POPULARITY
This show has been flagged as Clean by the host. Recently I had a discussion on Mastodon about mobile phone applications. The other person stated "the web belongs to web browsers". I agreed to it as a general good approach. Some dedicated apps cannot be substituted with the browser, but some can. I do not have so many apps myself, but anyway that statement got me to review a couple of my apps how they works in the Firefox browser. And actually, I could delete three apps and all functions I needed from them can be managed from Firefox. Beside traditional bookmarks, those pages can be pinned to the Firefox start page or placed like a webapp on the mobile screen, so they look like an ordinary app. Using the Firefox browser makes it easier to control the privacy. In addition to what is built into Firefox, I currently also have the two extensions, Privacy Badger and uBlock Origin in my Firefox browser. Beside privacy and in general to be somewhat more in control, this approach also reduces the number of apps to keep updated and reduce storage need. Sometimes apps are necessary of otherwise beneficial. But I think the traditional browser should not be forgotten also on the smart mobile phone. Provide feedback on this episode.
Every now and again, a story that has a significant technology element really breaks through and drives the news cycle. This week, the Trump administration is reeling after The Atlantic magazine's Jeffrey Goldberg revealed that he was on the receiving end of Yemen strike plans in a Signal group chat between US Secretary of Defense Pete Hegseth and other top US national security officials. User behavior, a common failure point, appears to be to blame in this scenario. But what are the broader contours and questions that emerge from this scandal? To learn more, Justin Hendrix spoke to:Ryan Goodman is the Anne and Joel Ehrenkranz Professor of Law at New York University School of Law and co-editor-in-chief of Just Security. He served as special counsel to the general counsel of the Department of Defense (2015-16).Cooper Quintin is a senior staff technologist at the Electronic Frontier Foundation (EFF). He has worked on projects including Privacy Badger, Canary Watch, and analysis of state-sponsored malware campaigns such as Dark Caracal.
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
Privacy Badger blocks trackers on news sites and prevents browser exposure to unwanted domains like TikTok and Datadog. No major updates on EU's controversial Article 45 in eIDAS 2.0. Industry pushback continues as implementation would threaten encryption. Cryptocurrency exchange Poloniex lost $130M in a hot wallet hack, the 14th largest crypto theft. Decentralized finance platform Raft lost $3.3M due to an exploit. Crook operated website iotaseed.io to generate wallet seed phrases, then recorded and stole them. New Intel processor vulnerability called Downfall leaks encryption keys and sensitive data between users on shared systems. Russia moves to formally ban all VPN use in the country. Two new flaws found in OpenVPN software, one allowing memory access. SpinRite development paused as DOS and Windows versions are complete. Understanding assembly language helps malware analysis and exploit development, but high-level decompilers also useful. Quantum-safe symmetric cryptography is limited compared to asymmetric crypto. EU's Article 45 allows transparent decryption and traffic interception, supposedly for security purposes. "Windshield Barnacle" parking enforcement device uses suction cups and 1000 lbs of force to immobilize vehicles until parking tickets are paid. Sci-fi book series Aeon 14 by M.D. Cooper offers fun military space opera adventure. 27-year-old theoretical crypto attack now shown practical. Passive network observers can steal SSH RSA keys if faulty signature generated, allowing impersonation. Show Notes - https://www.grc.com/sn/SN-948-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: kolide.com/securitynow bitwarden.com/twit GO.ACILEARNING.COM/TWIT
https://youtu.be/l-AhCmBSdgM On this episode of Destination Linux (336), we discuss Montana banning TikTok and what this means for our community. Is this a privacy guru's dream or is the government overstepping? Then we're going to discuss some new competition for RHEL. Plus, we have our tips, tricks and software picks for you. Let's get this show on the road toward Destination Linux! Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/2b8d8a0b-15ed-4b1f-93f2-9fc6b3499ffb.mp3) Sponsored by LINBIT = https://linbit.com Hosted by: Michael Tunnell = https://tuxdigital.com Ryan (DasGeek) = https://dasgeekcommunity.com Jill Bryant = https://jilllinuxgirl.com Want to Support the Show? Become a Patron = https://tuxdigital.com/membership Store = https://tuxdigital.com/store Chapters: 00:00 DL 336 Intro 01:10 Community Feedback: Ecosia search engine - [ link (https://www.ecosia.org/?c=en) ] 08:04 LINBIT - https://linbit.com 09:23 Montana bans TikTok and why the EFF is fighting it - [ techradar.com (https://www.techradar.com/computing/cyber-security/montana-tiktok-ban-digital-rights-groups-join-the-fight-against-unconstitutional-bill) | eff.org (https://www.eff.org/deeplinks/2023/03/government-hasnt-justified-tiktok-ban) ] 27:39 OpenELA takes the fight to Red Hat (SUSE, Oracle, CIQ) - [ link (https://openela.org/) ] 39:45 SUSE to be acquired again and taken Private - [ link (https://www.suse.com/news/EQT-announces-voluntary-public-purchase-offer-and-intention-to-delist-SUSE/) ] 43:05 Gaming: Extreme Tag! - [ link (https://store.steampowered.com/app/2207750/Extreme_Tag/) ] 48:53 Software Spotlight: exa - [ link (https://github.com/ogham/exa) ] 50:34 Tip of the Week: Privacy Extensions for your browser - [ Firefox Relay (https://relay.firefox.com/) | Privacy Badger (https://privacybadger.org/) | DuckDuckGo Privacy Essentials (https://duckduckgo.com/app) | uBlock Origin (https://ublockorigin.com/) ] 53:59 Housekeeping 56:17 Outro
Guests Winfried Tilanus | Emilie Tromp Panelist Richard Littauer Show Notes Hello and welcome to Sustain Open Source Design! The podcast where we talk about sustaining open source with design. Learn how we, as designers, interface with open source in a sustainable way, how we integrate into different communities, and how we as coders, work with other designers. Richard has two amazing guests joining him, Winfried Tilanus, who's a Privacy Consultant at Privacy Company, and Emilie Tromp, who's a Social Design Strategist at Reframing Studio. Today, they discuss how Privacy by Design should be approached, and the importance of understanding the different perspectives on privacy. We'll hear about the Samen Beter project they did, challenges of designing privacy centered systems, the importance of user feedback and testing, and the iterative process of building trust with users when it comes to their data. Download this episode to hear much more! [00:01:41] What is Privacy by Design? [00:02:59] Emilie has more of a social design strategy background, so she tells us the project she worked on with Winfried through eHealth applications, and how Privacy by Design should be approached and the importance of understanding the different perspectives on privacy. [00:07:27] Richard wonders if they've implemented Privacy by Design as a theoretical framework for designing something in any open source projects or if they've talked to open source projects and how they should implement this. [00:08:53] Emilie explains more about the project they worked on called, Better Together (Samen Beter in Dutch). [00:10:05] As part of this open standard that they've built for privacy by design, we find out how they made sure that they took into account all the different definitions of privacy. [00:12:17] Emilie and Winfried highlight how they tested some concepts with end users who don't use eHealth but could envision a scenario in the future where they would be using eHealth, and they explain a game they developed called, The Privacy Game. [00:17:15] Earlier, they mentioned this is an open standard they're making, and we hear if someone wants to build an app, how they can implement Privacy by Design as a standard into their process. [00:21:24] Richard wonders if he can see the standard for Privacy by Design and how he can apply it directly whenever he's working, and Emily tells us there's a new standard for Privacy by Design, currently in the draft stage. [00:26:52] In Emilie and Winfried's work with implementing Privacy by Design, developing a standard on it, and talking to users, we learn what work they had to do to convince other people in their organization that it's a good idea, and they share some ideas on how other designers do that. [00:29:23] Winfried and Emilie gave a talk at FOSDEM, and we hear if they had any special notes about reaching out to open source designers or developers about how they could implement these principles into their work. [00:31:05] Find out where you can learn more about Privacy by Design and where to follow Winfried and Emilie on the web. Quotes [00:29:50] “It may be even easier for open source developers to work through the methodology because a lot of projects have clear stated principles as guidelines for what commits to accept or not.” [00:30:18] “When it's open source, it's much easier to show what you're doing in reality is what you show also, that it aligns.” Spotlight [00:33:08] Richard's spotlight is Privacy Badger. [00:33:28] Winfried's spotlight is the book, The Space Between Us by Cynthia Cockburn. [00:34:11] Emilie's spotlight is the book, Le Grand Vide by Lea Murawiec. Links Open Source Design Twitter (https://twitter.com/opensrcdesign) Open Source Design (https://opensourcedesign.net/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) Sustain Design & UX working group (https://discourse.sustainoss.org/t/design-ux-working-group/348) SustainOSS Discourse (https://discourse.sustainoss.org/) Sustain Open Source Twitter (https://twitter.com/sustainoss?lang=en) Richard Littauer Twitter (https://twitter.com/richlitt?lang=en) Winfried Tilanus LinkedIn (https://nl.linkedin.com/in/winfriedtilanus) Winfried Tilanus Twitter (https://twitter.com/winfriedtilanus) Emilie Tromp LinkedIn (https://www.linkedin.com/in/emilie-tromp-435a971/) Privacy Company (https://www.privacycompany.eu/en/home-en) Reframing Studio (https://reframingstudio.com/) Reframing Method (https://reframingstudio.com/reframing-method) Sustain Podcast-Episode 127: GitHub Maintainer Month with Marie Kochsiek of drip and Hélène Martin of ODK (https://podcast.sustainoss.org/guests/kochsiek) FOSDEM '23 Talk: Value Driven Design by Winfried Tilanus and Emilie Tromp (https://fosdem.org/2023/schedule/event/value_driven_design/) FOSDEM '20 Talk: Designing to change it all by Winfried Tilanus (https://archive.fosdem.org/2020/schedule/event/designing_to_change_it_all/) Better Together (Samen Beter) (https://www.samenbeter.org/) GIDS-HTI-Protocol (https://github.com/GIDSOpenStandaarden/GIDS-HTI-Protocol) VIP Vision in Design: A Guidebook for Innovators by Paul Hekkert (https://www.amazon.com/VIP-Vision-Design-Guidebook-Innovators/dp/9063693710) Privacy Badger (https://privacybadger.org/) The Space Between Us by Cynthia Cockburn (https://www.bloomsbury.com/us/space-between-us-9781856496186/) Le Grand Vide by Léa Murawiec (https://www.amazon.com/Grand-Vide-L%C3%A9a-Murawiec/dp/2901000703) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Emilie Tromp and Winfried Tilanus.
In today's digital world, online privacy is more important than ever. In this episode, we are joined by our resident nerd Thomas Tetter. We delve into online privacy and share essential tools that can help you safeguard your personal information and enhance your online security. From web browsers like Brave and Librewolf, ad blockers like UBlockOrigin and Privacy Badger, password managers like Bitwarden, and private search engines like Brave Search, Start Page, and Qwant, we cover a range of privacy-focused tools. We also discuss VPNs like Proton VPN and Mullvad VPN, the more private social media app Friendly, private email providers like Proton Mail and Tutanota Mail, the Linux operating system for enhanced privacy and security, and PiHole for network-level ad blocking at home. Join us as we explore these tools and provide practical tips on being more private online and protecting your digital footprint. Don't compromise your online privacy - tune in now to learn how to safeguard your personal information in the digital realm! SUPPORT US Starting at just $0.99/month https://anchor.fm/impactdefense/support Check out our partners and support our mission to educate others about self defense. Pick up some Blackout Coffee! www.ImpactGear.live/coffee, and use Coupon Code IMPACTDEFENSE for 10% off your order! Upgrade your holster to an Alien Gear Holster today at www.impactgear.live/aliengear Or if you prefer, check out We The People Holsters: www.impactgear.live/wethepeople Visit www.TheAtomicBear.com and use the coupon code IMPACTDEFENSE at checkout to get 20% off your entire purchase! Visit www.SirtPistol.com and use the coupon code IMPACTDEFENSE at checkout to get 10% off your firearm training tools! Visit www.Invisawear.com and use the coupon code IMPACTDEFENSE at checkout to get 10% off your entire purchase! Looking for quality at home exercise equipment? www.impactgear.live/flybird Looking for camping/storage food? www.impactgear.live/valleyfood Get your firearms and gear here: www.impactgear.live/brownells Build your custom AR here: www.impactgear.live/customgun Get ammo and more at Global Ordnance: www.impactgear.live/GO Check out some awesome holsters at: www.impactgear.live/JM4 Get the best hearing protection in the game: www.impactgear.live/proears Find Outdoor and Camping gear at: www.impactgear.live/outdoor Get awesome Concealed Carry Bags and Cases at: www.impactgear.live/elite Check out the many many knives at: www.impactgear.live/knifecountry For information on attending or hosting a seminar or class visit www.impactdefense.online Here are a few Everyday Carry Self Defense Tools that we like: Saber Pepper Spray: https://amzn.to/3ytSbKA Mace Brand Spray & Personal Alarm: https://amzn.to/3y6bkAG Atomic Bear Rebel Tactical Pen: https://bit.ly/3xYc4rA Fox 479 Folding Karambit: https://amzn.to/3bvPK0R Smith & Wesson Extreme Ops Karambit: https://amzn.to/3bpS2yv Train with the pistol without spending $1,000s on ammo: https://amzn.to/3Nx7DJS Self Defense Tool Reviews Playlist – https://youtube.com/playlist?list=PLiOlN6IhPUCeCigB0zjE-ki8KCqUEqfPJ Let's connect: Instagram – @impact_defense Twitter – @defenseimpact Facebook - www.facebook.com/impactdefense TikTok- @impactdefense YouTube- www.youtube.com/c/impactdefense Our mission with Impact Defense is to educate and inspire as many people as possible to take self protection seriously. --- Support this podcast: https://podcasters.spotify.com/pod/show/impactdefense/support
Featured Content (2:47) Frank Bouchard is the co-founder of Wipebook. During our conversation Frank and I talk about the following: The history and technology behind Wipebook's reusable notebooks Examples of how Wipebook's notebooks are being used in education settings Wipebook's technology in the future Why should people use and or purchase products from Wipebook EdTech Thought (26:13) Our AI Responsibility In a recent blog post, Fonz from My EdTech Life discusses the growing presence of artificial intelligence (AI) in education and the potential risks of overreliance on AI tools. His post highlights the importance of using AI as a tool for critical thinking and meaningful application, rather than a crutch that hinders learning. The post emphasizes the need to teach students responsible AI usage, including awareness of data laws, ethical concerns, and digital citizenship. By promoting a balanced approach to AI in education, students can be better prepared for success in the modern workforce. We also need to help our colleagues by sharing knowledge, experiences, and best practices related to AI in education. Actively seek opportunities Foster a culture of collaboration Provide mentorship and guidance EdTech Recommendation (0:00) 3 Must-have Chrome Extensions Save to Google Drive Have you ever found an article or image online that you want to save for later, but don't want to clutter up your bookmarks? Save to Google Drive is the perfect solution. This extension allows you to save web content like images, videos, links, and various types of files to your Google Drive for later viewing. This is a great way to keep everything organized in one place and easily accessible from any device. Compose AI Improving your writing skills is crucial in today's digital age, and Compose AI is here to help. This extension enhances grammar checking and generates text using AI to auto-complete sentences in your browser, such as in Gmail, Outlook, and Google Docs. Compose AI can also suggest ways to improve your writing and make it more engaging. Privacy Badger Privacy is a growing concern for many people, and Privacy Badger is here to help. This extension blocks trackers based on their behavior to improve privacy while browsing the web. Created by the Electronic Frontier Foundation, Privacy Badger helps protect your personal information and keep your browsing habits private. Just Give It A Try (34:47) New Canva Tools! Draw Magic Design Magic Presentation Magic Edit & Eraser Beat Sync Animation Translate House of #EdTech VIP (40:08) Alli McCrary Waltham, MA Teacher, EdTech Coach, Digital Literacy Focused, Chat GPT & AI Obsessed. aiclassroom.me
There are times when I find myself in unexpected territories. This is one of those times. It is why I'm trying to include more attention to the virtual mental health providers. If you have ever listed to a podcast or watch YouTube, you probably have heard or seen something about the company known as BetterHealth. You might have seen an advertorial from a social media influencer or from a podcaster. Yeah, this is pickle. BetterHealth presented itself as a service that helps users find and connect with behavioral health providers. Not only under the BetterHealth name but also under a number of doing business as names as: Faith Counseling - Christian focus therapy Pride Counseling - LGBTQ therapy focus Teen Counseling - Teens with parent approval Terappeutia - Spanish speaking users. The Federal Trade Commission (FTC) issued a complaint against the company BetterHealth had customers provide personal identifiable information. BetterHealth made promises and assurances about the level of privacy and security about user data. According to the FTC, the company shared user information with social media companies Facebook, Snapchat, Criteo and Pinterest. They also shared data to target former users with ads on those platforms. There is now a consent order that BetterHealth has agreed to follow. One of those things is not to share or sell visitors or users data to third parties. In this episode, I go over a bit more details but this is the gist of what happened with the company. If you need support contact the National Suicide Prevention Lifeline at 988 or 1-800-273-8255, the Trevor Project at 1-866-488-7386 or text “START” to 741-741. Resources Mentioned: Associated Press news story BetterHelp shared users' sensitive health data, FTC says There is a page on the Federal Trade Commissions website where you can obtain the original complaints, and the consent order. BetterHealth response to the consent order via their website. The National Law Review article about the FTC's One-Two Punch on Data Tracking and Health Privacy FTC Enforcement Action to Bar GoodRx from Sharing Consumers' Sensitive Health Info for Advertising Alternate Browsers, Search Engines and Add-Ons Brave Search Engine Duck Duck Go Search Engine Firefox Focus for mobile devices Privacy Badger from the Electronic Frontier Foundation Vivaldi Browser Disclaimer: Links to other sites are provided for information purposes only and do not constitute endorsements. Always seek the advice of a qualified health provider with questions you may have regarding a medical or mental health disorder. This blog and podcast is intended for informational and educational purposes only. Nothing in this program is intended to be a substitute for professional psychological, psychiatric or medical advice, diagnosis, or treatment.
Don't make the mistake of exposing your IP address and personal data. Make sure that you hack like a ghost. Doesn't matter if you just want privacy online or you want to be invisible. // MENU // 00:00 - Coming up 00:29 - Disclaimer 00:33 - Sparc Flow and How to Hack Like... books overview 04:24 - The "unrealistic" in the real world 05:56 - "How to Hack Like a Ghost" behind the scenes 08:30 - Love/hate relationship with the security industry // Advice for beginners 11:51 - Not knowing everything is fine 13:10 - Stakes as a Pentester vs Hacker 15:36 - How to cover your tracks // Wardriving, Proton VPN, Brave 23:52 - Linux Tails // Red teaming, bouncing servers 25:51 - Don't leave trails // Hacking big companies 28:25 - Chromebooks vs hackers 28:58 - Bouncing servers, Frontline servers, Command & Control servers, Redirectors 35:20 - The problem with CTFs 37:09 - Sparc Flow's journey to cyber-security 40:13 - Advice for beginners // How to get started 45:40 - Important skills to have 51:16 - SparcFlow's new book 53:31 - Conclusion // Books // Hack like a Ghost: https://amzn.to/3E2KAFm Hack like a Legend: https://amzn.to/3hh28F7 Hack like a Pornstar: https://amzn.to/3fw4L5r How to Hack Like a GOD: https://amzn.to/3TnkrG1 Ultimate Guide for being Anonymous: https://amzn.to/3Uv Counter Hack Reloaded: https://amzn.to/3zNjaB3 The Art of Intrusion: https://amzn.to/3sYPEEw // Software mentioned // Note: There are NOT affiliate links. Just listed here to hopefully help you: Proton VPN: https://protonvpn.com/ Brave: https://brave.com/ Privacy Badger: https://privacybadger.org/ uBlock Origin: https://github.com/gorhill/uBlock // CTFs // IppSec: https://www.youtube.com/ippsec LiveOverflow: https://www.youtube.com/LiveOverflow // SparcFlow's SOCIAL // Twitter: https://twitter.com/sparcFlow Blog: https://sparcflow.substack.com/ // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube Main Channel: https://www.youtube.com/davidbombal YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN... YouTube Clips Channel: https://www.youtube.com/channel/UCbY5... YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC... Apple Podcast: https://davidbombal.wiki/applepodcast Spotify Podcast: https://open.spotify.com/show/3f6k6gE... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com hack hacker hacking ghost tails tails linux linux hack like a ghost hack like a legend invisible online hide identity privacy cyber security kali linux ethical hacking penetration testing ethical hacker black hat book review how to hack cyber security course hacking books computer hacking cyber security career cyber security analyst online privacy internet security online privacy for kids online privacy and security online privacy tips online privacy guide internet security tutorial edward snowden brave browser tor protonvpn protonmail duckduckgo google graphite phone privacy browser privacy browser ios privacy broke hide online hidden identity anonymous bullying #hacking #privacy #hack
Son moteur, c'est sûrement la curiosité. Certes, le répertoire du Moyen-Âge et de la Renaissance est son terrain de jeu favori, les Machaut, Binchois, Dufay, Lescurel, Le Jeune, et maints polyphonistes oubliés et, voici plus de quarante ans, Dominique Vellard a fondé l'Ensemble Gilles Binchois pour les chanter. Mais il y a aussi le Vellard curieux de toutes les traditions, indiennes, sépharades, ottomanes, arabo-andalouses, qui n'aime rien tant que confronter avec elles son répertoire d'élection. Partant du Haut Moyen Âge et du chant grégorien, il est aussi un compositeur d'aujourd'hui. Peut-on imaginer des polyphonies qui exprimeraient le monde où nous vivons, avec des harmonies et des sonorités actuelles ? Sa réponse est oui. C'est la parution presque simultanée de deux disques, l'un dédié à des chansons de Guillaume Dufay, l'autre à des musiques liturgiques du dernier Liszt, qui a donné prétexte à cette conversation dans un parc, à bâtons rompus.
How to prevent companies from misusing cookie banners to collect users' data? What solutions are there to safeguard citizens' online privacy?We try to answer with Stefano Rossetti, a data protection lawyer at noyb.• Can you please briefly introduce yourself and your organisation? [1'06'']• Could you please tell us about the “500 GDPR complaints” and “browser signal” campaigns? [3'22'']• Is the GDPR a hindrance or a tool to fight this battle? [18'54'']• Besides being unlawful, what are the risks of this spread of users' information? [24'22'']• When I click “Refuse” (where possible), my Privacy Badger plugin still warns me that it has prevented potential third party cookies to track me. Are even lawful cookies really lawful? Or, in other words: Do we know what websites actually do with our data, besides banners' claims? [29'25'']• [From the audience] Is it lawful for companies to use, for whatever purpose, sensitive categories of data collected by tracking online users (even if one gives consent to that)? [34'44'']• [From the audience] What do you think about the Norwegian Consumer Council to completely ban surveillance advertising? [41'56'']• What do you think about Apple's initiative to protect users' privacy: is Europe letting big tech companies take the lead as policymakers on this matter? [48'00'']
You read that correctly. Facebook and Instagram are limiting advertisers' ability to to track -- teens. Not you and me, just our teenagers. Hopefully, this gets pushed to us all; however, until then, work to take your privacy back by installing browser extensions that block ads and trackers such as Privacy Badger from EDF and UBlock Origin. –––––––––––––––––––––––––––––– Let's continue our discussion! Follow me on Twitter at @dexter_johnson and visit http://DexJohnsPC.com to stay on top of my latest blog posts about the world of technology. Follow my tech news Twitter list: https://twitter.com/i/lists/1407003582264655878 Share this podcast with a friend! Links from this episode: https://www.engadget.com/facebook-instagram-limit-targeted-ads-teens-130055774.html?src=rss Intro music details: –––––––––––––––––––––––––––––– RETRO Xcape by Lahar https://soundcloud.com/musicbylahar Creative Commons — Attribution 3.0 Unported — CC BY 3.0 Free Download / Stream: https://bit.ly/retro-xcape Music promoted by Audio Library https://youtu.be/eHHMlcSVBgE –––––––––––––––––––––––––––––– Outro music details: –––––––––––––––––––––––––––––– Reloaded by Savfk - Music https://soundcloud.com/savfk Creative Commons — Attribution 3.0 Unported— CC BY 3.0 Free Download / Stream: https://bit.ly/_reloaded Music promoted by Audio Library https://youtu.be/IlUSKojxLxU ––––––––––––––––––––––––––––––
Is it possible for you to view your FLoC ID right now? And if so, can you decode this ID to understand what Google is learning about you from it? Does FLoC require your consent or cooperation from the sites you're visiting? Are there tools to block this and, if so, how effective are they? In part 2 of my discussion with EFF's Bennett Cyphers, we'll answer these questions and many more. Google's FLoC proposal depends on Google being a "benevolent and omniscient overseer", which is a bad bet. Even if Google manages to get the technology right and carefully avoids tracking "sensitive" info, there's nothing saying it won't change this later - on purpose or by accident or both. And given the rabid desire by data mining companies to monetize your information, FLoC may enable new forms of tracking and fingerprinting. Bennett Cyphers is a staff technologist on the Tech Projects team. He works with a variety of teams across EFF, focusing on consumer privacy, competition, and state legislation. He also assists with development on Privacy Badger. Outside of work he has hobbies and likes fun. Further Info: Ditch Chrome, switch to Firefox: https://firewallsdontstopdragons.com/its-time-switch-to-firefox/ Donate to Mozilla (Firefox): https://donate.mozilla.org/en-US/Am I FLoC'd? https://amifloced.org/ Disable Amazon's Sidewalk: https://www.amazon.com/gp/help/customer/display.html?nodeId=GZ4VSNFMBDHLRJUK HUGE sale on my book right now! Use code SUMMER2021: https://www.apress.com/us/book/9781484261880Would you like me to speak to your group about security and/or privacy? http://bit.ly/Firewalls-SpeakerGet your custom d20 challenge coin! https://firewallsdontstopdragons.com/get-your-official-challenge-coin/ Generate secure passphrases! https://d20key.com/#/Become a Patron! https://www.patreon.com/FirewallsDontStopDragons
The public has voted and the results are in: people do not want to be tracked. In response, like pop-up ads before them, third party cookies are now being blocked by default by just about every browser - except Chrome. Google (who owns Chrome) is an ad company who relies on web tracking to make 90% of their revenue. With the writing on the wall, they and other ad tech companies are scrambling to find other ways to track people. Google has proposed a new system they call Federated Learning of Cohorts, or FLoC, which they claim can replace most of the tracking capability of third party cookies while somehow managing to preserve users' privacy. Today, I will discuss this new proposal with Bennett Cyphers of the Electronic Frontier Foundation: how it works, how they are rolling it out, and why EFF believes that FLoC is not the way to go. Bennett Cyphers is a staff technologist on the Tech Projects team. He works with a variety of teams across EFF, focusing on consumer privacy, competition, and state legislation. He also assists with development on Privacy Badger. Outside of work he has hobbies and likes fun. Further Info: Get your custom d20 challenge coin! https://firewallsdontstopdragons.com/get-your-official-challenge-coin/ Become a patron! https://www.patreon.com/FirewallsDontStopDragons Would you like me to come speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGoogle’s “Sensitivity of Cohorts” paper: https://docs.google.com/a/google.com/viewer?a=v&pid=sites&srcid=Y2hyb21pdW0ub3JnfGRldnxneDo1Mzg4MjYzOWI2MzU2NDgw Google’s FLoC API spec: https://github.com/WICG/floc Am I FLoC’d? https://amifloced.org/ Opt out of NHS data sharing: https://www.ft.com/content/9fee812f-6975-49ce-915c-aeb25d3dd748
While law enforcement touts the benefits of cell site simulators, today we will talk about the negative impacts, as well. While the actual impacts are not documented due to secrecy, we have to wonder whether Stingrays could interfere with critical communications like 911 calls, for example. We also must understand that any tool can be used for good and for evil, by the "good guys" as well as the "bad guys". In an effort to bring more transparency, Cooper created Crocodile Hunter (a reference to Steve Irwin, who was tragically killed by a real-life stingray). Cooper explains how it works and how anyone can make one. And finally we'll talk about why it's so important to get out there and fight for more transparency. Cooper shows us what a difference this can make in your community with two very different situations in two US cities. Cooper Quintin is a security researcher and Senior Staff Technologist with the EFF Threat Lab. He has worked on projects such as Privacy Badger, Canary Watch, and analysis of state sponsored malware campaigns such as Dark Caracal. He has also performed security trainings for activists, non profit workers and ordinary folks, and given talks about security research at security conferences around the world. He previously worked building websites for non-profits, such as Greenpeace, Adbusters, and the Chelsea Manning Support Network. Cooper was also an editor and contributor to the hacktivist journal, “Hack this Zine.” He has spoken at multiple black hat conferences about security issues ranging from IMSI Catchers to Malware attacks against journalists. Further Info BECOME A PATRON! https://www.patreon.com/FirewallsDontStopDragonsElectronic Frontier Foundation (EFF): https://www.eff.org/ EFF’s Electronic Frontier Alliance: https://www.eff.org/electronic-frontier-alliance Crocodile Hunter project: https://github.com/EFForg/crocodilehunterHow IMSI catchers work: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networksEFF page on IMSI catchers: https://www.eff.org/pages/cell-site-simulatorsimsi-catchersWhy 5g won’t help: https://www.eff.org/deeplinks/2019/01/5g-protocol-may-still-be-vulnerable-imsi-catchersDIGITS documentary: https://curiositystream.com/video/1720My new Apress video: Maximum Privacy with End-to-End Encryption https://link.springer.com/video/10.1007/978-1-4842-7034-9
The single easiest way to track someone today is using their cell phone. We have them with us at all times and in order for them to work, they must be tracked by the cell phone network. When law enforcement wants to identify people at a protest or hanging around a particular area, they could take the time to get a warrant to present to multiple cell phone providers. Or they could simply bring in a portable, fake cell site. Any cell phones in the area will reveal their location to all nearby cell sites, and the owners of those phones will be none the wiser. The use of cell site simulators (often known by a particularly popular model called a "Stingray") is heavily shrouded in secrecy. Even their very existence was denied for years. Today, we'll talk with a man who has made it his mission to uncover the use of such devices. We'll talk about how they work, why they're so hard to detect, and the broader implications of their use by police and sheriff's departments with little to no oversight. Cooper Quintin is a security researcher and Senior Staff Technologist with the EFF Threat Lab. He has worked on projects such as Privacy Badger, Canary Watch, and analysis of state sponsored malware campaigns such as Dark Caracal. He has also performed security trainings for activists, non profit workers and ordinary folks, and given talks about security research at security conferences around the world. He previously worked building websites for non-profits, such as Greenpeace, Adbusters, and the Chelsea Manning Support Network. Cooper was also an editor and contributor to the hacktivist journal, "Hack this Zine." He has spoken at multiple black hat conferences about security issues ranging from IMSI Catchers to Malware attacks against journalists. Further Info BECOME A PATRON! https://www.patreon.com/FirewallsDontStopDragonsElectronic Frontier Foundation (EFF): https://www.eff.org/ EFF’s Electronic Frontier Alliance: https://www.eff.org/electronic-frontier-alliance Crocodile Hunter project: https://github.com/EFForg/crocodilehunterHow IMSI catchers work: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networksEFF page on IMSI catchers: https://www.eff.org/pages/cell-site-simulatorsimsi-catchersWhy 5g won't help: https://www.eff.org/deeplinks/2019/01/5g-protocol-may-still-be-vulnerable-imsi-catchersSea Glass project: https://seaglass.cs.washington.edu/ Sitch project: https://sensor.readthedocs.io/en/latest/ My new Apress video: Maximum Privacy with End-to-End Encryption https://link.springer.com/video/10.1007/978-1-4842-7034-9
Mit wenigen Klicks lassen sich Internet-Browser um nützliche Funktionen erweitern. Doch Vorsicht: Auch wenn solche Erweiterungen nichts kosten, zahlt man oft mit seinen Daten. Firefox, Chrome, Safari, Edge – für alle der meistverbreiteten Internet-Browser gibt es Erweiterungen, die dem Browser neue Tricks beibringen. Browser-Erweiterungen können auf den Webseiten der entsprechenden Anbieter heruntergeladen werden oder aus den Webshops der Browser-Betreiber. Mit wenigen Klicks sind sie installiert und von da an im Browser aktiv. Es gibt zu viele solche Erweiterungen, um sie hier alle aufzuzählen. Darum beschränken wir uns auf einige der praktischsten Anwendungen: Geld sparen Honey ist eine Erweiterung, die automatisch nach Coupons und Rabattmarken sucht, mit denen sich beim Einkauf in Online-Shops Geld sparen lässt. Beim Bezahlen wird der Rabatt-Code wiederum automatisch eingefügt. Tabs managen Wer im Browser gerne Dutzende von Tabs mit verschiedenen Webseiten offen lässt, strapaziert die Ressourcen seines Computers, denn jeder offene Tab verbraucht Speicherplatz. Mit OneTab lassen sich all die offenen Tabs auf einer Übersichts-Seite als Links speichern und später wieder öffnen. The Great Suspender dagegen versetzt die Tabs bloss in Schlafzustand, so dass sie keine Ressourcen mehr verbrauchen und schnell wieder geöffnet werden können. Werbung blockieren Manche Webseiten sind mit Werbung zugepflastert, kaum mehr lesbar und langsam zu laden. Ein Werbeblocker kann Werbefenster ausfiltern und nur noch den eigentlichen Inhalt einer Webseite anzeigen. Es gibt viele verschiedene Werbeblocker, uBlock Origin gilt weitherum als einer der besten. Aber Achtung: Manche Online-Publikationen sind auf Werbeeinnahmen angewiesen. Ein Werbeblocker entzieht ihnen diese Ressourcen. Ausserdem gibt es Werbeblocker, die selber Daten ihrer Nutzerinnen und Nutzer sammeln und an die Werbewirtschaft verkaufen. Privatsphäre schützen Die meisten Browser-Erweiterungen sind gratis. Das heisst aber nicht, dass ihre Nutzer nichts bezahlen: Erweiterungen können unter Umständen mitlesen, welche Seiten im Internet besucht werden und wie lange – Daten, die für die Werbewirtschaft sehr interessant sind. Nutzerinnen und Nutzer zahlen deshalb oft mit ihren Daten. Die Erweiterung Privacy Badger der NGO Electronic Frontier Foundation überwacht und blockiert Mechanismen, mit denen unsere Spuren im Internet ausgeschnüffelt werden. In beschränktem Mass kann der Privacy Badger auch als Werbeblocker eingesetzt werden.
The His & Her Money Show: Managing Money, Marriage, and Everything In Between
Here at His & Her Money, we like to cover all the bases when it comes to family life, and parenting our children is a huge part of that. Every parent just wants to set their kids upright, so today we're tackling a ridiculously important and ridiculously under-discussed topic around protecting our kids: internet security. On today's episode of the His & Her Money Show, we've got Chelsea Brown on board to break it all down for us. Chelsea is an ethical hacker, which means she's a web wizard with a cybersecurity degree to back it up. Her peers' experiences with cyberbullying and doxing back in the Myspace days inspired her career path, and today her job is all about navigating the internet and all the technology that comes along with it, and coaching parents how to keep their kids safe in a space that's not always kid-friendly. Check out Chelsea and learn more at digitalmomtalk.com! RESOURCES MENTIONED Authy App | authy.com/ OurPact App | ourpact.com/ uBlock | ublock.org/ Privacy Badger | privacybadger.org/
Browserlar tek başına yeterli mi? ShortCAST bu hafta browser eklentilerine odaklanıyor. 1Password, XTab, Privacy Badger ve daha fazlası. (1:00) Kullandığımız browserlar (1:27) İlkan neden Chrome'u tercih ediyor? (3:30) Emre hangi browserları kullanıyor (7:14) XTab öneriyor muyuz? (8:08) 1password olmazsa olmazlarımızdan (9:38) Foxclock (11:00) Ublock - HTTPS Everywhere ve Privacy badger güvenlikte olmazsa olmazımız (12:42) Shareaholic (13:40) Translate ve Grammarly çok farklı dillerde sitelerde gezerken büyük katkı sağlıyor (14:32) Stayed Focus, Webtime Tracker ve Netflix Party önerir miyiz? 21.50 - Invid ve biraz derinlemesine araştırmalar ShortCAST'i sosyal medyadan takip edebilirsiniz! Twitter: twitter.com/shortcast_pod Instagram: www.instagram.com/shortcast_pod/
Nyheter Microsoft håvar in npm: https://github.blog/2020-03-16-npm-is-joining-github/ Authy beta till Linux (tack Christer): https://authy.com/blog/authy-desktop-now-available-in-beta-for-linux/ Firefox ångrar sig om TLS 1.0/1.1: https://www.mozilla.org/en-US/firefox/74.0/releasenotes/ Coronaviruset pressar internet: https://blog.cloudflare.com/on-the-shoulders-of-giants-recent-changes-in-internet-traffic/ Otrevligheter Nya Edge sämst på privacy?: https://www.scss.tcd.ie/Doug.Leith/pubs/browser_privacy.pdf Trevligheter Flameshot: https://flameshot.js.org Worldwide hackathon för bristfällig utrustning: https://www.coventchallenge.com/ Utmaningar Alex PinePhone Intet nytt, men Anbox gör framsteg ### Sebs Linuxäventyr Alex testade PoE lite snabbt Meta Lars tipsar om Privacy Badger (webbläsartillägg) Kvartalsbrejk, ses igen 6e april Kontakta oss Hemsida: https://trevligmjukvara.se Mail: kontakt@trevligmjukvara.se Twitter: @trevligmjukvara (https://twitter.com/trevligmjukvara) Telegram: Trevlig Mjukvara (https://t.me/trevligmjukvara) Mastodon: @trevligmjukvara (https://mastodon.linuxkompis.se/@trevligmjukvara) GitHub: Trevlig Mjukvara (https://github.com/trevligmjukvara) Tack till Ljudeffekter från https://www.zapsplat.com/ Musik från https://filmmusic.io "Pixelland" av Kevin MacLeod "NewsSting" av Kevin MacLeod "Toccata and Fugue in D Minor" av Kevin MacLeod "Beautiful World - Epic and Uplifting Motivational Trailer" av Rafael Krux "Black Knight" av Rafael Krux "Pixel Peeker Polka - Faster" av Kevin MacLeod Licens för alla: CC BY 4.0 (http://creativecommons.org/licenses/by/4.0/) Grafik och font i loggan: Ok-emoji: emojione version 2.2.7, https://commons.wikimedia.org/wiki/File:Emojione_1F44C.svg (CC BY 4.0) Font: Sulphur Point av Dale Sattler, https://fonts.google.com/specimen/Sulphur+Point (OFL)
This week, Tim and Ruth talk all things smartphones. We kick things off in Tech News with a rundown of cellphone battery myths and truths, and then we jump into the discussion of Android or iPhone in your small business- does it matter to declare your company "for" one or the other? Lastly, we're chatting about the EFF's browser extension Privacy Badger, and talking a little about why the EFF is such an important institution for online privacy matters.
Good morning everybody! I was on with Ken and Marty (who was sitting in for Matt.) We had a good discussion Setting up a new computer and How you can protect yourself from Ransomware. Here we go with Ken and Marty. These and more tech tips, news, and updates visit - CraigPeterson.com --- Automated Machine Generated Transcript: Craig John McAfee, here's the guy that started the Anti-Virus movement by many arguments, saying, our software is useless. Don't buy it. Craig Hey, I was on with it was Marty this morning in place of Matt and Ken Altshuler, and of course, yesterday was the big election day in Maine on Super Tuesday. We didn't talk about that, really because we spoke about Marty's new computer and what you should do with a new computer, so I gave him the advice that I give all of my employees. It is what we do when you get a brand new computing device. Ken Well, now Craig Peterson is on. How are you? Craig Hey, good. Yeah, blame it on rank choice voting, I think. Marty So everybody's second choice. Ken Let's start talking about ransomware, shall we? I mean, so does ransomware work? Do people pay ransoms? Craig You'd have to ask the question, right? How Does it still work? Ransomware has been around for two years. Well, it goes back further than that. It was two years ago certainly had the vast, huge, massive hit on ransoms. That has brought down multinational companies for weeks, in some cases, very, very big deal. It's kind of fallen off. People aren't thinking much about it anymore. They're not protecting themselves. Now we've got this warning that's come out about ransomware. It is back with a vengeance. Kind of what you alluded to here, Ken has happened. We're no longer just seeing ransomware encrypting our data. What's happening now is ransomware gets onto your computer, and it's a whole new generation. What it does now is it starts poking around your computer, looking for Word documents, looking for your spreadsheets, and in your case, I think it would be what Word Perfect documents. Ken Word Perfect. The best word processing program ever made. Oh, all the legal guys like eight and a half by 14 and all that. Craig Yeah, yeah, exactly. It looks for those, and then it sends them back to the bad guys. Then the bad guys have a look at them and say, Okay, is there any real value here might there be something else on that computer? Can we spread laterally throughout the organization? Then they will hop on your computer unbeknownst to you because your laptop called home when it got this new kind of Once they've got all of the data off your computer that they want, then they probably will encrypt all of your data for the heck of it. They will put a ransom up on your screen. Now what they're doing, and this is up dramatically now we're talking about more than seven and a half billion dollars here in the US ransomware the last couple of years. What they're doing now is they're saying, Hey, I'll pay up Ken, or we're going to release all of your client files, even though nobody can read the WordPerfect files anymore. All of your client files to the internet, all of your personal information, your trade secrets, intellectual property, pay up, or else. The FBI is warning about this increase in is a new type of ransomware. It grew by 100% over the last two quarters. It is getting dramatic is getting out of control. What people need to do here is to protect themselves. Backups. However, having backups would help with the encryption, right? Because you can restore your files from the backup. But, it's not going to help with the, "Hey, we're going to release all of your information if you don't pay up." We have to start doing penetration tests on our systems, making sure that they're relatively safe. I'm going to have some training on that coming up. Starting next week, on some of the things you can do just some free training. Absolutely. I'm not selling anything in this course, right. I do have some classes for sale, but I'm trying to help out because, man alive there is some nasty stuff happening right now to home users, as well. It's the businesses that are more likely to pay this type of violence. What Jack Sparrow type of ransom. Yeah, that's something we don't want. I hope people will, will take advantage of that and avoid that in their business. Marty So Craig Marty here. A question that just came up for me at my nonprofit ET-tech is that we just bought a new HP laptop and it has McAfee antivirus on it now. I hate that program, to be frank. It takes forever. And I've said to my staff, and we don't need that. Whatever comes with Windows Windows Defender is fine. Delete McAfee. Was that the right call? Craig Oh, Marty, Marty. Marty. You're right. Here's the dirty secret right now when it comes to antivirus software. It is 100% ineffective, 100% useless when it comes to these modern types of attacks. When you're talking about McAfee, Norton, it's just mind-blowing here. John McAfee has a video out on YouTube that you can watch anytime you'd like. We're here. Here's John McAfee. The guy that started the industry by many arguments, saying, our software is useless. Don't buy it. Right. Oh, he doesn't own the company anymore, but that's what he's saying. You've got one of the top people over at Symantec Norton. There, I think he was VP of Marketing, if I remember right, getting caught saying at any event here after a couple of drinks, that their software is useless, and of course, losing his job shortly after that. The antivirus software industry is trying to mess with us. Frankly, now that McAfee probably paid about $2 to Microsoft or, in this case, HP is more likely about two bucks HP to have their software installed on your computer because they hope you're just going to go ahead and do it. So here are the basics of what you're going to do. It ties in with these tutorials that I'm going to have in the next few weeks because the right thing to do is get rid of all of that kind of extortion where they get onto your computer when you buy it new. So the first thing I do, Marty is a completely erase the computer, I mean, completely reformat the disk, and reinstall Windows without all that extra crap on it. And then, I turned on Windows Defender and made sure it's turned on and make sure you turn on automatic updates. Then I go in and configure Windows Firewall because, for some reason, Microsoft shipped it with a firewall. Yet the way they have everything turned on makes the firewall almost entirely useless, which drives me crazy. There's a configuration that you have to do on that, and I'll be talking about that a little bit if you listen to my show on Saturday at one o'clock I'll be starting to talk about these things. Next week, I'm going to have a lot more, but one o'clock every Saturday, by the way. So, Marty, you are right, you are going to get a lot of defense, just by turning on Windows Defender. I would also advise that you to use OpenDNS or Umbrella, you can use a free version, and there's a paid version that is going to stop this type of ransomware we just talked about. Right there with the OpenDNS, even the free version. For my customers, I use the commercial version, which I sell to them and support them. That's number one. There are several other things you should do to try and keep your computers safe. I'm going to go through step-by-step what to do and how to turn all these things on. On the browsers, you can turn on a few different things. You're going to want to have Ghostery on there, you're going to have Ublock Origin on there, and you are also going to have Privacy Badger on there. Those are few things that I'll be talking about in these webinars coming up and showing you guys exactly what to do and how to do it. Marty We are talking to our tech guru Craig who joins us every Wednesday at 730. Let's go to Shark Tank. One of the judges or sharks of Shark Tank lost, for $200,000, which kind of drop in the bucket for me, but probably hurt her a little bit, but then got it back. Yeah. How did she get it back is my question because the FBI warns you that you're not getting that money back? Craig Yeah, ever. It's gone. They're saying that, after 90 seconds, the money is out of the country, which is true, in this case, as well. And what happened is this is a business email compromise here real quick. And there was a bad guy who did a little bit of research on Barbara Cochran, who is this one of these Investors over in Shark Tank. They found out who her assistant is. They found out who her bookkeeper is. And they sent some fake emails and the bookkeeper wired some money 388,000 bucks to a bank over in Germany based on the email. The big mistake on the bookkeeper's part was that the bookkeeper responded to the email asking for the money to be wired. The email address of the assistant was one character off. So they just kind of faked it. Then they found out about it because when the bookkeeper wired the money. The bookkeeper forwarded the wire confirmation to the assistant using the correct email address. The assistant said what the heck's going on here, called the bank immediately, and was able to get the German bank to freeze the account before it got wired out in this case, to China. Usually, it's Eastern European countries that have people that are doing this, but in this case, it was China. Surprisingly enough, Barbara Corcoran got back all of her money minus wire fees from his from this bank over in Germany. And you're right can this like never happens you never get your money back. Yeah, I was shocked about it. I mean, that was unbelievable. Yeah, it was shocking to her too. So be careful on these emails. Always confirm with a phone call. You know, use it. Just stop and think about what would do? Well, ten certainly would not send an email you never get. He gets his dial phone, their rotary phone, and he would call someone, and that's what you should do. You know this, this new tech is terrific. But in reality, pay close, close attention, particularly when it comes to stuff like this. I've worked with companies that have had all of their money stolen, and we worked with the FBI to start investigations for them. Although they will investigate, you never get your money back, right. Ken Craig Peterson, our tech guru, joining us as he does every Wednesday. Thank you so much, Craig. Appreciate it. We'll talk to you next week. Craig Thanks, guys. Bye-bye. Ken Okay. All right. Let's get CBS News and when we come back Transcribed by https://otter.ai --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
O&O ShutUp 10CalendlyFantasticalTextExpanderCloudAppThingsFirefox add-ons: uBlock Origin, https Everywhere, Privacy Badger, Enhancer for Youtube, Decentraleyes, Cookie Autodelete, Invidition for Invidio.us, Password Manager add-onMagnet
Welcome to The Solid Podcast: Season 3 Episode 2. In the last episode we covered how the big tech companies use cookies, trackers and browser fingerprinting to follow your web surfing. They then use that information to target advertising directly to you and your "framily" (friends & family). In this follow up episode I teach you several ways to block these trackers or control them to your liking. After listening to this episode you will be able to safely put the tinfoil snap backs away and bust out your New Era's signature 59FIFTY with your favorite team on it.
On the day after Data Protection Day (or Privacy Day, depending on whether you are tomato or tomato) we take a look at privacy enhancing technologies - how to control, restrict and eliminate your personal data footprint (if that’s what you want to do). This podcast will be invaluable for privacy professionals that want to know what PETs are available and for consumers that would like to have greater control of their digital profiles. GDPR Now! Is brought to you by This Is DPO. www.thisisdpo.co.uk. Guest/s Abigail Dubiniecki Data Protection Specialist My Inhouse Lawyer https://www.linkedin.com/in/abigaild/ Host Mark Sherwood-Edwards info@thisisdpo.co.uk Materials Competition and Markets Authority (UK competition regulator) report on digital advertising https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants Links to PETs (Privacy Enhancing Tech) and resources mentioned in the podcast (and more!) Disclaimer – not endorsing any PET in particular, just sharing info. Want a pretty version or more explanation? Check out my LinkedIn profile for a Slideshare of a presentation and handy Infographic – available next week. Let’s help build this list. Which PETs are you using or curious to try? If they’re not here, let Abigail know via contact details in the show notes so I can update my list. Inform yourself, update software, adjust privacy settings, use 2FA! Privacy Analyzer (https://privacy.net/analyzer): Analyses your browser to reveal what can be learned about you and recommend actions you can take DuckDuckGo Device Privacy Tips https://spreadprivacy.com/tag/device-privacy-tips/ ‘Learn’ tab in the DisconnectMe Privacy Pro VPN (iOS only) – ‘learn’ materials available without paying. Just download the app and click!: https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1 Consumer Reports articles & videos with quick-fixes in bite-sized pieces: https://www.consumerreports.org/privacy/linkedin-privacy-settings/ www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/ Terms of Service, Didn’t Read (TOSDR https://tosdr.org/): one-stop shop for digested Ts & Cs of most popular online providers, including score cards. Brilliant browser add-on offers automatic assessment of pages you access. Addresses privacy notices & terms e.g. cancellation, etc. Ghostery (www.ghostery.com) lets you block ads and trackers, watch the watchers, and speed up your browser with a suite of products, some of which are free, others reasonably privacy. A new product – Ghostery Midnight (www.ghostery.com/midnight) – claims to protect your entire device while giving granular preference management at the app-by app level. Sounds like having your own personal privacy watchdog on your device. Extension is free!! But some of the other products are paid. Baycloud (https://baycloud.com) was one of the early champions of privtech, starting in the DNT space. They offer B2C and B2B resources. Baycloud Bouncer let reveals who’s tracking you and gives you a handy dashboard to adjust your preferences (https://baycloud.com/bouncer). You can also pre-scan websites you’d like to visit from the comfort of Baycloud’s site. Try before you buy (so to speak, with your data I mean). Free!! Have I been pwned?(https://haveibeenpwned.com) will help you check whether your account or credentials has been compromised based on research into the (sigh) multitudinous data breaches. Free!! DuckDuckGo privacy report card for websites (https://duckduckgo.com/app): instantly evaluates and remediates websites you visit to give you a before and after score. Browser add-on for various browser types on desktop but only available for iOS on mobile. Free!! Deseat.Me (www.deseat.me) : Helps you clean up your online presence by instantly getting a list of all your accounts, allowing you to sort through and delete them / unsubscribe. Personal Data.io: A self-named “integrated toolbox addressing surveillance capitalism”. This advocacy group goes beyond providing tools for e.g. filing DSARs, there is a forum (https://forum.personaldata.io) and a number of chat groups for trouble-shooting, contributing, advocacy and knowledge-exchange) You can share your experience or tap into people’s expertise, commiserate or find journalists to raise awareness about your experience or discoveries. This is the group that helped journalist Judith Duportail, who was researching dating apps, learn that Tinder had over 800 (disturbing) pages of data on her. Worth a read here: https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold My Permissions(https://mypermissions.com): app that does a privacy scan (Privacy Cleaner) of your social media / collaboration apps to help you identify who can access your data. It identifies your current permissions and let’s you quickly and efficiently manage them all from one place. A small fee required to manage permissions, but there is a free tier. Princeton IoT Inspector (https://iot-inspector.princeton.edu/) let’s you watch your smart devices back. Automatically discovers IoT devices and analyzes their network traffic to identify security and privacy issues. Currently only available on MacOS High Sierra or Mojave (waitlist for Windows, Linus and MacOS Catalina). PiHole for Raspberry Pi (https://pi-hole.net): Protect your entire network from ads and targeting. Block in-app and SmartTV ads. Free!! but powered by donations. You need a supported OS and hardware (Raspberry Pi). Strong Passwords: NCSC ‘3 random words’ guidance: https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/use-a-strong-and-separate-password-for-email. Test password strength on Comparitech: https://www.comparitech.com/privacy-security-tools/password-strength-test/. Generate secure, unique passwords with https://1password.com. VPN, tracking-blockers, ad-blockers, including some in-app / whole-of-device options and free web extensions: Bitnet Defender (https://www.bitdefender.com/toolbox) Guardian (https://apps.apple.com/us/app/guardian-firewall-vpn/id1363796315) Disconnect.Me (https://disconnect.me) ProtonVPN (https://protonvpn.com) Adblock Fast (https://adblockfast.com) HTTPS Everywhere (https://www.eff.org/https-everywhere) Privacy Badger (https://www.eff.org/privacybadger) Privacy Possum (https://download.cnet.com/Privacy-Possum/3000-11745_4-77899656.html) Who Targets Me browser extension re: political microtargeting (https://whotargets.me/en/) Private Search and Browsers: DuckDuckGo! (https://duckduckgo.com) StartPage.com (www.startpage.com) Qwant & QwantJR (https://www.qwant.com) Ecosia (https://ecosia.org) Firefox (https://www.mozilla.org/en-GB/firefox/new/?redirect_source=firefox-com) Brave (https://brave.com) Cliqz (https://cliqz.com/en) Use their brilliant add-ons like Facebook Container, universal cookie consent. Private chat, calls, collab: jitsimeet (https://meet.jit.si) Signal (www.signal.org) Wire (https://app.wire.com/auth) NextCloud Talk (https://nextcloud.com/talk). Secure email: Proton Mail (https://protonmail.com) NextCloud (https://nextcloud.com/athome/) Lock down social media (or switch to something better): Data Detox story: https://onezero.medium.com/find-out-what-google-and-facebook-know-about-you-31d0fa6d7b61 CitizenLab security planner: https://securityplanner.org/#/ Surveillance Self Defense social media tool: https://ssd.eff.org/en/module/protecting-yourself-social-networks; Private social networks: Minds (https://www.minds.com/) MeWe (https://mewe.com) Mastodon (https://mastodon.social/about) Diaspora (https://diasporafoundation.org/) Popjam (for kids): https://web.popjam.com/home. Exercise your rights, control your online identity: TapMyData (https://tapmydata.com/) Deseat.me (https://www.deseat.me/) Just Delete Me (https://justdeleteme.xyz) Data Rights Finder (https://www.datarightsfinder.org) Personaldata.io forum (https://forum.personaldata.io/) Yoti (https://www.yoti.com) SecureKey’s Verified.Me (Canada only for now: https://verified.me/) Take your data back: Personal Data Accounts: Hub of All Things (Dataswift): https://www.hubofallthings.com/ Digi.Me (https://digi.me) MesInfos (http://mesinfos.fing.org/english/) inrupt (https://inrupt.com/) Go forth and make good privacy choices: Exit Google Maps and use TomTom instead (https://www.tomtom.com/en_gb/) Read & support creators and journalists in ad-free, targeting free spaces like Correspondent (https://thecorrespondent.com/) & Medium (https://medium.com/) Listen to (or create your) Podcasts on Radio Public (https://radiopublic.com/) Pickatale reading & audio app for kids age 0 - 10 (https://pickatale.co.uk/) OneZeroMe Financial Passport (https://onezero-me.com/) Get value from it (or share the love!): Brave Rewards (https://brave.com/brave-rewards/); My Good-Loop ethical adtech (https://my.good-loop.com/#my); My Offrz (https://myoffrz.com/en/fuer-nutzer/); HATDeX (https://hatdex.dataswift.io/). Give back Privtech folks & advocates work hard & use their incredible expertise to make a difference. Help fund them. Pay for their tools. Support their cause. Contribute your own sweat & skills. Spread the word. Most BigTech apps who’ve lost their way were starving startups at some point. Help privtech scale!! It means a better future for all of us. Help Open Rights Group make more privacy notices machine-readable: https://generator.projectsbyif.com/; Participate in workgroups like Forum.PersonalData.io; Donate money, time or skills to TOSDR, PiHole, and others asking for help. Still want more? Learn here: The Ultimate Guide to Online Privacy – 150+ Ninja Tips: https://fried.com/privacy ; Privacy Tools.io : https://www.privacytools.io/ Reset the Net Privacy Pack: https://pack.resetthenet.org/; Data Ethics.eu: Digital Self Defense tab; news; CitizenLab’s Net Alert keeps you updated on online threats & offers solutions. Security Planner is very handy. NCSC Top Tips for Staying Secure Online; Data Rights Finder (Open Rights Group). Special Guest: Abigail Dubiniecki.
We know that we're tracked, but what remains largely invisible is the massive economy working behind the scenes (or "mirror") to buy, sell, trade and bid on you and your data. I've seen estimates that claim there are up to 4000 data brokers in the US alone. And what's worse is that they are largely unregulated, making the data market a total free-for-all. What can you do to curb this tracking and selling of data? We'll discuss that in the conclusion of my interview with the EFF's Bennett Cyphers. Bennett Cyphers is a staff technologist on the Tech Projects team at the Electronic Frontier Foundation (EFF). He contributes to a variety of different projects within EFF, most of them tied to privacy and competition. In the past year, he's worked on the tracker-blocking browser extension Privacy Badger, provided technical advice to lawyers and activists, and read and re-read the California Consumer Privacy Act. Before coming to EFF, he was a policy intern at Access Now and earned a Master's degree for work on privacy-preserving machine learning. In his spare time he designs t-shirts for fake punk rock bands. Further Info EFF’s Behind the One-Way Mirror: https://www.eff.org/wp/behind-the-one-way-mirror Setting Apple ID to zero (“limit ad tracking”): https://blog.tenjin.com/idfa-sends-all-zeros-on-ios-10-devices-2/Best & Worst Gifts for 2019: https://firewallsdontstopdragons.com/best-worst-gifts-2019/ The Scoring of America: https://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdfCorporate Surveillance in Everyday Life: https://crackedlabs.org/en/corporate-surveillance
Welcome! The Holidays are almost here -- Hannakah begins tonight and the middle of next week is Christmas - Boy this year has flown by. There is a lot of Tech in the News so let's get going! For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Signature Anti-Virus does not adequately protect you from today's Malware Lessons We Failed To Learn and Therefore Are Doomed To Repeat Business Computers Should Only Be Used For Business 5G - Not Ready For PrimeTime...Yet! Are You At Risk from Your Outsourced Software Provider Security - Knowing What You Have Is Essential Chrome 79 will continuously scan your passwords against public data breaches Getting the Perfect Tech Gift for Your Special "Techie" --- Automated Machine-Generated Transcript: Craig Peterson Hey, hello everybody, Craig Peters on here on w GAM and online at Craig peterson.com. Hopefully, you're able to join me on Wednesday mornings as well as I am on live with Ken and Matt, we always talk about the latest in technology and news and of course in security since that's primarily what I've been doing for the last 20 plus years here in the online world, man, just thinking back, it's, you know, I first got on the internet. Of course, it wasn't called that. But way back in the early 1980s. And I remember in fact when I first started doing networking professionally back in 75, and there was no worry about anything with you know, yeah, okay, we didn't want people to hack into so you'd have leased lines for your business and I was doing a bunch of work. from banks way back when right, one of my first jobs, and I was really enjoying it, I just learned a whole lot up to today. And we're going to cover this here because my gosh, it's it has changed. The Internet used to be very libertarian, everybody on it was very libertarian or conservative. Of course, that's because there were a whole ton of government contractors on the ARPANET as well as some colleges and universities. And you look at it today, and you think that really it's changed dramatically which it has. But I think the ratio is probably still about the same. You've got the silent majority that just doesn't say much about anything, right. And then you've got this hugely vocal minority who's just yelling and screaming all of the time. And then some of these tech companies that are trying to straddle somehow in the middle and not get everybody all upset with them. It's really a Much different world. But when we're talking about security, it is nothing at all like it used to be. You used to go online, and you'd have some fun you, you know, exchange emails with people, you'd share some files and some fun things. I remember this one whole thread on chases. That was just absolutely amazing. I think I came up this time of years while it was all these puns about different cheeses. It was a lot of fun. Now today, we've got a whole different internet out there and a great article by Robert Limos and he is looking at WatchGuard Technologies' latest quarterly report that was published just last week. And this network security firm found that the percentage of malware that successfully bypassed anti-virus scanners IT companies network gateways has increased Significantly, watch guard technology is saying that the amount of malware that signature-based antivirus software catches, has plummeted to about 50%. Now, I think their numbers are high because I think it's more like 20%. But they're getting specific here. They're talking about the amount of malware that comes into a network via an external source. In other words, people are accidentally pulling it from a website they visit, or perhaps it's been injected into their systems through someone who's visiting their network and using another vulnerability. But they're saying that antivirus software This is signature-based stuff, that's what you get from Norton Antivirus. That's what you get from, you know, the Symantec people from McAfee from all of these different antivirus companies out there. It is just horrific what's happening because of what's known as zero-day now you might have heard of this before you might not have but basically what zero-day malware is, is malware is nasty software and malware includes things like viruses, worms, Trojans, etc. It is this type of malicious software that has not been seen in the wild before. And what it used to me is they would, you know, some brilliant person who as my mother would say, Why don't they do something useful with their time, some brilliant PR person would come up with a piece of software, no one had ever seen a way of attacking that no one had ever seen before. And they would attack us and they would get through because there was no signature for it or the engines in the antivirus software just could not manage to handle. You know malware like this new piece of malware that just came out the problem we're having today is that the majority of malware act just like zero-day. So here's what happens with a signature-based attack. You can think of it just like your body's anti-virus system night than what you have in your body. And your body looks at something that it sees and says, Have I seen this before. And if it has seen it before, it knows to attack it before. It grows really big and kind of starts to get out of control, and then the body has to attack it after it's already really, you know, it's taken the beachhead if you will use a military term. I've been watching a lot of world war two movies lately, but it's taken that beachhead and now has control of the beach and is starting to get in further and it's very difficult to get out versus it recognizes it almost right away as a nasty virus. And goes ahead and end the Jackson You know you have more cells in inside your body inside your skin there are more cells that are foreign to your body then there are body cells when you start counting all the bacteria and everything that's in your system and on your skin. It's just incredible. So our body relies on a lot of these things. In order to keep us healthy, if we had no bacteria, you be in trouble. It's like you know if you go on antibiotics, which is an anti-bacterial, what does the doctor tell you to do? Well, you know, start eating yogurt and, and other things. Maybe take some Kombucha or various other things in order to try and stay healthy. Get that good bacteria going in your gut again. Well, when your body is attacked by something that hasn't seen before. That's what we would call in the computer world as a zero-day virus has never been seen by Your body or in the case of a computer's never been seen by this signature-based antivirus software. So what the bad guys have been doing is they figured out how Yes, indeed we are trying to block them. And they figured out that the majority of us are using these signature-based antivirus software packages. So they've designed the viruses and the malware to change itself every time. So no longer can the antivirus software, just look for certain signatures. So for instance, if you were always attacked by blonde-haired blue-eyed Norwegians, you might be cautious next time you see a blonde-haired blue-eyed Norwegian approaching towards you maybe with a baseball bat or whatever it is, they might have in their hands, right? So you get worried about it. What's the old expression? Once burn shame on me. You twice burn shame on me. Right? So we learn we respond based on how we've been attacked before. And so does the antivirus software now it can take them days or weeks, even months to get a signature out and get it all dispersed. You know, I'm talking about the old software, not the newest stuff, not the enterprise stuff we use for our business client. But the stuff that you use as a consumer and Heaven forbid if your business and you're using stuff like Norton Symantec, or McAfee or any of these other a VG antivirus software packages that are based on signatures because they just don't work. So what happens is they change themselves constantly. So it might be a Norwegian, but they dyed their hair they put on colored contact lenses, and they change their clothing. That's effectively what's happening with our computers nowadays. It may be that Viking that's approaching you but you Don't know it because it just doesn't look like they change everything about themselves at least most everything except the malicious intent and what they end up doing once they've got control of you. So watch guard is saying that this is a major change here. Now I'm going to quote directly from them. The big change is that more and more malware is becoming evasive. So the signature-based protection is no longer sufficient. There's nothing wrong with having it because it will catch 50% to two-thirds of the traffic but you definitely need something more. And that's why I've been recommending you guys do a few things you can do the free stuff. If you are not a business, you can go to my favorite right now. Open DNS and sign up for an account. They have some paid stuff. I think it's $20 a month per computer, for business to get the basic business service. It's free. For a regular home user, but it does not allow you to do any customization. And then there are a few packages in between open DNS. Now we use a commercial version of is an enterprise version called brawler. That's where the calling it now, but it's the highest level where we can, you know, watch it and maintain it. So that's step number one of what you need to do get open DNS so that if you do get one of these pieces of nastiness like ransomware, and it tries to call home, it can't get the phone number, right. He can't call home because there's another phone number. And I think that's a very important thing to do. It's free if you're home user, you might want to pay for the family plan would block certain scary sites and certain things you probably don't want your kids to see pornography and other things open dns.com and then the other thing to do, I had it in my big course this last year and that was how to harden Windows machine. It's rather involved. And I'll probably do a course early next year on this. But make sure you harden your machine, you're going to want to turn off stuff you don't need, you're going to want to make sure your firewall is set up properly to do the types of blocks that you need. You're going to want to make sure that you've got Microsoft's new malware software installed properly and running properly. So I'll have a course on this early next year that you can get. Because when you're talking about 50%, and I've seen numbers as low as 20% effectiveness with anti-virus software, you have to do something. Hey, if you're looking to buy some gifts, I'm going to be talking about some of them in today's show, including five g should you get that phone, you're listening to Craig Peterson on w GAN and online. Greg peterson.com. Stick around. We'll be right back. Craig Peterson Hey, are you thinking about buying a mobile phone? We're going to talk about that right now. You're listening to Craig Peterson on WGN and online at Craig Peterson calm. Now you've heard about 5g. You're probably using 4g LTE right now, on your phone and maybe mobile devices you may be your iPad or a tablet that you might have. Amazon has its Kindles. They do not, by the way, have 4g LTE on them, at least, for the most part, they're using some of the much older technology because frankly, all they're doing is sending books right? Which are pretty small. But it is that time of year that we're buying presents and there are only a few days left here for that holiday season, purchasing time. And we've got a lot of competition in the 5g world. So let's talk about what this is. And I'll give you some tips. But what is going on? 5g holds a lot of promise. Now I don't know if you remember I remember how shocked I was at how fast 4g was. I bought a phone. And it had 4g LTE in on it. It was an Android phone. And I vowed never again for so many reasons. And you've heard them on the show here before, but I had bought an Android phone, and I didn't have 4g up where I lived. And I drove down. We were heading down. I think it was till Pennsylvania take one of the kids to camp. And I was going through Valley and I noticed Wait a minute. There's a big city right there. I got 4g so I immediately went to speed test.net and I ran the test to see just how fast is for G. And I was just shocked. I was getting like 20 megabits a second, which was absolutely amazing. Because I've been using cell phones since they first came out. And you know, back in the day it was 14 for right? Oh, cell phone so fast. And now just to see 20 megabits was absolutely mind-blowing. But there are some major limitations to the 4g LTE network that we are using today. And those limitations are speed for one. And then the other thing is the number of devices that can be supported. And then the cost of the data and the data transfers. So 5g has been under development for quite a while. And this is not we're not going to get into Huawei and how they stole all their technology. It really appears to be from our friends up at Nortel and put the whole company out of business because of the spine that they did. And thank goodness finally, we've got a president who's trying to do something about it. But five G's real promise for us right now is that we will get two things will get a gigabit worth of data bandwidth, which means by the way, that we may not even bother with Wi-Fi in our homes if you live in an area that has full 4g or 5g coverage because it's just going to be just as fast as your cable is right now. Now the cable companies are probably going to try and compensate by lowering their prices and giving you faster and faster and faster internet. But for a lot of people, it's going to make economic sense because the cost isn't going to be high. And then the second thing that 5g is going to give us is the ability to have billions of devices connected to the 5g network. That means that everything from our cars Which really the next generation of cars self-driving cars really do need 5g so they can talk to each other. So they can continually upload data to the cloud to let all of the routing computers know about local weather conditions and, and road and where the potholes are and everything is just, it's going to be amazing, right? On the one hand, on the other hand, well, there might be some data leakage that we might not want. So the cars are going to have it but so is pretty much every device that you have. A couple of years ago, I talked about the new jacket, the new trucker jacket that Levi's hat out. And that trucker jacket was designed specifically to connect your phone to your phone and allow you to control your phone. So it had Bluetooth in it. You could touch these little wires that were embedded into the sleeve with your hand and use that to control your cell phone. You know, listen to music and Suddenly things are just kind of cool. So our clothes are going to have the internet in them. Our computers, of course, everything you buy a laptop, it's going to have 5g built-in, you're not going to need to have an external device anymore. Just list goes on and on and on. I've everything that's going to happen is going to be phenomenal. But it is not there yet. And Apple did not include 5g with the iPhone 11 this year, it will include it with the iPhone 12. That's coming out next year. And I saw a very, very good summary of what's probably going to be coming out of Apple in September next year. The guy that published it has been spot on with most everything that Apple was coming up with. And they are he's saying that they are going to be having 5G on the phone and it would make a lot of sense. But right now you can put in orders for the Samsung Galaxy Note 10 plus the one plus 70 that's There are other phones that are claimed to have 5g. But listen, everybody, it is still too early to buy a 5g phone. That is really my big tip when it comes to 5g right now, these networks have not fully standardized, they are not running, none of them are running full 5g anywhere except in a couple of major cities. The biggest problem with building out the 5g networks is that they need to have basically what we've come to know as cell towers everywhere. I mean, everywhere. These are little micro things that are not big towers like we have right now. You know, those fake trees that you see that are actually cell towers. Now, these are going to be small boxes and they're going to be on pretty much every street corner in the big cities. They'll be on the sides of buildings. They'll be on the sides of people's houses. Cell companies are going to pay us to put these on our homes so that we can now provide 5g to us and to our neighbors. And then there's going to be people who will be upset because of the radiation, even though it's non-ionizing, and it's not known to cause any harm, people will be upset about it. But these things are going to be everywhere. And that's because remember, I'm talking about one gigabit worth of bandwidth coming down to your device. Well, you cannot do gigabit service on lower frequency so they have moved to higher frequencies. The old UHF TV channels are pretty much I think they're all gone now throughout the country. And the FCC has bought back the bandwidth and has auctioned it off to all of these different companies that wanted to buy it. And it's just everything is going to change and with the high frequencies that they need in order to deliver these beads, they now have a problem and that is these higher frequencies do not penetrate glass. They don't penetrate walls very well at all. And they just don't penetrate metal at all basically, it's really bad. So it T Mobile has announced nationwide 5g available as of last Friday. That is pretty darn cool. It's got a 600 megahertz 5g network which is going to cover most of the country. That is pretty impressive. But the trade-off is it's using low band 5g which means it is good at providing slightly boosted speeds inside buildings and is available in a lot more places than what competitors offer 18 T and Verizon are offering the opposite. They have ultra-wideband networks right now superfast speeds, but very, very small footprints very small pocket, and you got to be standing near one of these towns This is kinda cool T Mobile is expecting with theirs. That actually is p mag is PC Magazine, you can expect a boost of about 15 megabits with their new 5g nationwide. And you might see 150 megabits if you have a new 5g phone or 700 megabits if you have 4g LTE. So not a huge right now, but just wait. Okay, wait until next summer next fall, when things are really going to start happening. All right, stick around. We got a lot to cover still we're going to be talking about some guests who will talk about some of the big hacks of the year. What does it mean to us? What can we do? I'm going to give you some tips and some tricks, what not to do on your work computer third party security risks and some lessons from the National Security Agency. You're getting it right here from Craig Peterson on WGA and Craig Peterson Hello, welcome back. Greg Peterson here on w GAN will be enjoying the show today. We got a lot to cover here. Awesome. Good news, some gift ideas. I've got a very cool article from Ars Technica, about nine gift ideas for the tech enthusiasts in your life. And frankly, I am totally into this. It gave me a couple of ideas in fact of things that I'm going to be getting for people. So you might want to stick around and listen to that for the enthusiast in your life. And we're going to start right now with something that I think pretty much everyone's can be interested in. If you are, you know an employee, if you work at a company, and you use computers, there is a couple of words of caution here. In this segment, Now, first of all, the business computers are owned by the business. And that's kind of where this Bring Your Own Device thing has gotten everything a little bit fuzzy, you know, so if you are using your phone, for instance, your smartphone, and you're using it for work purposes, it's not the businesses phone. So there's not a whole lot that they can say about your phone and how you use your phone. However, the business has an absolute right to its data, and kinking troll, frankly, how you use your phone for the business data, right? Well, how about the computers that are actually owned by the computer? What can you do legally? And what can't you do? What can the business tell you that you should do with it and what can they not tell you what to do? Well, the bottom line is it depends. It depends on the business and what their policies are. So overall, that's kind of the first place you should check your employee handbook. Now we've provided a lot of businesses with employee handbook sections on this and you can certainly get them from your attorney from your corporate attorney, or from HR if you're an employee there. But if you're using a work-issued computer, now that includes a desktop computer includes a laptop, it's going to include things like iPads, even phones, you've probably checked your personal email on that device, you might have stored some files on there. You, you might have used it for a number of different things. Now in many cases, it's not a big deal as far as the company is concerned. You know, if you've got kids right to have a life outside the office, so for you to be able to send an email to the BBC. Or to make a few phone calls because babysitting didn't show up or a kid is sick or whatever. Most employers say that's absolutely fine if I died personally would not work for an employer. That said, That's not fine. I think that's a very, very big deal a very bad thing, the right companies that are like that. But when you start to store your private files on the company's computer, or maybe the company's Dropbox or Google Drive, or you are maybe going down a rabbit hole, as you started with something on Cora or you started with something somewhere else, and all of a sudden before you know it, it's an hour two hours later, or heaven for Ben, you are going to Facebook or some of these other sites to poke around. Then things change. Now many of us use messenger on Facebook in order to keep in contact with family and friends. So is it legit to have a messenger window open? Is it legit to do that, right? Well, the bottom line is you probably shouldn't do any of this on a computer provided by your employer. You're not necessarily breaking the law, but you could get fired if it's against your company's policies. And also, you need to remember that employers can install software to monitor what you do on your work-issued laptop or desktop. Now we do not monitor employees and what they're doing on a computer, except to watch for things that the employees might be doing that might harm the business directly. In other words, if an employee's bringing in a file from home, we're going to check that file. If they're downloading something from the internet. We're going to check that download. We're going to check their emails are going to clean them up, we're going to stop the ransomware we're going to stop the zero-day attacks that I talked about earlier. As well as all of the known types of vulnerabilities. But remember that not everybody is like us, right? We are not interested in getting involved in the businesses Workplace Relations, a lawsuit that a business might want to bring to against an employee, right? That's not what we do. Although we've certainly been pulled into those before in the past. And you need to keep that in mind as an employee because they can monitor what you do, they might put keyloggers on there to see what you're typing, they might have a software that takes a random screenshot. We've done that before with these workers that are doing a specific project. So we outsource something, there might be a graphic or might be writing an article or something, and we're paying by the hour for that contractor to do the work. So as part of the agreement, we have software that sits on the computer and randomly takes screenshots So we have an idea that yes, indeed, they are actually working on our stuff. And it took them five hours and we spent it to take one hour. And it's because they're slow, not because they were out wandering the internet and doing research on the party that's going to be coming up next week at the office or at their home, right. So be very careful about it. And the type of surveillance and security software that's installed on the company computer is usually based on two things, one, how large the company is, and what kind of resources they have to dedicate to watching you, and what type of information you deal within your role. Now, almost all of our clients in fact, now I think of it I think all of our clients are in what are called regulated industries. So if you're a car dealer, you're in a regulated industry, because you have payment card information, you have financing information on all kinds of personal information. So that has to be monitored, right? We have doctors' offices that have HIPAA requirements personal again, personally identifiable information, healthcare information. So security numbers, phone numbers, email addresses, and under the new regulations that are coming out right now, January one in California and Massachusetts in the European Union right now, and they are working on similar regulations on the federal level, even an email address is considered to be personally identifiable information. Until the list goes on and on if you have government contracts, we have clients that have DFARs or Defense Department requirements or FINRA, which is for financial organizations, right? That's what we do. So all of these heavily regulated businesses need to have software that is going to detect that someone is trying to exfiltrate data, shut it down immediately. We need to know that employees are trying to steal information. And in many of these cases, we will work with the company if there are lawsuits and ensue because of the regulation or because of other reasons out there. So if you're working with a company like this, which is frankly, in this day and age, every company, right, what, what employer does not have security numbers of employees? How do you pay them if you don't have the social security numbers, those are all falling under the regulations nowadays. And unfortunately, a lot of businesses don't pay attention to that. So a very small company, they're probably not doing this. But larger companies are definitely going to be doing this. And there's a great little quote here from Jesse crims. He's an Information Security Analyst over the New York Times and he said Without supporting evidence at this scale, at scale, it's pretty rare that people are not doing heavy surveillance and tends to generate a lot of useless data, roped employee into liability issues and generally make the team that monitors the surveillance systems miserable. In other words, you probably don't want to know. And that's the standard we take. We make sure that all of the regulations are complied with, but whether or not someone's sending an email to the babysitter or whatever, it's just not worth it. We're worried about espionage. Okay, so there you go. There are some tips for you. And using business security or using a business computer at work. Stick around. We'll be right back. We got some more stuff to talk about, including some major updates to the Google Chrome browser. Should you be using it anymore. We'll be right back. Craig Peterson Hello everybody, Craig Peterson here. Welcome back. We're listening Of course on WGAN or online at Craig Peterson dot com, you'll find me on pretty much every podcasting platform out there. And if you really enjoy the show, you know one of the best ways to let me know is to share it. I love to see all of the people who are listening and getting feedback from everybody so send me a note as well. But here's where you can go if you would like to give me a five-star review, just go to Craig Peterson comm slash iTunes. And right there, you can give me a five-star review. on Apple, they're still kind of the 800-pound gorilla in this space. Rumor has it that the next release of iOS is going to have some major improvement to this whole podcasting stuff. Apple really kind of started it with the iPod, which is where it got the name from. I still have one of my original iPods kicking around. It was frankly, it was my favorite device for listening to music. Anyhow, let's talk a little bit about some of the browser issues that are out there right now. Many people are concerned about the web browsers you're using. We know we're being monitored. We know we're being watched right now, by these big companies. Google makes its money by what? By selling our information. Facebook's the same way. Now Google is going to sell us advertising, and so is Facebook. And frankly, I would rather know about cars and see advertisements for cars. When it is the time I'm looking to buy a car right? And I'm never going to buy a lot of from Russia, right? So why would I want to see ads for that? So I am Pro, the monitoring in that space. Right. I, you know, you kind of go back and forth about that. You look at what President Obama's team did back when he was running for election the first time where they grabbed all of Facebook's data about everyone. And then they used highly targeted advertising. And then you saw what happened eight years later with President Trump and while the Cambridge Analytica scandal that was Child's Play compared to what President Obama's team did, but somehow President Obama's team didn't get in trouble for it. But President Trump's team certainly did even though Trump's don't get into that right now. But the browsers that we're using are tracking us. And remember, again, this old adage, it's old now, right? It's relatively new frankly. But if you do not pay for service, the odds are you are the product. And Google certainly considers that. And so does Facebook, that you are the product. So when you're looking at browsers, what should you be using the biggest browser out there right now the one that any software developers going to aim at is the Google Chrome browser. Because that's what most people use. It is really a great browser. From a functionality standpoint, people are using Google's Of course search engine, which has been very, very good here over the years. They, they've just done some wonderful things. And Google has added more and more features to their browser. Now, people ask me constantly, what is it that I use? What is it that I recommend? Well, I can tell you that Craig recommends that you don't use the Chrome browser when you can avoid it. Now I do use Chrome. When I am on a website, and I'm trying to do something and one of these other browsers doesn't work quite right. I go over to Chrome because it's not the worst thing in the world. It's not as though it has a direct backdoor into Russia, at least not that we're aware of, or into the CIA or the NSA. We know that Google doesn't like to cooperate with the US military, in some of its research projects, but Google also loves to cooperate with China and has three artificial intelligence labs in China. So it's giving China our next generation of computing technology for free but won't share it with our government. Yeah. Well, anyway, I guess I do get kind of political sometimes on the show. Google's Chrome version 79 just came up with a new feature. Now you know, when it comes to password, That I highly recommend you use some software called one password. They have some free stuff, they have some paid offerings. And what one password does is it keeps all of your passwords keeps them secure. You only have to remember one password, which is, frankly a huge win. And it was great in the business environment where you can set up vaults of passwords so that you know HR can have their own vault and this software development teams can all have their own vaults, and you can have your own personal vault, and it'll create passwords for you that are highly secure, that conform to the requirements for different websites and, and you can share them within vaults. There are just all kinds of wonderful things that you can do using one password. And then if you've been around a while, a couple of years ago, you know I offered a service that we were doing internally. We did this for free for over 1000 People, but we double-checked their password to see if not passwords but email address to see if their email addresses and passwords are out on the dark web. And you know, we checked it at least a month and generated reports for people. And that might be something we decided to do in the future. Well, there is a huge database out there that we've talked about on the show before. Google has now adopted in its Chrome browser. So Chrome 79 has what they're calling as a password checkup extension. So that was what how it all started. It was for desktop versions of Chrome, and it audited your passwords when you entered them, and took a look at them to see if those passwords were known to have been breached. Now, it's not necessarily that your account was breached, although it might have been it the password in the Heres why. Here's why they looked at the password itself. What the bad guys are doing nowadays is they are comparing your password against millions, hundreds of millions, in fact, billions of known passwords that people have used. And they start with the most common passwords and then work their way out from there. So if you're using a password that has been known to been breached in the past, it isn't something you should use. So I thought that was great. They had this password checkout extension. So now what they've done is they've integrated into every Google account and on-demand audit that you can run on all of your saved passwords. And in version 79. Google has a password checkout integrated into both the desktop and mobile versions of Chrome. So what will happen now is that if you are using Chrome to save your passwords, which I do not do as a rule, except for a few accounts I don't really care about because again, I'm using one password to keep my passwords and can keep them all straight? So it is built-in now. And anytime you enter in a password, it's going to check to see if that password has been breached anywhere online. Google is calling this private set intersection, which means you don't get to see Google's list of bad credentials. And Google doesn't get to learn your credentials. But the two can be compared four matches and basically what it's doing is it's doing mild encryption on your password and comparing it against this known setup password. So it's very, very good to do. One password has this feature already built-in password will warn you if I website that you're going to has been known to have been compromised. And Google's figuring here, that since it has a big encrypted database of all your passwords, I might as well compare against, compare them against this 4 billion strong public list of compromised usernames and passwords. They've been exposed in all kinds of security breaches over the years. And little on little later on today, we're going to talk about the top half dozen or so big security breaches, what caused them and then you might want to pay attention to to see if your information was exposed. But the main reason I like to talk about this stuff is so that you can look at your position, you know, at home or at work and ask yourself, hey, listen, there is this breach something that would have worked against us, right? I think it's very, very good. So Here we go. I'm not going to get any details here on what exactly what Google is doing and how they're doing it. If you are a chrome fan, you might want to use it. So let's talk about what the alternatives to Chrome or opera is a big one. And I have heard rumors that the Opera browser, which is kind of my primary browser, I have another one will tell you about in just a second, but opera very fast. It's designed to be secure. It also blocks a lot of spyware out there. Very good. But the rumors are that it is now in the hands of the Chinese government apparently owns it. I'm not sure that's entirely true. But, you know, it's up to you whether you want to take any risks. I'll tell you also about an extension I use in all of my browsers, which makes it much more secure much safer for me. We'll probably have to wait until after the top of the hour to get into that, but I'll tell about that. So what do I use the most? And what do I trust the most? Well, Netscape, the Netscape browser. Mozilla is the next one that I use opera is number one, at least for the time being. I use Firefox as well. Both of them do a lot of blocking, oh, I have a lot of privacy enhancements. Those are the two I use the most. And then I also use Apple Safari. Apple, again, is not selling your information as Google does. So it's considered to be a little bit safer. So far, we haven't known Apple to really leak information. They've been relatively safe, they certainly aren't selling it to anyone. And that's what I use. And then if I have to all fall back to Google Now, if I wanted to be extra safe online, there is another browser out there that I do like, and it's called epic EP, I see the epic browser. And it is actually based on Google's Chrome browser underneath the hood, just as Microsoft's browser is based on Google's Chrome browser. And Google is actually using a base form from Apple's Safari browser, which is kind of interesting. They all share code nowadays. But the epic browser is the browser if you absolutely want to keep your data safe. It even has a built-in privacy VPN. So check it out as well. When we come back, I'll give you a little clue here. A couple of tips on what you can do to keep every browser just a little bit safer. We'll get into some gift ideas and more. So stick around you're listening to Craig Peterson on WGAN and online at Craig Peterson dot com. Stick around. We'll be right back. Craig Peterson Hello, everybody, Craig Peterson here. Welcome back and listening to me on WG A in an online, Craig peterson.com. Hey, if you are a new listener, I just want to let you know a little bit about my background I've been helping to develop the internet, they in fact, just called a pie in the air you the other day, which is kind of interesting to think about. But yes, indeed, I designed and made some of the very first routers and some of the very first firewalls and load balancers and stuff back in the day. Let me tell you back in the day, we had to write these things from scratch because they just didn't exist as commercial products. And, you know, there's a lot of products I could have sold over the years but I'm just wasn't that kind of guy. Anyhow, so now I do a lot of cybersecurity for businesses, government agencies, most particularly really, for anybody in a regulated business, which today in this day and age means any business because we are all regulators I talked about in the last segment. Well, we have some gift ideas. And let me just start with one here. And then we'll get into some more articles from this week. We've we're going to be talking about the NSA here and what their top recommendation is for businesses. But you know, I am a techie guy, and I love tech and tech gifts and it's all just a pretty darn cool thing. When you get right down to it, just like, you know, I just love playing with this stuff. I guess that's the way to put it. And using it and making my life a little easier and faster, more efficient, effective, etc. But I want to talk about the high-end tech gifts that you might want to give, and you might want to give for yourself. In fact, that's exactly what I'm doing with one of these this year. Well, if you have somebody who's a gaming enthusiast, there are so many things out there that you can get for them. There's this one particular mouse that is very highly rated for gamers. It's called the razor Viper. It has some very, very fast, maneuverability stuff built in. Because of course, when you're playing some of these video games interactive, you need to be able to move very quickly so anyhow, we'll leave it at that because I am not a game type person. I used to play some, some games way back when you're in a dungeon with twisty mages, mazes, remember right how things started. But let's get into this. Now. This is one of the things I think would be a great gift for almost anyone, it's great for a computer that has the USBC which is the newest version of the USB cable. It is what the new Mac books come with the new max do as well. It's the next generation of the high-speed stuff that the last generation max had. But it also works with regular USB cable has a little adapter that you can use with it. It's called SanDisk extreme portable SSD. This thing is very, very nice. It's a good option for data you need to have with you wherever you go. It's surprisingly small. It is rated for the extremely high shock it's like 500 G's or something crazy like that. And it will withstand water and dust as well as vibration. You can drop it from six feet in the air without suffering any damage at all. This thing is amazing. And right now it is half price. Over on Amazon. Just look it up there. SanDisk is the name of the company S-A-N-D-I-S-K, it's their extreme portable SSD fits in the palm of your hand that you're going to love this. It's available in 250 gig 500 gig one terabyte and two terabytes now, I would not get the 250 gig, not that it's too small. But for an extra $10 you double your space up to 500 gig. Now when you go up to the one terabyte, which again is twice the space, it's twice the cost. So the one terabyte you're gonna have to ask yourself what makes sense and two terabyte options. But this thing is so fast, or what I love this for is to have different virtual machines on it. It's the one I use when I am doing a demo or for when I need to do a client-side install. I can have every version of Windows on my need to use Mac OS all the different versions of that a few versions of Linux all right there on the drive. It's very very convenient. And very, very fast you're going to love this thing. In fact, that's one of the fastest portable storage solutions that has ever been tested. It's kind of similar you know you can get Samsung T five SSD, they have very good SSDs. Okay, don't get me wrong here. The Samsung t five is more affordable but the SanDisk extreme SSD is better. Now I got to tell you that the cost right now on Amazon for this portable drive, there's no moving parts in it. As I said it fits in the palm of your hand. The cost on that is lower on Amazon right now. It's half price is lower than I can buy it from my distributors at So just to give you an idea of what a great value that is, coming up, we're going to talk about, I think the coolest gift you can give to somebody that is truly a hobbyist in the computer world, you're going to love it. And then if you are that person when you go to someone's house for Hanukkah, Thanksgiving, Christmas birthdays, whatever it is, and they say, hey, Craig, come over here for a second. my computer's not working right can you have a look at it will will tell you about the best gift for somebody like that and maybe some need to get get for yourself as well. So I'm going to talk right now about some of the biggest security breaches we'll go over one and then we'll get to some others little later on in this our last hour. And by the way, if you want to listen to the whole show, my podcast and everything. You can just go to Craig Peterson comm slash iTunes or slash tune in if you'd like to listen to it. On tune in or slash pretty much anything well actually if you type in slash pretty much everything you need an error page right? But you'll find me Craig Peters on on most of the major podcast sites that are out there by just going to Craig Peterson comm slash, whatever it is like Sasha Hart or slash SoundCloud or slash tune in, etc, etc. Well, data aggregators are big targets that are out there and who is a data aggregator? Well, let me tell you about what happened when I was at a wedding last week I was staying with my sister in law my wife and I, and there we got home and there was a card in the door and there's from an insurance company members like all state or something and, and it asked for one of my sisters in law, who had been living in that house to call so we thought okay, well, it's just a hoax thing. You know, they're they're trying to sell some insurance or something. So we just ignore that fact, I think we just threw the card in the trash. Well, the next night, we were sitting there at home and there's a knock at the door. And it's the same insurance agent. And she wants to talk to my deceased sister in law. And we get into this a little bit more and talking and talking to her trying to figure out what, what, what, why, what's going on. It turns out that someone was involved in a fatal car accident. And that person gave my deceased sister in-law's identity as her own. Yes, indeed, the dead are, quite frequently in fact, a victim of identity theft. Now we know about the dead voting right particularly in Chicago, and but in other places around the country. Well, in this case, apparently according to the report - she had been involved in a fatal car wreck about six months after she had died, and someone was dead. Obviously, this was a case of mistaken identity, but the insurance lady who's at the door, and she's obviously, some sort of an investigator used one of these skip trace databases in case you're not familiar with those. These are databases that are put together by data aggregators and data aggregators are these companies that suck up data from every public source they possibly can. And even some paid sources. And it includes records from credit card companies, and you name it, they pull it all together, they try and make heads or tails of it. So she had this report from a data aggregator and listed my long-deceased father in law's name is part of this and, and my kids, couple of my kids that had at one point staying for a visit with their grandmother, for a few months, while going to school, etc. and include my wife's name, my name just kind of went on and on. They got a lot of data wrong. And that's what I found to typically 25 to 50%, sometimes even more the data they have is incorrect. But enough of it was correct that she could kind of start piecing things together. And she was able to figure out that this was insurance fraud. Well, these data aggregators have massive databases as frankly, you might imagine. And they have these databases online. Yeah, you know where I'm going. This was a Mongo DB Mongo database, which is used, it's kind of it's called NO SEQUEL. It's an unformatted database. It's perfect for these data aggregators, and a company called verifications.io. That provided email verification services, had a Mongo database Continued over 800 million records publicly accessible to anyone in the world with an internet connection. And they had four sets of data. They'd had email addresses, dates of birth, phone numbers, physical addresses, employer information, IP addresses, business leads and other information. Not everything was sensitive. So when we get back we'll talk about what lessons should be learned what you can pick up from this a couple of tips for you. If you are a business person of any sort, or if you have data that might be in one of these databases, so we'll talk about these big verifications Mongo DB breach from this year and some more gift ideas right area listening to Craig Peters on online and here on WGAN terrestrial radio. Craig Peterson Hello everybody Greg Peterson back here on WG and online at Craig peterson.com. If you enjoy my show, by all means, make sure you subscribe to the podcast. Pretty much everything that I do goes up there my Wednesday mornings with Matt and can during their drive time show Wednesday morning that goes up there Other appearances go up there the whole radio show goes up there as well. Craig Peters on comm slash iTunes and do leave me a review if you wouldn't mind. You know those five-star reviews help get the message out. And we just passed another hundred thousand downloads, which is kind of cool. I appreciate it. Every one of you guys for listening. We try and get as much information as we can. So let's get back to our Well actually, you know There's something I forgot to button up from the last hour. Let's get to that. And then we'll get to some, some gifts and some more risks and what the NSA is saying right now, I had been talking earlier in the show about web browsers, and which browsers you should be using, which ones I recommend, then, you know, if you missed all of that, again, you will find it at Craig peterson.com, slash iTunes, you can listen to the whole thing right there. But I was talking a little bit about a plugin that I use. This is a plugin that works with pretty much any browser out there and works differently than any plugin that you might have been familiar with before. This is from the Electronic Frontier Foundation. Now I've had my disagreements with them in the past. Overall, I agree with a lot of what they're doing. But this is a plugin that goes into Chrome Opera or Firefox or pretty much anything that is called Privacy Badger Privacy Badger. So think about badgers if you know these things, they you'll find them a lot over in England, but they're over here too. They burrow underneath hedges and they like to live in the ground. And they are mean they will fight anything way bigger than they are. They don't care. They're going to win because they go all in. Well, that's what this is all about Privacy Badger. So I am on a website. Right now I'm looking at my browser and the Privacy Badger plugin, and it's got a nine on it right now. So what that means is that Privacy Badger detected nine potential trackers on this web page that I'm on right now. And it has sliders for them up there and it says you shouldn't need to adjust the sliders unless something is broken. So what Privacy Badger does is it watches you As you go to different websites, it looks at the cookies that are placed on your browser from these websites and determines, Hey, wait a minute. Now, this is a cross-site tracker. This is another type of tracker that we probably don't want to have. So it's showing them all to me. So here we go. Here's what I have right now on this website that I'm on. And the website is otter in case you don't use otter it is phenomenal transcription service, very inexpensive. 600 minutes for free every month. otter.ai but it turns out otter is using some tracker. So the first tracker showing me that Privacy Badger blocked is graph.facebook.com. So this is Facebook gathering data about me what I do where I go, the next one that's marked yellow, which is it has three different indications here on the slider. One is a blocks it entire The next one is that it could block cookies and then the far right one is to allow a domain to do it. So graph.facebook.com was blocked automatically static.facebook.com was allowed the regular facebook.com was allowed Google Analytics completely blocked API's Google com was allowed stripe checkout was allowed stripe as a payment service. JavaScript on stripe com was allowed and stripe network usually m dot means it's a mobile site. So that was blocked and Q dot stripe com was allowed but those are tagged the one these all of the ones I mentioned that were tagged, are considered to caution level. So by adding Privacy Badger as a plugin to any of your browsers Basically is going to stop sites from tracking you and it does a very good job. It learns as you go. It is not something that is prefixed with I'm going to block this site or that site. It is absolutely dynamic. I really, really like it. So check that out. This is kind of a flashback, as I said to an earlier segment where I was talking about which browser to use, what the considerations are. And this will work with any of them out there. So just do a search for Privacy Badger, it should come up near the top of your DuckDuckGo search. And it's five the Electronic Frontier Foundation e FF, check it out online. Okay, so now let's get into gifts again. I mentioned my top gift recommendation in the last segment. This one is for total geeks. Now we are using this for actually keeping timing tracking It's called raspberry pi. So we have a special card that goes along with this that has a GPS antenna attached to it and GPS readers so that we can track the satellites in the sky. We use the timing that they provide us with, we do some advertising. So that one of the things we do for our clients is we have to track their logs and keep real detailed records on their logs. We need to know exactly when Did something happen? So that if after the fact heaven forbid, someone gets in, some piece of malware gets in when did it come in? Where did it go? What did it do, right? Because you want to be able to know after the fact Well, what does it get access to? unlike so many of these companies that have no idea what they lost? In fact, most businesses don't even know until six months later that they were even the hack versus what the best in the biz are doing right now is about six hours, not just to detected but to remediation, which is where we sit well, usually within that six-hour time frame. Well, this is called a Raspberry Pi. And they've got the newest version of Raspberry Pi four. This is a small Linux computer. So if anybody that you know likes to hack together science projects or you know, do a little bit of experimenting, this is phenomenal, absolutely phenomenal. You can turn it into a retro game console, it'll play a lot of these old video games. A smart speaker that's a DIY thing. You can build it into your Legos to make a real fancy remote-controlled car. Anything your hobbyist mind comes into mind. This is phenomenal. You can for 100 less than 100 bucks, you can get a complete kit. Okay? The Raspberry Pi fours a lot faster and the older Raspberry Pi three Model B plus faster CPU you can put up to four gigs of ram in this thing. It is a phenomenal USB 3.0 port. So if you are or you know somebody that's really into DIY hobbies, this is the way to go. Okay? The Raspberry Pi four does get closer to your general and genuine desktop PC performance. But it's not really there yet. It's not one running Windows, it does run Linux, as I mentioned. And you can write basic programs for it, which is a programming language Python. If you have a kid that wants to learn Python, this might be a nice way for them to learn because they can kind of hack it together but it's just it's basically just a motherboard, you're gonna have to put it in a case by a case forward, you're gonna have to put a keyboard on it. A mouse, you have to put a display on it, okay, all kinds of stuff, but you can get just the basic Raspberry Pi four For someone that that really, really is a total hacker here, for like 4050 bucks, it's absolutely amazing. Okay, plenty of power for your money. Very versatile. In fact, it's more versatile in many ways than your Windows PC is. And for the budding engineer in your life, they will love you for it. So stick around, we're going to come back, I've got some more ideas for tech gifts that you might like. And we're going to talk about a couple more big hacks this year, and what it means to you. We've got third party security risks, the NSA has some advice for business and we'll tell you about that too. When we get back, you're listening to Craig Peterson right here on w GAN and online at Craig Peter song.com. That's Peterson with an O. Stick around because we'll be right back. Craig Peterson Hello, everybody, welcome back, Craig Peters on here on WGAN. And we're talking about stuff we usually talk about, you know, some of the security things, some of the latest technology that's out there. We're also doing a bit of a recap here some great gift ideas for the techie people in your life, even frankly, some of the non-techie people. And the security side, which is, I think, very important, can't talk enough about that. Because it could destroy your company, it could ruin that, frankly, the rest of your life could be a bit of misery, depending on what the bad guys do to you. Oh, it's absolutely crazy. told the story a little earlier of what happened with my deceased sister in law's identity, and how it was used in a fatal car accident and it's just it's amazing what some of these people are. Doing nowadays. And by the way, one of the most valuable segments of our population. We are know already about the retired people, the older people, right, who might be a little confused, hopefully, have some assets. But one of the most valuable identities out there online is that they have a child because their social security number and their identity are going to be very useful for at least a decade, if not longer because those kids probably not going to use it until they get their first job. So keep that in mind as well. Well, I want to get into these two things before the last half hour, so we'll cover these fairly quickly. But the big one, and that is waking up to third party security risks. Now one of the big attacks this year was Capital One and that's on my list of the ones I wanted to talk about today. They had personal information blog into overall hundred million US individuals and 6 million Canadian residents. Now, this was exposed. And when a former employee at Amazon Web Services inappropriately accessed the data, we could get into all of the real details behind this but the compromised information included names addresses, dates of birth, credit scores, payment history, contact information, and other information on people who had applied for Capital One credit card dating back to 2005. also exposed where the social security numbers of 140,000 individuals and bank account data blogging belonging to 80,000 secured credit card customers. So think about this for a little minute here. How many of us are using a service like Amazon Web Services, how many of us are relying on cloud services to keep our information safe? Right? Frankly, that's most of us, isn't it? And when you're talking about somebody like Amazon Web Services, or now there's Microsoft Azure, those are kind of the two really big players. IBM also has its cloud online that they sell access to. Most businesses look at it as a way to save money. Most businesses consider, hey, I don't need to keep track of the security, because my vendor is keeping track of it for me. And what we found out is, that's not true. So the lessons learned here. We'll start with that here from Capital One is that cloud service may be attractive because it's cheaper than doing it yourself. And that's particularly true, frankly, throughout the whole range, but it's particularly true for large businesses, but even for small business. businesses, can you really afford the right kind of server? Now I know a lot of small businesses go to the local staples store and buy a computer and call it a server, right? And maybe $800,000 later, they're out of there. Whereas a real server that's going to be really reliable is going to last years, you should be looking at more like 15 to $20,000 for. So businesses say, well, I'll just do it in the cloud. I'll use Amazon Web Services for this and we'll hire a consultant who's going to help us set it up. And we're going to use maybe Dropbox for that and maybe office 365 for this and now all of a sudden, I'm safe. Well, you're not. And companies, you guys are putting your data at risk, because you haven't adopted a security infrastructure, with the vigor that you need to apply. It should be at least as good as what You're using for your on-premise stuff. But you know what so many SMEs aren't even doing it right for on-premise stuff. Okay? So you're ending up with all of the financial cost of the penalties that you rack up, and the lawsuit and the cost of those lawsuits, which will vastly outweigh any it savings that you might have down the road. So keep that in mind. And that's what Capital One just learned this year. The Why? Because we're not taking third party security risk to heart Ponemon Institute did a study here 2018 founded 60% of customers surveyed, had suffered a data breach caused by third parties or vendors in the last 12 months. So what's causing it? Well, these applications are being built very different than they were a decade ago. They are online. They're using APIs. And they are not considering the security risks. So all services are connecting internally and externally via these APIs, popular finance websites load on your browser mobile apps, you can see the results. Dozens of third party services, okay, web apps, middleware, other code. This is a real problem. So, protect your own infrastructure, Step number one. Step number two demanded the others protect their infrastructure, okay. And trust yet verify. What we do is we wrap special security software around all of these third party infrastructure Software-as-a-Service sites that are out there, okay. So be very, very careful and you have to test even more for third party sites and you know, businesses just aren't testing as much as they should. So there you go. There's a couple of tips here three tips on what to do. When you are talking about third party security risk, and that is with all of these guys, Okay, number one, make sure your infrastructure is protected that you have the right kinds of firewalls and you have the right kind of malware treatment that's in place. All the other security controls, make sure they're configured right? If you're using something like Amazon Web Services, or Sure, or office 365, make sure you have the right settings. You know, it's difficult I get it, Microsoft has over 10,000 skews 10,000 products that are available in they're all software and services. There are dozens and dozens just for office 365 based systems. So make sure you have the right stuff. Make sure that they have proper compliance and certifications. And remember too that the certifications they have just represented a point in time. Do they still have the right kind of security? And because we are running our technology in this new type of infrastructure, make sure, frankly, that we keep track of everything because a breach can happen quickly do millions of dollars of damages right away. And 20% of businesses will file for bankruptcy the very next day. All right, well, let's talk about another gift here real quick before we go to a quick break. And this is for those of us that we go to a family event, and we go anywhere, and it's a Craig come over here for a minute, I need some help and you go over there and of course, it's questions and problems about their computers. So here's what I recommend. Get that person in your life if they're fixing the computer for that for you. I fix it. Great site painting Go online to find out how to fix physical problems. But they have something called the I fix it pro tech tool kit. I have one of these my kids have one of these. My technicians in my business have one of these. It's a 64-bit driver set that has all these weird types of sockets and everything on them. Because these parts and the computers that have the special locking screws and everything else, you need this Okay, the I fix it pro tech tool kit. Stick around. We'll be back with a wrap up for today's show. And we'll talk a little bit more about some gifts right here. You're listening to Craig Peterson on w GN. And the course online Craig Peterson calm. Stick around because we'll be right back. Craig Peterson Hello everybody Craig Peterson here WGAN and online at, of course, Craig Peterson dot com. Hope you've enjoyed the show today we have covered a lot of different things we talked about third party security risks for businesses which web browser you should be using. If you want to keep safe and some of the updates that Chrome has from Google, they'll keep you safer online. What not to do on your work computer. Why it's still too early to buy a 5g phone and signature antivirus and how it is at best catching 50% of the malware out there. It's getting really, really bad. And we've talked a little bit about some of the top breaches this year and there are some pretty scary Ones out there. But how does it apply to you? And how does it apply to your business as well? And we got one more that was brought up on the website at Craig Peterson calm, you can see all of these up there, a little bit of mind commentary and links to other articles online. But this is about the NSA and what the NSA, the National Security Agency is saying that we should be doing as businesses, but this applies 100% as well, to you as an individual. And the basics are to focus on your assets. And this is a very, very big deal. W
If you've listened to even a handful of my shows, you are well aware that you're being tracked around the web. But even I was surprised by some of the things I learned in the recent white paper from the Electronic Frontier Foundation entitled "Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance". One of the prime authors of this report, Bennett Cyphers, came on my show to walk us through the myriad and shocking ways that ad tech companies have found to identity us as we surf the web, use our smartphones, and even walk around the real world. Bennett Cyphers is a staff technologist on the Tech Projects team at the Electronic Frontier Foundation (EFF). He contributes to a variety of different projects within EFF, most of them tied to privacy and competition. In the past year, he's worked on the tracker-blocking browser extension Privacy Badger, provided technical advice to lawyers and activists, and read and re-read the California Consumer Privacy Act. Before coming to EFF, he was a policy intern at Access Now and earned a Master's degree for work on privacy-preserving machine learning. In his spare time he designs t-shirts for fake punk rock bands. Further Info EFF’s Behind the One-Way Mirror: https://www.eff.org/wp/behind-the-one-way-mirror Setting Apple ID to zero (“limit ad tracking”): https://blog.tenjin.com/idfa-sends-all-zeros-on-ios-10-devices-2/Best & Worst Gifts for 2019: https://firewallsdontstopdragons.com/best-worst-gifts-2019/
From Black Friday to Prime Day and Christmas shopping, there have been all kinds of mass sales events. Every year it seems like a new record of money spent is being broken around these events. But just because these events have all kinds of insane sales events it doesn’t mean we shouldn’t be wary of our security. Here are some tips to stay on top of these events and keep yourself safe while shopping online then and for the future. First, I’d recommend getting an ad and tracker blockers. Ads these days are the gateway for hackers to download malware to your computer. You can avoid all of these by getting an ad blocker. Some recommendations are UBlock Origin, Privacy Badger and Ghostery. Second, always shop on a private browser window. This means more than just ensuring you’re using private Wifi. For a lot of browsers when you are shopping, you are given a button or menu item that’ll let you open a new window. What’s convenient about this window is that it doesn’t store cookies or any other identifying information. Third, ask yourself the question “do you really need an internet-connected device? These days all kinds of gadgets connect to the internet but it’s worth asking whether that’s needed or not. Properly functioning is one thing, but if the benefit the device brings is marginal at best when it’s connected to the internet, it might be better to find an alternative that doesn’t demand it be connected to the internet. Fourth, keep an eye on phishing schemes. During these times you’ll find all kinds of emails talking about sales events, package tracking emails and coupon codes. Make a point of paying special attention to those emails. And finally, make sure that with every store you go to you have a different password. Passwords are obviously important but if you use the same password all the time it defeats the purpose of having one too.
Good morning everybody! I was on with Matt and Eric Lusk who was subbing for Ken. We talked about browsers and privacy. Firefox is taking the stance that privacy is where they need to concentrate their advanced efforts and updates. That is great news for everyone. We also hit Passwords and Password Managers and why you should use one and 5G and the internet of things. I am out in Phoenix at a big conference and will have some big announcements after I return that will help every one of you to cyber secure your life. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Who is tracking your web movements? Use Firefox if you want to know Security 101 - Passwords and Password Management --- Automated Machine Generated Transcript: Good morning, everybody. Craig Peterson here. I was on this morning over on WGAN in Maine on their am FM stations and talked a little bit with Eric, who was in for Ken this morning, Eric and Matt, about browsers what you should be looking for. Firefox has a new claim that we talked about this morning, I gave some advice on the thing, you need to download the one plugin that you must put on all of your browsers, and where to get that. And Eric asked a little bit about 5g and how it's going to change his life. So, of course, we got into that as well. So here we go with Eric and Matt. Well, ladies, gentlemen, it is that time of the day and that time of the week again, because 738 on a Wednesday, and that means that it's time to talk to Mr. Peterson. Craig Peterson, our tech guru joins us now Craig, How are you this morning? Hey, I am enjoying the conversations this morning between you two. This is quite a time we live in. It is quite a time ladies and gentlemen that we live in certainly the day after the election in Portland which made Matt a happy man. is a great day. Yes, indeed. So, let's start off in the world of technology, sir, by telling me something that has been beguiling me for some time. Firefox, so so there's privacy protections that make website trackers visible here and I and I used to be a Firefox guy, I guess is where I'm asking this question. And I switched off what like the rest of America to Chrome ages and ages and ages ago and I never switched back. But I've heard good things sort of in recent times about Firefox sort of being worth it again. What do you what? Generally speaking your take on all this? Okay, well, I did a pop-up training about different browsers. And in this day and age, something worth talking about. Microsoft, of course, had their internet explorer, aka Internet Explorer, bum, bum bum, a really poorly designed and implemented browser that didn't work on many websites out there. And what really kind of got Microsoft to pull up his socks was what you were just talking about, which is the Chrome browser out of Google. So Microsoft realized Internet Explorer was not worth it's salt. So they went ahead and they replaced it with another browser that they had created. Internet Explorer was actually created by Paul de and, and TSA. And they took the code so I won't go into all the details. But now Microsoft's newest web browser is actually Google Chrome. And it's rebadged. It's using something called chromium, which is the basis for Google Chrome. So Microsoft has switched over to Google Chrome many people So Matt, you're not left alone. I'm sure Eric uses Chrome as well. I use it from time to time I use Google Chrome if I try to use the Microsoft Internet Explorer, the 8 gigabytes of ram just grinds to close. Right? It explodes. Hence the name Internet exploder. Your question about Firefox is really quite opportune because there are two worlds there are three browsers out there that really keep privacy in mind. Now, you might have noticed over the last two, there are a lot of plugins designed to block ads, etc. Google removed the ability to block at an in certain cases, they removed it from Chrome now, because of course, they make their money through advertising can't blame on the guys over at Firefox have decided they're going to make privacy there. No Bro one thing for Firefox, and their latest version, which is verse 70, settles, the Firefox browser has a lot of privacy protection built-in. So I like it. I like it a lot. And I'm going to give you guys a little plugin you can put into your browser that's going to help no matter what browser use. The other two privacy browsers out there are opera. And there are rumors that opera has now got some Chinese connections, I have not been able to verify that. But opera by far, very, very privacy-related much more so than then Chrome is. And then the most private browser is called epic epi C. And the epic browser is also based on Chrome and chromium. So it has a lot of that same functionality, but it blocks pretty much everything and cookies. Now here's what I want everybody to write down. If you're using Chrome or Firefox or anything, something called Privacy Badger. And its Privacy Badger BADGR. Just like that nasty little road and to cleanse around from the Electronic Frontier Foundation. Privacy Badger is available as a plugin for almost any browser out there. And it watches where you're going. And it looks for trackers on the website. And it automatically learns which trackers it thinks should be blocked. And it is the least intrusive that I have ever seen for keeping your privacy. Privacy Badger. Epic might not work with some websites, Firefox and Opera work pretty much with all websites, but you can add Privacy Badger to both of those. So what do I recommend? If you really want the ultimate and private use? Epic. There is something even more private called the Tor Browser but then it gets complex. But use epic. If you want good privacy use Firefox, I would say I use opera a lot. And in any case, even if you're using Chrome, get the Privacy Badger. It's free. It's easy to download and install it on your browser. All right, we're talking to Craig Peterson, our tech guru. He joins us every once in a while, Wednesdays at 738. By, by and large, to talk about what is happening in the world of technology. Craig, tell me a little bit about one password. What is it and why is it changing things for some enterprises? Well, one password is what I use it because allows me and my teams to be able to share certain information, one password to keep passwords and logins for, generate passwords. But it also allows you to apply it and so as a family, Husband, and wife can share bank account information with it in business enterprises. Because now with allows them to have team so you might have a team of people to work or even just a few people that are working on the website, for instance, so they can all formation and then if someone leaves a team, you can instantly remove their access to the passwords and have someone go through and change all the passwords. So one password businesses what we're talking about here, they've got advanced protection mode, as well as all kinds of monitoring tools that let you know if a website is being compromised, and it helps take care of the biggest threat to security for most organizations, and that the people with absolute phenomenal employees all kinds of factual information in their hands and sometimes it gets lost. So one password has some holes and some key levels. recommend to anyone in the business. And both guys, Matt and Eric, you should be using one password, because it really helps you keep all of your accounts all of your logins safe. And remember, I told you that you should lie to your bank. When it comes to rolling password recovery questions. One password keeps up straight for you. Because you should be making up the answers to which high school did you attend? was your first date you know those questions? Make up the answers use one password to store them securely so that if you do need to use the password recovery stuff, you've got the right information, which is the wrong information, right? Because you're just totally made it up out of thin air for the eventuality that the websites going to be compromised and to stop the bad guys from getting the answers to your password caliber security questions. Craig, and see if I can get in one quick question. How is 5g going to change my life compared to 4g technology? Did you just say that? That was a quick question? I got two minutes here. Here's the bottom line, Eric 5g is going to change everybody's life. Because first of all, Data Access is going to be way faster than it is right now ultimately when it rolls out, but it's going to be cheaper. And 5g is designed to handle billions of simultaneous connections. What that means is everything that can have activity is going to happen. Now, for instance, your Tesla, two parts in the garage connects via the internet, the Tesla, of course, I plug it in every night. Yeah, exactly. And when you plug it in, and it connects to the home Wi-Fi network, it updates that software automatically. It's 5g. Eric, what's going to happen is everything's going to be internet-connected, your glasses are going to be internet-connected. Because it's so inexpensive, so easy. And it's designed to have so many devices connected, which opens up, of course, a number of worms when you're talking about the things because it will make the internet of things I'm talking about. Anchor, you're going to keep track of how far you walk that morning and everything is going to be online, Greg. If I could just find my five-year-old sneakers every morning. I would be happy if I could just find them. Yeah, there's probably going to be an app for that. Yeah, exactly. There will. Alright, well, Craig Peterson, our tech guru joins us on Wednesdays at this time to go over what's happening in the world of technology. thank you as always, always a pleasure and we will talk again next week. By the way 1 pm on Saturday. By the way, 1 pm on Saturday, every Saturday, Craig has a show right here on WGAN. And thanks a lot, Craig. Appreciate it. And good luck with the show this weekend. Thanks. All right, so why don't we take a quick moment here and toss it back over the news. Hi, guys, hey, I'm out at a conference. And I'm going to be here for well about another week, actually. And I just want you to keep your head up. Because if you aren't on my mailing list, you are going to find out about some very cool stuff that we're going to be doing later here in the month of November and December, and after the first of the year, too. So if you're not on my mailing list, if you don't get my weekly emails that come out every Saturday morning, make sure you subscribe right now are you going to miss some amazing stuff? You might have already missed some of these pop-up training that I've been doing that have each gun a couple of hours apiece sometimes a little bit more. So go to Craig peterson.com slash Subscribe, and right there, you'll see a little form. I won't spam you. I do let you know when I have two training courses when I have the pop-ups when I have all of this stuff, but this is not one of those heavy sell marketing type things. And you're going to want to know about what we're doing coming up here to help you out. All right, have a great day and we'll be back with the show this weekend. Bye-bye. Transcription by otter.ai --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Yan Zhu, AKA bcrypt, is the Chief Security Officer at Brave. Yan joins Leo Laporte to talk about her past dropping out of high school and earning a B.S. at MIT; her work on Brave's security-focused browser and other open-source projects like HTTPS Everywhere, SecureDrop, and Privacy Badger on Firefox; DJing and creating electronic music; and more. Host: Leo Laporte Guest: Yan Zhu Download or subscribe to this show at https://twit.tv/shows/triangulation.
Yan Zhu, AKA bcrypt, is the Chief Security Officer at Brave. Yan joins Leo Laporte to talk about her past dropping out of high school and earning a B.S. at MIT; her work on Brave's security-focused browser and other open-source projects like HTTPS Everywhere, SecureDrop, and Privacy Badger on Firefox; DJing and creating electronic music; and more. Host: Leo Laporte Guest: Yan Zhu Download or subscribe to this show at https://twit.tv/shows/triangulation.
Yan Zhu, AKA bcrypt, is the Chief Security Officer at Brave. Yan joins Leo Laporte to talk about her past dropping out of high school and earning a B.S. at MIT; her work on Brave's security-focused browser and other open-source projects like HTTPS Everywhere, SecureDrop, and Privacy Badger on Firefox; DJing and creating electronic music; and more. Host: Leo Laporte Guest: Yan Zhu Download or subscribe to this show at https://twit.tv/shows/triangulation.
Yan Zhu, AKA bcrypt, is the Chief Security Officer at Brave. Yan joins Leo Laporte to talk about her past dropping out of high school and earning a B.S. at MIT; her work on Brave's security-focused browser and other open-source projects like HTTPS Everywhere, SecureDrop, and Privacy Badger on Firefox; DJing and creating electronic music; and more. Host: Leo Laporte Guest: Yan Zhu Download or subscribe to this show at https://twit.tv/shows/triangulation.
For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What are some of the best ways of keeping an eye on what our kids are doing online? How do we know what information apps, websites, etc. are collecting from our kids What are some simple steps that we can do to help automatically protect the privacy of our kids and ourselves when browsing the web? Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more---- He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies. He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator". Webpage: https://briansemrau.com Resource & Research: https://semsec.net Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches. (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.) If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use): https://www.lastpass.com/ 1Password: https://1password.com/ Dashlane: https://www.dashlane.com/ KeePass: https://keepass.info/ 3. Browser extensions: HTTPS Everywhere: https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger: https://www.eff.org/privacybadger - helps to block tracking as your browse the web. (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin: a. Chrome: https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en b. FireFox: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ c. Edge: https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab d. Safari: https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4. Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android: https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple: https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity
We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing. Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp.
For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What is the Dark Web and do we need to be concerned about it? Chrome and other browsers have recently started marking a lot of sites as "not secure". Are they truly not safe to use? How do we protect our social security numbers as well as our children’s? Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more---- He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies. He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator". Webpage: https://briansemrau.com Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches. (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.) If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use): https://www.lastpass.com/ 1Password: https://1password.com/ Dashlane: https://www.dashlane.com/ KeePass: https://keepass.info/ 3. Browser extensions: HTTPS Everywhere: https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger: https://www.eff.org/privacybadger - helps to block tracking as you browse the web. (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin: a. Chrome: https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en b. FireFox: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ c. Edge: https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab d. Safari: https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4. Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android: https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple: https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity
WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives
Producer/Host: Jim Campbell Let’s take a look at some of the privacy tools listed on the www.chooseprivacyeveryday.org web site. Look under Resources on the home page, then under Tools to Protect Privacy. We’ll look at four on that list today: HTTPS Everywhere, Ghostery, Disconnect.me, and Privacy Badger. They can help us to maintain at least a little more personal privacy as we move around the web, and give those who wish to track us everywhere minor conniptions.
Producer/Host: Jim Campbell Let’s take a look at some of the privacy tools listed on the www.chooseprivacyeveryday.org web site. Look under Resources on the home page, then under Tools to Protect Privacy. We’ll look at four on that list today: HTTPS Everywhere, Ghostery, Disconnect.me, and Privacy Badger. They can help us to maintain at least a little more personal privacy as we move around the web, and give those who wish to track us everywhere minor conniptions. The post Notes from the Electronic Cottage 5/16/19: Privacy Tools 2019 first appeared on WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives.
Le RDV Tech 278 - Spécial : débat sur l'éthique des données personnelles Au programme : Débat sur l'éthique des données privées. Bloqueur de traqueur recommandé : Privacy Badger (ou Ublock Origin / Kimetrak). Comment créer son cloud privé : l'article de Guillaume. Le moteur de recherche Qwant. Pour soutenir l'émission, rendez-vous sur http://patreon.com/RDVTech. Plus d'infos sur l'épisode : Les animateurs sont Guillaume Champeau (@gchampeau) et Patrick Beja (@NotPatrick). Le générique est de Daniel Beja (@misterdanielb). Sa musique libre de droit est sur MusicInCloud.fr. Commentez cet épisode et retrouvez d'autres émissions sur http://frenchspin.fr ! See acast.com/privacy for privacy and opt-out information.
When is a Virtual Private Network (VPN) not really private? Answer: When your VPN provider tracks where you go and sells that information to someone else. Today we’ll talk about a recent study that shows that many of the top free VPN services make their money by collecting and selling your browsing information. That seems to violate the “P” part of “VPN”, but let’s face it: if the product is free, then you are probably the product. I’ll help you find a VPN service that is truly private. In other news, Amazon’s Echo was recently caught recording a private conversation and sending it to a seemingly random person - should you be worried? Also, I’ll explain why shouting at your hard drives can cause corruption and tell you about a great new feature of the Privacy Badger browser plugin that will stop Facebook from tracking you. For Further Insight: Don’t shout at your hard drives: https://www.youtube.com/watch?v=tDacjrSCeq4 Choosing a truly private VPN: https://www.privacytools.io/#vpn Help me to help you! Visit: https://patreon.com/FirewallsDontStopDragons
A mai menü: - = NEWS = - Trump vs iPhone // http://bit.ly/2xroaxh DDoS halott! // http://bit.ly/2LHaS2V // http://bit.ly/2L7A0Pc LuLzSec - CloudFlare // https://youtu.be/1EAnjZqXK9E?t=27m52s TP-Link TL-WR840N/ TL-WR841N auth bypass!!! // http://bit.ly/2spsjw3 - = Main topic = - Hogyan böngésszünk anonim és biztonságos módon! - Privacy kényelmetlen! - Cookies // AutoDelete Cookies http://bit.ly/2xof98k - Böngészők - Geolokáció tiltása - TOR Browser - Keresési előzmény kikapcsolása - Tracking blokkolás: Privacy Badger, Ghostery, Disconnect - NoScript addon Könyvajánló: Social Engineering: The Science of human tracking // http://bit.ly/2sjLZlJ
We discuss Salesforce buying Mulesoft, rumors about Google buying Red Hat and provide cold takes on the Facebook crisis. Plus, Matt Ray explains why there are pictures of a giant snake, a kangaroo and dog's bottom posted on Facebook Wall. Matt Ray’s Facebook links BIG SN (https://www.facebook.com/photo.php?fbid=10152581031594848&set=p.10152581031594848&type=3&theater)AKE (https://www.facebook.com/photo.php?fbid=10152581031594848&set=p.10152581031594848&type=3&theater) Matt Ray’s son and a dog..? (https://uploads.fireside.fm/images/9/9b74150b-3553-49dc-8332-f89bbbba9f92/VCF0qZJ1.jpg) Kangaroo vs. Bicyclist (https://www.sunshinecoastdaily.com.au/news/queensland-cyclist-crashes-into-kangaroo/3322469/?ref=hs) Matt’s Coterie of Browser Plugins: TrackMeNot (https://cs.nyu.edu/trackmenot/) uBlock Origin (https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en) Ghostery (https://www.ghostery.com/) Privacy Badger (https://www.eff.org/privacybadger) KB SSL Enforcer (https://chrome.google.com/webstore/detail/kb-ssl-enforcer/flcpelgcagfhfoegekianiofphddckof?hl=es) TamperMonkey (https://chrome.google.com/webstore/detail/tampermonkey/dhdgffkkebhmkfjojejmpbldmpobfkfo?hl=en) Relevant to your interests The Cambridge Analytica Debacle is not a Facebook “Data Breach.” Maybe It Should Be. (https://techcrunch.com/2018/03/17/the-cambridge-analytica-debacle-is-not-a-facebook-data-breach-maybe-it-should-be/) The Facebook Brand (https://stratechery.com/2018/the-facebook-brand/) Salesforce is reportedly in talks to acquire Mulesoft and the stock is going nuts (https://www.yahoo.com/tech/salesforce-reportedly-talks-acquire-mulesoft-155720487.html) Salesforce agrees to buy Mulesoft in $6.5 billion deal (https://www.cnbc.com/2018/03/20/salesforce-agrees-to-buy-mulesoft-in-6-point-5-billion-deal.html) Salesforce buys a mule, but pays for a horse (https://www.marketwatch.com/story/salesforce-buys-a-mule-but-pays-for-a-pedigreed-horse-2018-03-20) Salesforce’s $6.5b acquisition of Mulesoft: what it means for the cloud ecosystem (http://techgenix.com/salesforce-mulesoft/) Update: Red Hat could be a Google takeover target – a deal wouldn't be cheap (https://www.wraltechwire.com/2018/03/19/report-red-hat-could-be-a-google-takeover-target-a-deal-wouldnt-be-cheap/) IBM's cloud strategy revolves around multi-cloud support, grabbing new workloads (http://www.zdnet.com/article/ibms-cloud-strategy-revolves-around-multi-cloud-support-grabbing-new-workloads/#ftag=RSSbaffb68) IBM's Watson Assistant is coming to IFTTT (https://ifttt.com/blog/2018/03/NewServices1) Apple, IBM add machine learning to partnership with Watson-Core ML coupling (https://techcrunch.com/2018/03/19/apple-ibm-extend-partnership-with-watson-core-ml-coupling/) Oracle's New Licenses Sales Drop While Revenue Meets Estimates (https://www.bloomberg.com/news/articles/2018-03-19/oracle-s-new-licenses-sales-drop-while-revenue-meets-estimates) Don’t Anthropomorphize Larry the Lawnmower (https://www.youtube.com/watch?v=-zRN7XLCRhc) Docker Cloud is shutting down • r/docker (https://www.reddit.com/r/docker/comments/85w2vd/docker_cloud_is_shutting_down/) Introducing Windows Server 2019 – now available in preview (https://cloudblogs.microsoft.com/windowsserver/2018/03/20/introducing-windows-server-2019-now-available-in-preview/) Java 10 Released, First in the New Faster Cadence (http://Java 10 Released, First in the New Faster Cadence -- ADTmag) This episode brought to you by: Datadog! This episode is sponsored by Datadog, a monitoring platform for cloud-scale infrastructure and applications. Built by engineers, for engineers, Datadog provides visibility into more than 200 technologies, including AWS, Chef, and Docker, with built-in metric dashboards and automated alerts. With end-to-end request tracing, Datadog provides visibility into your applications and their underlying infrastructure—all in one place. Sign up for a free trial (https://www.datadoghq.com/ts/tshirt-landingpage/?utm_source=Advertisement&utm_medium=Advertisement&utm_campaign=SoftwareDefinedTalkRead-Tshirt) at www.datadog.com/sdt (http://www.datadog.com/sdt) Datadog wants you to know they monitor Kubernetes performance metrics (https://www.datadoghq.com/blog/monitoring-kubernetes-performance-metrics/). You try it by signing up for a trial at www.datadog.com/sdt (http://www.datadog.com/sdt). Exegesis Want more talk about FANG? Then Listen to Cotê and Brandon review Scott Galloway’s (http://www.stern.nyu.edu/faculty/bio/scott-galloway) book The Four (https://www.amazon.com/s/?ie=UTF8&keywords=the+four+scott+galloway&tag=googhydr-20&index=aps&hvadid=214061735707&hvpos=1t1&hvnetw=g&hvrand=11767013390428378688&hvpone=&hvptwo=&hvqmt=e&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9028322&hvtargid=aud-416583594430:kwd-345132176336&ref=pd_sl_6onuzfwg4j_e) on Episode of 52 (http://www.softwaredefinedinterviews.com/52) of Software Defined Interviews (http://www.softwaredefinedinterviews.com/) from awhile back. Even more relevant today! Nonsense Jeff Bezos has a robot dog (http://brucesterling.tumblr.com/post/172049593263) WhatsApp co-founder tells everyone to delete Facebook (https://www.theverge.com/2018/3/20/17145200/brian-acton-delete-facebook-whatsapp) Conferences, et. al. April 3rd to 4th, Dallas - MC Coté at SpringOne Tour (http://springonetour.io/2018/dallas). April 11th, InnoTech San Antonio (http://www.innotechconferences.com/sanantonio/) - Coté speaking (http://sched.co/Dpzf). April 10-12th, Sydney AWS Summit April 26-27, DevOpsDays Jakarta (http://devopsdays.org/events/2018-jakarta/) - Matt (https://twitter.com/agilecircleindo/status/969511498287493120) is keynoting (https://twitter.com/agilecircleindo/status/969511498287493120), and Coté will be speaking too (https://twitter.com/agilecircleindo/status/969511498287493120). May 15th to 18th, 2018 - Coté talking EA at Continuous Lifecycle London (https://continuouslifecycle.london/sessions/the-death-of-enterprise-architecture-defeating-the-devops-microservices-and-cloud-native-assassins/). May 22-25, ChefConf 2018 (https://chefconf.chef.io/), in Chicago. SDT news & hype Check out Software Defined Interviews (http://www.softwaredefinedinterviews.com/), our new podcast. Pretty self-descriptive, plus the #exegesis podcast we’ve been doing, all in one, for free. Keep up with the weekly newsletter (https://us1.campaign-archive.com/home/?u=ce6149b4008d62a08093a4fa6&id=5877922e21). Join us in Slack (http://www.softwaredefinedtalk.com/slack). Buy some t-shirts (https://fsgprints.myshopify.com/collections/software-defined-talk)! DISCOUNT CODE: SDTFSG (20% off) Send your name and address to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) and we will send you a sticker. Recommendations Matt: Earworm video series (https://www.youtube.com/playlist?list=PLJ8cMiYb3G5fyqfIwGjH2fYC5fFLfdwW4) from Vox Brandon: Metrex II Black Mesh Task Chair (https://www.costco.com/Metrex-II-Black-Mesh-Task-Chair.product.100177590.html) from Costco Coté: Le Relais de Venise - l’Entrecôte (https://www.yelp.com/biz/le-relais-de-venise-l-entrec%C3%B4te-paris-2?uid=02uxjke4yV-F3CVOQWN6UA&utm_source=ishare)
Ever wonder how Facebook seems to know what you just searched for? How about Google and Amazon? All of these companies follow certain guidelines that let them and other aggregate information about you then show it to you in relevant ways -- but you can limit it because it's your data!! Take control with Privacy Badger and Ghostery! Let's continue our discussion! Follow me on Twitter and Instagram at @dexter_johnson and visit http://DexJohnsPC.com to stay on top of my latest posts. Share this podcast with a friend!
Yan Zhu is renowned security and privacy engineer. She is currently working as a Senior Software Engineer at Brave and a Technology Fellow at the Electronic Frontier Foundation. She is an open web standard author, technology speaker, and open source contributor. Some of her contributions include HTTPS Everywhere, Lets Encrypt, Secure drop, Privacy Badger.
Denne gang er jeg på besøg hos Kim Elmose, der er digital udviklingsredaktør i Ingeniørforeningen, IDA. Interviewet foregår i IDAs lille tv-studie, hvor lyset pludselig gik ud - men vi fortsatte ufortrødent! Udover den tekniske drift og udvikling af ida.dk rådgiver Kim om digital kommunikation og underviser i brug af sociale medier som Twitter og Facebook. Men en af Kims største interesser er spørgsmålet om databeskyttelse og privatliv, især med fokus på hvad vi gør som ganske almindelige brugere. Så udover at fortælle om sit daglige arbejde kommer Kim også med gode råd til apps og tjenester som gør det forholdsvis nemt at minimere hvor meget firmaer og andre nysgerrige kan kigge med… Links Kim ordner support for IDAs brugere med Zendesk og laver intern projektstyring med Trello. Microsofts OneNote er blevet omdrejningspunktet for Kims opgave-styring, noter på opgaver og så videre. Skal Kim rådgive nogen i huset med at bygge en ny side eller undersite – afdækker han deres behov ud fra Business Model Canvas. Privatlivsting som vi taler om i denne episode Privatliv.nu er Kims con amore projekt, hvor han skriver om især apps og tjenester til privatlivsbeskyttelse. Han skriver også på bloggen Online Minds sammen med en ven, Lars K. Jensen, der er digital projektleder på Ekstrabladet.dk. Signal er en velrenommeret krypteret beskedtjeneste. Wire kan været et fint alternativ - smooth og lækker med privatliv for øje. Til privat mail er Kim glad for ProtonMail, fordi den har to faktor login, og mulighed for at sende passwordsbeskyttede mails til ikke-ProtonMail-brugere. Søgning Startpage.com der har European Privacy Seal, eller i stigende grad også den dansk-baserede søgemaskine, FindX, der lige er kommet i offentligt beta. Den primære browser er Firefox – udstyret med diverse privacy-apps – udover de sikkerheds-features, som browseren er født med. Men Kim bruger også jævnligt Tor-browseren – af solidaritetshensyn overfor de, der virkeligt har brug for at bruge Tor, hvis de skjuler sig for regimers overvågning. Browserboblere: Brave fra en af stifterne af Mozilla, og Cliqz: ny tysk baseret privacy-browser til de fleste platforme. Disconnect Me er den foretrukne cookie- og adblocker til Firefox. Ellers er der også Privacy Badger: cookie- og adblocker fra Electronic Frontier Foundation, EFF.org. Øvrige privatlivs-tips fra Kim Passwordmanageren LastPass tilbyder at gemme password, generere nye og lange passwords. Har en meget fin mobilapp og fungerer fint med tilføjelser i browser. SpiderOak One backupper indhold i krypteret form fra din computer, og kan også dele dokumenter ligesom fx Dropbox. Det ER vigtigt med VPN – også på mobilerne – for at beskytte sin trafik. Og der er mange muligheder, fx Orbot på Android eller OperaVPN – ny app fra Norge. De tre tips - og en lille bonus: Prøv at sigte mod Zero Mail indboks. Hver gang du får en mail – beslut hvad der skal ske med den! Screencast-værktøj Snagit kan fx tage screendumps eller lave små videoer til at sende til udviklere, brugere der har spørgsmål til vores cms'er eller andet. Man kan tegne og skrive på fotos og videoer med yderligere instruktioner. Instapaper kan bruges til at gemme artikler fra nettet til senere (offline-)læsning i ro og mag. Til bogmærker bruger Kim Pinboard.
Wir beginnen wie immer mit unserem Intro, welches wir dieses mal manuell regeln. Nach Begrüßungsrunde und den allgemeinen Punkten auf unserer Agenda, fangen wir auch gleich mit unseren Themen der Sendung auf. Vorher ist Sven aber noch erfreut und Stefan erschrocken über die Zahl der Downloads. In den News merken wir kurz an, dass der Hash-Algorithmus “SHA1” nun endlich Tot ist und weiterleben wird. Historisch: 2005 Broken, 2009 als Veraltet bezeichnet und sollte seitdem auch nicht mehr verwendet werden. Ein Entwickler zieht über “Anti-Viren”-Hersteller her. Die Quintessenz ist: Verschlüsselungen aufbrechen ist immer BÖSE!! Sicherheitsforscher haben einen Weg gefunden, Browser unabhängig Nutzer zu tracken. Im ersten Thema des Abends erklärt Sven wie man seine Privatsphäre und seine Sicherheit mit Hilfe von Browser-Plugins erhöhen kann und stellt seine Highlights vor. Neben der Linux-Distribution “Tails” empfiehlt Sven TOR und bestimmte Verhaltensweisen zu nutzen sowie Browser Plugins. “Noscript”, “Privacy Badger” und “uBlock Origin” sind nur ein paar Plugins die erwähnt werden. Das wichtigste Werkzeug das man hat ist jedoch weiterhin “Hirn” Beim unserem zweiten Thema erzählt und Stefan etwas über das “Darknet” und was es damit wirklich auf sich hat. Unter anderem erwähnt er das erste “Darknet” der Welt, das “ARPANET” aber auch zwei bekannte Netzwerke, welche als “Darknet” bezeichnet werden. Zuerst wird das “Freenet” Besprochen wobei die Meinung von Stefan ist, dass es sich nicht für ihn lohnt. Anschließend wird noch das “TOR” Netzwerk beleuchtet und ausführlich besprochen. Nicht nur die positiven Aspekte werden beleuchtet, sondern auch die negativen Aspekte denen man begegnen kann. Zum Schluss gibt es wie bereits bekannt ein wenig Smalltalk und eine kleine Anekdote wie sich Stefan anschickte das Internet in Gänze zu filtern. Anschließend widmen wir uns wie bereits gewohnt unserem Intro/Outro, dass wir dieses mal ausspielen lassen.
This is the 59th episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions. This episode was hosted by Tom Eston and Scott Wright recorded January 11, 2017 (Happy New Year!). Below are the show notes, commentary, links to articles and news mentioned in the podcast: Amazon […] The post The Shared Security Podcast Episode 59 – Amazon Echo, Wifi Router Security, EFF Privacy Badger appeared first on The Shared Security Show.
Eva und ich unterhalten uns ab jetzt regelmäßig über Themen aus Digitalien – in dieser Folge zählen dazu der Citizen Score, sicherer surfen dank HTTPS und dem Privacy Badger, Google-Ranking-Faktoren und die Beschleunigung von mobilen Webseiten.
01:45 - Gary Herman Introduction Twitter Jabico Enterprises 01:49 - Commoditization 10:14 - The Changing Landscape of Software Development Craftsman/Architect vs Entrepreneur 17:48 - Perception of Value 23:55 - Utilizing Offshore Teams vs Onshore Teams 31:09 - Specialization 34:47 - Roadmapping and Building Trust with Clients The Freelancers' Show Episode #201: Roadmapping with Brennan Dunn 43:55 - Giving Away Advice; Creating/Maintaining Open Source Projects Projects Expertise 48:41 - The American Freelancer and Software Development; Are there limitations? 54:17 - Helping Clients Find the Right Team Picks Why DYFConf Europe Was The Best Thing Ever (And You Should Have Been There) (Reuven) FlightAware (Reuven) The Icarus Deception: How High Will You Fly? by Seth Godin (Jonathan) Jonathan Stark: How To Increase Your Income Without Hiring Junior Developers (Jonathan) Jonathan Stark on Huffduffer (Jonathan) AmazonBasics AA High-Capacity Rechargeable Batteries (Philip) AmazonBasics Microfiber Cleaning Cloths (Philip) The Prisonbreak Bootcamp (Philip) Don’t lose hope (Philip) Tab Wrangler (Chuck) Privacy Badger (Chuck) Session Buddy (Gary) I am Rebel (Gary) The Founder Institute (Gary)
01:45 - Gary Herman Introduction Twitter Jabico Enterprises 01:49 - Commoditization 10:14 - The Changing Landscape of Software Development Craftsman/Architect vs Entrepreneur 17:48 - Perception of Value 23:55 - Utilizing Offshore Teams vs Onshore Teams 31:09 - Specialization 34:47 - Roadmapping and Building Trust with Clients The Freelancers' Show Episode #201: Roadmapping with Brennan Dunn 43:55 - Giving Away Advice; Creating/Maintaining Open Source Projects Projects Expertise 48:41 - The American Freelancer and Software Development; Are there limitations? 54:17 - Helping Clients Find the Right Team Picks Why DYFConf Europe Was The Best Thing Ever (And You Should Have Been There) (Reuven) FlightAware (Reuven) The Icarus Deception: How High Will You Fly? by Seth Godin (Jonathan) Jonathan Stark: How To Increase Your Income Without Hiring Junior Developers (Jonathan) Jonathan Stark on Huffduffer (Jonathan) AmazonBasics AA High-Capacity Rechargeable Batteries (Philip) AmazonBasics Microfiber Cleaning Cloths (Philip) The Prisonbreak Bootcamp (Philip) Don’t lose hope (Philip) Tab Wrangler (Chuck) Privacy Badger (Chuck) Session Buddy (Gary) I am Rebel (Gary) The Founder Institute (Gary)
Online Privacy Tools and Practices Modern Consumer Expectations Lastpass password manager Tor Firefox HTTPS Everywhere Privacy Badger Self-Destructing Cookies ublock-origin Disconnect Firefox Security Settings Open DNS Open VPN Two-factor Authentication How to Encrypt your iPhone Netflix Launches in India
Technology fellow at the Electronic Frontier Foundation Yan Zhu (@bcrypt) joins Matt and Andy to dig deep into online security, privacy, encryption, HTTPS Everywhere, podcast patent trolls, Privacy Badger, the Tor browser, the future of online ads, Edward Snowden, the Silk Road, the upcoming Probably Science live show at SF Sketchfest on January 14th and a bonus audio snippet about Yan's legendary landlord.
Show #106, Hour 1 | Guests: Bob Hoffman is the author of Marketers Are From Mars, Consumers Are From New Jersey, former head of two advertising agencies, and writer of the industry blog, The Ad Contrarian which was named one of the world’s most influential advertising and marketing blogs by Business Insider. In 2012 Bob was selected Ad Person of the Year by the S.F. Advertising Club Noah Swartz is a Staff Technologist on the Tech Projects team at the Electronic Frontier Foundation (EFF). He works on the various software the EFF produces and maintains, including but not limited to Privacy Badger. Before joining EFF Noah was a researcher at the MIT Media Lab as well as a technomancer and free software/culture advocate. Sandy Pelland is the founder of lifestyle destination website MomLifeTV and member of the Interactive Advertising Bureau (IAB). Her site’s mission: Being a Mom is one of the most rewarding experiences. But, parenting isn’t always easy. Sometimes you just need help. At MomLifeTV, we’ve assembled talented professionals and organizations who give you great tips, advice and information. We also feature great stories from Moms, to help you, on your journey through Motherhood. Dave Yoon is co-founder/creator of Been Choice which adds a new twist to the ad blocking game: users can opt in to see advertising, and get paid in exchange for being tracked! Earlier this week the Apple App Store pulled Been Choice over privacy concerns; Been Choice has resubmitted it for approval. Dave spent a decade with MIO Partners (McKinsey Investment Office) as Engagement Manager, then Portfolio Manager, before co-founding Been, Inc. | Show Summary: Angie explores ad blockers, ad technology, privacy, and the overall ad industry with a diverse panel of experts.
En este capítulo os hablamos de alternativas a bloqueadores de anuncios pero con conciencia y con ganas de no fastidiar, en concreto os hablamos de qué es lo que se hace para anunciarnos cosas y cómo se comporta nuestra recomendación, Privacy Badger. En nuestra sección del Lesbiano Gadgetero, os hablamos de cómo montar vuestro propio sistema de copias de seguridad mediante sincronización de directorios en un equipo que tengáis en casa, ya sea un pc con linux, una máquina virtual, una Raspberry PI o lo que tengáis por ahí en el trastero. Os hablamos de muchas alternativas pero con la que nos quedamos es OwnCloud. Probadla y nos comentáis. Métodos de contacto Como siempre, para cualquier cosa, recordad, nos podéis encontrar en Twitter con las cuentas @Enteratec_com, @Materron y @Kashopi. Enviadnos vuestras consultas tanto aquí como en comentarios en el blog o en el formulario de contacto del blog. La música del podcast: Intro: Lucky_One del artista George_Woods. Métodos de contacto: Funny_Children_s_Song del grupo Akashic_Records Feed del podcast: https://enteratec.com/consultorioenteratec.xml.rss
@AkiliShine, @Atorres890, & @JoeKBraswell discuss tech & geek news on BHL's Geek. Nerd. Tech! Today, first up is Tech News, where the hosts discuss how Trumps political antics are making Twitter and Facebook tons of Money. Apple's next iPhone is rumored to Debut in September, and facebook is introducing it's own version of Periscope. Also, are you sick of Advertisers tracking you online? Well guess what. Privacy Badger don't give a flop. Check it out. Next, onto this week's Geek and Pop Culture news where we discuss Ben Affleck's contract for 3 standalone batman movies, and we give our thoughts on a few of the newest films. Finally, we wrap things up with our Video Game news where we're breaking down Xbox One's backwards compatibility coming in November and Battlefront's awards at Gamecom. All this and more on this week's Geek. Nerd. Tech.!
Episode 64 Test MonkeyAll right we're live!Derick 3:43 - Derick makes a pitch to 3 people! Mastermind Bundle of RabbitMQ for Developers goes on sale May 12th for $1200 (per person) John7:28 – John returns from a strange QA/Tester conference. John is persuaded that there are good Testers/QA people, but the majority is pretty lazy. John is concerned that there is not enough innovation. Josh14:36 – John has come full circle with automated testing and writing iOS code using a Xamarim. Derick talks about unit testing and building tools. Josh talks about a certain magazine for DEVs that focus on testing in production. John22:03 - John mentions that he believed in the continuous deployment, until Chrome! Broken flash… Derick talks about how he uses Privacy Badger and Ad Blocker apps, and how they refuse to service Flash. John talks about the keynote of QA, and how QAs are passionate about testing. In short, the Doctor probably can do what the nurse does – and maybe better - but the nurses may to be able to do the doc’s job. John28:35 - John runs into Michael Bolton the famous tester, and turns the sour relationship to a friendly connection. Also, John meets Dan North that the conference and made some respectable connections. Derick 30:49 – Derick shares how the interviews for RabbitMQ will have far more value for him, as well as his customers. Josh suggests that Derick’s own testimonial would be a great marketing strategy. In other news, Derick is also 22lbs down on the one meal a day. Chuck 39:20 - Derick mentions the 10 seats for the consulting packing will go live, but the rest of the package will be for sale later on. Josh41:38 – Josh is running on 4 hours of sleep, he had two clients and diving into the projects. He has plenty of excitement that he cannot sleep. Josh is working websites and backend marketing/data stuff. Josh says thank you to Brian Harris for the referrals. The EntreProgrammers talk about ways to support Josh’s project, things to do and ways to approach the project, especially with the given circumstances. John talks about changing the work relationship between Josh and his client, which is to use him a referral channel. In turn this will make Josh more money and take the load off his client. John 1:05:35 – John mentions how Josh is one degree away from Tim Ferris. Because of that, Derick is now thinking about not befriending Josh any longer. John wants software built to make automatic contacts with people in LinkedIn. The rest of the team doesn’t think it is worth the time to do so. This is John’s vision for another marketing strategy, he mentions how some small businesses use LinkedIn for a small portion of their marketing. 1:17:35 – Johns has over 20,000 followers on Twitter. Here is some talk about Twitter and following rules and limits. 1:21:39 - John is finally going to record an audio version of his book! John is also doing consulting, a test automation gig for Verizon. The EntreProgrammers talk about hourly rates, values base pricing, weekly, or daily rates for doing a consulting job like this particular one. John now decides to update his hourly rate after consulting with the Mastermind. 1:33:32 – John mentions a highlight of the QA conference, the 70-20-10 model, a productively model for where your focus should be. Chuck 1:35:00 – Chuck is trying to decide or figure the value of Dev Chat TV. Chuck is trying to refine the efforts of his podcast, content and platform of Dev Chat. Chuck has also hired a VA to support his YouTube channel, email, and some podcast content. Johns gives some feedback on how to divide the work, and how provide access to sensitive information to VAs. 1:43:00 - The EntreProgrammers share information about how and why assistants are to document their task list or work. 1:51:25 - John shares information about LastPass, a folder you could share with your assistants. John talks about how divide weekly and quarterly time sensitive work. 1:59:21 – The EntreProgrammers Retreat Info: June 1st there will be a page for payment to reserve you spot with the EntreProgrammers. Link is below for the email list. 2:01:52 - Thoughts for the DayJohn – Make sure that you have the poker into more than one fire.Josh – Rise to the challenge, and define the work.Chuck - You can’t improve things unless you continually measure it. People and things mentioned in this episode!Master Mind Bundle of RabbitMQ for Developershttp://derickbailey.com/2015/05/07/update-on-rmq-for-developers-consulting-to-be-available/Xamarimhttp://xamarin.com/platformc Michael Boltonhttp://www.developsense.com/courses.htmlDan North http://dannorth.net70 20 10http://www.lifehack.org/articles/productivity/70-20-10-formula-for-successful-networking.htmlLastPasshttps://lastpass.comThe EntreProgrammers Retreat http://entreprogrammer.com/retreat2015Book : Anti Fagile by Nassim Nicoleas Taleb http://www.amazon.com/Antifragile-Things-That-Disorder-Incerto/dp/0812979680Book: Traction by Gino Wickmanhttp://www.amazon.com/Traction-Get-Grip-Your-Business/dp/1936661837/ref=sr_1_1?s=books&ie=UTF8&qid=1431300621&sr=1-1&keywords=traction+by+gino+wickman
iOS 8 beta 5, nove paranoične zadeve in IRC. Ja, IRC. Povezave Apple in Beats iOS beta 5 OS X Yosemite beta 5 iOS bete skozi čas (un kul graf) Prenovljeni MacBook Pro Retina Applov lastni CDN Google kupil Twitch Privacy Badger John Carmack in Oculus Wi-Fi tracking v Angliji Guardians of the Galaxy Todo Movies Brooklyn Nine-Nine
Resuming our half-and-half episode format, it’s Season 2, Episode 6. Chris talks about a previous show with Jonah, where he learned about Tom Cruise’s middle tooth! Paul thinks Tom Cruise’s middle tooth could be the Silence. Chris recommends Teeth if you’re into… you know what, don’t watch this. Paul says his children are really enjoying the Hopscotch and Paper apps on the iPad. Spellbounders is a iPad game recommended by a listener in the chat room. Chris is using Privacy Badger, a plugin for browsers from the EFF that blocks ad trackers. Want to chat without cell service? Check out FireChat. ProtonMail boasts security and encryption for the average user. It’s an email service started by some CERN scientists. We talk iMessage difficulties. Chris uses FolderSync to sync his photos with OwnCloud. While Paul used ScannerPro to copy receipts to OwnCloud. Is NFC coming to Apple? Rumor! Chris admits he’s a closet reality show fan because he watches MasterChef. Paul’s watching The Wil Wheaton Project. Montreal Sauce has no sponsors, but they talk about all the commercials on television, OnDemand and product placement. From the chat room to Paul & Chris, the world thinks Agents of S.H.I.E.L.D. went from bad to decent. Meanwhile, Paul is concerned with Samuel L. Jackson’s health. Paul & Chris explore the Montreal Sauce history of foley sounds made with the mouth. Paul talks an awesome Star Wars parody he did & Chris talks about a parody he made of a Maya Deren film. Support Montreal Sauce on Patreon