satan is the father of lies, and the mother of those lies is a government who has rejected God. We have especially been lied to these last two years, and the COVIDpanic has been one of the central mechanisms that our government has used to lie to us and to grab more power. Because Christians have not been reading their bibles, we are susceptible to lies and weak in our ability to fight these lies. God has given us His word to fight Satan and his lies, and we need to recover all of God’s word, its serrated edge and all. Mark your calendars for October 6th-8th, as we fight, laugh and feast with fellowship, beer and Psalms, our amazing lineup of speakers, hanging with our awesome vendors, meeting new friends, and more. Early bird tickets sale now!. San Francisco Archbishop bars Nancy Pelosi from Communion over abortion stance https://nypost.com/2022/05/20/san-francisco-archbishop-bars-pelosi-from-communion-over-abortion/?fbclid=IwAR0D804Pqq8W9u8YChrUfOxVPX7rJ2LcRmr7Kv48rjyO78XhUDeVhMaSnW0 San Francisco’s Roman Catholic archbishop has banned House Speaker Nancy Pelosi (D-Calif.) from receiving Holy Communion during Mass until she repents of her public pro-abortion stance. “A Catholic legislator who supports procured abortion, after knowing the teaching of the Church, commits a manifestly grave sin which is a cause of most serious scandal to others,” Ssalvatore Cordileone wrote in a public notification Friday. “Therefore, universal Church law provides that such persons ‘are not to be admitted to Holy Communion.'” “I am hereby notifying you that you are not to present yourself for Holy Communion and, should you do so, you are not to be admitted to Holy Communion, until such time as you publically repudiate your advocacy for the legitimacy of abortion and confess and receive absolution of this grave sin in the sacrament of Penance,” the 65-year-old clergyman wrote. Cordileone noted that while he and Pelosi had discussed the issue in the past, the archbishop has “not received such an accommodation to my many requests” to speak again following the September passage of a controversial Texas abortion law which bans abortions after a heart beat is detected – usually at six weeks. At that time, Pelosi vowed to codify the Supreme Court’s landmark Roe v. Wade ruling into federal law. In recent weeks, Pelosi has doubled down on that stance in light of a leaked Supreme Court draft opinion that indicated Roe will be overturned later this year. The archbishop noted that he will “continue to offer up prayer and fasting” for the Speaker in the coming weeks. Pelosi’s office did not immediately respond to The Post’s request for comment. Federal judge strikes down Tennessee's transgender bathroom sign law https://www.nbcnews.com/nbc-out/out-politics-and-policy/judge-strikes-tennessees-transgender-bathroom-sign-law-rcna29267 Let’s take a dip back into the pool of gender insanity shall we? According to NBC News, A federal judge struck down a Tennessee law Tuesday that would have required businesses in the state to post warning notices on their public restrooms if they have policies allowing transgender patrons to use the facilities that match their gender identities. The American Civil Liberties Union challenged the law in June on behalf of two business owners — the owner of Sanctuary, a performing arts and community center in Chattanooga, and the owner of Fido, a restaurant in Nashville, among other businesses. The law went into effect on July 1, but U.S. District Judge Aleta A. Trauger issued a preliminary injunction against it a week later. Then on Tuesday, Trauger permanently blocked the law by granting the ACLU's motion for summary judgment, which asks a court to decide a case without a full trial. She wrote in a 40-page decision that the law violates the First Amendment of the Constitution because it compels speech that is controversial and with which the plaintiffs disagree. The law required business owners with even informal policies that allow people to use whichever bathroom they want to post a sign that reads, “This facility maintains a policy of allowing the use of restrooms by either biological sex regardless of the designation on the restroom,” at the entrances of single-sex public restrooms, locker rooms, dressing areas or other facilities that are “designated for a specific biological sex ... where a person would have a reasonable expectation of privacy.” The law said the sign must be at least 8 inches wide and 6 inches tall and use the colors red and yellow, with a boldface typeface, among other requirements. Representatives for the state argued that the law is a "content-neutral" rule meant to clarify restroom signage and is not meant to be an endorsement of how gender identity should be understood, according to the opinion. The ACLU's clients, they argued, have “imagined an idiosyncratic, hidden undertone to the [required] signage.” Trauger, who was appointed to the court by President Bill Clinton, disagreed, noting that the government's preferred view of how gender works — that it is dictated by "biological sex," which is assigned at birth and is limited to male or female — is contested. This has been your CrossPolitic Daily News Brief… if you liked the show, share it far and wide, as that helps us as a show grow! You could also sign up as a club member, and join the Fight Laugh Feast army! And as always, if you’re a business owner, or CEO who wants to talk about partnering with CrossPolitic, let’s talk… email me at garrison@fightlaughfeast.com. For CrossPolitic News, I’m Garrison Hardie. Have a great rest of your day, and Lord bless.

CrossPolitic Studios
Daily News Brief for Monday, May 23rd, 2022 [Daily News Brief]

CrossPolitic Studios

Play Episode Listen Later May 23, 2022 18:30


This is Garrison Hardie with your CrossPolitic Daily News Brief for Monday, May 23rd. 2022. We’re finally back after a week in the Valley of the Sun, also known as Phoenix Arizona… We were down filming a TV show with our corporate sponsors Aromored Republic, as well as wrapping up our CrossPolitic Liberty Tour, where we discussed the five stones of true liberty… because we have giants to slay in our land. You can find the show on our app, as it was our Sunday Special… and with guys like Jeff Durbin, Delano Squires, and Dr. James White on the stage, you’ll want to check it out. So here’s what you guys missed over the weekend… First, have you guys heard there’s this scary new virus on the loose? The WHO, or World Health Organization seems to think we should be terrified of it. Well according to CNBC, the Monkey Pox is spreading primarily through sex… but not just any sex…. It’s primarily spreading through homosexuals… That’s right folks, monkey pox is here, and we’ve rolled out the rainbow carpet for it… Biden says everyone needs to be concerned… https://www.cnbc.com/2022/05/23/monkeypox-outbreak-is-primarily-spreading-through-sex-who-officials-say.html Monkeypox: 'Everybody should be concerned,' says Joe Biden Play whole clip. Well you heard it there, Biden says everyone should be concerned about it, therefore, it’s probably nothing to be concerned about… the article from CNBC reads, An outbreak of the monkeypox virus in North America and Europe is primarily spreading through sex among men with about 200 confirmed and suspected cases across at least a dozen countries, World Health Organization officials said Monday. The outbreak has quickly advanced across Europe and North America over the last week and is expected to be far more widespread as more doctors look for the signs and symptoms. Two confirmed and one suspected case of monkeypox in the U.K. were reported to the WHO just 10 days ago, the first cases this year outside of Africa where the virus has generally circulated at low levels over the last 40 years, the organization said. European nations have confirmed dozens of cases in what’s become the largest outbreak of monkeypox ever on the continent, according to the German military. The U.S. and has confirmed at least two cases and Canada has confirmed at least five so far. Belgium just introduced a mandatory 21-day quarantine for monkeypox patients. While we’re on it, Belgium recently hosted a gay-fetish festival called The Darklands Festival… Well, organizers of a fetish festival in Belgium are warning attendees of possible exposure to monkeypox after public health officials linked three cases to the event that recently concluded in Antwerp. The Darklands Festival posted the notice on its website on Friday, the same day Belgian public health officials confirmed cases of the rare viral disease. The announcement comes amid growing concern from scientists about the spread of monkeypox, which is commonly found in tropical rainforests in Central and West Africa, and is now being reported in Europe. Darklands is a four-day event catered toward gay men that includes a daytime festival, several nighttime parties, as well as education and shopping that features "an extraordinary selection for fetish retailers at the gear market," according to its website. The festival concluded on May 9. I won’t go into details on this festival, but you can imagine that numerous forms of debauchery and lust, were taking place… Portugal has 21 known cases, most of them were linked to the festival. Spain was also linked to the Monkey Pox with 21 confirmed cases, most of them, linked with a gay sauna… also known as a sauna… Sky News recently released some fear porn of their own, and spoke on the higher chance of gay men getting the virus. Monkeypox: What you need to know Play 1:57-2:54 Ah yes, it has to be balanced with the stigma, of accurate science… The WHO convened an emergency meeting this weekend via video conference to look at the virus, identify those most at risk and study its transmission. The organization will hold a second global meeting on monkeypox next week to more thoroughly study the risks and treatments available to fight the virus. While the virus itself is not a sexually transmitted infection, the most recent surge in cases appears to have been spread among men who have sex with other men, WHO officials said, emphasizing that anyone can contract monkeypox. The virus is spread through close contact with people, animals or material infected with the virus. It enters the body through broken skin, the respiratory tract, the eyes, nose and mouth. Though human-to-human transmission is believed to occur through respiratory droplets as well, that method requires prolonged face-to-face contact because the droplets cannot travel more than a few feet, according to the CDC. It should also be noted, that this particular strain of monkey pox, has a mortality rate, of less than 1%... and by the way, there was an outbreak of monkey pox before! Back in 2003, there were 47 confirmed cases in the U.S., and it was the first time monkey pox was found outside of Africa. The more you know! By the way, the New York Department of Health, is suggesting that masks can help protect from monkey pox… who could’ve seen this coming? I won’t get into it on this show, but you can find the link in the show notes. https://www.independent.co.uk/news/world/americas/monkeypox-new-york-city-virus-masks-b2084287.html Changing topics here… Did you know that more than 75% of those raised in evangelical, Presbyterian, and Reformed churches don’t pursue any kind of Christian higher education? Surprising isn’t it. Cornerstone Work & Worldview Institute is seeking to provide a new, exciting, and affordable option for Christians. Their mission is to build Kingdom culture in the workplace by equipping their students in a Trinitarian worldview and vocational competencies. Their low-cost full-time program offers integrative course modules, internships, and mentoring so their students can finish debt-free with vocational preparation, a robust faith, and financial potential to build strong godly families and homes rooted in their communities and churches long-term. Visit their website at www.cornerstonework.org to find out more about enrolling. Alright, back to the former vice president Joe Biden, Biden says US will 'militarily' defend Taiwan against China if they invade. Whoa… according to the Post Millenial, President Joe Biden stated unequivocally that the US would intervene militarily on behalf of Taiwan should China invade its territory. Biden was speaking in Tokyo at a conference with Prime Minister Fumio Kishida. Noting that the US didn't want to "get involved in the Ukraine conflict militarily for obvious reasons," a reporter asked "are you willing to get involved militarily to defend Taiwan if it comes to that?" Here’s how he responded: Biden: US would defend Taiwan militarily Play full clip: Past presidents have offered what The New York Times calls "strategic ambiguity" when confronted with questions about a military response to a potential Chinese invasion of Taiwan. Apparently Biden's staff was also surprised with the outright admission that the US would offer more than aid to Taiwan, as has been done in Ukraine, but actual military assistance further than arms and resources. The US had been walking a fine line up to this point, with statements about support for Taiwan, without saying exactly what that support would entail. This statement from Biden represents a departure in message from the White House. A statement from the White House sought to backtrack the President's comments, in a move that the press has become accustomed to over the past year and a half since Biden took office. Well hey, if there’s one thing that Taiwan can trust, it’s the words from our government. I mean, look at Afghanistan, or Ukraine… the U.S. never goes back on its word… It was in August that, after a similar statement by Biden that the US "would respond" if there were an attack against Taiwan, staff claimed that Biden was not changing the policy of the US. He had said then that the US has a "commitment" to defend Taiwan. If China were to invade Taiwan while the US were still supplying weapons to Ukraine to fight off their Russian aggressors, the US would be engaged in conflict against their greatest global rivals, Russia and China, at the same time, on two continents. Taiwan was pleased with Biden's remarks. Taiwan's Foreign Ministry expressed "gratitude" for the statement, the Times reported, for Biden's "rock-solid commitment to Taiwan." It was in October that they asked for help, saying that it was preparing for war against China. This was after the Chinese military sent a total of 52 aircraft into Taiwanese air space. In July 2021, Chinese state media published their "three-stage" plan for an invasion of Taiwan. That plan involved ballistic missiles, fighter jet attacks, and amphibious landings on Taiwan's beaches. Japan would perhaps join the US in defending Taiwan should the need arise, though leaders from that nation made no statement so bold as Biden's. The US Congress approved $40 billion in aid and weapons to Ukraine last week, and the Pentagon approved an additional $100 million in arms. This year our national conference is in Knoxville, TN October 6th-8th. The theme of this year’s conference is Lies, Propaganda, Storytelling and the Serrated Edge. Satan is the father of lies, and the mother of those lies is a government who has rejected God. We have especially been lied to these last two years, and the COVIDpanic has been one of the central mechanisms that our government has used to lie to us and to grab more power. Because Christians have not been reading their bibles, we are susceptible to lies and weak in our ability to fight these lies. God has given us His word to fight Satan and his lies, and we need to recover all of God’s word, its serrated edge and all. Mark your calendars for October 6th-8th, as we fight, laugh and feast with fellowship, beer and Psalms, our amazing lineup of speakers, hanging with our awesome vendors, meeting new friends, and more. Early bird tickets sale now!. San Francisco Archbishop bars Nancy Pelosi from Communion over abortion stance https://nypost.com/2022/05/20/san-francisco-archbishop-bars-pelosi-from-communion-over-abortion/?fbclid=IwAR0D804Pqq8W9u8YChrUfOxVPX7rJ2LcRmr7Kv48rjyO78XhUDeVhMaSnW0 San Francisco’s Roman Catholic archbishop has banned House Speaker Nancy Pelosi (D-Calif.) from receiving Holy Communion during Mass until she repents of her public pro-abortion stance. “A Catholic legislator who supports procured abortion, after knowing the teaching of the Church, commits a manifestly grave sin which is a cause of most serious scandal to others,” Ssalvatore Cordileone wrote in a public notification Friday. “Therefore, universal Church law provides that such persons ‘are not to be admitted to Holy Communion.'” “I am hereby notifying you that you are not to present yourself for Holy Communion and, should you do so, you are not to be admitted to Holy Communion, until such time as you publically repudiate your advocacy for the legitimacy of abortion and confess and receive absolution of this grave sin in the sacrament of Penance,” the 65-year-old clergyman wrote. Cordileone noted that while he and Pelosi had discussed the issue in the past, the archbishop has “not received such an accommodation to my many requests” to speak again following the September passage of a controversial Texas abortion law which bans abortions after a heart beat is detected – usually at six weeks. At that time, Pelosi vowed to codify the Supreme Court’s landmark Roe v. Wade ruling into federal law. In recent weeks, Pelosi has doubled down on that stance in light of a leaked Supreme Court draft opinion that indicated Roe will be overturned later this year. The archbishop noted that he will “continue to offer up prayer and fasting” for the Speaker in the coming weeks. Pelosi’s office did not immediately respond to The Post’s request for comment. Federal judge strikes down Tennessee's transgender bathroom sign law https://www.nbcnews.com/nbc-out/out-politics-and-policy/judge-strikes-tennessees-transgender-bathroom-sign-law-rcna29267 Let’s take a dip back into the pool of gender insanity shall we? According to NBC News, A federal judge struck down a Tennessee law Tuesday that would have required businesses in the state to post warning notices on their public restrooms if they have policies allowing transgender patrons to use the facilities that match their gender identities. The American Civil Liberties Union challenged the law in June on behalf of two business owners — the owner of Sanctuary, a performing arts and community center in Chattanooga, and the owner of Fido, a restaurant in Nashville, among other businesses. The law went into effect on July 1, but U.S. District Judge Aleta A. Trauger issued a preliminary injunction against it a week later. Then on Tuesday, Trauger permanently blocked the law by granting the ACLU's motion for summary judgment, which asks a court to decide a case without a full trial. She wrote in a 40-page decision that the law violates the First Amendment of the Constitution because it compels speech that is controversial and with which the plaintiffs disagree. The law required business owners with even informal policies that allow people to use whichever bathroom they want to post a sign that reads, “This facility maintains a policy of allowing the use of restrooms by either biological sex regardless of the designation on the restroom,” at the entrances of single-sex public restrooms, locker rooms, dressing areas or other facilities that are “designated for a specific biological sex ... where a person would have a reasonable expectation of privacy.” The law said the sign must be at least 8 inches wide and 6 inches tall and use the colors red and yellow, with a boldface typeface, among other requirements. Representatives for the state argued that the law is a "content-neutral" rule meant to clarify restroom signage and is not meant to be an endorsement of how gender identity should be understood, according to the opinion. The ACLU's clients, they argued, have “imagined an idiosyncratic, hidden undertone to the [required] signage.” Trauger, who was appointed to the court by President Bill Clinton, disagreed, noting that the government's preferred view of how gender works — that it is dictated by "biological sex," which is assigned at birth and is limited to male or female — is contested. This has been your CrossPolitic Daily News Brief… if you liked the show, share it far and wide, as that helps us as a show grow! You could also sign up as a club member, and join the Fight Laugh Feast army! And as always, if you’re a business owner, or CEO who wants to talk about partnering with CrossPolitic, let’s talk… email me at garrison@fightlaughfeast.com. For CrossPolitic News, I’m Garrison Hardie. Have a great rest of your day, and Lord bless.

Tony & Dwight
Dog Tired. Saban's Spat & Fido's Fairy. The Browns are Clowns. Fake Formula & Fish Sticks.

Tony & Dwight

Play Episode Listen Later May 20, 2022 27:15


The CyberWire
Russian cyber threats and NATO's Article 5. Conti says it's going to bring Cost Rica to its knees. BLE proof-of-concept hack. CISA warns of initial access methods. Thanos proprietor indicted.

The CyberWire

Play Episode Listen Later May 17, 2022 28:20


An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks at updates to the FIDO alliance. Rick Howard and Ben Rothke discuss author Andrew Stewart's book "A Vulnerable System: The History of Information Security in the Computer Age". And,the doctor was in, but wow, was he also way out of line. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/95 Selected reading. Russia Planned a Major Military Overhaul. Ukraine Shows the Result. (New York Times)  The Cyberwar Against Pro-Ukrainian Countries is Real. Here's What to Do (CSO Online)  Collective cyber defence and attack: NATO's Article 5 after the Ukraine conflict (European Leadership Network)  Cyber attack on Costa Rica grows as more agencies hit, president says (Reuters) Ransomware gang threatens to ‘overthrow' new Costa Rica government, raises demand to $20 million (The Record by Recorded Future)  Hacker Shows Off a Way to Unlock Tesla Models, Start Cars (Bloomberg) NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk (NCC Group)  Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (NCC Group Research)  Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks (NCC Group Research) Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (NCC Group Research)  Alert (AA22-137A) Weak Security Controls and Practices Routinely Exploited for Initial Access (CISA) Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals (U.S. Attorney's Office for the Eastern District of New York)  US prosecutors allege Venezuelan doctor is ransomware mastermind (ZDNet)  'Multi-tasking doctor' was mastermind behind 'Thanos' ransomware builder, DOJ says (The Record by Recorded Future)  U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware (The Hacker News)

NosillaCast Apple Podcast
NC #888 17th Anniversary, FIDO Passkeys, Audio Hijack 4 Tutorial, TAKMLY Digital Microscope, Podfeet Redesign, Find vs. Search in 1Password 8, Security Bits

NosillaCast Apple Podcast

Play Episode Listen Later May 16, 2022 55:56


CCATP #727 – Dr. Maryanne Garry on How Everything You Remember is Wrong CCATP #728 — Bart Busschots on Why FIDO Passkeys Rock Audio Hijack 4 - Tutorial on ScreenCastsOnline TAKMLY Digital Microscope - Fun and Educational Podfeet Home Page Redesign - You Didn't Even Notice! Tiny Tip – Find vs. Search in 1Password 8 Support the Show Security Bits — 15 May 2022 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle Podfeet 15-Year Anniversary Shirts Affiliate Links: Parallels Toolbox Affiliate - get 3 mos free Learn through MacSparky Field Guides Backblaze One Free Month Setapp One Free Month Eufy Affiliate Google Fi

The Dalrymple Report
Episode 249: iPod Touch, AirPods, and FIDO

The Dalrymple Report

Play Episode Listen Later May 13, 2022 60:54


Apple has officially discontinued the iPod Touch. Dave and I talk about the history of the iPod and why it makes sense to call it quits on the product. We also talk about AirPods Pro and Max this week. Both devices are rumored to be updated this year, but what does that mean and what would the right price be for the products. Apple, Google, and Microsoft have all committed to support for FIDO—Dave tells us what that is and why it's important. Brought to you by: Zocdoc: NOW is the time to prioritize your health. Go to Zocdoc.com/DALRYMPLE and download the Zocdoc app to sign-up for FREE and book a top-rated doctor. Many are available as soon as today. New Relic: That next nine p.m. call is just waiting to happen. Get New Relic before it does! And you can get access to the whole New Relic platform and 100GB of data free, forever – no credit card required! Sign up at NewRelic.com/dalrymple. Show Notes: Alexander Ovechkin and Putin Apple discontinues iPod touch Gruber: A Touching Goodbye for AirPods Max, what's next? Google announces Pixel Buds Pro Apple, Google, and Microsoft commit to expanded support for FIDO standard to accelerate availability of passwordless sign‑ins Disney+ Hits 137.7M Subscribers

Of Course You Realize THIS Means Podcast - A Looney Tunes Discussion
This Means War Propaganda! With Mike Manalo and Stephanie Sandmeier

Of Course You Realize THIS Means Podcast - A Looney Tunes Discussion

Play Episode Listen Later May 13, 2022 60:18


The long running Looney Tunes Franchise ran into some problematic shorts during war time and we're here to break it all down in this podcast with pop culture writer Mike Manolo and producer Stephanie Sandmeier!   The Looney Tunes created shorts from 1941-1944 that focused on selling a specific image to the US public in movie theaters, that would persuade men and women to support the war for the Allies. America was pushed into the war with the bombing of Pearl Harbor and that's when the Japanese soldier became an image subjugated to awful steroetypes that not only effected kids' perceptions of asians abroad, but here in the States as well. This was a terrible time of insensitive depictions of asians and pacific islanders. Films Discussed: Yellowface: Asian Whitewashing and Racism in Hollywood - Directed by Clara and Julia Kuperberg. The film is now available on HboMax. Shorts Discussed: Daffy Duck and the Dinosaur - (1939) Chuck Jones Bugs Bunny Nips the Nips - (1944) Friz Freleng Tokio Jokio - (1943) Norman McCabe Looney Tunes News: Casper Caveman and Fido from Daffy Duck and the Dinosaur have entered the World of Mayhem in all their time traveling glory! These shorts are all in the public domain and it's important that we don't forget what was created before so that we may learn from this mistakes.   Follow The Guests: Stephanie Sandmiere: Instagram: https://www.instagram.com/stephaniesandmeier/ YouTube: https://www.youtube.com/c/NomTalkNetwork Twitter: https://twitter.com/RisuKim   Mike Manalo: Instagram: @Tidybowlboy182 Twitter: https://twitter.com/tidybowlboy182 Work: https://thenerdsofcolor.org/author/mmanalo182/   Follow the Podcast: Instagram: https://www.instagram.com/thismeanspodcast @ThisMeansPod. Rate, Review, Subscribe & Like on iTunes and follow on all socials because That's NOT All Folks!

The Checklist by SecureMac
Checklist 278 - Getting to Know FIDO

The Checklist by SecureMac

Play Episode Listen Later May 12, 2022 23:58


Last week, we talked about keeping our passwords safe. This week, we're talking about killing them. Joining us this week to explain is Megan Shamas, Senior Director of Marketing for the FIDO Alliance, online at fidoalliance.org. Getting to know FIDO on Checklist No. 278, brought to you by SecureMac.   Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

DevNews
S8:E5 - Big Tech Goes All-In On Passwordless Sign-In, Apple's Gatekeeping of Web-Based AR, Apple Mail's Nifty Email Tracking Blocker, and More

DevNews

Play Episode Listen Later May 12, 2022 37:36


In this episode, we talk about Apple's gatekeeping of web-based AR on the iPhone, a neat feature added to Apple Mail that blocks email tracking, and we say goodbye to the iPod. Then we talk about Apple, Google, and Microsoft's plan to implement passwordless sign-in on all major platforms with Jackie Singh, former senior incident response and threat analyst at Biden For President, who currently is the director of an anti-surveillance nonprofit, which advocates and litigates against government use of mass surveillance. Show Notes DevDiscuss (sponsor) CodeNewbie (sponsor) Avalanche (sponsor) Apple is a massive force in AR. It's also been holding the technology back Apple Mail Now Blocks Email Tracking. Here's What It Means for You The music lives on: iPod touch will be available while supplies last Apple, Google, and Microsoft commit to expanded support for FIDO standard to accelerate availability of passwordless sign‑ins

mixxio — podcast diario de tecnología
Es una historia del futuro

mixxio — podcast diario de tecnología

Play Episode Listen Later May 12, 2022 12:11


Windows Weekly (Video HI)
WW 776: The Outlook's Oblique - FIDO, Microsoft Build 2022, Power Pages

Windows Weekly (Video HI)

Play Episode Listen Later May 11, 2022 113:28


FIDO, Microsoft Build 2022, Power Pages Microsoft starts testing 'Suggested Actions' in new Windows 11 test build  Microsoft Issues New Windows Insider Preview Build to Dev and Beta  Apple, Google, and Microsoft to Work Together on Passwordless Logins  Microsoft Releases Physical Copies of Windows 11  Windows 11 is Getting a "New" Sound Recorder App Microsoft 365 & IT  Microsoft readies its latest 'industrial metaverse' pitch  Microsoft's new Outlook email client is live (at least for now)  Quick Hands-On: Outlook (Pre-Release)  Microsoft to rechristen Power Apps portals as 'Power Pages' Hardware  Microsoft Unveils New Adaptive Accessories Coming This Fall  Microsoft, Volkswagen are working to enable HoloLens headsets to be used in vehicles  Intel Adds a New Member to the 12th Gen Core Processor Family  AMD Launches New Chipsets for Chromebooks Dev  Microsoft's Build 2022 Session Catalog is Now Available  Microsoft Announces New .NET Milestones  Google Announces Flutter 3.0 Xbox Report: Microsoft Still Plans Xbox Streaming Device Sony Has Sold 19.3 Million PlayStation 5 Consoles Nintendo Sold 23 Million Switch Consoles in the Past Year Tips and Picks  Tip of the week: Read "After Steve"  App pick of the week: Fortnite  Enterprise pick of the week: Replacing the Store for Business and Store for EDU  Codename pick of the week: Haven  Beer pick of the week: Lowercase Brewing Mexican Lager Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: Nuvei.com cloud.jumpcloud.com/windows newrelic.com/windows

Windows Weekly (MP3)
WW 776: The Outlook's Oblique - FIDO, Microsoft Build 2022, Power Pages

Windows Weekly (MP3)

Play Episode Listen Later May 11, 2022 112:56


FIDO, Microsoft Build 2022, Power Pages Microsoft starts testing 'Suggested Actions' in new Windows 11 test build  Microsoft Issues New Windows Insider Preview Build to Dev and Beta  Apple, Google, and Microsoft to Work Together on Passwordless Logins  Microsoft Releases Physical Copies of Windows 11  Windows 11 is Getting a "New" Sound Recorder App Microsoft 365 & IT  Microsoft readies its latest 'industrial metaverse' pitch  Microsoft's new Outlook email client is live (at least for now)  Quick Hands-On: Outlook (Pre-Release)  Microsoft to rechristen Power Apps portals as 'Power Pages' Hardware  Microsoft Unveils New Adaptive Accessories Coming This Fall  Microsoft, Volkswagen are working to enable HoloLens headsets to be used in vehicles  Intel Adds a New Member to the 12th Gen Core Processor Family  AMD Launches New Chipsets for Chromebooks Dev  Microsoft's Build 2022 Session Catalog is Now Available  Microsoft Announces New .NET Milestones  Google Announces Flutter 3.0 Xbox Report: Microsoft Still Plans Xbox Streaming Device Sony Has Sold 19.3 Million PlayStation 5 Consoles Nintendo Sold 23 Million Switch Consoles in the Past Year Tips and Picks  Tip of the week: Read "After Steve"  App pick of the week: Fortnite  Enterprise pick of the week: Replacing the Store for Business and Store for EDU  Codename pick of the week: Haven  Beer pick of the week: Lowercase Brewing Mexican Lager Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: Nuvei.com cloud.jumpcloud.com/windows newrelic.com/windows

All TWiT.tv Shows (MP3)
Windows Weekly 776: The Outlook's Oblique

All TWiT.tv Shows (MP3)

Play Episode Listen Later May 11, 2022 112:56


FIDO, Microsoft Build 2022, Power Pages Microsoft starts testing 'Suggested Actions' in new Windows 11 test build  Microsoft Issues New Windows Insider Preview Build to Dev and Beta  Apple, Google, and Microsoft to Work Together on Passwordless Logins  Microsoft Releases Physical Copies of Windows 11  Windows 11 is Getting a "New" Sound Recorder App Microsoft 365 & IT  Microsoft readies its latest 'industrial metaverse' pitch  Microsoft's new Outlook email client is live (at least for now)  Quick Hands-On: Outlook (Pre-Release)  Microsoft to rechristen Power Apps portals as 'Power Pages' Hardware  Microsoft Unveils New Adaptive Accessories Coming This Fall  Microsoft, Volkswagen are working to enable HoloLens headsets to be used in vehicles  Intel Adds a New Member to the 12th Gen Core Processor Family  AMD Launches New Chipsets for Chromebooks Dev  Microsoft's Build 2022 Session Catalog is Now Available  Microsoft Announces New .NET Milestones  Google Announces Flutter 3.0 Xbox Report: Microsoft Still Plans Xbox Streaming Device Sony Has Sold 19.3 Million PlayStation 5 Consoles Nintendo Sold 23 Million Switch Consoles in the Past Year Tips and Picks  Tip of the week: Read "After Steve"  App pick of the week: Fortnite  Enterprise pick of the week: Replacing the Store for Business and Store for EDU  Codename pick of the week: Haven  Beer pick of the week: Lowercase Brewing Mexican Lager Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: Nuvei.com cloud.jumpcloud.com/windows newrelic.com/windows

Radio Leo (Audio)
Windows Weekly 776: The Outlook's Oblique

Radio Leo (Audio)

Play Episode Listen Later May 11, 2022 112:56


FIDO, Microsoft Build 2022, Power Pages Microsoft starts testing 'Suggested Actions' in new Windows 11 test build  Microsoft Issues New Windows Insider Preview Build to Dev and Beta  Apple, Google, and Microsoft to Work Together on Passwordless Logins  Microsoft Releases Physical Copies of Windows 11  Windows 11 is Getting a "New" Sound Recorder App Microsoft 365 & IT  Microsoft readies its latest 'industrial metaverse' pitch  Microsoft's new Outlook email client is live (at least for now)  Quick Hands-On: Outlook (Pre-Release)  Microsoft to rechristen Power Apps portals as 'Power Pages' Hardware  Microsoft Unveils New Adaptive Accessories Coming This Fall  Microsoft, Volkswagen are working to enable HoloLens headsets to be used in vehicles  Intel Adds a New Member to the 12th Gen Core Processor Family  AMD Launches New Chipsets for Chromebooks Dev  Microsoft's Build 2022 Session Catalog is Now Available  Microsoft Announces New .NET Milestones  Google Announces Flutter 3.0 Xbox Report: Microsoft Still Plans Xbox Streaming Device Sony Has Sold