POPULARITY
Hop, Mise en Ligne des "Nostalgiques Part 41 », Avec Pour Cette Fois un Mix Composer de Vieux Tube Comme : 740 BOYZ, VICTOR MEDE, CALVIN HARRIS, DAFT PUNK, DJ SNAKE, DR DRE, EURYTHMICS, FRAGMA, JAX JONES, JUNIOR SENIOR, LADY GAGA, MANDY, MARTIN SOLVEIG, MAX A MILLION (DJ Sam Re-Edit), MICHAEL GRAY, NELLY FURTADO, PAROV STELAR, SILENT CIRCLE etc... Que du Vieux son en Version Remixer ! Bonne Ecoute !
Joan's new husband Alex hops into the women's forum to warn of imposters in the online community, prompting chatroom members to wonder who can be trusted. Alex opens up about his past, and Joan creates a secret society to protect the women in the forum from interlopers.
Mike Janke is co-founder and Board Member of DataTribe. Mike Janke is also a founder and former CEO of Silent Circle, the world's leading Global Secure Communications service and the makers of Blackphone – Time Magazine's top 10 invention of the year. Mike is also a former member of the elite SEAL Team 6 as well as an author of two best-selling books on self-discipline, leadership, and performance.He is the 2016 recipient of the Visionary of the year award from the Center For Democracy and Technology. Mike is also the founder of Blue Pacific Studios – a Los Angeles based Film production firm. Prior to starting Silent Circle, he was the founder and former CEO of SOC-USA one of the country's largest defense logistics and security firms headquartered in Washington DC, with over 10,000 employees in a dozen countries. Mike speaks around the world on Technology, Defense and Privacy.
Jon Callas is a computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle. He has held major positions at Digital Equipment Corporation, Apple, PGP, and Entrust, and is considered "one of the most respected and well-known names in the mobile security industry. His views stem from big tech's mass pooling of personal data for advertising and the polarization within Silicon Valley. While some companies are committed to privacy, many more earn their revenues from selling user data. Callas has stated that if the advertising market takes a downturn, companies that protect their users' data are the most insulated from harm. --- Support this podcast: https://anchor.fm/out-of-the-blank-podcast/support
Today, we're surrounded by strong encryption. Thanks to efforts like Let's Encrypt, almost all web communications today at encrypted. And thanks to wonderful privacy communications tools like Signal, we can share private thoughts instantly and securely with anyone on the planet. But this was not always the case. This secure, private, encryption-enabled future we're living now was far from certain 30 years ago when Phil Zimmermann created and freely released his email encryption tool Pretty Good Privacy (PGP). If not for Phil and a handful of others, we could very easily have lost the Crypto Wars of the 1990's and authoritarian mass surveillance could have been the norm. In today's show, Phil and I walk through the creation of PGP, the technological and political climate of that day, and the nerve-racking few years where Phil faced potential jail time for releasing "munitions grade" encryption to the world. We'll also discuss the literally life-saving impacts PGP has had over these last 30 years and how global law enforcement agencies and liberal democratic governments have revived the Crypto Wars. Phil Zimmermann is the creator of Pretty Good Privacy, which is still widely regarded as the gold standard for secure email communication. Phil went on to form Silent Circle and win several prestigious awards including US Privacy Champion and was inducted into the Cybersecurity Hall of Fame. Further Info Phil Zimmermann's website: https://philzimmermann.com/ Phil's announcement for the 30th anniversary of PGP: https://philzimmermann.com/EN/news/index.htmlPGP Web of Trust: https://en.wikipedia.org/wiki/Web_of_trust SNL Bass-o-matic skit: https://www.nbc.com/saturday-night-live/video/bassomatic/n8631 National Cybersecurity Awareness Month resources: https://www.cisa.gov/cybersecurity-awareness-month-resources Only ONE WEEK LEFT to snag your challenge coin!! https://firewallsdontstopdragons.com/my-challenge-coins-are-back/ Become a Patron! https://www.patreon.com/FirewallsDontStopDragons Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGenerate secure passphrases! https://d20key.com/#/
The undead attacks on Vorsthold are increasing. A few weeks ago a group of Dawnland adventurers tried to help Rangrim, a necromancer of the Silent Circle, hunt for his lost colleague Morin, but to no avail. Archmage Duron Cragshin is worried about for the safety of his student, but is busy combatting the undead threat. Sheryl, Baine, BB, Arkadius and Taffeta answer the summons this time. What happens in the tunnels deep under Vorsthold is not what any of them could have expected… Want to support TOME OF TALES? Why not buy me a Ko-fi? Every ko-fi bought helps with production! ☕ (https://ko-fi.com/yousei) The Kantas Expanse is a long-running Dungeons and Dragons 5th Edition campaign run by the London RPG Community. Looking for a friendly place to run or play a TTRPG? Whether you're new, or a veteran, we cater for everyone. Join us on Discord (https://invite.gg/lrc). Featuring: Riane Vardeleon as BB Kieran Seabrook-France as the Mysterious Dwarven Guard Cover art done by Laura Tolton. Listen to Sheryl's Character Playlist on Spotify!
Mike Janke is a former member of the most elite special operations units in the world, Navy SEAL Team 6. He takes us through his upbringing in Pennsylvania, his mindset while going through some of the most challenging military pipelines in the world, and what life was like after leaving the SEAL Teams. Mike is also the founder and former CEO of Silent Circle, the world's leading Global Secure Communications service and the makers of Blackphone – Time Magazine's top 10 invention of the year. He is the 2016 recipient of the Visionary of the year award from the Center For Democracy and Technology. High Performance Coaching - Click here to schedule a free consultAsk Me Anything (have your question get answered on a future podcast episode)missiondrivenmade.com/contact/Website - https://missiondrivenmade.comMDM Apparel - https://missiondrivenmade.com/store/Instagram - @missiondrivenmadeYouTube - Mission Driven MadeFacebook - @missiondrivenmadeLinkedin - Jacob StraubSupport the show (https://buymeacoffee.com/JacobStraub)
There are many business models and businesses that we curtail because they can be dangerous to people or democracy or society. Even rights enshrined in the US Constitution have reasonable limits. Now that it's become evident how engagement-optimized and algorithm-driven social media is ripping at the very fabric of our democracy, it's time for an intervention. Today, Phil Zimmermann (creator of PGP) will explain why things have gotten so bad and what we need to do to fix it and save civil society. Phil Zimmermann is the creator of Pretty Good Privacy. PGP is still widely regarded as the gold standard for secure email communication and caused quite a controversy when it was introduced in the early 1990s. Phil went on to form Silent Circle and win several prestigious awards including US Privacy Champion and was inducted into the Cybersecurity Hall of Fame. Further Info BECOME A PATRON! https://www.patreon.com/FirewallsDontStopDragons About Phil Zimmermann: https://www.philzimmermann.com/EN/background/index.htmlRead Crypto by Steven Levy: https://amzn.to/2PyAjKE Silent Circle: https://www.silentcircle.com/ Okuna update: https://medium.com/okuna/the-path-forward-8d56ccf37b5c Check out Somus.app: https://www.somus.app/ Watch The Social Dilemma: https://www.netflix.com/title/81254224 Watch The Great Hack: https://www.netflix.com/Title/80117542 Foundation for Individual Rights in Education (FIRE): https://www.thefire.org/
After a month-long absence, Deep Cuts and Superficial Wounds returns with italo disco, euro disco, a little bit a new wave and a female forward selection of 80s hits by the one and only Love Connie. Watch Drew’s big Simpsons project that kept this podcast offline all month.And here’s that big Twitter thread where people were shouting out their favorite artists in celebration of Sophie’s life and work. 0:00 Madleen Kane, “Cover Girl” — Apple Music • Spotify • Amazon 7:46 Lanah Pillay, “Pistol in My Pocket” 13:02 New York Models, “Hot for You” 17:51 The Fashion, “Future Girl” — Spotify • Amazon 23:56 France Gall, “Ella, elle l’a” — Apple Music • Spotify • Amazon 28:38 David Gray, “Let’s Dance Tonight” — Apple Music • Spotify • Amazon 36:01 Martha and The Muffins, “Black Stations, White Stations” — Apple Music • Spotify • Amazon 41:05 Toni Basil, “Over My Head” — Apple Music • Spotify 44:17 Wish featuring Fonda Rae, “Touch Me (All Night Long)” — Apple Music • Spotify • Amazon 53:44 Fern Kinney, “Love Me Tonite (Love Love Love)” — Apple Music • Spotify • Amazon 58:11 Kim Wilde, “Dancing in the Dark” — Apple Music • Spotify • Amazon 64:08 Silent Circle, “Touch in the Night” — Apple Music • Spotify • Amazon 69:17 Manhattan Project, “That’s Impossible” — Apple Music • Spotify • Amazon 76:08 Cube, “The Young Pretender” 81:37 Check Up Twins, “Sexy Teacher” — Apple Music • Spotify • Amazon 91: 11 Orchestral Manoeuvres in the Dark, “Electricity” — Apple Music • Spotify • Amazon This whole thing is put together by me, Drew Mackie. Follow me on Twitter. I'm on Instagram too. Also listen to the Spotify playlist that inspired this podcast. If you have a recommendation for a song you think should be played on the show, hit me up on Twitter or leave me a voicemail by calling (970) 823-4726 — or 970 82 DISCO. I may play your recommendation on a future show. Have a look at the official website for fancy people. The original art for this podcast was designed by Sarah Wickham, who rocks. Check out her art and also buy her stuff. Subscribe: Mixcloud • iTunes • Stitcher • Libsyn • Google Podcasts
On this episode of Beers & Bytes, we welcome Tony Cole, Chief Technology Officer at Attivo Networks. He’s a well-known global strategist and evangelist in cybersecurity who works to provide education on the evolving threat to our interconnected world. Cole is on the board of directors for (ISC)² and Silent Circle and also serves on the NASA Advisory Council and is the former president of ISSA-DC.Beers from today's episode:My Imaginary Girlfriend - https://lostrhino.com/Sanctimonious Enmity - https://www.adroit-theory.com/Voodoo Ranger Juicy Haze IPA - https://www.newbelgium.com/Waves West Coast IPA - https://almanacbeer.com/Guinness Extra Stout - https://www.guinness.com/Hoppy Duck IPA - https://texasbeerco.com/Learn Morehttps://attivonetworks.comhttps://beersandbytespodcast.comhttps://fluencysecurity.comhttps://fortify24x7.comhttps://fortifyxdr.comSupport the show (https://beersandbytespodcast.com)
2 Hours of Death/Black Metal featuring interviews with Mecalimb and Sepulchral CursePlaylistKoergull the Exterminator - The Black Goat of the WoodsPROSCRIPTION--Red Sacrament Black CommunionEXPUNGED - Dark Age CrusadeTERMINAL_NATION -Death For Profit MECALIMB - SOLICE FOR THE WEAKINTERVIEWMECALIMB - TOTAL WARDERANGED - NECRO-BULIMIA INTERFERING AFTERLIFE Xaemora - Manifestos Blasphemous Putrefaction - Blasphemous Ritual Black Communion - Gateway To The Nebular Crypt Incarnate Deity - Plaguebearer CARNATION - Iron DisciplineLaw of Contagion - ov Evil VOUS AUTRES - Vesuve SEPULCHRAL CURSE - INTO THE DEPTHS UNKNOWNINTERVIEWSEPULCHRAL CURSE - EYES INSIDENOCTURNIS - A Path To Nothingness BARISHI - The Silent Circle
Welcome! In this segment, Craig tells you about how police hacked a criminal network and why we are seeing a resurgence of ransomware. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: 7 reasons to pay for antivirus software and skip the free versions YouTube TV jumps 30% in price effective immediately Police roll up crime networks in Europe after infiltrating popular encrypted chat app New Mac ransomware is even more sinister than it appears Ransomware is now your biggest online security nightmare. And it's about to get worse Apple's Silicon Macs promise screaming performance TikTok and 32 other iOS apps still snoop your sensitive clipboard data An embattled group of leakers picks up the WikiLeaks mantle --- Automated Machine-Generated Transcript: [00:00:00] Hey, have you been using EncroChat to make sure your communications are secure? It's only thousands of dollars a year and bad guys have been using it. Well, they've been using it until now. the Europeans caught them. They had this thing called operation and it was being run by various police agencies. it's been reported now by major local news outlets. Motherboard has an interesting article about it as well. I have a tech crunch article about it up on my website, but the police secretly took over. Encrochat now was something that was designed to be very, very safe, right? A private communication tool for you to use anywhere in the world [00:01:00] and the way they made this stuff private is they also included the hardware. So the idea here is kind of similar to another company that I've liked over the, over the years. It's Silent Circle. They have something called the black phone and in the Silent circle's case, they're using an Android device, which makes me a little bit nervous, but it is being run by some of the best cryptographers in the world. And with Silent circle and the black phone, you, you buy their phone and you can send messages back and forth, and it keeps your teams connected and secure. They have an app that works on any Android or iOS device now instead of just having to have the physical device, but they still have the physical device, I believe. Let me see. Let me get on there. Yeah. Silent phone. There you go. Silent [00:02:00] phone deliver secure enterprise. Ready? Silent world, silent manager, or actually that looks like the silent phone is their new product, which is kind of interesting. They've obviously changed their tune a little bit out there. Anyhow. In order to be truly safe. You need new hardware, at least that's the thinking. And the looks like a Silent circle's changed their tune a little bit. I use. Something in order to keep me and my messages safe. We use WebEx teams internally with our own encryption keys, and that's really quite secured meets military-grade encryption, which we have to do because we provide services to military contracts. Cheers. This stuff rolls downhill, right? So if we're providing a service to a DOD subcontractor, we have to be compliant with those regulations as well. So we are, and [00:03:00] then there are some other apps that you can use that are pretty darn good. that worked quite well. Things like WhatsApp, et cetera. But in this case, back to our story here, this was a network that was being used by. Organized crime and the police apparently were able to monitor a hundred million encrypted messages. Sent through this network called Encrochat and they were discussing drug deals, murders, extortion, plots. Okay. Kind of everything. and I love this article and vice it starts out saying something wasn't right. Starting earlier this year, please kept arresting associates of Mark, a U K-based, alleged drug dealer. Mark took the security of his operation seriously with the gang using code names to discuss business on custom encrypted phones made by a company called Encrochat and for legal reasons, they're referring to Mark [00:04:00] as the pseudonym. Okay. But it goes on and on because the messages are encrypted on the devices themselves. Please couldn't tap the group's phones or intercept messages as authority normally would I still want to encourage chat criminal spoke openly negotiated the deals. In detail and priceless name to customers, explicit references to the drugs they were selling and how much, et cetera, and a motherboard. This is such a great article, but in the same timeframe, police across the UK in Europe started busting these criminals. And in mid-June, they picked up, the alleged member of another drug gang and then millions of dollars worth of illegal drugs were seized in Amsterdam. Hmm, what's going on? Well, it turns out that the messages weren't really secure, these guys were paying thousands of dollars a year to have these security devices and to have secure messaging. [00:05:00] But turns out that, due to this mass hacking operation run by the police, they'd been quietly reading these users' communications for months, and then investigators shared the messages with agencies all around. Europe. It's just an amazing scale. It's amazing what they were able to do. It's amazing that the Encrochat people obviously didn't have any real professionals, security people building this stuff, but, man, good for them. Some of the information and receptive by authorities showed how deeply law enforcement seems to have breached to the alleged criminal organizations. It's just going on and on. The Netherlands, and what they were able to do there pill mill and covered by law enforcement. They were doing this, this goes on for pages. They got all of this great video and then Encrochat [00:06:00] device here. They've got a YouTube video showing all of it. So if you're interested in this, check it out because it just really, I think reinforces the concept that you're not. Safe online with your communications, no matter what you have to be very, very careful. And if you're using something like WhatsApp, great for you, glad you are. I use what's an app with my, my mastermind, one of my mastermind teams that I'm on. I really enjoy using it. It's simple. It's easy to use. So that's something you might want to look at. And then the other one I use is signal it's called signal S-I-G-N -A-L. Hey, if you want to get information like this from me on a weekly basis, or sometimes even more. Make sure you are on my email list. Just go to Craig peterson.com/subscribe. Go there right now, before you forget, and [00:07:00] you'll be getting this stuff. People who are already on my list knew about these things, how to communicate. Privately and securely, even when we're talking about a family gathering. You don't want to run it through China on Zoom. Really? You don't. Okay. So how do you do all of that? No, you know, we talked about that in some of my pieces of training and in some of my newsletters. So I'll make sure you go there. Craig peterson.com/subscribe. And if you have any questions. Make sure you ask, just send me an email. M E@craigpeterson.com. So let's get into ransomware because it is once again, your biggest online security nightmare. You thought the nightmare was over three years ago? No, no, no, no. It is back. And it's back with a vengeance, great article on ZDNet this week. There are so [00:08:00] many IoT devices we're connecting to our enterprise networks. It is getting more and more dangerous. IOT of course is the internet of things. These are things like your lights, your. Oh, everything, right? I just saw a thing or an article talking about major hacks going on with some of these network attacks, attached storage devices, these NAS devices that we're putting on that you might think are more or less commercial when they are not. So this is rapidly ransomware shaping up to be the defining online security issue of the era, frankly. It's a very simple idea. It is so easy to execute right now with increasing sophistication by criminal groups. It has gotten to the point where you can hire a company that writes ransomware and gives you technical support on it. Some of them will even [00:09:00] just go ahead and take a percentage of the money that you get for the ransoms and you don't have to do anything. So the ransomware group gives you the software. Gives you all of the services. If somebody gets the ransomware, they're contacting the ransomware group, they're sending the Bitcoin to the ransomware group. The ransomware group is taking their money off the top and sending you the bad guy. The Bitcoin. So we're going to talk about that even more. When we get back, stick around, you're listening to Craig Peterson and online. Make sure you subscribe right now. Craig peterson.com/subscribe. Stick around. We're going to be right back. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Welcome! We have a lot of technology in the news this week. I will give you my take on the monitoring that the government is doing and why. We will discuss contact tracing and how Big Tech is trying to come up with a solution. What is this 5G conspiracy that is being bantered about and why is Amazon having delivery issues. Linksys and Zoom are having problems and I will tell you what you need to do. And we will wrap up with China and US and what can be done about intellectual property theft and spying. So sit back and listen in. For more tech tips, news, and updates visit - CraigPeterson.com --- Automated Machine Generated Transcript: Hello, everybody Craig Peterson here on WGAN and, of course, also heard every Wednesday morning at about 730 with Matt, as we discuss the latest issues of the day. And in fact, that's what we do here every weekend as well. So I do want to welcome you guys who some of you might be new. Some of you have been listening for a while now. I'm trying to remember when was my first time at this station. I've been on the air now for more than 20 years, 25 years, something like that long time. And I always have enjoyed it. And I enjoyed talking with you guys, too. We've had about six or eight calls. I think this week, and we've been setting aside time for people who are having problems with the computers, whether it's kind of work at home situation, maybe it's a small business, just help Send them out helping them understand what's up. So shout out to all you guys. I think the winner this week was Linda, and we spent Wow, an hour and a half, two hours with her trying to help with a few things. She had some questions about emails, and you've been having some problems for about two years now. And so we spent some time going over that with her. Elahh, one of our texts, also one of my daughters, was gracious enough to spend the time with her. And I know Linda appreciated it. And it can get frustrating. I understand that too, is funny because Elahh was saying that, you know, from time to time to Linda was getting a little hot under the collar, but that's understandable. I do that too with computers because they just can get so frustrating. So hey, I get it. I understand. And we also had an email go out this week, and you should have received that. Offering if you wanted help, and you could schedule free calls. You could get any information you wanted to get my earballs and eyeballs if necessary to look at your screen, depending on what's going on. So that's a little bit of what I've been up to this week. We also finished up I did not do any webinars this week. I'm planning on doing some Facebook Lives next week. Maybe some webinars as well depend on how it all goes. And on training, right, we're getting into the basics again, helping you guys out with completely free stuff. I'm going to be redoing my webinars and kind of explaining all of the stuff you need to know, not you know, we're not getting geeky on this. I'm not trying to turn you into a computer expert. But understand modems what they are your routers, your Wi-Fi, your firewalls, your Windows computers with the updates, what's an upgrade How about the patches going through VPN And the major risks of VPN, and when you need to use them when the appropriate time is to use them. And I'm also thinking about maybe putting together a little series for businesses that are starting up, trying to be optimistic here, right? We're starting up again, and we're getting back into the swing of things. And that means there are some things you have to worry about the machines where they shut down properly, how to get them back up and running, do you need to go in and update some of the software, maybe replace some of the just antivirus with real advanced malware protection and all that sort of stuff? So I might be doing that as well. I'm kind of thinking that, and I was talking with my team this last week about trying to do that to be optimistic and help businesses get back going again because I think we're going to have some serious problems. I think that well, frankly, I know that some people have lost their jobs or a friend of mine was saying that a friend of his I just found out that he's not going to be rehired when the business reopens because he had been laid off. And of course, this whole payroll protection plan, frankly, is a scam. It's just crazy. What the Federal Government did, they would be better off giving every family in this country a check for $60,000. Of course, that would not Greece or pockets, would it? And that would help a lot. A lot. Instead, they're spending about $60,000 per family, the spending that money on banks who are already liquid, they can go to the capital markets. You've heard about the public companies that have gotten some of this money. How about the major universities that have multiple 10s of billions of dollars in endowments that got it? And yeah, I'm a little bitter about this because I didn't get any of the money. I applied. I got nothing, nothing. I got an email a couple of weeks after I applied it saying, Well, you know, we need this. We need that. Well, wait a minute, I was supposed to get this, this instant $10,000 loan to help me stay on my feet. So this friend of mine, they got laid off, right? Then even on the PPP, you're given two months' worth of payroll, and you have to keep these people on the payroll for about four months. Well, how can you do that if the government's not letting you make money? If it's not letting you bring people into your restaurant or send people technicians out, whatever it is that you do cut hair, right? You can't you, but you know this already, right? Because this is happening to you. Look at the stats in Maine, and they say okay, well, we helped all of these, you know, these 10s of thousands of companies. Well, maybe they did, but I can tell you from people I know and my personal experience that it hasn't hit any of the pockets of the real small businesses. I haven't even gotten that. The so-called 1200 dollar stimulus check from the Federal Government. It's insane. How many weeks that we've been locked down now? It's what about six weeks? It is not good. It is not fair. It's going to be hard to come back. My friend was saying that his friend found out they're not hiring him back, which is going to be the case for many people. What happened? His friend hanged himself. Yeah, think about that. Think about all of these other consequences. It's the typical thing with the government, right? You've got people highly focused on this pandemic, and what should we do? They are extremely highly focused because last October, there was this major meeting, where they've been getting together and talking about global warming and what we need to do to save the universe. 1000 years from now. And of course, we know just how good these models are that they use for global warming. And I've never really talked about it here. I've talked about it on my other radio shows in the past, I've had the guy who founded the Weather Channel weather.com on, and it's just absolutely crazy how bad those numbers are. But we can't even get the models, right when it comes to a virus that's right in front of us, where we have some real numbers. Okay, well, maybe the numbers coming out of China weren't that wasn't that good. Perhaps those numbers were fake. Maybe, you know, we can't trust them. That's fine. Well, how about Italy? How about all of Europe, the numbers are coming out of there. How about our numbers we're still not getting it right. Remember the initial model talking about millions dead in the United States, a couple of hundred thousand dead over in the UK. We're not even getting get close to that. We're not also going to be close to the UK number that was predicted. And then it's revised down, and it's revised down and as revised down as writes down so we've got these people who are focused on what they learned last year, about pandemics and what the response should be based on this, all of this quote-unquote science. And they, of course, you know, we haven't had pandemics like this to deal with, so in reality, it's a theory, and they have the models which are in reality theory. And all of those models said Oh, no, we're going to have a lot of people that unless we go ahead and quarantine people, we need this social distancing is what they've been calling it. And so a lot of states that Okay, everybody has a social distance you have to get out you have to Oh, my goodness. And you look at the exact opposite look at Sweden and what's happened over there and was Sweden did none of this stuff, they didn't quarantine, they didn't shut down their businesses. People were still sitting in cafes, sipping their coffee, having a pleasant afternoon, and that that springtime sunshine outside, doing everything they wanted to. And it's about the size of Michigan and Sweden has had fewer deaths than my lot fewer deaths than Michigan. And you know, in Michigan, what they did with all of their lockdowns over there. It's it is nuts. These models are, at best, a guesstimate. And there they were saying okay, well we need to do is kind of get rid of that peak because our hospitals aren't going to handle it. Have you noticed how hospitals now are looking to, and some have already not only declared bankruptcy but closed their doors because they are not full. They're not full of Coronavirus cases. They shut down all the elective so-called optional surgeries and other things, right. We haven't gone to see the doctors. How many people's lives were saved the numbers the stats look like this was one of the worst I don't know the flu just a regular flu year even not particularly bad, but that's not what all of these projections said that's not what this just tickle model said. Right? Right. I remember playing the game of life well is you don't play it but writing some of that code, seen it on the computer way back when back in the 70s, it would have been and mid-70s. I was just so impressed with it, and it shows how a cell will replicate you know and replicate and how it will expand. That's about the only I've seen that's correct. So we can't get our models right for COVID-19. We still don't have them, right. We're again revising them. Now they're saying that we could have another resurgence this fall maybe even worse than what we had this year. At the same time, some of these same people are saying, Hey, we're all going to die. Because what was it five years ago or ten years ago, by then we were by 2010. We're supposed to be underwater in Florida, right? You just can't trust it. People are dying. People are losing their jobs. And so we're looking at it saying, what can we do to help businesses get back? Anyways, stick around. That's enough, belly aching for me. We'll be right back here on WGAN. Of course, I'm Craig Peterson. We'll be getting into the tech stories of the week. So stick around. Hey, welcome back, everybody. Craig Peterson here on WGAN and online at Craig Peterson dot com. We are talking today about some of the latest technology as we do every Saturday and Wednesday morning. On Wednesday morning, it's at 738, and on Saturdays, we're on from one end till three. Well, we're going to talk right now about this news surveillance program that's out there. And the whole idea behind this is to map the spread of the Coronavirus. At least that's the rumor, right? A great article you'll find@medium.com about this, but Coronavirus is being used to drive brand new surveillance programs around the world. So let's talk about a few different countries what they're doing. And I've gotten a little bit of a concern we'll talk about later in the show today, about maybe something like that. Patriot act, as we had after 911, that gives the government all kinds of new powers and they may go unchecked, which is a concern for me, particularly looking at the statistics as we know them so far, which is that this isn't just a horrific, horrific thing. It's terrible. It's awful when anybody dies, but it happens every year with the flu too. So we'll see where it all comes out. But we were just talking about the last segment. The whole thing about the models is just ridiculous. Well, in Argentina, their Ministry of Health has built a mandatory app for anyone entering the country, and you have to keep it installed for 14 days, and that requires users to give access to their GPS position. Now, it's not clear if Argentina is keeping track actively of the people with that location data about apparently the province of Santa Fe is Forcing those who have violated the quarantine to download an app that tracks precisely where we are. We're talking about Argentina here, as well as many other countries is that they are putting one of those trackers on you as though you'd been convicted of a crime which bugs me, frankly, Australia. Yeah, and everything down there is trying to kill you, including the Coronavirus. Now those ordered into quarantine could have government surveillance devices installed in their homes or be forced to wear electronic surveillance devices, and that's a new law that went into place in the state of Western Australia. But the Australian government has opted not to use cell phone-based tracking Austria. The Australian telecom con gave two days' worth of anonymized location data to the government to analyze movement in the country. And this is something that I've been saying that governments are doing worldwide. They're asking the cell phone companies that you know, the providers to give them location data, and anything that's anonymized pretty much can be D anonymized. And think about that, think about how easy that is. So if the government has your home address, and they see that person 1750, it is of that place every night, well guess what they can guess who you are, and then they know where you travel, etc., etc. So anonymized location data is ridiculous rain. They've got electronic braces that connect to a mobile app. And this is something similar to what Hong Kong has done. Belgium, they've been hit the worst in Europe when it comes to per capita cases and deaths. But three telecoms over in Belgium are giving data to a private company, and they're analyzing the information and trying to detect Widespread trends of movement in the country. Now they're using drones to make an announcement. But they can also be using the devices to capture surveillance footage. That's according to the top VPN digital rights tracker, Brazil. Let's get into the socialist countries here. Local governments across Brazil are tracking locations from citizens' smartphones. And one city receives alone is tracking 700,000 people's location through their devices. And that's one of Brazil's smaller metropolitan areas. And quote here from one of the Brazilian firms that are doing some of this stuff, we have visibility of specific behaviors that couldn't be captured by other technologies. For example, if an individual leaves their house, we can detect that in a matter of seconds. And then, of course, that ends up in the government's hands China, another socialist country. They're using practically every surveillance system in their toolbox. Publicly located cameras there you go running facial recognition searches, citizens are location tracking through their phones. Drones are being used to give directions from the government. Can you imagine that having a drone over your shoulder yelling at you? We've seen that over in China where they chase you back to your house. The Government in China is socialist, also tracking individuals more than 200 cities through a smartphone app that grades are health and assigns them a classification of green, yellow or red this according to New York Times socialist newspaper, the app sends that data to the police. It works as a hall pass for entry into certain public places, and that has been proposed here in the United States. As well that you can have a little Hall Pass, to let you board planes and go to work, etc. and China, of course, is putting pressure on private companies in the country to hand over data to China. Dubai, I don't know they're, they're a monarchy kind of a, you know, I don't know it's not quite socialist. It's undoubtedly addicted, dictatorial. They're using cameras. And by the way, one of the significant ways they make money in Dubai is these amazingly high fines for speeders. Still, this case, they repurpose the cameras from catching speeding motorists to analyze driver's license plates and determine if they are deemed, essential workers. Ecuador is tracking cellphones. Germany, which is starting to open its businesses, in fact, this week, they started opening while their telecom company they're big firm over there called telecom is providing location data from its customers to the Robert Kok Institute. And that's the organization coordinating their national action against Coronavirus. Now Germany did something right upfront. That was wonderful. I think they went immediately to the private sector and Germany said hey, listen, guys, we're going to need tests so come up with some tests figure out how we can do this how we can do testing quickly. Whereas here in the US where we don't have the private companies right up front getting involved in at CDC said we're the only ones that can do this. We are at let us do it. We're, we have a monopoly on testing. And we don't like those tests because they have 40% negative rates and you know, false positives, false negatives and, and you have to have everything come through us, right, which is a very socialist thing. And, you know, we don't live in a truly capitalist country anymore. We're at best, it's crony capitalism, but in Germany, they did the right thing. They got companies involved right away to figure this out to analyze the data. They weren't relying on a non-reviewed report out of the United Kingdom, to base all of their analysis and projections on. So they're also expected to launch a Bluetooth based app like those that are used in Singapore and Indonesia right now. They've also got a smartwatch app over in Germany, Hong Kong, those quarantines have to wear special electronic wristbands that track the locations are handed out the airport and must be paired with the individual's phone. And then, once they arrive home, they're given one minute to walk around their apartment to calibrate the wristband and the company app to space where they are confined. India oh my gosh, talking about a country that could have problems. They have expanded their programs to track citizens through both digital and analog means They using location data. They're using closed-circuit television footage to track citizens in the southern Indian state of Kerala. According to Reuters, some western states, are stamping the hands of those arriving in airports, with a removable ink stamp detailing the date until which the person must quarantine. They're also taking passenger information, primarily airlines and railroads. Now, the touch base authentication, like fingerprint scanners, are risky, because they require people to touch a surface. They're getting a real boost in facial recognition over in India. So stick around, we'll come back. We're going to go through a few more countries what they're doing, and then we'll talk more about what's going on here. Yeah, Craig Peterson has some concerns. You are listening to WGAN. I will be right back, so stick around. Hey, welcome back everybody Craig Peterson here on WGAN, and I had on some good old Herb Alpert, remember him? The Taste of Honey was the one playing during the break. How is that for fun? Man, I haven't listened to Herb Alpert in a lot of years since Well, the 70s, right? I Remember the album's cover and that this particular one was somewhat controversial. Look at the Beatles, all almost all of their stuff was initially done in mono, and then they remastered it into stereo. Some of the purists are pretty upset about that. So we're kind of going through what different countries in the world have been doing when it comes to this Coronavirus. And, you know, we'll talk about the US as well, but there is a trend. I hope you notice seen Indonesia, they've got an app that tracks interactions with nearby Bluetooth. Okay? And it has it is by the way in Indonesia, it's an often and it does help you if you want to notify people who might have been exposed so they can get tested Iran. In contrast, they haven't had as many deaths, because they've just been shooting people in the streets. Well, that is according to a classmate of one of my sons who is living in Jordan, right now. The smartphone app developed by the Iranian government scooped up millions of users' location data, alongside a short questionnaire that claimed to detect the likelihood of infection. And notice about the app was also sent to 10s of millions of Iranians with the director to take the questionnaire before going in for Coronavirus test. At least 3.5 million people, according to Iran, are using this app. Israel government. They are Using data from their telecom providers here telecom, track the location of their citizens. And those people, by the way, who braved quarantine in Israel are facing up to six months of imprisonment. So there you go. They're also using this data they're getting from the telephone companies to track people and potentially quarantine them. In Northern Italy, Vodafone, you might have heard of these guys, this is an English telecom provider. Vodafone also has a presence in Italy. They are providing the Italian government with heat maps, which means general details as to the number of mobile phone users locations. They started over in Lombardi, Italy, of course, that was a bit of a hotspot, and officials do Chairman 40% of the people in Italy are moving around far too much. According to The New York Times, Kenya, they've got aerial surveillance of the border to detect illegal crossings. Norway, the Norwegian Institute of Public Health and Norwegian tech companies, simultaneously built a voluntary app that tracks GPS Bluetooth data to be stored for 30 days. In Pakistan, through location surveillance and mass texts, the Government of Pakistan is tracking confirmed cases Coronavirus. Sending alerts to people found to potentially come in contact with them in the past 14 days is not a bad idea. Poland has an app called home quarantine, which is requiring Polish citizens who are quarantine to check in immediately and intermittently check-in by sending a picture of themselves at home with 20 minutes or within 20 minutes or face to find. So all of this is from the medium you'll find a lot more data. Tell them just kind of rushing through it. Russia has more than 100,000 cameras are in Moscow. And the Russian government is using facial recognition and phone-based tracking to monitor people under quarantine. Local governments in Russia are also kind of doing their own thing. Singapore, very, very socialist authoritarian, really government there. They released an app called trace together pings nearby smartphones through Bluetooth to determine who's come within six and a half feet of each other for more than 30 minutes. That's according to the LA Times, and they record the data they stored for three weeks supposedly and don't record the user's location. South Africa, again, telecom companies, South Korea, they've had an interesting response. You've probably heard about them what they've been doing there. In South Korea, the confirmed cases of Coronavirus are being tracked in using a bunch of different data, collected through data mining. They're taking credit card purchases, smartphone location tracking, closed-circuit TV footage, analyzed by facial recognition. So the Korean government can then reconstruct where a person's been that was diagnosed, and they have just incredible granularity. Like using the person's location data to check the closed-circuit TV footage, see if they were in a mask, etc. Switzerland and they're colossal telecom companies. Swisscom is alerting the federal government when more than 20 phones are located within 100 square meter area. One of my sons has a girlfriend over in Sweden, and they are not doing anything over there. The numbers are fascinating. So we'll see what ends up happening there. Taiwan's government is denying that it's adopting surveillance technology to track citizens' movements, but that is what's happening. Thailand. If you're arriving there from a high-risk area, you're going to get a SIM card for your phone that lets the government track you for two weeks. In Turkey, they are monitoring locations of patients using cellular data and sending messages to them if they should quarantine. The UK is allegedly talking with telecom companies to track citizens' location data. National health servers or services partnered with planets here to track the spread of the virus in the good old United States. Yes, indeed. The mobile advertising industry is the one that's doing the tracking here. They've been supplying data to local state and federal organizations about the location of individuals. And that's according to The Wall Street Journal. Because it's advertising data, they want to know, very, very fine-grained data. So for instance, if you go to Gold's Gym, they somebody who has what Planet Fitness gym can say, hey, I want to send an ad to anyone that went to this Gold's Gym. That's a half a mile down the street from me. And the advertising companies have that data. And so you might have noticed, it's some of its kind of scary. You go into a hospital of a sudden you start getting ads for hospitals, medicine, and even lawyers for malpractice suits. So they have very fine-grain data, and apparently, it is granular enough to let them know whether people are staying at home. If parks are still in use, Foursquare, which has one of the most comprehensive repositories of personal location data, is in talks with a bunch of different government agencies. Most data comes from these apps and bottom line, you've permitted those apps to log your location. So you download that free game that you love to play. It may be tracking your data and sending it up. Now, remember, it doesn't have to use GPS; it only has to do is know the Wi-Fi network in use. Remember, when Google and these other companies have been driving around taking pictures of everything, they are recording the SSIDs and MAC addresses of the Wi-Fi systems all over the country. That way, they can tell where you are based solely on the Wi-Fi connection. So they're taking all that data and then they are reselling it. And the whole goal here is to have a portal that could be used to track citizen movement in up to 500 us citizens cities, Google and Apple have also come up with a new standard for tracking. And this is tracking using Bluetooth again, some troubling state and local policies West Virginia. People who test positive but refused to quarantine are getting ankle bracelets. Yes indeed. Many of the software privacy and privacy guarding mechanisms are unknown about all of these things. There are a bunch of things pred poll predictive policing. All of this is coming in New Jersey, Connecticut using aerial drones with temperature sensors and apparatus to detect people who might have the virus, so it's getting scary. Stick around. We'll be right back. I am Craig Peterson on WGAN with a little Coronavirus information, things we are doing, and what is coming. Hey, welcome back, you're listening to Craig Peterson here on WGAN, every Saturday from one till three. Also, I am on Wednesday mornings with Matt during drive time for those of us that are still driving to work. where we talk about the latest in technology for the week. Then we do some more follow-ups here on the weekend as well. I had mentioned earlier, we're planning on doing something to help businesses get back into the business, and we are going to be focusing in on some of the technologies for that. So keep an ear out. Make sure you sign up for my email list so you can get all of this. You can get stuff like Linda and Joanne and Ted and Danny and many others who listen to me here on Saturdays, and you can get all of the stuff that they get to help stay safe online and to keep up to date on What is happening in that great big world outside? We covered what other countries are doing for surveillance, there was a definite pattern to the socialist countries, demanding people self-isolate, quarantine fines, prison time, right? You notice that, didn't you? Now I want to talk a little bit more about the US because we kind of ended the last segment talking about that. But where I'm getting concerned is what our government will do? The reason I went through all of these other countries is so that we have an idea of what they're doing because, like the UK, okay, they're certainly more socialist than we are. They're not dictatorial at all, but they are doing a lot more with the tracking than we appear to be. Doing. And of course, we have some rights recognized in our Constitution that is going to be difficult for the government to take away, but they have taken them away in emergencies before. Look at what happened during our World Wars, and even what happened in the wars in the 60s in regards to the demonstrations and things. It's not as though nothing could happen here. And there is a great article in TechCrunch this week by Heather Fetterman. And you'll find it up on my website at Craig Peterson dot com, where she's wondering about this potential, what she's calling the Patriot Act for COVID-19. We had this massive knee jerk. What was it about two weeks after the tower Twin Towers came down in New York City after that terrorist attack. About two weeks later, we all of a sudden had this Patriot Act, which gave the government all of these sweeping powers, And they were monitoring all of our calls, which in contact with emails, even locations, etc. Very, very scary stuff. So what's going to happen now because Heather Fetterman is a privacy lawyer, and is the VP of privacy and policy at big ID is a New York-based company that's trying to use AI to help businesses be better privacy stewards for their customer. And now you think of your customers. I think of the data that you have, first of all, do you need it? All right, that's one of the things I talked about and all the training I do. And secondarily, how much of it sensitive, should you be throwing it away? Deleting it because you don't need it. And you certainly don't need the liability or what should you be doing so that's part of what they do. She also has headed up privacy over at Macy's and American Express, and with the code At 19 infections climbing here in the US kind of leveling in some spots, we're saying nationwide, we may be on a bit of a downturn. The officials are starting to panic. And you heard it this week. They're saying, Oh, my, what is going to happen coming up this fall? Are we going to have a massive COVID-19 resurgence in the middle of the flu season? Is this going to double the number of deaths that we would get in a regular flu season? And so they are trying to figure out these government regulators and lobbyists frankly, and of course all of the bureaucrats and, and Congress and everybody, so they're trying to figure out how do we track the people. Now, remember, when we give up a little bit of privacy for some suppose it security trying to think of a time when we got it back. Certainly, we have gotten it back in some cases. After World War Two, of course, you no longer had to have those ration cards. So things got better. Certainly. World War One, for instance, introduced the income tax, and it was guaranteed only to be 3% maximum ever. And the income tax would only be on the richest Americans it would not affect the rest of us. And that was something put in place because of World War One, and they needed funding. But in case you haven't noticed, income tax has not gone away. So will this whole monitoring that they're doing for COVID-19? Will it go away once this epidemic has died down because it is going to die down at some point in time, but frankly, it's going to be with us forever. Whether it was engineered Somewhere whether it was in the wild from a bat and when direct to humans or pigs, and then humans or however it got to us, it's here now, and it's never going away. So is that going to give the government justification to continue to track us all? And when we have limited testing development ability then, of course, it's going to improve. Even if they had 2 billion test kits available, If I test negative today, and I'm exposed this afternoon, are you going to test me again tomorrow? I might have it tomorrow, and I didn't have it today. So even then, testing is not going to solve the problem. So we've talked before about this whole joint effort between Google and Apple, and the idea here is to come up with some standardized software that can monitor the spread of infections by keeping track of infected people. Keeping track of the people they have been close to and how long they've been close to them. And the idea is you download the mobile app from a public health website. And the Public Health website will notify you if you have had prolonged exposure to someone that came down with COVID-19. That will frankly, this would be handy with the flu, for instance, right? There we would cut back the number of flu-related deaths dramatically, absolutely dramatically. And this system is designed to use low Bluetooth Low Energy transmissions rather than GPS. But again, It's just a standard, and it is not a piece of software. And someone could implement using the standard and track your GPS and record as well. Okay. So this is, frankly, if they do this the way they're promoting it, I don't have a huge problem with this as long as it's voluntary. Now, apparently, in Indonesia, it has been voluntary, but only about a third of people have done it. So how are they going to enforce all of this stuff? And these community mobility report, they're showing trends over time by geography, where they're taking data from the phones of people who have Android or who are even with iOS using Google software, and have not turned off the location history setting. And they've got this great little map so they can track all of the people. The CDC is tracking all So the movements of American citizens based on location data from the mobile advertising companies, we mentioned a little bit earlier. So it's great that the government's trying to stop the spread of infections. But ultimately, you can't stop them all. And there has to be a line. Where is it? So the Patriot Act wasn't two weeks. It was six weeks after 911 that gave the government powers that had never had before to spy on American citizens. Yeah, you know, was it constitutional, certainly not in times of peace. I think that argument could be made pretty effectively. But in this case, it was effectively a war. So it may have made sense at the time, but the government's still vacuuming up millions of records of phone calls and text messages to today. Look at that huge data center. The National Security Agency built over in Utah, the point of the mountain. So if companies like Google and Facebook are willing to share data with a government, there needs to be a clear and defined period in which they can share this data, there has to be a clear and defined period in which they can retain the data as well. So civil liberties, of course, are fundamental here. And my gosh, following September 11, of course, the New York Police Department conducted illegal surveillance on some local Muslim populations. Remember what happened during World War Two with the Japanese American internment camps? The FBI is surveillance of African Americans who oppose segregation, the whole civil rights movement. They've got something called the fair information practice principles. These state that personal data should not be used for any purpose beyond the specified object of the data processing activity. So we've got to be careful. The government has proven itself to keep this too much data, keep it for too long, and also not securing it properly. Word gets out, and it gets into the hands of people within the government that probably shouldn't have access to it. It gets into the hands of the bad guys. And if the government starts collecting this are going to see yet another uptick tick in cybercrime. It has already happened. But imagine all of this location data in personal data and how valuable it would be to the hackers. You know, I don't hold hope that our Congress it has learned from the past. I don't Look at what Clearview AI did. We talked about them a month or two ago, where they were scraping information off of websites. They were getting the facial pictures that we had posted, not realizing that a company like Clearview would grab them and use them to identify us and sell the information to the highest bidder. So it's not right. It is not good, but it's very concerning. And you might want to read this. It's on techcrunch.com. Heather Fetterman is the author of the article. And she's been looking at privacy for a very, very long time and thank goodness for that. And you'll find it on my website at Craig Peterson comm make sure you sign up so you can get all of my weekly email summaries of this week in the news, including everything from today. Stick around, and we'll be right back to the top of the hour here on WGAN. Okay, okay, okay. Hi everybody. Craig Peters on here on WGAN. Of course, I'm heard every Saturday from one until 3 pm, Wednesday mornings on with Matt, Wednesday at about 730 is they go over, of course, all of the latest news, keeping you up to date, on your day, what's happening where you should go, where you shouldn't go, what you should do. And in this kind of this day and age, it's maybe you shouldn't go anywhere, right. I was just reading an article during the break about the SARS epidemic. It was written by a guy who was over in Hong Kong at the time and talking about almost the same thing. When SARS broke out, this was slightly after the reunification of China and Hong Kong. The British signed it over the rights one nation to what was it two economies or something like that again, remember, they also, of course, had British common law and stuff. They were doing the same thing back then. The Chinese were presenting doctors who dared talk about a potential pandemic who talked about this respiratory illness that people had. So I guess some things just don't change very much over time. And that's one of them. But he talked about what it was like going out on the roads, not seeing anything, and now he's living in Los Angeles. And he said he was right there in Sunset Boulevard. He stood right in the middle of the intersection through two sets of green lights and didn't see a single car. Then this part I thought was fascinating. At the end of the article, he talked about how the kind of ban was lifted, because people South Korean team they're in Hong Kong, of course, the government stepped in. All these draconian measures kind of like what the socialist government did in Taiwan and throughout China, after this latest COVID virus, hit The you know, so the muon virus is spreading. They're jailing doctors who dare talk about it. They're putting their head in their sand, pretending it's not happening. And then, all of a sudden, they cracked down on everybody and everything. But in the end, he said in Hong Kong, at least for SARS, what ended up happening was all of these people all of a sudden had a desk kind of a Why am I putting on this face mask this morning, and slowly but surely without a government order. People started going out, started walking around, and he said one day, he was sitting there eating noodles in a restaurant, and all of these people were walking by and just really having a normal life. And they thought, wow, this is kind of cool. Wait a minute when did this normal life happen? And I think that might be kind of what happens here, although the governors are slowly starting to open up states and now you know, moving from what Stage one to two to three, that this is going to be fascinating, absolutely fascinating. What would have been the best way to respond? Of course, there'll be a million opinions that will be expressed here over time about the best way to respond. Maybe we could have warned people to try not to spread this saying if you have this respiratory problem or you're obese or whatever that there are major causes of death associated with getting the virus. Who is it that we should recommend quarantine for? I know that some people I think I mentioned on the show before are being advised that in till about 18 months have passed, you should not be going outside. Now I have an aunt who's a transplant patient. She's been advised to stay out of everything for about 18 months because this could nail her. And we know about kidney problems with this virus and liver problems even people getting legs amputated, right? There's a professional sports athlete who had his leg amputated after this and damage of course to the lungs, etc., etc. So would that have been a better response just warning everybody to be careful here the precautions you should take. Then the segment of the population that needs to be quarantined not everybody. We're already hearing about the side effect deaths, if you will, the people committing suicide, getting hooked on drugs, it'll be just in terrible places for a very, very long time. So it's very, very concerning to me. Hey, and I want to give you all quick notice here puts you on notice we are going to be doing Some getting back to business training, where we're talking about security, what you need to do and what you should do, what are the first things you should do when your business reopened? We're going to help you with backups The best way to get the backups done, how to verify them, I'm going to walk you through all of that. And we're going to have all of these free webinars coming up, make sure you are on my email list. And to do that, just go to Craig Peterson dot com you can go to Craig Peterson dot com slash subscribe is probably the best place. And you will once you're there, be able to subscribe to my emails and start getting like moving along. So let a little bit of advice there on that side. I thought that article was interesting. So, of course, I shared it with you. And we'll see what happens here. I think we should we're at the point now where we should start getting back to normal. We should have enough data already here in the us that we can trust that tells us Who the most vulnerable populations are. We know nursing homes are vulnerable that people in nursing homes aren't just necessarily older, which is one of the problems associated with death from this virus. Still, they are also many of them are infirmed one way or the other. So we know we got to protect them. Imagine spending a few trillion dollars, hunches, protecting those people, maybe helping them out with some other health issues. And I'm sure going forward many of these convalescent homes nursing homes are going to be more careful with the transmission of disease. While we won't, we won't go down that road. Alright, so let's talk about some conspiracies here. One of the big conspiracies about Coronavirus that people spouting is that these new 5g networks that are growing dramatically across the whole United States and around the world are causing Coronavirus and are where it started. Now, we somehow always get all of these theories, conspiracy theories right. Whenever anything starts happening, well, you know its causation and correlation are not the same things. In other words, if Coronavirus started when 5g networks got turned up that correlation. But that does not mean that 5g is causing this problem. It is a massive conspiracy out there. It's spreading more and more. Even USA Today had an article about it this week, talking about how people are just claiming the man 5g is exacerbating at the very least The spread of Coronavirus. Hence, I think the opposite is true. 5g is allowing people to be entertained, to do research, pick up new hobbies to learn while they're at home. So that's a very, very big deal here. The actor John Cusack spread this social media, right? Isn't that a problem what he tweeted to 1.6 million followers 5g will be proven to be very, very bad for people's health. He deleted the tweet later where he said five G's making people sick, and we're going to regret it. He put another one up, calling people who disagreed with him just dumb and effing sheep. Yeah, who are the sheep here? So there are all kinds of these people out there. There's rapper Wiz Khalifa I have heard of him. Isn't that weird? Singer Keri Hilson at sea judge on Britain's Got Talent, Amanda Holden. I know her because I've watched that show before. And all of these people attended various art schools. So we've got Yeah, one in Pittsburgh, I've got another one in Atlanta and another one over in London. So be very, very careful. There's no evidence that there's any tied to this. I've talked about it before. There are different types of radiation, and when you mentioned, 5g or LTE and radiation, and people just totally freaked out because they think of radiation, like what they use at the dentist's office or in the hospital. That radiation is dangerous, and it is called ionizing radiation. Where ionizes cells, and that's a problem. The type of radiation we're talking about with LTE with 5g With Wi-Fi is non-ionizing radiation. So keep that in mind, and the American Cancer Society says that the frequency of the radio waves that are given off by a cell phone, quote simply does not have sufficient energy to damage all our DNA or cause heating in the body tissues. It has been proven again and again. The Federal Communications Commission ruled months ago that we have nothing to worry about, not that we can necessarily trust it comes from the government. But you know me as an advanced class, Amateur Radio license holder. I've studied this back into the 70s, just trying to figure out what was going on. Am I more dangerous because we're talking about a cell phone or smartphone that gives out milliwatts' worth of power? And as a ham, I was routinely transmitting 50 watts of power relatively near my head, and in some cases, I was 100 watts or even 1500 watts worth of power very close by. So what is it? Okay, so this is not a fact I just wanted to kind of warn you guys. Yeah, 5g is spreading. It's spreading very fast. It's rolling out quickly with the Sprint T-Mobile merger. And T-Mobile has a nationwide 5g right now, that's a cool one there to low enough frequency that looks like T-Mobile may win the whole 5g argument outside of the big cities, because of the lower frequency bands that T-Mobile has access to. It's even worth using in your house. Anyways, of course, you're listening to Craig Peterson on WGAN. Stick around. We'll be right back. Hi guys, Craig Peterson here. Welcome back. I hope I put that whole 5g Coronavirus myth to bed. Remember, 5g is not going to be harmful. Now some characteristics are a little bit different than what you might expect. With 5g there are going to be transmitters all over the place, particularly in big cities, there'll be one on basically every corner would be on buildings everywhere. Most of the 5g networks using higher frequencies that cannot pierce buildings very well and cannot penetrate even glass. So I know from that standpoint, there will be more radiation, and it will be closer to you. But ultimately, I don't think there's any real risk involved in that. So there you go. I'm thinking back to a speaking engagement for an annual meeting for a bank, and a lady came up to me afterward and said, so what do you think about cell phones causing cancer? And I explained to her what I had just described to you guys here, only last segment, and she said, Well, my sister died of brain cancer. And she got it when she started using her cell phone all the time for work. And, you know, so what do you think of that? And I said, Well, I'm just so terrible thing. That's all I said. But again, correlation versus causation. Did she already have that brain cancer before she started using that cell phone for work? And if you are concerned about it, and you know, some people are very, very worried about The thing to do is always use a headset of some sort. If you're concerned about any kind of electromagnetic radiation, you should probably use a wired headset, which is getting harder and harder to find. And then you hold the cell phone away from you when you're using it because the power drops off very quickly of that signal. It's for those math majors, it drops off as the inverse of the distance squared, in other words, drops off, really, really fast. So if you just hold it a few feet from your body, you have cut down the amount of radiofrequency transmission or radiation, you've cut it down by many factors many multitudes, frankly, as it drops off, but anyway, so that's the way to do it. Some people use Bluetooth nowadays, and you see people walk around all the time with this little apple, ear pod things. And those are using Bluetooth that is much lower power than what your phone is putting out. So there you go some tips if that's what you want to do. This next one, I thought it was funny. And I talked this week on a couple of different times different radio stations about this, and Amazon is actively trying to get people to buy fewer items on its website. Now have you noticed that typically, you go around from website to website, and you see just all kinds of advertisements for things from Amazon, mainly if you've looked at something recently? Well, this week, Amazon lifted its ban that prevented third-party sellers from shipping non-essential items to its warehouses. Before that, they were only accepting household staples, basic stuff, toilet paper, right metal supplies, any other high demand products, but it's also been raining in its tactics used to encourage people to buy stuff, and they have dropped some of their advertising. And remember, they've got this Prime Day deals extravaganza that they have every year where they say, Hey, listen, we're going to save you, and you can save like 3040 50% on some things. That is delayed indefinitely. Now, the traditional Mother's Day Father's Day deals have been canceled for this year. They also remove the recommendation boxes. Have you noticed that if you look at an item, it will show you other related products people bought, and they've removed that as well? And a quote from an unnamed Amazon employee talking to the New York Post. We typically want to sell as much as we can, but our entire network is Full right now with hand sanitizers and toilet paper that we can't serve other demand. The demand we see for essential products has remained high. That's according to Jeff Bezos. But unlike a predictable holiday surge, this spike occurred with little warning, creating significant challenges for our suppliers and Disney Disney network and delivery network. We also have some of these people who are working in the warehouses getting sick with it, and at least one worker has died. So how's that Amazon canceled Father's Day, Mother's Day, and their Prime day for all of us Prime people. A couple of weeks ago, I had a webinar where I discussed Wi-Fi wireless networks. And I told you guys Hey, listen, and I've got this deal. That we put together and we based the deal on some, I think, frankly amazing, some amazing stuff. That is business class, Wi-Fi router-firewall, you know, low-end business class stuff. And, and, man, a lot of you guys bought that. And I thought that was great. And we're getting those set up now. But we've got another warning out if you are a Linksys user if you have a Linksys broadband router, these wireless routers that they've been sending for years. They're saying that they've locked user accounts on their smart Wi-Fi cloud service. It's asking users to reset their passwords. Hackers were using these hijacked accounts and changing router settings to redirect users to malware sites. Now if you're taking if you attended my DNS training Where I told you what the best free DNS services are out there, you came to realize I'm sure pretty quickly that one of the best things you can do is put one of these DNS services, like the open DNS, put them into your router. So what ends up happening is when your web browser program on your computer asked to go somewhere on the internet, it's going to ask a known-good DNS service. I think that's a wonderful thing. And Firefox added in a new service just recently that uses a CloudFlare DNS service to help prevent some of the hijackings that can happen. So apparently, what's happening right now with some of these Linksys routers that are tied into their smart Wi-Fi cloud service is they're changing the DNS settings on your Linksys Wi-Fi router. And they're changing it so that when your machine says, For instance, I want to go to Bank of America, instead of giving Bank of America's real internet address, it gives the internet address of a hacker-controlled website. That is a very, very big deal. So what's going to happen is people are going to be ripped off right, left, and center because instead of going to the real website, they are going to be going to malware sites. And sometimes, it redirects them to the malware site, which tries to install malware and then immediately redirects you to the real site. Now, we've known about this type of attack for a very long time because people just have not been changing the default administrative usernames and passwords on the routers. So either someone breaks in via the internet, or in some cases, they are compromising a home computer and then using that home computer to compromise the router and therefore compromise Do the other business computers and compromise the home router, etc., Right? So that's been around for a long time. This particular problem is only impacting the Smart Wi-Fi account. It is a cloud-based system that if you only have these Linksys devices connect to Linksys routers and other equipment over the Internet to manage the router settings, which has always been a bit of a problem, okay? And I'm on Linksys as website right now, and they're saying, Hey, we're experiencing longer than usual wait times while Yeah, I bet they are. If you have Linksys smart Wi-Fi, if you're using it, make sure you go and change your usernames and passwords right away because it's turning out to be a problem. So we're going to talk about zoom some more when we get back you're listening to Craig Peterson on WGAN and online. Craig Peterson dot com. Hey, welcome back, everybody Craig Peterson here, in case you missed the last segment, if you are using Linksys, you're going to want to go back and listen to it. It's a very, very big deal. Very important. Because of the hack that has just happened with their Smart Wi-Fi service. It's a pretty bad one. Also, we talked about COVID-19 in the show the Patriot Act, 5g rumors, we've got this 5g rumor about how it is accelerating the spread of Coronavirus and the surveillance programs around the world. Now you can listen to all of those on tune in the app. And right there you just search for Craig Peterson you'll see me we post all of these online. So check that out if you missed it. And next week, don't miss any of the show, because I'm on Saturdays from 123 pm. I'd love to hear from you as well. Just send an email to me at Craig Peterson dot com. It is a very, very big deal. Just do that, and we will be reaching out right away. I had promised to get to this ongoing zoom issue. You know I don't like zoom. We after we found out about zooms significant security vulnerabilities. Months ago, we banned it in our company and all of our client's companies out there, and in light of this Coronavirus pandemic, everybody is turned to these apps now FaceTime pretty good, pretty safe. It's encryption, zoom. Not it's pretty good, not safe at all. Currently, hanging out with friends is one thing. But doing work on zoom is entirely different. Because what we found out now is that Zoom is very insecure. You probably heard me last week. I think it was I talked about the thousands of zoom meetings that were found on-line by hackers. Well, this week, we've got yet another zoom story. Researchers found on Monday, according to refinery 29 le Bell's article, that hackers began selling over a half a million zoom accounts for less than one cent per account. And according to findings from the cybersecurity firm Sibyl, which is investigating some of these hacking activities, Sibyl found that more than half a million zoom accounts on hacker forums and the dark web put up for these low prices. Bleeping Computer, which is something that I follow as well and if you are into cybersecurity and understanding some of the computer stuff. I think you'll appreciate it. Bleeping computer has also been reporting on this, some of these accounts are cheap. Cymbal was able to purchase 530,000 Zoom accounts for two-tenths of a cent each. Two-tenths of a cent each, so five for a penny. Now, why are they being hacked so suddenly? Well, it turns out that Zoom has yet another major security problem again, this is what happens when businesses just jump in headfirst without really understanding the implications of what they're doing. And we have seen this over and over again. These hacks are not a traditional hack. In this hack, the hackers used something known as credential stuffing to hack the Zoom accounts. It is something I've warned about, again, and again, and again. I have some features that hopefully we're going to get them running soon here on WGAN, and some of these other radio stations out there. But these credential stuffing attacks take data from the dark web hacks that have happened on other websites where you've got people's usernames, email addresses, or passwords. And then they're compiled into lists that are sold to hackers. There are some huge lists out there that contain millions. I think there's one that had 2 billion usernames and passwords in it. They're being used right now to scam people into sending money from to the hackers. Okay. But then this case what's happening is they are stuffing them into zoom hence credential stuffing, checking to see if zoom will allow them to log in. And of course, Zoom doesn't have the proper security to stop these credential stuffing attacks. Don't use Zoom. Stop using it drives me nuts. So the suspected reason, by the way, that these accounts have been doled out by hackers. It's coming back to this whole Zoom bombing notion where people want to drop in on zoom meetings. Now, Zoom bombing is typically used for trolling and abuse. But if you can go and you can get one of these databases of usernames, email addresses, and passwords. And let's say you want to spy on your competition, and you can now drop in on your competitions' zoom meetings. What do you think is going to happen? If one political party wants to spy on another political party, just look up that person's email address, and you're in. So hackers have been using zoom bombing and virtual synagogue chats during Passover, shouting racial racist slurs at women and people of color berating people attending Alcoholics Anonymous meetings. We've got a high school teacher reporting that her classroom call was accessed by an end on an identified individual who was yelling profanities, putting up swastika tattoos. A woman of color told BuzzFeed that unwelcome parties entered her regular meetings with other women of color and what seemed like 100 people yelling racist slurs at the same time. Cybersecurity experts are suggesting that passwords be changed on all Zoom accounts, that's what I've been saying. Right? Change your password. Don't use your normal Zoom meeting, set up a random Zoom meeting number. It's there now stepping in to help prevent these attacks. The FBI in Boston had to step in and offer tips on how to keep online meetings secure, which is absolutely freaking amazing. So a bit careful and don't use Zoom. A lot of people have switched over to WebEx, which is something I've been using and selling for years now, WebEx teams not only gives you meetings, it gives you all of these different workspaces and things. I like it and recommend it. They are offering their free WebEx meetings for 90 days but had to stop it for a bit because too many people were signing up. WebEx had to open up a whole other data center to be able to handle All of this demand. So it's essential, we need to understand that if you want to have a small meeting with family, friends, even small business and you guys are smart enough to be using iPhones, not Android. Just go ahead and use FaceTime. It's quite good. You'll like FaceTime now. They have meetings for up to 30 people. You can also use a few other apps. You know, some people like WhatsApp, I am not fond of that. Silent Circle has some excellent stuff. They've got a silent phone, and these guys know what they're doing. If you're on Android, the first tip is to get rid of it. Don't use Android if you have anything you're data, and you are concerned about losing. Because Android is not as a secure platform in the least, it's crazy people. Remember, you cannot Get the updates, even with our friends over at Samsung with their Galaxy phones, they only provide updates for a couple of years. So if you are stuck in the Android space, and I get it right, I am not the biggest Apple fan in the world. But their software, their systems are secure. They are not in the business of selling your information. Google Android is in the business of selling your information. Okay. Hey, and when we get back, we're going to talk about iPhones. We're going to talk about what would be the actual cost of an iPhone if it was made in the United States because that may be happening soon. Stick around. We'll be back with more. I'm Craig Peterson, and you're listening to me on WGAN make sure you get my newsletter, Craig Peterson dot com slash subscribe. Hey, welcome back everybody Craig Peterson here on WGAN. And of course, online at Craig Peterson dot com slash subscribe. Well, we have made it through most of the show today we've been talking about Linksys and significant security problems you have to take care of right away if you're using link system vices. We spoke about Zoom and why you don't want to use Zoom ever again, and I gave you some alternatives. What Amazon is doing with canceling Father's Day, Mother's Day, they've changed right now anyways, for the time being, their entire business model COVID-19 of course, we talked about that about some rumors floating around about the spread of COVID-19 because of 5g. We also talked about what countries are doing around the world to help battle this. What is the US doing with surveillance right now on the COVID-19 front? Where it's all taking us? You'll find all of that by going to Craig Peterson dot com right there on the homepage. You can scroll down and listen to any of the segments that you might have missed. You can also get it right on the TuneIn app, where you might even be listening to me right now. Live as the show is aired Saturdays Of course 123 and looking at the clock, that means we are almost done for the day today. I can't believe how fast it went today. I am delighted to be able to help you guys out we've had hundreds of people who have attended my webinars over the last few weeks. I didn't do any this previous week. I am strongly suspected. I'm going to be doing some this coming week. So keep an ear to the ground on this next week. Okay. Let's Get into that Oh, and to do that, the only way you can have a new to the ground on this is if you are on my email list, Craig Peterson dot com slash subscribe. How's that for easy? So how much would an iPhone cost if we make it in America? You know, some of these iPhones go upwards of over $1,000 depending on what they are. And I want you to think about that for just a minute. Not so much in the context strictly of an iPhone. But what did a first computer cost you? How about a laptop? Because frankly, these devices have almost the same functionality as a functional laptop does or a good computer does. They do. And you could not get this type of computing power just a few years ago. I found a couple of my beloved iPhone pods only a few weeks ago in a drawer as I was doing some cleaning, right, aren't we all right spring cleaning time. And I just was shocked and amazed because these things were huge, I think one was 80 gigabytes. And I think the other might have been 120 gigabytes. And that's huge for the day. Huge. I used to listen to them on airplanes. It was just such a relief because all that was on there was my music. And there was nothing else to tempt me. I didn't even put games on them. Now there's a lot of hacks available for the iPod, you can put on some cool players, but that iPod interface, it could
How deep it all goes. What POTUS does to protect us. How can we rebuild everything? Identifying real public servants. It's all about the info. Pallets of cash and how they traveled. Governors who are standing out - badly. The devil has many tricks. Unexpected patriotism complicates DS plans. Objectivity is now critical. Learn more about your ad choices. Visit megaphone.fm/adchoices
SonicWall (https://www.sonicwall.com/) . Bill has lead key divisions of AT&T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle. Bill also created and hosted “Hacked” for SiriusXM’s business radio. He has been recognized with several awards including Marketing Computers “Marketer of the Year,” Tech Titans “Corporate CEO of the Year,” Federal Computer’s “Top 100 Award,” and the “National Youth Science Camp Alumnus of the Year.” In this episode, we discuss starting in encryption, security for the SMB market, advanced malware, threat intel, cloud security, breaking SSL in the enterprise, network basics for IoT, governments backdooring encryption, and so much more. Where you can find Bill: LinkedIn (https://www.linkedin.com/in/billfconner/) Twitter (https://twitter.com/ConnerBill) SonicWall Blog (https://blog.sonicwall.com/en-us/authors/bill-conner/)
Are we living in a parallel universe…thanks to Nelson Mandella? What potentially can happen with Intelligence Augmentation on humans? Also, why companies like Silent Circle and Cyanogen are failing, Microsoft's new OS that isn't Windows, Star Trek Beyond, and much, much more... Special Guest: N/A Stories of the Week:--Random Access: Blackphone woes, Cyanogen woes, using Linux makes you a terrorist, the Apple Stagefright, Cortana cannot be stopped, Verizon bought Yahoo!, The Illumination Hour.--"The Mandella Effect" Link: bit.ly/1ThAjJp First Choice:--"Enhanced Humans 2" Game Talk:--"The Mini NES and the Future of Gaming" HackSec:--"?" The Climax:--"Star Trek Beyond Review" APPENDIX:--"Roberts & Roberts Brokerage" Link: rrbi.co --”Sovryn Tech Solutions” Link: solutions.zog.ninja --”Libreboot X200” Link: bit.ly/1FI57ew--"The Illumination Hour Podcast" Link: www.spreaker.com/show/illumination-hour----------------------------------------------------------------------------------------Make easy monthly donations through Patreon: patreon.com/sovryntechAnd you can tip me at: sovryntech.tip.meSovryn Tech is powered by Namecheap! Get a website today with Bitcoin!Donate with Bitcoin! BTC: 1AEiTkWiF8x6yjQbbhoU89vHHMrkzQ7o8d Donate with PayPal! Link: donate.zog.ninjaDonate with our Amazon Wish List! Link: wishlist.zog.ninja----------------------------------------------------------------------------------------You can e-mail the show at: brian@zomiaofflinegames.comAlso on Telegram: @SovrynFollow content updates on Telegram: @DarkAndroidBitMessage: BM-NBMFb4W42CqTaonxApmUji1KNbkSESki ----------------------------------------------------------------------------------------You can also visit our IRC channel on Freenode: #SovNetOr just go to: irc.zog.ninja ----------------------------------------------------------------------------------------sovryntech.comtwitter.com/sovryntechsteamcommunity.com/id/ninjaprogram
Are we living in a parallel universe…thanks to Nelson Mandella? What potentially can happen with Intelligence Augmentation on humans? Also, why companies like Silent Circle and Cyanogen are failing, Microsoft's new OS that isn't Windows, Star Trek Beyond, and much, much more... Special Guest: N/A Stories of the Week:--Random Access: Blackphone woes, Cyanogen woes, using Linux makes you a terrorist, the Apple Stagefright, Cortana cannot be stopped, Verizon bought Yahoo!, The Illumination Hour.--"The Mandella Effect" Link: bit.ly/1ThAjJp First Choice:--"Enhanced Humans 2" Game Talk:--"The Mini NES and the Future of Gaming" HackSec:--"?" The Climax:--"Star Trek Beyond Review" APPENDIX:--"Roberts & Roberts Brokerage" Link: rrbi.co --”Sovryn Tech Solutions” Link: solutions.zog.ninja --”Libreboot X200” Link: bit.ly/1FI57ew--"The Illumination Hour Podcast" Link: www.spreaker.com/show/illumination-hour----------------------------------------------------------------------------------------Make easy monthly donations through Patreon: patreon.com/sovryntechAnd you can tip me at: sovryntech.tip.meSovryn Tech is powered by Namecheap! Get a website today with Bitcoin!Donate with Bitcoin! BTC: 1AEiTkWiF8x6yjQbbhoU89vHHMrkzQ7o8d Donate with PayPal! Link: donate.zog.ninjaDonate with our Amazon Wish List! Link: wishlist.zog.ninja----------------------------------------------------------------------------------------You can e-mail the show at: brian@zomiaofflinegames.comAlso on Telegram: @SovrynFollow content updates on Telegram: @DarkAndroidBitMessage: BM-NBMFb4W42CqTaonxApmUji1KNbkSESki ----------------------------------------------------------------------------------------You can also visit our IRC channel on Freenode: #SovNetOr just go to: irc.zog.ninja ----------------------------------------------------------------------------------------sovryntech.comtwitter.com/sovryntechsteamcommunity.com/id/ninjaprogram
Gareth Kay believes brands should show, not just tell Gareth Kay is cofounder of Chapter, a San Francisco-based creative studio. Before Chapter, he was Chief Strategy Officer at Goodby Silverstein & Partners, the advertising agency known for work such as 1993's iconic "Got Milk?" campaign for the California Milk Processors Board. I was excited to talk to Gareth because, while he's a strategist, he doesn't come from the world of traditional brand consulting that I come from (and so many of my other guests come from). In fact, one of my first questions for him was, "What do you think the general perception of the brand consulting world is amongst people in the advertising world?" Gareth says advertising agencies are increasingly seeing clients that have already been through a brand consultancy, and "when [the brand consultancy's work] was good you would be a little bit miffed because [cracking the strategy] was something, as a strategist, you really loved doing." On the flip-side, he'd sometimes see brand consultancy work that looked "clever on a piece of paper but…frankly, it was un-executable or, worse still, was a piece of thinking that was clearly designed to get through the armies of different interests inside a client organization and it kind of got watered down…through rounds and rounds of meetings and consensus-building." I asked Gareth about an article he published in WARC, titled "The 'brand' word." When you think about how we throw the term [brand] about, more often than not we are describing something we do-a brand strategy or campaign, not the associations we are trying to create. … We use it too often to create a false sense of control and a mistaken belief that we manage the brand. The models we use reinforce this: the tools of temples and pyramids are about what we build, not how people respond to them. The tools we use to shape brands are not fit for purpose. They are used to create simplicity and consistency which run counter to a culture of complexity and change. This led us to a fascinating conversation on what agencies should be using instead of these "temples and pyramids." Gareth argues consultancies should: "Show the thing," a mantra at Chapter-essentially prototyping real-world applications to showcase brand ideas rather than trying to capture them with words alone, which he calls "a very lossy form of compression." Avoid wordsmithing. He quotes a friend, Russel Davies, "you'll be discussing whether a brand is funny or…humorous." "Is that really the best use of our time, of our money, of our resources?" he asks. The brand model used at Chapter is a "Brand Operating System," the underlying code and principles that define everything a brand does. The framework includes three layers: Belief: What does this brand genuinely believe in the world? This is the problem it's trying to solve or the opportunity it sees. Purpose: What do you do as a brand given your belief? Pursuits: Because we believe X (our Belief) and we're going to do Y about it in the world (our Purpose), we will do the following things. The Pursuits are normally three, action-oriented principles. Gareth provided a detailed example of the Brand Operating System by talking through Chapter's work for Silent Circle. We ended the conversation talking about brands Gareth thinks get all the fundamentals right (Hiut Denim and Allbirds) and his advice to young strategists and planners. For more of Gareth's insights, read his posts on Medium and follow him on Twitter. Below, you'll find the full transcript of the episode (may contain typos and/or transcription errors). Click above to listen to the episode, and subscribe on Apple Podcasts or elsewhere to hear every episode of How Brands Are Built. Episode sponsors · Squadhelp. To begin a business name contest with hundreds of business naming experts, check out their services to get a fresh perspective on your company. · Rev.com. Rev offers fast, reliable, and accurate audio transcriptions. Right now, Rev is offering listeners $10 off their first order. Follow this link for your $10-off coupon.
Phil Zimmermann fought a multi-year court battle and risked years in jail in order to defend your right to privacy. Phil created an email encryption system called Pretty Good Privacy (PGP) in 1991 that is still the gold standard for private email today. I sat down with Phil to discuss his legacy and why we are truly in the Golden Age of Surveillance, despite claims by law enforcement that all communications are “going dark”. Philip R. Zimmermann is the creator of Pretty Good Privacy, an email encryption software package. Originally designed as a human rights tool, PGP was published for free on the Internet in 1991. This made Zimmermann the target of a three-year criminal investigation, because the government held that US export restrictions for cryptographic software were violated when PGP spread worldwide. Despite the lack of funding, the lack of any paid staff, the lack of a company to stand behind it, and despite government persecution, PGP nonetheless became the most widely used email encryption software in the world. After the government dropped its case in early 1996, Zimmermann founded PGP Inc. That company was acquired by Network Associates Inc (NAI) in 1997. In 2002 PGP was acquired from NAI by a new company called PGP Corporation, where Zimmermann served as special advisor and consultant until its acquisition by Symantec in 2010. Since 2004, his focus has been on secure telephony for the Internet, developing the ZRTP protocol and creating products that use it, including Silent Phone and Zfone. Zimmermann is Co-founder of Silent Circle, a provider of secure communications services. For Further Insight: Website: https://www.philzimmermann.com/
Круг Молчания. В программе «Молочный Коктейль» рассказ об одной из самых популярных и одновременно загадочных групп эпохи евродиско – Silent Circle. Почему за более чем 30 летнюю историю группы свет увидело всего три номерных альбома, в чем секрет успеха альбома, сыгранного на одном синтезаторе и, причем здесь DJ BOBO? Ведущий программы - Максим Кондрашов. Трэк лист: 01 - Silent Circle - Touch in the night 02 - Silent Circle - Time For Love 03 - Silent Circle - After Dark Tea Maria 04 - Jessica - Like A Burning Star 05 - Silent Circle - Oh, Don't Lose Your Heart Tonight 06 - Silent Circle - What A Shame 07 - Silent Circle - 2 night 08 - Silent Circle - Night Train 09 - Silent Circle - Don't Ask Me Why
Phil Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. Phil is also a Co-Founder of Silent Circle, a provider of secure communications services. Before founding PGP Inc, Phil was a software engineer with more than 20 years of experience, specializing in cryptography and data security, data communications, and real-time embedded systems. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode510 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Phil Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. Phil is also a Co-Founder of Silent Circle, a provider of secure communications services. Before founding PGP Inc, Phil was a software engineer with more than 20 years of experience, specializing in cryptography and data security, data communications, and real-time embedded systems. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode510 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Phil Zimmermann of Silent Circle and PGP joins us, Paul drops knowledge on staying secure at hacker conferences, and we discuss the security news for the week!Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode510 Visit http://www.securityweekly.com for all the latest episodes!
Phil Zimmermann of Silent Circle and PGP joins us, Paul drops knowledge on staying secure at hacker conferences, and we discuss the security news for the week!Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode510 Visit http://www.securityweekly.com for all the latest episodes!
In our 124th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Alan Cohn, and Michael Vatis discuss: EU parliament’s Privacy Shield; US appeals court upholds conviction over shared password; Russia enacts sweeping data retention and decryption law; EU approves cybersecurity rules for critical industries and online service providers; 9th Circ. pressed to limit feds' use of foreign spying data; FBI, DOJ back data breach plan in FCC privacy proposal; Silent Circle quietly kills warrant canary; and 10 million Android devices reportedly infected with Chinese malware. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
In this frank/informal chat, recorded live at Collision 2016 in New Orleans, Mike Janke, Co-founder and Chairman of Silent Circle, shares his field views on enterprise security, starting with the advice and wake-up calls he gives to customers. Janke also gives a blunt take on the FBI vs Apple encryption controversy. The issue of user experience design versus security is addressed. The guys wrap with some reflection from Janke on his prior work as a Navy SEAL, and what he learned about risk that carries over into his work with Silent Circle. Yes, you can get Busting the Omnichannel on iTunes.
SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
In this frank/informal chat, recorded live at Collision 2016 in New Orleans, Mike Janke, Co-founder and Chairman of Silent Circle, shares his field views on enterprise security, starting with the advice and wake-up calls he gives to customers. Janke also gives a blunt take on the FBI vs Apple encryption controversy. The issue of user experience design versus security is addressed. The guys wrap with some reflection from Janke on his prior work as a Navy SEAL, and what he learned about risk that carries over into his work with Silent Circle.
Silent Circle, a start-up in Geneva, has created a phone that is impermeable to snooping. How worried are the intelligence agencies? Murad Ahmed, the FT's European technology correspondent puts the question to Sam Jones, the FT’s defence and security editor. See acast.com/privacy for privacy and opt-out information.
Last week, Ben posted five hard questions to both government and industry regarding encryption and the "going dark" debate. We posed these questions and more on the issues of technology, public policy and corporate responsibility to Mike Janke, co-founder and Chairman of Silent Circle, an international company that sells a platform of devices and services with built-in privacy-by-design. As a former Navy SEAL, Mr. Janke, who previously was CEO and founder of a private security company, offers a unique perspective with respect to the equities of law enforcement and other government officials who have a mandate to keep people safe, individuals' right to privacy, and corporate duties to protect intellectual property and customer data. One thing that listeners will likely take away from the interview is that law enforcement has a long way to go before convincing sophisticated industry participants that the FBI or other government entities are not actually technically capable of accessing the communications or devices they need in a pinch. Janke also makes a compelling case for why companies should be wary of the cybersecurity risks posed by communications or storage services or products that are capable of being decrypted. And yet, we identify what just might be a fault line between tech leaders' claims that end-to-end encryption is necessary to address the privacy concerns of everyday users, and the reality of who is the real market for a secure platform, at least in Silent Circle's recent experience. And we leave open the door as to whether there is room in the debate to carve out some middle ground when innocent victims are in harms way.
Revealed! The hidden spiritual meaning and sociological impact of "Forever Young." How do you make babies? Is Marian Gold an impish cult leader? Why the spacesuits? Is the average German male larger than the average Japanese? Bonus: The bizarre love triangle of CK-1, AK-47, and Ralf Hutter reaches a dramatic tipping point! Other artists mentioned: Depeche Mode, Japan, Jem and the Holograms, Duran Duran, Salt N Pepa, Silent Circle, Kraftwerk (again)
Privacy and security are important in the digital and data world and especially after Snowdens’ revelations. Phil Zimmermann, the creator of PGP and Zfone and currently the Co-Founder of Silent Circle is the most suitable person to talk about the privacy and security issues we face. How enterprises and their employees can protect their data including an average user. Social media and various devices make it really easy for people to reveal important information about their lives, without them realising it. As we are now entering the IoT era, security and privacy will be even more important as more devices will generate even more sensitive data. Interviewed by Sakis Triantafyllakis for Tech Talks Central.
In this episode... Jon Callas gives a little of his background and his current role We talk through why cryptography is so hard, and so broken today Jon overviews compatibility, audit and making cryptography useful Jon brings up open source, security, and why "open is more secure" is bunk We talk through "barn builders" vs. "barn kickers" and why security isn't improving We talk through how to do privacy, active vs. passive surveillance We talk through anonymous VPN providers, anonymization services, and how they're legally bound Jon talks about appropriate threat modeling and knowing what we're protecting We talk through patching -- how to do patching for Joe Average User Bonus-- Mobile is as secure (or more) than what we're used to on the desktop Guest Jon Callas ( @JonCallas ) - Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and CTO of the global encrypted communications service Silent Circle. He has held major positions at Digital Equipment Corporation, Apple, PGP, and Entrust, and is considered “one of the most respected and well-known names in the mobile security industry.” Callas is credited with creating several Internet Engineering Task Force (IETF) standards, including OpenPGP, DKIM, and ZRTP, which he wrote. Prior to his work at Entrust, he was Chief Technical Officer and co-founder of PGP Corporation and the former Chief Technical Officer of Entrust.
Intro/Outro: Mad Heads – Молода кров GnuPG donations https://www.gnupg.org/donate/ Support Risky.Biz https://www.patreon.com/riskybusiness GPG Tools https://gpgtools.org GPG encrypted loopback disks http://patrick.uiterwijk.org/2013/02/25/gpg-encrypted-loopback-disks/ Mofilla, Tor & Privacy https://blog.mozilla.org/it/2015/01/28/deploying-tor-relays/ Anthem hack http://krebsonsecurity.com/2015/02/data-breach-at-health-insurer-anthem-could-impact-millions/ World's Biggest Data Breaches infographic http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ The Pirate Bay & CloudFlare CDN http://n4gm.com/thepiratebay-using-cloudflare-cdn/ Tsarev & Kolomoyskiy https://www.youtube.com/watch?v=9H4Eb9UI5xg BlackPhone https://blackphone.ch Kyivstar cell network blackout in Eastern Ukraine https://www.facebook.com/peter.chernyshov/posts/10205651506638154 https://www.facebook.com/peter.chernyshov/posts/10205679729343704 SS7 security concerns http://www.zdnet.com/article/invasive-phone-tracking-new-ss7-research-blows-the-lid-off-personal-security/ Had Russian blackhats pwned Sony? http://www.forbes.com/sites/thomasbrewster/2015/02/04/russians-hacked-sony-too-claims-us-firm/ Tech journalism in Ukraine http://biz.liga.net/all/it/stati/2924651-proslushat-kazhdogo-reyting-nadezhnosti-mobilnykh-messendzherov-.htm RetroShare http://retroshare.sourceforge.net Signal https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8 Silent Circle https://silentcircle.com Extradition aspects http://arstechnica.com/tech-policy/2015/01/dutch-judge-allows-alleged-sophisticated-russian-hacker-to-be-sent-to-us/ Snare on MacOS X bootkitting http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/ Cisco Annual Security Report http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html Source 114 vs Verizon Business. Who wins? https://pbs.twimg.com/media/B81r299IUAEu2qT.jpg:large http://www.verizonenterprise.com/DBIR/2014/ Fear the known: why AV companies publish security reports? Binary Risk Analysis https://binary.protect.io https://binary.protect.io/workcard.pdf 2 factor authentication vs 2 step verification Yubikey https://www.yubico.com/products/yubikey-hardware/yubikey-2/ Army cyber defenders open source code in new GitHub project http://www.army.mil/article/141734 CERT-UA 2014 report http://cert.gov.ua/?p=2019
Sharapoff presents new Deep remix
Sharapoff presents new Deep remix
Full Версия! Sharapov presents new Deep remix
Full Версия! Sharapov presents new Deep remix
Panel: Ephemeral Communications: Why and How? Ryan Lackey Founder, CryptoSeal, Inc. Jon Callas Silent Circle Elissa Shevinsky Glimpse Possibly more to come..... Ephemeral communications applications are increasingly popular ways, especially among younger users, to communicate online. In contrast to “once it’s on the Internet, it’s forever”, these applications promise to delete information rapidly, or to maintain anonymity indefinitely, lowering inhibitions to share sensitive or personal content. There are several types of these applications, as well as ephemeral or anonymous publication use of mainstream tools, with unique security features and general utility. Key people from the major ephemeral applications will debate where the market is, where it’s going, and how these systems can best balance user desires with technical and legal requirements. Ryan Lackey, Founder of CryptoSeal, founded HavenCo, the world’s first offshore datahaven, and has worked as a defense contractor in Iraq and Afghanistan, at various technology startups, and is currently working on a secure hardware-based router for business travelers. Jon Callas, CTO of SilentCircle, is co-founder of PGP Corporation and Silent Circle. Elissa Shevinsky, Founder of Glimpse.
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ranks with the rest of their industry's century-long culture of wiretapping. When you can get actual phone companies to join in the struggle, you know change is afoot. And yes, Navy SEALS are involved. Phil Zimmermann is the creator of both PGP, the most widely used email encryption software in the world, and the Zfone/ZRTP secure VoIP standard, and is now co-founder of Silent Circle. Earlier in 2012 Phil was honored as an inductee into the 'Internet Hall of Fame.' PC World named him one of the 'Top 50 Tech Visionaries' of the last 50 years and InfoWorld named him one of the 'Top 10 Innovators in E-business.' He has received Privacy International's 'Louis Brandeis Award,' CPSR's 'Norbert Weiner Award,' the 'EFF Pioneer Award,' and the Chrysler Award for 'Innovation in Design.'
Topics covered on today's episode of Mind Set Daily "China is cloning pigs on 'an industrial scale'" The Beijing Genomics Institute produces 500 cloned pigs a year, according to a BBC News report, making it the world’s biggest centre for cloning the animals. It is also the world’s largest centre for gene sequencing of species of animals, particularly those that are "cute" or "taste good". The BGI has a gene sequencing centre with 156 machines, huge when compared with Europe’s largest sequencing centre, the Welcome Trust Sanger Institute near Cambridge which has 30. "Blackphone: A secure, encrypted smartphone for the post-Snowden era" Riding on the recent revelations of the NSA’s widescale and seemingly indiscriminate interception of communications, Silent Circle and Geeksphone are teaming up to produce the “Blackphone” — a customized Android smartphone that has the necessary hardware and software to make secure phone calls, send secure messages, store and transfer files securely, and to browse the web privately and securely. "If a Time Traveller saw a Smartphone" A well-educated time traveller from 1914 enters a room divided in half by a curtain. A scientist tells him that his task is to ascertain the intelligence of whoever is on the other side of the curtain by asking whatever questions he pleases. Until Next Time... Support Mind Set Central Subscribe or donate
Episode 0x35 Halloween! We're all dressed up and ready to scare you as long as you promise to give us candy. Well, as many of us as will actually show up. Busy lives are busy. Upcoming this week... Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag (or Deep Dive) And there are weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: Breaches - the BIG one Snowden says "You're all owned"... basically. NSA is inside Google and Yahoo datacenters worldwide. How to Get Ahead at the NSA - What the NSA can and can not spy on. Google in 2010 on China and surveillance Canadians sue their own government over domestic spying SCADA / Cyber, cyber... etc DRAFT Guidelines for Smart Grid Cybersecurity DERP LinkedIn Intro: Data, Meet Security Issues Mailbag The Cybersecurity Industry is Hiring, But Young People Aren't Interested Briefly -- NO ARGUING OR DISCUSSION ALLOWED Halloween idea: biometric breaking face makeup using CV Dazzle. University student asks Nicholas Percoco to perform a "Personal Pen-test" and is blown away by what is found out. Ben to @JimmyVo you are dead to me Lavabit and Silent Circle try to fix email Liquidmatrix Staff Projects -- gratuitous self-promotion The Security Conference Library Contribute to the Strategic Defense Execution Standard (#SDES) and you'll be Doing Infosec Right in no time. If you're interested in helping out with openCERT.ca, drop a line to info@openCERT.ca Upcoming Appearances: -- more gratuitous self-promotion Dave: - Where ISN'T Dave? James: - Hackfest! Ben: - Will come out in the spring - infosec bear! Matt: - AppSecUSA in November Wil: - Going as his defeated sense of "self worth" for halloween. It's a pretty lame costume. Other LSD Writers: - We're not sure - with new found fame, Chris Sistrunk isn't talking to us anymore Advertising - pay the bills... Hackfest registration is open BSides Jackson (Mississippi) Signing up for a SANS course? Be sure to use the code "Liquidmatrix_150" and save $150 off the course fee! And Liquidmatrix_5 for 5% off a course Seacrest Says: I'm not available anymore, because Texas. Please leave your message at the tone. Creative Commons license: BY-NC-SA
Chet welcomes series regular Paul 'Duck' Ducklin to discuss the latest security news: Android random number flaw implicated in Bitcoin thefts, OpenX ad servers "pre-compromised", Lavabit and Silent Circle suspend operation, winners of Black Hat 2013 #sophospuzzle.
Episode 0x32 Getting the Band Together? Another week, another attempt at a full house for the show. Upcoming this week... Lots of News non-infosec stuff Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag (or Deep Dive) And there are weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: News and Commentary SilkRoad seized. Dread Pirate Roberts arrested. Tor hidden service de-anonymised? Silent Circle moves away from NIST approved ciphers Sometimes, 7 milliseconds is REALLY important Breaches ALL THE BREACHES!!!! SCADA / Cyber, cyber... etc UK gets the cybers DERP John McAfee copies Occupy.here and TOR Cyber warrior crush! Mailbag Hi I'm a middle aged infosec dude who's hit a slump in his career and thinking about going to the USA to pursue infosec awesomeness. I'm torn between good beer, healthcare and no republicans vs the possibility of all the cyber I could ever want. Help me please, I need advice!!! PJ McGuff, Ontario Briefly -- NO ARGUING OR DISCUSSION ALLOWED Whistleblowers and the Crypto-Anarchist Underground: An Interview with Andy Greenberg ESXi 5.5 drops limits on RAM and Physical CPU 101 Free Tools for VMWare Administrators An awkward hug for our own Mr Arlen Old people make riskier and more inconsistent decisions Bittorrent chat! Liquidmatrix Staff Projects -- gratuitous self-promotion The Security Conference Library Contribute to the Strategic Defense Execution Standard (#SDES) and you'll be Doing Infosec Right in no time. If you're interested in helping out with openCERT.ca, drop a line to info@openCERT.ca Upcoming Appearances: -- more gratuitous self-promotion Dave: - Attending HITB Malaysia, Deepsec in Austria, and bsidesTO. Panelist at SecTor. And finally speaking at Hackfest in Quebec City. James: - Speaking at SecTor and Hackfest, Panelist at SecTor (twice), and speaking at bSidesTO Ben: - Panelist (with Dave, James and Mike Rothman) for SecTor 2013's return of the (canadian) fail panel Matt: - Still on his honeymoon... Wil: - Trying to cut weight before new headshots, but will be at SecTor. Other LSD Writers: - wait? There are other writers? Advertising - pay the bills... Hackfest registration is open BSides Toronto!!!! Use discount code liquidmatrix-2013 to receive 10% off the registration price. Can't attend the full conference? Use code liquidmatrix-expo2013 to gain free access to the expo ($50 value).SecTor 2013 Signing up for a SANS course? Be sure to use the code "Liquidmatrix_150" and save $150 off the course fee! And Liquidmatrix_5 for 5% off a course Random Kids in the Hall Clip - French Canadian Trappers Creative Commons license: BY-NC-SA
Episode 0x2F things happen Anyone else think that it would be nice if life had a bit of regularity? Upcoming this week... Lots of News Kittens Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag and And there are weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: News and Commentary Researcher's say Tor targeted by malware that phones home to the NSA... Or not maybe... Lavabit shuts down, cuts off nose to spite NSA's face Silent Circle follows suit Hitting The Panic Button Breaches wifi baby monitors a bit hackable (surprise!!!!) Visa's alert of possible data breach impacts Rivermark Credit Union members SCADA / Cyber, cyber... etc US promises not to spy on the German - will stay besties for eva until some pops the 99 red balloons (again) DERP Source: New York Times Website Hit by Cyber Attack IAB urges people to stop “Mozilla from hijacking the Internet” Mailbag Noob Advice? I just recently started listening to the podcast as I'm only now discovering the infosec field, so first off, I'd like to say thank you for making this resource freely available. Now for my question; I am an incoming college freshman (Computer Science) and am at a sort of crossroads. If I wanted to put myself in the best possible position for a successful career in the infosec field, is the military a viable option? I have the option of joining ROTC in school, and I would have to commit to this if I decided to peruse that path. My long term goal would be to work for an intelligence agency in the federal government. If I was to leave the military or not pursue federal work, do most private companies hire employees with active duty military experience? Or would remaining a civilian throughout school present me with more opportunities? -Shane Non-Noob Response The answer is absolutely. Active duty military is a plus when getting hired. I would suggest finding a profession that you like and can enjoy such as intelligence, networking, or information security jobs inside the service. I for one wouldn't be where I am today without the help of being in the military. Gave me the focus, experience, and opportunity to break through in the private sector. Dave Kennedy - SET, TrustedSec, Derbycon, Awesome Briefly -- NO ARGUING OR DISCUSSION ALLOWED Stay tuned for "The Myrcurial Fund" PoC||GTFO Hacking mifare cards Every Important Person In Bitcoin Just Got Subpoenaed By New York's Financial Regulator Liquidmatrix Staff Projects The Security Conference Library Contribute to the Strategic Defense Execution Standard (#SDES) and you'll be Doing Infosec Right in no time. If you're interested in helping out with openCERT.ca, drop a line to info@openCERT.ca Upcoming Appearances: Dave will be attending Derbycon, in Chicago, Hackfest in Quebec City and AppSecUSA in NY. James will be speaking at Derbycon and Hackfest in Quebec. James, Ben and Dave will be joined by Mike Rothman for SecTor 2013's return of the (canadian) fail panel. And Wil is going to be a dirty hippy out in the desert at Burning Man, but back and showered in time for BSidesTO and SecTor. Hackfest registration is open BSides Toronto!!!! Use discount code liquidmatrix-2013 to receive 10% off the registration price. Can't attend the full conference? Use code liquidmatrix-expo2013 to gain free access to the expo ($50 value).SecTor 2013 In Closing Word of the Week -- cyber-spatula Movie Review -- The Nutty Professor 2 everyday is CTF! go set up a team Signing up for a SANS course? Be sure to use the code "Liquidmatrix_150" and save $150 off the course fee! And Liquidmatrix_5 for 5% off a course Seacrest Says: the lost episode 2E was legen.... wait for it.... wait for it... wait for it... Creative Commons license: BY-NC-SA
Google+ Hangout Show Notes Hosts Preston Wiley, CISSP, CCNA Mike Hill, CISSP Keith Watson, CISSP-ISSAP, CISA Articles To Our Customers by Silent Circle, Silent Circle follows Lavabit in shuttering encrypted e-mail by Steven Musil (CNet), Important Announcement by Ladar Levison (Lavabit LLC), Edward Snowden has applied for asylum in Russia Live Blog from Global Post, Forced Exposure ~pj by Pamela Jones (Groklaw) Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit Works by Greg Kumparak (TechCrunch), Mark Zuckerberg’s own Facebook timeline hacked by Palestinian researcher by Lee Munson (nakedsecurity blog)
This week, Dave and Gunnar talk about: Twitter security, Chrome security, SpiderOak security, SnapChat security, Open Security, OpenShift security, and calendar security. Subscribe via RSS or iTunes. A prototype. Twitter improves 2 factor authentication Android Device Manager web page going live for some users Google Chrome lets you – or anyone using your computer – see the plaintext web passwords stored by your browser (by design) “Three people can keep a secret if two of them are dead,” Benjamin Franklin LavaBit and Silent Circle shut down. Gunnar came back from Mil-OSS LANT Open Security from the folks that brought you mil-oss Red Hat Government Symposium registration now open! Hellekson’s Law is now under review Gunnar considers signing up for Reputation.com and ponders their sponsorship eligibility OpenShift Enterprise on top of a trust between IPA/IdM and Windows Active Directory TaskPaper vs. Remember the Milk Hackpad with Dropbox integration DropDAV: DAV for Dropbox, paging Adam Clater Unrelated but still useful: Fix Dropbox Connection Issues With NetworkManager and Wifi The new dgshow.org website? Fork us! Creative People Say No Cutting Room Floor 3D printable objects modeled on expired 19th century patents We Give Thanks Adam Clater for getting us to think about storage liberation
Justin and Jason discuss the details of selling Pluggio, what Justin considers to be the ideal attributes of a SaaS business and his idea for a collaborative web app for doing mockups, the hypocritical startup advise of Ben Horowitz and Dustin Moskowitz, the surprising wealth of A-list celebrities and Internet entrepreneurs, the Xerox compression bug and the Laravel "returning" bug, Nassim Taleb's Skin in the Game paper, analog mockups, developing an Android app in Titanium, why Apple's board is concerned about the current rate of innovation, the nonsensical empirical risk assessment of the U.S. government, the cynical political theatre of shutting down U.S. embassies based on non-specific terrorist threat, how Snowden was offered one year's asylum in Russia as well as a job by social networking giant VKontakte, why Lavabit and Silent Circle both shut down their encrypted email services, how the TSA is rapidly expanding beyond the confines of the airport and the increasing militarization of local police, the lurching surveillance / police state and the possibility of a quantum internet.
Justin and Jason discuss the details of selling Pluggio, what Justin considers to be the ideal attributes of a SaaS business and his idea for a collaborative web app for doing mockups, the hypercritical startup advise of Ben Horowitrz and Dustin Moskowitz, the surprising wealth of A-list celebrities and Internet entrepreneurs, the Xerox compression bug and the Laravel "returning" bug, Nassim Taleb's Skin in the Game paper, analog mockups, developing an Android app in Titanium, why Apple's board is concerned about the current rate of innovation, the nonsensical empirical risk assessment of the U.S. government, the cynical political theatre of shutting down U.S. embassies based on non-specific terrorist threat, how Snowden was offered one year's asylum in Russia as well as a job by social networking giant VKontakte, why Lavabit and Silent Circle both shut down their encrypted email services, how the TSA is rapidly expanding beyond the confines of the airport and the increasing militarization of local police, the lurching surveillance / police state and the possibility of a quantum internet.
Is sitting killing you (faster). DOJ White Paper justifies Assassinating Americans. Nugent to Morgan, Leave gun owners the hell alone. Flu Vaccine Alternatives. Silent Circle encryption for your messages AND files.