2008 film by Gregory Hoblit
POPULARITY
47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate LINKS: TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:14:45) Monerotopia Price Report Segment w/ Bawdyanarchist. (01:20:20) Monerotopia News Segment w/ Tux. (01:21:20) MMR vaccine (01:22:20) Donald Trump the first Crypto President. (01:23:29) No more Bitcoin buys for El Salvador. (01:25:06) Senators Schumer, Warren and Booker. (01:26:03) Untraceable post. (01:27:11) Web Monero Ecosystem. (01:28:04) Monero Swapping Protocol. (01:30:33) Trump establishing strategic bitcoin reserve. (01:32:23) Pledditor post. (01:33:00) PeterSchiff and Monero. (01:34:53) Sam Bankman-Fried. (01:38:08) Monerotopia Viewers on Stage Segment. (01:40:50) Monerotopia Guest Segment w/ REMSee. (02:40:47) Monerotopia Finalization. NEWS SEGMENT LINKS: https://x.com/dbrozelivefree/status/1896402717091811820?s=46 https://x.com/peterschiff/status/1896660831880007729?s= https://x.com/excellion/status/1896864412373500173?s=46 https://x.com/rightanglenews/status/1896927664826617928?s=46 https://x.com/donttracemebruh/status/1897226065031917859?s=46 https://x.com/moneromavrick/status/1897344007837266354?s=46 https://x.com/repthomasmassie/status/1897400794946920547?s=46 https://x.com/jpthor/status/1897590009840222226?s=46 https://x.com/davidsacks47/status/1897841517357650323?s=46 https://x.com/pledditor/status/1898205499926958264?s=46 https://youtu.be/YPrtBgIcKgU?si=jMQ6YWD5T0pL7VF https://x.com/douglastuman/status/1898291203713474621?s=46&t=WeY1AyuT6Ir1FNBKKqBeg SPONSORS: PRICE REPORT: https://exolix.com/ GUEST SEGMENT: https://cakewallet.com & https://monero.com NEWS SEGMENT: https://www.wizardswap.io Don't forget to SUBSCRIBE! The more subscribers, the more we can help Monero grow! XMRtopia TELEGRAM: https://t.me/monerotopia XMRtopia MATRIX: https://matrix.to/#/%23monerotopia%3Amonero.social ODYSEE: https://bit.ly/3bMaFtE WEBSITE: monerotopia.com CONTACT: monerotopia@protonmail.com MASTADON: @Monerotopia@mastodon.social MONERO.TOWN https://monero.town/u/monerotopia Get Social with us: X: https://twitter.com/monerotopia INSTAGRAM: https://www.instagram.com/monerotopia DOUGLAS: https://twitter.com/douglastuman SUNITA: https://twitter.com/sunchakr TUX: https://twitter.com/tuxpizza
The Hidden Lightness with Jimmy Hinton – The missing code, essential for tracking the flow of funds, raises serious questions about accountability and oversight within the government. How could such a massive amount of money go unaccounted for? Where did the money go? And what can be done to prevent this from happening again? These are just some of the questions that this episode seeks to answer...
Summary In this episode, Blockchain Wayne interviews Tracy Leparulo from Untraceable, discussing her journey into the crypto and Web3 space, the evolution of events in the industry, and the importance of education and community. Tracy shares her experiences with early Bitcoin, the challenges of scams, and the significance of digital hygiene. The conversation also explores the future of Web3 events and the innovative approaches Untraceable is taking to create inclusive and engaging experiences for all attendees. Learn more about Futurists Conference and get tickets today: https://www.futuristconference.com/ Learn more about Untraceable: https://www.untraceableinc.com/ Takeaways Tracy started her journey in crypto through microfinance in Kenya. Bitcoin's high transaction fees led Tracy to explore cryptocurrency as a solution. The early days of crypto were filled with skepticism and challenges. Education is crucial to prevent scams and hacks in the crypto space. Digital hygiene is essential for securing crypto assets. Untraceable aims to create inclusive events for all levels of crypto enthusiasts. The evolution of crypto conferences reflects the changing landscape of the industry. AI and crypto are becoming increasingly intertwined. Events should focus on community building and education. The future of Web3 may see integration into all types of events. Chapters 00:00 Introduction to Tracy and Untraceable 01:05 Tracy's Journey into Crypto and Web3 03:14 Reflections on Early Bitcoin Experiences 05:34 Lessons from Crypto Scams and Hacks 07:56 The Importance of Digital Hygiene 08:32 Transition from Traceable to Untraceable 10:55 The Evolution of Crypto Conferences 12:57 The Intersection of AI and Crypto 15:03 The Role of Events in Crypto Education 18:24 Creating Inclusive Crypto Events 20:09 The Future of Web3 Events 22:41 Innovative Conference Experiences 26:35 Closing Thoughts and Future Opportunities
Terry Sawchuk is the Founder Sawchuk Wealth.
Pine Needle Extract for your HEALTH: https://goascentnutrition.com/AndWeKnow Recent Interview: https://shorturl.at/mNPF0 ——— New Spring Wellness Center: https://nad.newspringwellnesscenter.com/andweknow 573-577-3400 Video: https://shorturl.at/zpHUK ———— Protect your investments with And We Know http://andweknow.com/gold Or call 720-605-3900, Tell them “LT” sent you. ————————————————————— AT SEA with LT cruise: https://www.inspirationtravel.com/Ita ———— Protect your investments with And We Know http://andweknow.com/gold Or call 720-605-3900, Tell them “LT” sent you. ————————————————————— *Our AWK Website: https://www.andweknow.com/ *Our 24/7 NEWS SITE: https://thepatriotlight.com/ ————————— Jessie is exactly right. https://x.com/DisrespectedThe/status/1891881294646170016 Watch the amazed, stupid faces of the CNN panel as Kevin O'Leary teaches them a thing or two about government waste https://x.com/DineshDSouza/status/1891775122056355841 Biden 2020 voters who switched to Trump in 2024 tell CNN they like what Trump is doing. https://x.com/DineshDSouza/status/1891557483589595160 PALANTIR CEO ALEX KARP DELIVERS PAINFUL TRUTH TO DEMOCRATS https://x.com/CitizenFreePres/status/1891904449934749815 Well this actually makes a lot of sense! https://x.com/DavidJHarrisJr/status/1891897725546897435 "We will hunt you down... you will be caught. You will be removed, and you will never return." https://x.com/WhiteHouse/status/1891897694827803009 ————————— *DONATIONS SITE: https://bit.ly/2Lgdrh5 *Mail your gift to: And We Know 30650 Rancho California Rd STE D406-123 (or D406-126) Temecula, CA 92591 ➜ AWK Shirts and gifts: https://shop.andweknow.com/ ➜ Audio Bible https://www.biblegateway.com/audio/mclean/kjv/1John.3.16 Connect with us in the following ways:
Elon Musk's Department of Government Efficiency revealed that $4.7 trillion in disbursements by the US Treasury are “almost impossible” to trace.Also: Losing USAID funding sends NGOs to Brussels to beg for money from European Union; and UK PM Sir Kier Starmer says he's prepared to deploy British troops to Ukraine.FOLLOW US!X: @WatchSkyWatchTV | @Five_In_TenYouTube: @SkyWatchTelevision | @SimplyHIS | @FiveInTenRumble: @SkyWatchTVFacebook: @SkyWatchTV | @SimplyHIS | @EdensEssentialsInstagram: @SkyWatchTV | @SimplyHisShow | @EdensEssentialsUSATikTok: @SkyWatchTV | @SimplyHisShow | @EdensEssentialsSkyWatchTV.com | SkyWatchTVStore.com | EdensEssentials.com | WhisperingPoniesRanch.com
The acting commissioner of Social Security tried to block Elon Musk from getting in and when that didn't work, she quit. Boy does this look bad for her and the whole SS system. It happens on the same day we learn $4.7 trillion is spending has no category on the record and is essentially untraceable. This mess should have been cleaned up years and years ago. What's up with that Delta crash in Toronto Monday? Why don't we know what happened, who was flying the plane and why were other planes taking off and landing just fine? I'm curious, I want to know if it had anything to do with Delta being the most woke airline in the world. It kinda seems like reporters don't care about this story at all. Royals owner John Scherman says he's got a new stadium deal "buttoned up" but we get no details and nobody asked a follow up question when he met with the media in Arizona. Team USA plays Canada again Thursday, this time in the title game of the 4Nations Hockey tourney and American players are saying this may be the biggest game of their lives. The NBA All Star Game is a disaster for the league and a great musician from an 80's band hopes to play guitar again.
DOGE Finds Whopping $4.7 TRILLION In ‘Untraceable' Treasury Payments
Our latest update on the DOGE and what Elon has to report in his findings. (33:10)
Joe and Alex discuss how everything you've probably read about this week was a distraction from Trump's endgame. We all have to pay very, very close attention to what's happening behind the curtain. Why Trump's crypto capture scheme could be the biggest story in our lifetimes. And how social media is quickly becoming an arm of the state. TikTok, X, and now even Facebook... and why in the face of all Trump's distractions this week and beyond, Joe explains why we have to be more vigilant than ever. Learn more about your ad choices. Visit megaphone.fm/adchoices
A new database tracks how state and local governments across the country are spending billions of dollars in opioid settlement funds. In Ohio, about half of those funds are untraceable.
47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate LINKS: https://x.com/DontTraceMeBruh https://x.com/zano_project TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:11:23) Monerotopia Price Report Segment w/ Bawdyanarchist. (00:44:08) Monerotopia Guest Segment w/ Untraceable, Zoidberg and Ravaga. (02:53:23) Monerotopia News Segment w/ Tux. (02:54:01) MiCAR and the Monero Ecosystem. (02:55:12) XMR and BTC. (02:56:20) X Payments in 2025. (02:59:39) Terrorism wave. (03:01:42) X Algorithm promoting more information. (03:04:33) Monerotopia Viewers on Stage Segment. (04:04:02) Monerotopia Finalization. NEWS SEGMENT LINKS: https://www.reddit.com/r/Monero/s/VdZV4D4U8A https://x.com/elastostroll/status/1874080433606189328?s=46 https://x.com/fringeviews/status/1874442583897960764?s=46 https://x.com/nickjfuentes/status/1874954603995004997?s=46 https://x.com/tuxpizza/status/1875221149749252601?s=46 https://x.com/elonmusk/status/1875355425601999255?s=46 https://x.com/elonmusk/status/1874871236653932664?s=46&t=WeY1AyuT6Ir1FNBKKqBeg https://x.com/elonmusk/status/1875355425601999255?s=46&t=WeY1AyuT6Ir1FNBKKqBeg SPONSORS: PRICE REPORT: https://exolix.com/ GUEST SEGMENT: https://cakewallet.com & https://monero.com NEWS SEGMENT: https://www.wizardswap.io Don't forget to SUBSCRIBE! The more subscribers, the more we can help Monero grow! XMRtopia TELEGRAM: https://t.me/monerotopia XMRtopia MATRIX: https://matrix.to/#/%23monerotopia%3Amonero.social ODYSEE: https://bit.ly/3bMaFtE WEBSITE: monerotopia.com CONTACT: monerotopia@protonmail.com MASTADON: @Monerotopia@mastodon.social MONERO.TOWN https://monero.town/u/monerotopia Get Social with us: X: https://twitter.com/monerotopia INSTAGRAM: https://www.instagram.com/monerotopia DOUGLAS: https://twitter.com/douglastuman SUNITA: https://twitter.com/sunchakr TUX: https://twitter.com/tuxpizza
GO FORWARD CONFERENCE|| DEC 2024| DAY 13 (part a) | UNCHANGING NATURE, DYNAMIC WORKS| UNDERSTANDING GOD'S MOVEMENTS | CHIMDI OHAHUNA Welcome to this teaching episode. In it, we will further explore the profound understanding of God's unchanging nature and the dynamic progression of His works. This teaching will reveal how God's actions were initiated before time began, with time aligning to His divine movement rather than the reverse. Challenge traditional beliefs within Christendom that emphasize catching up with trends, instead, this teaching highlights the truth that we are ahead of trends by being led by the Spirit of God. As Romans 8:14 states, those the Spirit leads are the sons of God, moving in sync with His will, beyond the grasp of worldly trends. Drawing inspiration from John 3:8 and John 1:5, we compare the movement of God's children to the wind—mysterious and untraceable. We emphasize the importance of standing firm and stationary in Christ, rooted in His revelation, as Galatians 5:1 urges. Also, this teaching unravels the Greek term 'stekou' (stationary), using the metaphor of a house built on a rock versus one on sand (Matthew 7:24-27). We stress the need to know the truth, which sets us free (John 8:32), urging believers to fully embody Christ and reveal Him through their lives. We explore faith as a defense mechanism, represented by the shield of faith (Ephesians 6:16), emphasizing the need to be unmovable and persevering in Christ. As we stand firm, the world will witness our faith and be drawn to Christ, fulfilling our mission to reconcile them to the Lord Jesus. Join us as we uncover these timeless truths, calling for believers to be firmly rooted and built up in Christ, standing fast in their faith, and moving with the divine flow that transcends time and trends. Grace to you! Jesus is Lord. --- Support this podcast: https://podcasters.spotify.com/pod/show/gracelife-comi/support
GO FORWARD CONFERENCE|| DEC 2024| DAY 13 (part b) | UNCHANGING NATURE, DYNAMIC WORKS| UNDERSTANDING GOD'S MOVEMENTS | CHIMDI OHAHUNA Welcome to this teaching episode. In it, we will further explore the profound understanding of God's unchanging nature and the dynamic progression of His works. This teaching will reveal how God's actions were initiated before time began, with time aligning with His divine movement rather than the reverse. Challenge traditional beliefs within Christendom that emphasize catching up with trends, instead, this teaching highlights the truth that we are ahead of trends by being led by the Spirit of God. As Romans 8:14 states, those the Spirit leads are the sons of God, moving in sync with His will, beyond the grasp of worldly trends. Drawing inspiration from John 3:8 and John 1:5, we compare the movement of God's children to the wind—mysterious and untraceable. We emphasize the importance of standing firm and stationary in Christ, rooted in His revelation, as Galatians 5:1 urges. Also, this teaching unravels the Greek term 'stekou' (stationary), using the metaphor of a house built on a rock versus one on sand (Matthew 7:24-27). We stress the need to know the truth, which sets us free (John 8:32), urging believers to fully embody Christ and reveal Him through their lives. We explore faith as a defense mechanism, represented by the shield of faith (Ephesians 6:16), emphasizing the need to be unmovable and persevering in Christ. As we stand firm, the world will witness our faith and be drawn to Christ, fulfilling our mission to reconcile them to the Lord Jesus. Join us as we uncover these timeless truths, calling for believers to be firmly rooted and built up in Christ, standing fast in their faith, and moving with the divine flow that transcends time and trends. Grace to you! Jesus is Lord. --- Support this podcast: https://podcasters.spotify.com/pod/show/gracelife-comi/support
GO FORWARD CONFERENCE|| DEC 2024| DAY 13 (part c) | UNCHANGING NATURE, DYNAMIC WORKS| UNDERSTANDING GOD'S MOVEMENTS | CHIMDI OHAHUNA Welcome to this teaching episode. In it, we will further explore the profound understanding of God's unchanging nature and the dynamic progression of His works. This teaching will reveal how God's actions were initiated before time began, with time aligning with His divine movement rather than the reverse. Challenge traditional beliefs within Christendom that emphasize catching up with trends, instead, this teaching highlights the truth that we are ahead of trends by being led by the Spirit of God. As Romans 8:14 states, those the Spirit leads are the sons of God, moving in sync with His will, beyond the grasp of worldly trends. Drawing inspiration from John 3:8 and John 1:5, we compare the movement of God's children to the wind—mysterious and untraceable. We emphasize the importance of standing firm and stationary in Christ, rooted in His revelation, as Galatians 5:1 urges. Also, this teaching unravels the Greek term 'stekou' (stationary), using the metaphor of a house built on a rock versus one on sand (Matthew 7:24-27). We stress the need to know the truth, which sets us free (John 8:32), urging believers to fully embody Christ and reveal Him through their lives. We explore faith as a defense mechanism, represented by the shield of faith (Ephesians 6:16), emphasizing the need to be unmovable and persevering in Christ. As we stand firm, the world will witness our faith and be drawn to Christ, fulfilling our mission to reconcile them to the Lord Jesus. Join us as we uncover these timeless truths, calling for believers to be firmly rooted and built up in Christ, standing fast in their faith, and moving with the divine flow that transcends time and trends. Grace to you! Jesus is Lord. --- Support this podcast: https://podcasters.spotify.com/pod/show/gracelife-comi/support
On an episode where day turned into night, we had Tracy, a former investment banker turned entrepreneur and speaker. After a decade in finance, in 2018 Tracy transitioned to becoming an entrepreneur and had since become one of the GCC's leading wellness entrepreneurs with a rapidly growing social media presence.Tracy founded Untraceable, a wellness and personal growth company whose latest program attracted 10,000 subscribers in its first quarter. Her latest venture, Mama Booza, is a UAE-born traditional Arabic ice cream brand where she serves as a founder and active shareholder. Tracy also hosts the “What They Don't Tell Us” podcast, sharing life lessons and expert insights.At the end of the almost two-hour episode, Tracy said, “We spoke like we knew each other forever. We went deep like there were no cameras watching. Hope you all enjoy this as much as I have!”
Nepovember blazes on as we take a little trip to Portland in the not too distant past for an in depth look at emerging technology and the human psyche in Untraceable. Email: WeeklyPodcastMassacre@gmail.com Instagram: @WeeklyMassacre Threads: @WeeklyMassacre Music by Dora the Destroyer
Action 4 Kamala, Untraceable Tim, & Secret Service Breaks Into A Salon @bradbinkley | Linktree https://linktr.ee/bradbinkley Learn more about your ad choices. Visit megaphone.fm/adchoices
Bookwaves/Artwaves is produced and hosted by Richard Wolinsky. Links to assorted local theater & book venues Aya de Leon in conversation with host Richard Wolinsky. Aya de Leon is the Poet Laureate of the City of Berkeley. She is a novelist and poet who currently teaches creative writing at U.C. Berkeley. She is the author of ten books, the most recent of which are the adult novel, “That Dangerous Energy,” and the young adult novel, “Untraceable.” Originally a hip hop artist, Aya de Leon is also a noted local activist, and the acquiring editor of Fighting Chance Books, the climate justice fiction imprint of She Writes Press. She organizes with the Black Hive, the climate and environmental justice formation of the Movement for Black Lives. Stuart Klawans, author of “Crooked but Never Common: The Films of Preston Sturges,” in conversation with host Richard Wolinsky. Stuart Klawans was film critic for the Nation from 1988 to 2021, and before that wrote a small press and poetry column for the magazine. His previous books were Film Follies: The Cinema Out of Order, and a collection of his reviews and essays from 1988 to 2001, Left in the Dark. Preston Sturges was the first in the Hollywood sound era to write and direct his own films, creating a series of movies, from The Great McGinty in 1940, through The Lady Eve, Sullivan's Travels, The Miracle of Morgan's Creek and other classics to Unfaithfully Yours in 1948, that still resonate today. All the films mentioned in the interview are available streaming either for rental via Amazon or Apple, or in the case of Unfaithfully Yours, The Sin of Harold Diddlebock and The Great Moment, free on YouTube. Complete 52-minute interview. Review of “Evita” at San Francisco Playhouse through September 7, 2024. Book Interview/Events and Theatre Links Note: Shows may unexpectedly close early or be postponed due to actors' positive COVID tests. Check the venue for closures, ticket refunds, and vaccination and mask requirements before arrival. Dates are in-theater performances unless otherwise noted. Some venues operate Tuesday – Sunday; others Wednesday or Thursday through Sunday. All times Pacific Time. Closing dates are sometimes extended. B ook Stores Bay Area Book Festival See website for highlights from the 10th Annual Bay Area Book Festival, June 1-2, 2024. Book Passage. Monthly Calendar. Mix of on-line and in-store events. Books Inc. Mix of on-line and in-store events. The Booksmith. Monthly Event Calendar. BookShop West Portal. Monthly Event Calendar. Center for Literary Arts, San Jose. See website for Book Club guests in upcoming months. Green Apple Books. Events calendar. Kepler's Books On-line Refresh the Page program listings. Live Theater Companies Actor's Reading Collective (ARC). Calendar of upcoming readings. African American Art & Culture Complex. See website for calendar. Alter Theatre. See website for upcoming productions. American Conservatory Theatre Carrie, The Musical, The Reuff at The Strand, August 1-11. Noel Coward's Private Lives, September 12 – October 6, Toni Rembe Theatre. Aurora Theatre The Lifespan of a Fact by Jeremy Kareken & David Murrell and Gordon Farrell, June 21-July 21. Streaming: July 16-21. Awesome Theatre Company. Por La Noche (By Night), October 11 – 26, 2024. See website for information. Berkeley Rep. Mother Road by Octavio Solis, June 14-July 21, Peets Theatre. The Best of the Second City, July 16-29, Roda Theatre. Berkeley Shakespeare Company. See website for upcoming shows. Boxcar Theatre. New Years Eve at the Speakeasy, Jan. 1, 2025. Magic Man, Jan 3 – June 2, Palace Theatre. Brava Theatre Center: See calendar for current and upcoming productions. BroadwaySF: Mrs. Doubtfire, July 2-28. Girl from the North Country, July 30-Aug 18, Golden Gate. See website for events at the Orpheum, Curran and Golden Gate. Broadway San Jose: Disney's Frozen, August 21 – September 1. California Shakespeare Theatre (Cal Shakes). As You Like it, September 12 – 29. Center Rep: Arsenic and Old Lace by Joseph Kesselring September 8 -29. Lesher Center for the Arts. Central Works Accused by Patricia Milton, July 13 – August 11. Cinnabar Theatre. See website for upcoming productions.. Club Fugazi. Dear San Francisco ongoing. Check website for Music Mondays listings. Contra Costa Civic Theatre In Repertory: Hamlet and Rosencranz and Gildenstern Are Dead, September 7 – 22. Curran Theater: See website for special events.. Custom Made Theatre. In hibernation. Cutting Ball Theatre. See website for upcoming shows. 42nd Street Moon. Bright Star postponed. Golden Thread 11 Reflections: San Francisco, October 4-5 Brava Theatre Center. See website for other events. Hillbarn Theatre: Always…Patsy Cline, August 22 – September 15. Lorraine Hansberry Theatre. See website for upcoming productions. Lower Bottom Playaz See website for upcoming productions. Magic Theatre. Magic Gala, August 8, 2024. Richard II by William Shakespeare, August 21 – September 8. See website for other events. Marin Theatre Company Yaga by by Kurt Sondler, October 10 – November 3, 2024. Mission Cultural Center for Latino Arts Upcoming Events Page. New Conservatory Theatre Center (NCTC) Ride the Cyclone by Jacob Richmond & Brooke Maxwell, September 20 – October 20. Oakland Theater Project. Angels in America, Parts I & II, September 27 – October 26, Odd Salon: Upcoming events in San Francisco & New York, and streaming. Pear Theater. Chaplin and Keaton on the Set of Limelight by Greg Lam, June 28 – July 21, 2024. Presidio Theatre. See website for complete schedule of events and performances. Ray of Light: Legally Blonde, September 7-29, 2024, Victoria Theatre. See website for Spotlight Cabaret Series at Feinstein's at the Nikko (It's Britney, Bitch, July 24). San Francisco Playhouse. Evita, June 27-September 7. 2024. SFBATCO. See website for upcoming streaming and in- theater shows. San Jose Stage Company: See website for upcoming schedule. Shotgun Players. Collective Rage by Jen Silverman. July 20 – August 18. South Bay Musical Theatre: No, No Nanette, Sept 28 – Oct. 19. Saratoga Civic Theater. Stagebridge: See website for events and productions. Storytime every 4th Saturday. The Breath Project. Streaming archive. The Marsh: Calendar listings for Berkeley, San Francisco and Marshstream. Theatre Lunatico See website for upcoming productions. Theatre Rhino Streaming: Essential Services Project, conceived and performed by John Fisher, all weekly performances now available on demand. TheatreWorks Silicon Valley. King James by Rajiv Joseph, October 9 – November 3, 2024. Word for Word. See website for upcoming productions. Misc. Listings: BAM/PFA: On View calendar for BAM/PFA. Berkeley Symphony: See website for listings. Chamber Music San Francisco: Calendar, 2023 Season. Dance Mission Theatre. On stage events calendar. Oregon Shakespeare Festival: Calendar listings and upcoming shows. San Francisco Opera. Calendar listings. San Francisco Symphony. Calendar listings. Filmed Live Musicals: Searchable database of all filmed live musicals, podcast, blog. If you'd like to add your bookstore or theater venue to this list, please write Richard@kpfa.org The post July 18, 2024: Aya de Leon – Stuart Klawans appeared first on KPFA.
Aya de Leon in conversation with host Richard Wolinsky. Aya de Leon is the Poet Laureate of the City of Berkeley. She is a novelist and poet who currently teaches creative writing at U.C. Berkeley. She is the author of ten books, the most recent of which are the adult novel, “That Dangerous Energy,” and the young adult novel, “Untraceable.” Originally a hip hop artist, Aya de Leon is also a noted local activist, and the acquiring editor of Fighting Chance Books, the climate justice fiction imprint of She Writes Press. She organizes with the Black Hive, the climate and environmental justice formation of the Movement for Black Lives. The post Aya de Leon, “That Dangerous Energy” appeared first on KPFA.
Are you looking for a captivating Summer read? Tune in for a discussion with New York Times Bestselling author Laura Griffin, on her new thriller Liar's Point. Moments with Marianne airs in the Southern California area on KMET1490AM & 98.1 FM, an ABC Talk News Radio affiliate! Laura Griffin is the New York Times and USA Today bestselling author of more than thirty books and novellas. Her books have been translated into fourteen languages. Laura is a two-time RITA® Award winner (for Scorched and Whisper of Warning) as well as the recipient of the Daphne du Maurier Award (for Untraceable). Her book Desperate Girls was named one of the Best Books of 2018 by Publishers Weekly. https://lauragriffin.comFor more show information visit: www.MariannePestana.com #books #bookstagram #bookish #bookshelf #kmet1490am #LauraGriffin #thriller #mustread #summerreading #reading #readinglist
Bookwaves/Artwaves is produced and hosted by Richard Wolinsky. Links to assorted local theater & book venues Aya de Leon, the Interim Program Director of the Tenth Annual Bay Area Book Festival, June 1-2 in various locations in Berkeley, talks about this year's festival with host Richard Wolinsky. Aya de Leon is the Poet Laureate of the City of Berkeley. She is a novelist and poet who currently teaches creative writing at U.C. Berkeley. She is the author of ten books, the most recent of which are the adult novel, “That Dangerous Energy,” and the young adult novel, “Untraceable.” Originally a hip hop artist, Aya de Leon is also a noted local activist, and the acquiring editor of Fighting Chance Books, the climate justice fiction imprint of She Writes Press. She organizes with the Black Hive, the climate and environmental justice formation of the Movement for Black Lives. Complete Interview. Paul Auster (1947-2024), in conversation with host Richard Wolinsky, recorded October 2, 2002 while on tour for his novel “The Book of Illusions.” Paul Auster, who died on April 30th, 2024 was a world-renowned novelist, memoirist, and film-maker whose works were translated into forty languages. His career as a writer began with a well-received memoir, The invention of Solitude in 1982, and took off in 1987 with the publication of three connected novellas titled The New York Trilogy. His fame and success grew over the following years. He moved into film-making with the screenplays for two movies directed by Wayne Wang, Smoke and Blue in the Face, and then wrote and directed his own film, Lulu on the Bridge. There are three Paul Auster interviews in the archives. In this first interview, he discusses his film work, goes into depth about both The Book of Illusions and his previous novel, Timbuktu, much of the interview centersd on Lulu on the Bridge and the two Wayne Wang collaborations. The second interview was conducted in 2008 for Man in the Dark, and finally in 2017 for his masterpiece, 4 3 2 1. Currently, all three films, the two with Wayne Wang and Lulu on the Bridge, can be rented via Amazon. From time to time, all three show up on the Criterion app. Complete 48-minute Interview. Review of “The Glass Menagerie” at San Francisco Playhouse through June 15, 2024. Review of “Galileo, A Rock Musical” at Berkeley Rep Roda Theatre through June 23, 2024. Book Interview/Events and Theatre Links Note: Shows may unexpectedly close early or be postponed due to actors' positive COVID tests. Check the venue for closures, ticket refunds, and vaccination and mask requirements before arrival. Dates are in-theater performances unless otherwise noted. Some venues operate Tuesday – Sunday; others Wednesday or Thursday through Sunday. All times Pacific Time. Closing dates are sometimes extended. Book Stores Bay Area Book Festival 10th Annual Festival: June 1-2, guests include Joan Baez, Naomi Klein, Viet Thanh Nguyen, Jonathan Lethem. Book Passage. Monthly Calendar. Mix of on-line and in-store events. Books Inc. Mix of on-line and in-store events. The Booksmith. Monthly Event Calendar. Center for Literary Arts, San Jose. See website for Book Club guests in upcoming months. Green Apple Books. Events calendar. Kepler's Books On-line Refresh the Page program listings. Live Theater Companies Actor's Reading Collective (ARC). Upcoming readings to be announced. African American Art & Culture Complex. See website for calendar. Alter Theatre. See website for upcoming productions. American Conservatory Theatre The Lehman Trilogy by Stefano Massini . Adapted by Ben Power, directed by Sam Mandes, May 25-June 23, Toni Rembe Theater. Aurora Theatre The Lifespan of a Fact by Jeremy Kareken & David Murrell and Gordon Farrell, June 21-July 21. Streaming: July 16-21. Awesome Theatre Company. Por La Noche (By Night), October 11 – 26, 2924. See website for information. Berkeley Rep Galileo, World Premiere Musical, book by Danny Strong, with Raul Esparza, extended to June 23, Roda Theatre. Berkeley Shakespeare Company. See website for upcoming shows. Boxcar Theatre. The Speakeasy. Must close June 29, 2024 Brava Theatre Center: See calendar for current and upcoming productions. BroadwaySF: Company, June 5-29, Orpheum. Mrs. Doubtfire, July 2-28. Girl from the North Country, July 30-Aug 18, Golden Gate. See website for events at the Orpheum, Curran and Golden Gate. Broadway San Jose: Peter Pan, June 25-30. California Shakespeare Theatre (Cal Shakes). Terrapin Roadshow, June 1-2; As You Like it, September 12 – 29. Center Rep: Cabaret, May 26 – June 23, Lesher Center for the Arts. Central Works Accused by Patricia Milton, July 13 – August 11. Cinnabar Theatre. La Boheme June 21 – July 5. Club Fugazi. Dear San Francisco ongoing. Contra Costa Civic Theatre In Repertory: Hamlet and Rosencranz and Gildenstern Are Dead, September 7 – 22. Curran Theater: Sesame Street Live, Say Hello, June 7-8; The Cher Show, June 19-23. Custom Made Theatre. In hibernation. Cutting Ball Theatre. See website for upcoming shows. 42nd Street Moon. Bright Star postponed. Golden Thread Conversations with Artists via Zoom and Howlround TV, through June 13, 2024. Hillbarn Theatre: Always…Patsy Cline, August 22 – September 15. Lorraine Hansberry Theatre. See website for upcoming productions. Magic Theatre. Garuda's Wing by Naomi Iizuka, June 5-23. Marin Theatre Company Torch Song by Harvey Fierstein, May 9 – June 2, 2024. Mission Cultural Center for Latino Arts Upcoming Events Page. New Conservatory Theatre Center (NCTC) tick..tick..BOOM by Jonathan Larson, through June 16, 2024. Ride the Cyclone by Jacob Richmond & Brooke Maxwell, September 20 – October 20. Oakland Theater Project. Ghost of King Created by and featuring Michael Wayne Turner III June 6-23, 2024. Odd Salon: Upcoming events in San Francisco & New York, and streaming. Pear Theater. Pear Slices, new works through June 2. Presidio Theatre. See website for complete schedule of events and performances. Ray of Light: Everybody's Talking About Jamie, June 1 – 23, 2024. See website for Spotlight Cabaret Series at Feinstein's at the Nikko. San Francisco Playhouse. The Glass Menagerie by Tennessee Williams, May 2 – June 15. SFBATCO I, Too, Sing America, Grace Cathedral, June 13-15. See website for upcoming streaming and in- theater shows. San Jose Stage Company: Dirty Rotten Scoundrels. June 5 – 30. Shotgun Players. Best Available by Jonathan Spector. May 18 – June 16. Website also lists one night only events at the Ashby Stage. South Bay Musical Theatre: Mary Poppins, the Broadway Musical, May 18 – June 8. Saratoga Civic Theater. Stagebridge: Shady Manor, a musical play by Prescott Cole. June 14-16. 2501 Harrison St., Oakland. The Breath Project. Streaming archive. The Marsh: Calendar listings for Berkeley, San Francisco and Marshstream. Theatre Rhino All's Well That Ends Well by William Shakespeare, May 23 – June 2. Streaming: Essential Services Project, conceived and performed by John Fisher, all weekly performances now available on demand. TheatreWorks Silicon Valley. Being Alive: A Sondheim Celebration June 5-20, Mountain View Center for the Performing Arts.. Word for Word. See website for upcoming productions. Misc. Listings: BAM/PFA: On View calendar for BAM/PFA. Berkeley Symphony: See website for listings. Chamber Music San Francisco: Calendar, 2023 Season. Dance Mission Theatre. On stage events calendar. Oregon Shakespeare Festival: Calendar listings and upcoming shows. San Francisco Opera. Calendar listings. San Francisco Symphony. Calendar listings. Filmed Live Musicals: Searchable database of all filmed live musicals, podcast, blog. If you'd like to add your bookstore or theater venue to this list, please write Richard@kpfa.org The post Bookwaves/Artwaves – May 30, 2024: Aya de Leon – Paul Auster appeared first on KPFA.
Melinda Katz became the District Attorney for Queens County in January 2020, making history as the first woman to hold the office.Under her leadership, the District Attorney's office ensures that all defendants are treated fairly and in a non-discriminatory manner, while protecting the communities it serves in the most diverse county in America. District Attorney Katz restructured the office with new bureaus and mandates to manage challenges including taking guns off the street, empowering victims of domestic violence and human trafficking and seeking justice even in the oldest of cold cases.Shanon LaCorte has extensive work experience in the legal field. Shanon is currently working as the Bureau Chief of the Crime Strategies & Intelligence Bureau at the Queens District Attorney's Office since July 2023. Prior to this, they held the role of Director of the Crime Strategies & Intelligence Unit from May 2021 to July 2023.Before joining the Queens District Attorney's Office, Shanon worked at the Office of the New York State Attorney General. Shanon served as the Special Counsel for the Statewide Organized Crime Task Force from April 2016 to May 2021. Prior to that, they were an Assistant Attorney General in the Criminal Enforcement & Financial Crimes Bureau from October 2014 to March 2016.Shanon's earlier work experience includes working as an Assistant District Attorney at the Nassau County District Attorney's Office from January 2011 to October 2014. Prior to that, they worked as an Associate in the Litigation Department at Schulte Roth & Zabel LLP from September 2007 to August 2010.Shanon LaCorte obtained a Bachelor of Arts degree in Political Science and Government from Union College between 2000 and 2004. Subsequently, they attended American University Washington College of Law from 2004 to 2007 and earned a Doctor of Law degree (JD). What are ghost guns and why should you be concerned?The United States ranks first in the world when it comes to firearms ownership with 400 million guns that we know of. Guns Incorporated is big business in the United States valued at almost 21 billion dollars with more than five percent annual growth. This will be disrupted by 3D printed guns imminently.2024 has already seen a more than 1000 percent increase in 3D printed firearm recoveries in New York City. Queens County leads New York City in ghost gun recoveries. Their impressive leadership has implemented forward looking techniques to limit the flow of 3D printed machine guns, assault weapons, mines, bombs, and bullets in New York City. In this episode, District Attorney Melinda Katz and Bureau Chief Shanon LaCorte join us to talk about the growing of ghost guns and 3D printed firearms and they are working toward keeping these guns of the street.Sign up for the Some Future Day Newsletter here: https://marcbeckman.substack.com/Episode Links:Melinda KatzLinkedIn: https://www.linkedin.com/in/melindakatz/Website: https://www.katzforny.com/Shanon LaCorteLinkedIn: https://www.linkedin.com/in/shanon-lacorte-921324210/To join the conversation follow Marc Beckman here:YoutubeLinkedInTwitterInstagram
Tracy Harmoush is a former investment banker turned growth mindset speaker & entrepreneur whose focus lies in fitness. In spite of “social pressure to consider”, Tracy made the bold decision to shift direction from the 9-5 corporate world to build her fitness brand. Her app, Untraceable, shares a holistic approach to health and wellness, integrating Tracy's expertise and passion for fitness into customised workout plans and nutritional guidance. Tracy is emerging as a key speaker in leadership and self-development, thanks to her Podcast “What They Don't Tell Us” where she interviews thought leaders to provide her listeners with the tools to shape their mindset. In this episode, Tracy and I discuss life as an entrepreneur, covering work life balance, relationships, confidence and more. 0:00 Introduction3:22 The reality of 9-5 corporate work: Tracy's experience in corporate investing / trading in Dubai7:45 The evolution of Dubai culture (2000s to now) 10:33 Entrepreneurship vs corporate job: which one should you choose? 14:11 Tracy's fitness app & why basics beat gimmicks18:00 Dispelling common training & diet myths for women23:05 How to overcome gym anxiety27:12 Dubai Dating & cold approaching in the gym32:22 How Tracy's big success with Untraceable was an “accident” & her motivation with the podcast38:44 Priorities & work life balance as an entrepreneur42:00 Careers & relationships49:33 When the relationship simply doesn't work: not the right one, but no reason toleave55:44 Why being comfortable alone is crucial before being in a relationship57:20 Negative energy exchanges & how feeling confident whilst single is “the best feeling ever'1:00:22 Why are women attracted to bad boys? 1:03:22 Unrealistic standards & expectations 1:07:12 Building a network & valuable friendship group1:14:05 Opening up to your partner & protecting yourself from negative energy1:18:33 Should men speak out more about their emotions? The toxic masculinity of “men will be men” 1:22:03 Masculine & feminine energy1:28:12 Male dating struggles in their early 20s1:31:22 Regrets, appreciating the now & gratitude1:38:02 The wholesome story behind Tracy's ice cream business1:45:20 Tracy's current business ventures1:50:31 Role models 1:52:11 Tracy's #1 advice to young women » Escape the 9-5 & build your dream life - https://www.digitalplaybook.net/» Transform your physique - https://www.thrstapp.com/» My clothing brand, THRST - https://thrstofficial.com» Custom Bioniq supplements: CODEBQMIKETHURSTON - https://shorturl.at/fRV67» Follow Tracy «Youtube: https://www.youtube.com/@TracyHarmoushInstagram: https://www.instagram.com/tracyharmoush/Tik Tok: https://www.tiktok.com/@tracyharmoush?lang=enUntraceable: https://www.instagram.com/untraceable
Aya de Leon, the Interim Program Director of the Tenth Annual Bay Area Book Festival, June 1-2 in various locations in Berkeley, talks about this year's festival with host Richard Wolinsky. Aya de Leon is the Poet Laureate of the City of Berkeley. She is a novelist and poet who currently teaches creative writing at U.C. Berkeley. She is the author of ten books, the most recent of which are the adult novel, “That Dangerous Energy,” and the young adult novel, “Untraceable.” Originally a hip hop artist, Aya de Leon is also a noted local activist, and the acquiring editor of Fighting Chance Books, the climate justice fiction imprint of She Writes Press. She organizes with the Black Hive, the climate and environmental justice formation of the Movement for Black Lives. The post Aya de Leon, The Bay Area Book Festival 2024 appeared first on KPFA.
Last week, the Vermont House passed a bill outlawing untraceable ghost guns. What does that mean for Vermonters?
In a video message Catherine the Princess of Wales reveals she has cancer and is undergoing preventative chemotherapy. She is now the second senior royal to be recently diagnosed with cancer. King Charles announced his diagnosis last month. Also: The civil war in Sudan is now the world's greatest displacement crisis according to the UN. Aid agencies say international support is woefully inadequate for the millions beginning to starve to death. Plus: A new gun problem in Canada. Untraceable ghost guns created by 3-D printers.
Hey Bae! Welcome to The Christian Bae Podcast where Christ and Culture connects. Grab your journals ❤️ Ultimate Guide to starting a Relationship with God: https://beacons.ai/thechristianbae_ If you feel led to sow into this word Cash App: $thechristianbae Paypal: https://www.paypal.com/paypalme/TheChristianBae Zelle/Venmo/Apple Pay: TheChristianBae@gmail.com Let's stay connected Youtube: https://www.youtube.com/channel/UC0j-Bk97lLHz04EE7VPxGcQ IG: https://instagram.com/thechristianbae_?igshid=18erhyzf20fvr Thank you for always supporting The Christian Bae ❤️ --- Support this podcast: https://podcasters.spotify.com/pod/show/thechristianbae/support
H Hey Bae! Welcome to The Christian Bae Podcast where Christ and Culture connects. Grab your journals ❤️ Balentines Girls Night (Orl. FL): https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=4BNFPR8B959G6 Bible Study & Brainstorming 1/21: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=KDCM3MGLGGA6G TCB Pick My Brain Session: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=RMXVJT9CVSYVW - If you feel led to sow into this word Cash App: $thechristianbae Paypal: https://www.paypal.com/paypalme/TheChristianBae Zelle/Apple Pay: TheChristianBae@gmail.com Let's stay connected IG: https://instagram.com/thechristianbae_?igshid=18erhyzf20fvr Thank you for always supporting The Christian Bae ❤️ --- Support this podcast: https://podcasters.spotify.com/pod/show/thechristianbae/support
Most of us have a constant relationship to technology – tools that are constantly being developed and improved from an innovation standpoint, without a consistent understanding of how those tools function. How can the technology that we rely on the most be used to track us and share our personal information? Whether you are an activist, a reporter or the target of a stalker, there can be myriad reasons to better understand how our devices work and how to keep ourselves safe. Today we speak with two reporters who break down phone safety for us. Monique Madan investigates tech at the intersection of criminal justice, social justice, government accountability and immigration, and Wesley Callow supports The Markup's staff product and tech needs, keeping equipment and software up to date and secure. Together they've published a two-part series called Without a Trace: How to Take Your Phone Off the Grid and How to Keep Your Phone Off the Grid. The Markup is a nonprofit newsroom that investigates how powerful institutions are using technology to change our society. Check out the articles: 1. How to Take Your Phone Off the Grid: https://themarkup.org/levelup/2023/10/25/without-a-trace-how-to-take-your-phone-off-the-grid 2. How to Keep Your Phone Off the Grid: https://themarkup.org/levelup/2023/12/13/without-a-trace-how-to-keep-your-phone-off-the-grid Check out Monique Madan's website: https://moniqueomadan.com/ — Subscribe to this podcast: https://plinkhq.com/i/1637968343?to=page Get in touch: lawanddisorder@kpfa.org Follow us on socials @LawAndDis: https://twitter.com/LawAndDis; https://www.instagram.com/lawanddis/ The post Phone Security: Making $ Keeping Your Phone Untraceable w/ Monique Madan & Wesley Callow appeared first on KPFA.
IT.ie, the Irish-owned IT services company, today reveals the "12 Scams of Christmas", outlining the digital ruses consumers are most likely to fall for this festive season. As consumers prepare for the festive season, it can be an opportunity for cybercriminals to take advantage of increased online activity to gain access to sensitive data. Last year, An Garda Síochána issued a warning to consumers, stating that online fraud was on the rise at Christmas time. To help them to keep their personal information safe, IT.ie is encouraging consumers to "channel their inner Scrooge" by fiercely protecting their data and hard-earned money from criminals. This year, the message is clear: be a Scrooge with your private and financial data - or it might become a gift for criminals. The 12 Scams of Christmas that consumers need to look out for are: Sophisticated phishing emails These emails are crafted with advanced techniques such as artificial intelligence, making them look almost identical to those from reputable brands. They often lure victims with fake alerts or offers, leading to sites that steal personal information. IT.ie advises everyone to verify the email's authenticity and avoid clicking on links or attachments from unknown sources. If in doubt, don't click. Social media ad scams Scammers use social media platforms to post ads for exclusive or hard-to-find items at very low prices. These ads often lead to fake websites where your payment information can be stolen. Always research the seller and look for reviews on independent platforms before making a purchase. Bogus websites and URL spoofing Cybercriminals create fake websites that mimic legitimate online retailers, often using URLs that contain subtle misspellings or alterations that can easily go unnoticed. These websites can lure unsuspecting victims by offering high-demand goods at unbelievably low prices. Shoppers should always double check the URL for the correct spelling of the website's domain name and ensure that it starts with "HTTPS". A lock symbol should be visible before the URL. Untraceable payment methods Scammers prefer payment methods that are difficult to trace and offer no fraud protection, such as cryptocurrencies, wire transfers, or gift cards. These methods make it almost impossible to recover lost funds. IT.ie recommends to always use secure and traceable payment methods such as credit and debit cards, or reputable money transfer services. Mobile app frauds Fraudulent mobile apps, often disguised as legitimate shopping apps, can steal personal information or infect your device with malware. These apps might appear in official app stores but often have few downloads and negative reviews. Always verify the app's legitimacy and read reviews before downloading. Delivery notification scams These scams involve sending fake delivery notifications via email or text, which link to phishing websites designed to steal personal information. They often imply a sense of urgency, claiming a package is waiting. These scams are particularly successful at this time of year when people are expecting multiple deliveries. IT.ie recommends that shoppers always use the official tracking tools provided by the retailer and never click on links in unrelated email or text notifications. Charity donation frauds Scammers set up fake charities, particularly during the holiday season when people are more likely to make donations. They often solicit donations through persuasive emails or social media campaigns. Always research the charity using official charity regulator websites before donating. Gift card grifts Gift card scams involve selling discounted gift cards that are either fake or have been previously used. These offers are often found on unofficial websites or through social media ads. Always purchase gift cards directly from official retailers or authorised sellers. Travel scams With holiday travel in high demand, scammers can offer unrealistically cheap travel deals thro...
On May 31st, 1995, Jennifer Fairgate checked into the prestigious Radisson Blu Plaza Hotel, but never checked out. Missing identification, a locked door on an upper floor, few witnesses, and a gunshot left this crime scene a baffling mystery. Today, we discuss the true crime case of the Oslo Plaza Woman. Sensitive topics: death, suicide, and graphic descriptions of violence. If you'd like to listen to past mysteries we discuss, they are: Isdal Woman (https://open.spotify.com/episode/7HgTsOpp2N7huPhbFS2fx0?si=dd47462129904358). Sponsored by BetterHelp (go to http://betterhelp.com/redweb to get 10% off your first month), Rocket Money(go to http://rocketmoney.com/redweb to cancel your unwanted subscriptions), and Shopify (go to http://shopify.com/redweb to get a $1/month trial). If you have any information on this case, please email jennifer@vg.no Learn more about your ad choices. Visit megaphone.fm/adchoices
The Untraceable Market of 3D Printed Ghost Guns --- Support this podcast: https://podcasters.spotify.com/pod/show/mattcox/support
Campbell says the state needs new laws to tackle the problem. She joined WBUR's Morning Edition host Rupa Shenoy to talk about that proposed legislation.
In today's episode of Category Visionaries, we speak with Roei Ganzarski, CEO of Alitheon, a company that builds solutions for authentication, identification, and traceability of parts, products and people, about how counterfeiting and piracy have emerged as a global challenge for businesses across almost every sector, and the new tools needed in the fight against them. By protecting their client's products from black market competition, as well as detecting and tracking down costly fakes, Alitheon makes sure that authenticity is rewarded, the way things should be. We also talk about Roei's upbringing in Asia and how his father's work in shipping took him around the world before coming back to Israel, the culture differences he's experienced in the Pacific Northwest of America, just how ubiquitous fakes and forgeries are in the modern economy, and why making sure products are what they claim to be doesn't just help customers, but can fight crime and save our environment as well. Topics Discussed: Roei's youth spent traveling around the world with his parents before moving back to live in Israel The culture shock of moving to the Pacific Northwest, and what it's like adjusting to a less straight-talking culture How Roei became fascinated with the fight against counterfeits, and the origin story of Alitheon Why counterfeits can do more than just hurt a bottom line, and the potential impacts on workers' rights, criminal networks, and the environment Future prospects for consumer-grade anti counterfeit technology, and the impact it could have on society Favorite book: Start-up Nation: The Story of Israel's Economic Miracle
Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use? // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Top Hacking Books you need to read: • Top Hacking Books... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:51 - Don't use the nighbour's wifi 03:02 - OccupyTheWeb books 03:44 - How to remain anonymous on the internet // The NSA is watching 09:56 - Be careful of your browser 13:35 - Turn off cookies 15:41 - ProxyChains and Tor demo 22:10 - The FBI story 25:30 - ProxyChains and Tor demo continued 28:36 - How to remain anonymous 33:05 - Using Starlink 36:18 - Recommended operating systems 38:34 - Untraceable phones (burner phones) 40:05 - VPN vs Tor // Don't trust free proxies 42:29 - Don't keep systems together 44:24 - Recommended e-mail service 46:53 - Bitcoin is traceable 47:58 - Anti-forensics // How to clean systems 50:41 - Recommended search engines 51:34 - Have different identities/systems 52:26 - Conclusion tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #wifi #iphone #android
When Bitcoin was first created, it was believed to be an untraceable form of currency. This promise attracted tons of bad actors — and it turned out to be untrue. Apple News In Conversation host Shumita Basu spoke with journalist Andy Greenberg about his new book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. Greenberg lays out how U.S. authorities used cryptocurrency tracing to take down some of the most prolific criminals on the dark web.
We're finally back with another episode of True Crime Thriller Thursday. On today's episode we discuss the disappearances of Pamela Sue Hobley and Patricia Spencer. The Thriller of the day is the 2008 film Untraceable starring Diane Lane, Colin Hanks, and Billy Burke.
Tracy Leparulo is the CEO of Untraceable, the Crypto & Blockchain Events company behind the Blockchain Futurist Conference in Toronto. Why you should listen Since 2013 Tracy and her team have run leading events and marketing campaigns within the blockchain and crypto space. From major conferences to hackathons to launch events. The Untraceable team creates unforgettable experiences that build the blockchain and crypto community. The Blockchain Futurist Conference is August 9 - 10 in Toronto, Canada. Speakers include Vitalik Buterin and more on panel discussions including: NFTs, the metaverse, DeFi, cryptocurrency, DAOs and more. Supporting links Nootopia Blockchain Futurist Conference Andy on Twitter Brave New Coin on Twitter Brave New Coin If you enjoyed the show please subscribe to the Crypto Conversation and give us a 5-star rating and a positive review in whatever podcast app you are using.
In This Episode Erin and Weer'd discuss -- The Good: there are new details about Eli Dicken and his defensive shooting at the Greenwood Park Mall; The Bad: the House Assault Weapons bills made it through committee, so here's what we think will happen next; The Stupid: California has passed a new gun control law that seems to violate the PLCAA and the First Amendment as well as the Second. Next, Xander brings us his independent thoughts on when to take a shot and when not; and finally, Weer'd fisks Joe Biden's blathering about "Ghost Guns". Did you know that we have a Patreon? Join now for the low, low cost of $4/month (that's $1/podcast) and you'll get to listen to our podcast on Friday instead of Mondays, as well as patron-only content like mag dump episodes, our hilarious blooper reels and film tracks. Show Notes Main Topic: Eli Dicken's Concealed Carry permit Hero armed citizen landed 8 of 10 shots at 40 yards to stop mass shooting in 15 seconds Assault Weapons ban of 2021 House committee approves first assault weapons ban bill in decades Video: Nadler admits ‘assault weapons' ban intends to ban ‘common use' guns Democrat ‘Assault Weapons' Ban Sponsor: Stabilizing Braces Make an AR-Pistol an ‘Automatic Weapon' M1 “Assault Weapon” Analysis: Examining the California Gun Litigation Trap Few Have Noticed California invites court fight with gun law that mimics Texas on abortion Independent Thoughts: Art of the Rifle Principals of Personal Defense Weer'd Audio Fisk: Biden announces ATF nominee, new regulation to prevent gun crimes Fabulism: ATF is Unable to Verify Its Own ‘Ghost Gun' Claims That Got the Regulatory Ball Rolling Where do criminals really get their guns? Untraceable, but legal, DIY "ghost gun" used in Saugus school shooting, police say Assorted Calibers Podcast Ep 197: ATF “Clarification” Through Absurdity ATF Trace Data: New York ATF Trace Data: Illinois History of Tobacco Lawsuits Statement by President Joe Biden on Supreme Court Ruling on Guns
Bitcoin's true believers hold on through the wild price swings because they see enormous value in its properties as a... The post Bitcoin Can Become Untraceable. appeared first on Reason.com.
Do You Know How Crypto's Nose-dive Will Even Hurt Your 401K? Hey, it looks like if you did not invest in "Crypto," you were making a smart move! Wow. We got a lot to talk about here. Crypto has dived big time. It's incredible. What's happened? We get into that and more. [Following is an automated transcript] Hi everybody. Craig Peterson here. Appreciate your joining me today. Spend a little bit of time with me. It's always a fun thing to do thanks for coming in. And Thanks for sticking around. [00:00:29] Crypto currencies. It's a term for all kinds of these basically non-government sanctioned currencies. [00:00:39] And the idea behind it was I should be able to trade with you and you should be able to trade with me. We should be able to verify the transactions and it's nobody's business as to what's happening behind the scenes. And yet in reality, Everybody's business because all of those transactions are recorded in a very public way. [00:01:03] So crypto in this case does not mean secret or cryptography. It's actually referring to the way the ledgers work and your wallet. And in fact, the actual coins themselves, a lot of people have bought. I was talking with my friend, Matt earlier this week and Matt was saying, Hey, listen I made a lot of money off a crypto. [00:01:29] He's basically a day trader. He watches it. And is it going up? Is it going down? Which coin is doge coin? The way to go? Because Elon Musk just mentioned it. Is it something else? What should I do? And he buys and sells and has made money off of it. However, a lot of people have. And held on to various cryptocurrencies. [00:01:51] Of course, the most popular one. The one everybody knows about is Bitcoin and Bitcoin is pretty good stuff, bottom line, but 40% right now of Bitcoin investors are underway. Isn't that incredible because of the major drop-off from the November peak. And this was all started by a problem that was over at something called Terra Luna, which is another cryptocurrency now. [00:02:22] Already that there is a ton of vulnerable vol a ton of changes in price in various cryptocurrencies, Bitcoin being of course a real big one where, we've seen 5,000, $10,000 per Bitcoin drops. It really is an amazingly fluid if you will coin. So there's a number of different people that have come out with some plans. [00:02:47] How about if we do like what the us dollar used to do, which is it's tied to a specific amount of gold or tied to a specific amount of silver. And of course, it's been a while since that was the case. President Nixon is the one that got us off of those standards. Having a gold, for instance, back in your currency means that there is going to be far less fluctuation and your currency means something. [00:03:16] See, the whole idea behind currency markets for government is yeah, you do print money and you do continue to increase the amount of money you print every year. Because what you're trying to do is create money for the. Good product services that are created as well. So if we created another million dollars worth of services in the economy, there should be another million dollars in circulation that's the basic theory. [00:03:46] Monetary theory, really boiling. Down now of course, already our government is printed way more than it. Maybe should have. It is certainly causing inflation. There's no doubt about that one. So they're looking at these various cryptocurrencies and say what can we do? How can we have a gold standard where the us dollar was the currency the world used and its value was known. [00:04:10] Having a stable currency is incredibly important for consumers and businesses. The business needs to know, Hey, listen, like we signed a three-year contract with our vendors and with our customers. And so we need a stable price. So we know what's our cost going to be, what can we charge our customer here? [00:04:30] Can the customer bear the price increases, et cetera. The answer to most of those questions of course is no, they really can't is particularly in this day and age. So having a. Fixed currency. We know how much it's worth. I know in two years from now, I'm not going to be completely upside down with this customer because I'm having to eat some major increases in prices. [00:04:55] And as a consumer, you want to look at it and say, wow, I've got a variable rate interest rate on my mortgage. And man, I remember friends of mine back in the eighties, early eighties, late seventies, who just got nailed by those. They had variable rate interest loan on their home because that's all they could get. [00:05:14] That's all they could afford. So the variable rate just kept going up. It was higher than credit cards are nowadays. I remember a friend of mine complaining. They had 25% interest and that's when they lost the house because 25% interest means if you have a hundred thousand dollar loan, you got $25,000 in interest that year, let alone principal payments. [00:05:36] So it, it was a really. I think it was really hard for people to, to deal with. And I can understand that. So the cryptocurrency guys. I said, okay, let's tie it to something else. So the value has a value and part of what they were trying to tie it to is the us dollar. That's some currencies decided to do that. [00:06:00] And there were others that tried to tie it to actual. Assets. So it wasn't just tied to the dollar. It was okay. We have X dollars in this bank account and that's, what's backing the value of our currency, which is quite amazing, to think about that. Some of them are backed by gold or other precious metals. [00:06:24] Nowadays that includes a lot of different metals. This one coin called Terra Luna dropped almost a hundred percent last year. Isn't that amazing. And it had a sister token called Tara USD, which Tara Luna was tied to. Now, this is all called stable coin. The idea is the prices will be staying. [00:06:46] And in the case of Tara and Tara USD, the stability was provided by a computer program. So there's nothing really behind it, other than it can be backed by the community currencies themselves. So th that's something like inter coin, for instance, this is another one of the, there are hundreds of them out there of these cryptocurrencies. [00:07:13] Yeah. The community backs it. So goods and services that you can get in some of these communities is what gives value to inter coin money system. Now that makes sense too, right? Because the dollar is only worth something to you. If it's worth something to someone else, if you were the only person in the world that had us dollars, who would want. [00:07:36] Obviously the economy is working without us dollars. So why would they try and trade with you? If you had something called a us dollar that nobody else had, or you came up with something, you made something up out of thin air and said, okay, this is now worth this much. Or it's backed by that. [00:07:56] Because if again, if he can't spend it, it's not worth anything. Anyhow, this is a very big deal because on top of these various cryptocurrencies losing incredible amounts of money over the last couple of weeks, We have another problem with cryptocurrencies. If you own cryptocurrencies, you have, what's called a wallet and that wallet has a transaction number that's used for you to track and others to track the money that you have in the cryptocurrencies. [00:08:29] And it's pretty good. Function or feature it's hard for a lot of people to do so they have these kinds of crypto banks. So if you have one of these currencies, you can just have your currency on deposit at this bank because there's a whole bunch of reasons, but one of the reasons is that. [00:08:50] There is a run on a bank, or if there's a run on a cryptocurrency, currencies have built into them incredibly expensive penalties. If you try and liquidate that cryptocurrency quickly. And also if there are a lot of people trying to liquidate it. So you had a double whammy and people were paying more than three. [00:09:13] Coin in order to sell Bitcoin. And so think about that and think about much a Bitcoin's worth, which is tens of thousands of dollars. So it's overall, this is a problem. It's been a very big problem. So people put it into a bank. So Coinbase is one of the big one called Coinbase, had its first quarter earnings report. [00:09:37] Now, this is the U S is largest cryptocurrency exchange and they had a quarterly loss for the first quarter of 2022 of $430 million. That's their loss. And they had an almost 20% drop in monthly users of coins. So th that's something right. And they put it in their statement. Their quarterly statement here is to, WhatsApp. [00:10:07] Here's the real scary part Coinbase said in its earnings report. Last Tuesday that it holds. $256 billion in both Fiat currencies and cryptocurrencies on behalf of its customer. So Fiat currencies are things like the federal reserve notes are U S dollar, okay. Quarter of a trillion dollars that it's holding for other people think of it like a bank. [00:10:36] However, they said in the event, Coinbase we ever declare bankruptcy, quote, the crypto assets. We hold in custody on behalf of our customers could be subject to bankruptcy proceedings. Coinbase users would become general unsecured creditors, meaning they have no right to claim any specific property from the exchange in proceedings people's funds would become in accessible. [00:11:06] A very big deal. Very scary for a very good reasons. Hey, when we come back a website, no, you go, you type stuff in my email address, do you know? You don't even have to hit submit. In most cases, they're stealing it. [00:11:23] I'm sure you've heard of JavaScript into your browser. This is a programming language that actually runs programs right there in your web browser, whether you like it or not. And we just had a study on this. A hundred thousand websites are collecting. Information upfront. [00:11:40] Hi, I'm Craig Peterson, your chief information security officer. This is not a surprising thing to me. I have in my web browser, I have JavaScript turned off for most websites that I go to now, Java script is a programming language and then lets them do some pretty cool things on a webpage. [00:12:02] In fact, that's the whole idea behind Java. Just like cookies on a web browser, where they have a great use, which is to help keep track of what you're doing on the website, where you're going, pulling up other information that you care about, right? Part of your navigation can be done with cookies. They go on and on in their usefulness. [00:12:23] Part of the problem is that people are using them to track you online. So like Facebook and many others will go ahead and have their cookies on the other websites. So they know where you're going, what you're doing, even when you're not on Facebook, that's by the way, part of. The Firefox browsers been trying to overcome here. [00:12:48] They have a special fenced in mode that happens automatically when you're using Firefox on Facebook. Pretty good. Pretty cool. The apple iOS device. Use a different mechanism. And in fact, they're already saying that Facebook and some of these others who sell advertiser in from advertisers information about you have really had some major losses in revenue because apple is blocking their access to certain information about you back to Jarvis. [00:13:24] It's a programming language that they can use to do almost anything on your web browser. Bad guys have figured out that if they can get you to go to a website or if they can insert an ad onto a page that you're visiting, they can then use. Your web browser, because it's basically just a computer to do what while to mine, Bitcoin or other cryptocurrencies. [00:13:51] So you're paying for the electricity for them as your computer is sitting there crunching on these algorithms that they need to use to figure out the, how to find the next Bitcoin or whatever. And you are only noticing that your device is slowing down. For instance, our friends over on the Android platform have found before that sometimes their phones are getting extremely hot, even when they're not using them. [00:14:18] And we found that yeah, many times that's just. Bitcoin miner who has taken over partial control of your phone just enough to mind Bitcoin. And they did that through your web browser and JavaScript. So you can now see some of the reasons that I go ahead and disable JavaScript on most websites I go to now, some websites aren't going to work. [00:14:40] I want to warn you up front. If you go into your browser settings and turn off JavaScript, you are going. Break a number of websites, in fact many of the websites that are out there. So you got to figure out which sites do you want it on? Which sites don't you want it on? But there's another problem that we have found just this week. [00:15:00] And it is based on a study that was done as reported in ARS Technica, but they found. A hundred thousand top websites, a hundred thousand top websites. These include signing up for a newsletter or making a hotel reservation, checking out online. You probably take for granted that you nothing happens until you hit submit, right? [00:15:25] That used to be the case in web one dot O day. It isn't anymore. Now I want to point out we, I have thousands of people who are on my email list. So every week they get my insider show notes. So these are the top articles of the week. They are, usually six to 10 articles, usually eight of them that are talking about cybersecurity, things of importance. [00:15:51] The whole radio show and podcasts are based on those insider show notes that I also share with the host of all of the different radio shows and television shows that I appear on. It's pretty, pretty cool. So they get that, but I do not use this type of technology. Yeah. There's some Java script. [00:16:11] That'll make a little signup thing come up at the top of the screen, but I am not using technology that is in your face or doing. What these people are doing, right? So you start filling out a form. You haven't hit cement. And have you noticed all of a sudden you're getting emails from. It's happened to me before. [00:16:31] Your assumption about hitting submit, isn't always the case. Some researchers from KU Leuven university and university of Lu sane, crawled and analyze the top 100,000 websites. So crawling means they have a little robot that goes to visit the web page, downloads all of the code that's on the page. [00:16:55] And then. Analyzed it all so what they found was that a user visiting a site, if the user is in the European union is treated differently than someone who visits the site from the United States. Now there's a good reason for it. We've helped companies with complying with the GDPR, which are these protection rules that are in place in the European union. [00:17:21] And that's why you're seeing so many websites. Mine included that say, Hey, listen, we do collect some information on you. You can click here to find out more and there's some websites let you say no. I don't want you to have any information about me where you collect information, just so that you can navigate the site properly. [00:17:39] Okay. Very basic, but that's why European union users are treated differently than those coming from the United States. So this new research found that over 1800 websites gathered an EU users' email address without their consent. So it's almost 2000 websites out of the top 100,000. If you're in the EU and they found. [00:18:07] About well, 3000 website logged a U S users' email in some form. Now that's, before you hit submit. So you start typing in your email, you type in your name and you don't hit cement. Many of the sites are apparently grabbing that information, putting it into the database and maybe even started using it before you gave them explicit permission to do. [00:18:36] Isn't that a fascinating and the 1800 sites that gathered information on European news union users without their consent are breaking the law. That's why so many us companies decided they had to comply with the GDPR because it's a real big problem. So these guys also crawled websites for password leaks and made 2021, and they found 52 websites where third parties, including Yandex, Yandex is. [00:19:11] Big Russian search engine and more we're collecting password data before submission. So since then the group went ahead and let the websites know what was happening, what they found because it's not necessarily intentional by the website itself. It might be a third party, but third-party piece of software. [00:19:33] That's doing it. They w they informed those sites. Hey, listen, you're collecting user data before there's been explicit consent to collect it. In other words, you, before you hit the submit button and they thought, wow, this is very surprising. They thought they might find a few hundred website. In the course of a year now they've found that there were over 3000 websites really that were doing this stuff. [00:20:01] So they presented their findings that use neck. Oh, actually they haven't presented them yet because it's going to be a useful. In August and these are what the cold leaky forum. So yet another reason to turn off JavaScript when you can. But I also got to add a lot of the forums do not work if JavaScript's not enabled. [00:20:23] So we got to do something about it. Maybe complain, make sure they aren't collecting your. Maybe I should do a little course on that once you can figure out are they doing it before I even give them permission? Anyhow, this is Greg Peterson. Visit me online, Craig Peter, som.com and sign up for that. No obligation insider show notes. [00:20:44] We are shipping all kinds of military equipment over to Ukraine. And right now they're talking about another $30 billion worth of equipment being shipped to what was the world's number one arms dealer. [00:21:00] I'm looking right now at an article that was in the Washington post. And some of their stuff is good. [00:21:07] Some of their stuff is bad, I guess like pretty much any media outlet, but they're raising some really good points here. One of them is that we are shipping some pretty advanced equipment and some not so advanced equipment to you. To help them fight in this war to protect themselves from Russia. [00:21:31] Now, all of that's pretty common. Ultimately looking back in history, there have been a lot of people who've made a lot of money off of wars. Many of the big banks financing, both sides of wars. Going way, way back and coming all the way up through the 20th century. And part of the way people make money in war time is obviously making the equipment and supplies and stuff that the armies need. [00:22:03] The other way that they do it is by trading in arms. So not just the supplies. The bullets all the way through the advanced missile systems. Now there's been some concerns because of what we have been seen online. We've talked about telegram here before, not the safest webs, app to use or to keep in touch. [00:22:28] It's really an app for your phone. And it's being used by. Ukraine to really coordinate some of their hacker activities against Russia. They've also been using it in Russia to have telegram that is in order to communicate with each other. Ukraine has posted pictures of some of the killed soldiers from Russia and people have been reaching out to their mothers in Russia. [00:22:57] They've done a lot of stuff with telegram. It's interesting. And hopefully eventually we'll find out what the real truth is, right? Because all of a sudden hides in the military, he uses a lot of propaganda, right? The first casualty in war is the truth. It always has been. So we're selling to a comm country, Ukraine that has made a lot of money off of selling. [00:23:22] Then systems being an intimate intermediary. So you're not buying the system from Russia? No. You're buying it from Ukraine and it has been of course, just as deadly, but now we are sending. Equipment military grade equipment to Ukraine. We could talk about just that a lot. I mentioned the whole Lend-Lease program many months ago now teams to be in the news. [00:23:50] Now it takes a while for the mainstream media to catch up with us. I'm usually about six to 12 weeks ahead of what they're talking about. And it's so when we're talking about Lynn Lee sent me. We're not giving it to them. We're not selling it to them. We're just lending them the equipment or perhaps leasing it just like we did for the United Kingdom back in world war two, not a bad idea. [00:24:16] If you want to get weapons into the hands of an adversary and not really, or not an adversary, but an ally or potential ally against an adversary that you have, and they have. But part of the problem is we're talking about Ukraine here. Ukraine was not invited in Donato because it was so corrupt. You might remember. [00:24:39] They elected a new president over there that president started investigating, hired a prosecutor to go after the corruption in Ukraine. And then you heard president Joe Biden, vice president at the time bragging about how he got this guy shut down. Yeah, he got the prosecutor shut down the prosecutor that had his sights on, of course hunter Biden as well as other people. [00:25:03] So it's a real problem, but. Let's set that aside for now, we're talking about Ukraine and the weapon systems who we've been sending over there. There have been rumors out there. I haven't seen hard evidence, but I have seen things in various papers worldwide talking about telegram, saying. The Ukrainians have somehow gotten their hands on these weapons and are selling them on telegram. [00:25:32] Imagine that a effectively kind of a dark web thing, so we're saying the byte administration okay. There, that none of this is going to happen. Why? Because we went ahead and we put into the contracts that they could not sell or share or give any of this equipment away without the explicit permission of the United States, governor. [00:25:57] Okay. That kind of sounds like it's not a bad idea. I would certainly put it into any contract like this, no question, but what could, what happened here? If this equipment falls into the hands of our adversaries or our other Western countries, NATO countries, how do you keep track of them? It's very hard to do. [00:26:18] How do you know who's actually using. Very hard to do so in forcing these types of contracts is very difficult, which makes the contract pretty weak, frankly. And then let's look at Washington DC, the United States, according to the Washington post in mid April, gave Ukraine a fleet of M 17 helicopter. Now, these are my 17 helicopters are Russian, originally Soviet designs. [00:26:51] Okay. And they were bought by the United States. About 10 years ago, we bought them for Afghans government, which of course now has been deposed, but we still have our hands on some of these helicopters. And when we bought them from Russia, We signed a contract. The United States signed a contract promising not to transfer the helicopters to any third country quote without the approval of the Russian Federation. [00:27:23] Now that's according to a copy of the certificate that's posted on the website of Russia's federal service on military technical cooperation. Russia has come out and said that our transfer, those helicopters has grossly violated the foundations of international law. And you know what they think it has, right? [00:27:43] Arms experts are saying the Russia's aggression Ukraine more than justifies you. I support, but the violations of the weapons contracts, man, that really hurts our credibility and our we're not honoring these contracts. How can we expect you crane to honor those contracts? That's where the problem really comes in. [00:28:07] And it's ultimately a very big problem. So this emergency spending bill that it, the $30 billion. Makes you crane, the world's single largest recipient of us security assistance ever. They've received more in 2022 than United States ever provided to Afghanistan, Iraq, or Israel in a single. [00:28:33] So they're adding to the stockpiles of weapons that we've already committed. We've got 1400 stinger and the aircraft systems, 5,500 anti-tank missiles, 700 switch blade drones, nine 90. Excuse me, long range Howard. There's that's our Chellora 7,000 small arms. 50 million rounds of ammunition and other minds, explosives and laser guided rocket systems, according to the Washington post. [00:29:03] So it's fascinating to look. It's a real problem. And now that we've got the bad guys who are using the dark web, remember the dark web system that we set up, the onion network. Yeah. That one they can take these, they can sell them, they can move them around. It is a real problem. A very big problem. What are we going to do when all of those weapons systems come back aimed at us this time? [00:29:32] It's one thing to leave billions of dollars worth of helicopters, et cetera, back in Afghanistan is the Biden administration did with her crazy withdrawal tactic. But at least those will wear out the bullets, missile systems, Howard, a different deal. [00:29:51] It seems like the government calls a war on everything, the war against drugs or against poverty. Now we are looking at a war against end-to-end encryption by governments worldwide, including our own. [00:30:07] The European union is following in America's footsteps steps again, only a few years behind this time. [00:30:16] But it's not a good thing. In this case, you might remember a few have been following cybersecurity. Like I have back in the Clinton administration, there was a very heavy push for something called the clipper chip. And I think that your whole clipper chip. Actually started with the Bush administration and it was a bad thing because what they were trying to do is force all businesses to use this encryption chip set that was developed and promoted by the national security agency. [00:30:52] And it was supposed to be an encryption device that is used to secure voice and data messages. And it had a built-in. Back door that allowed federal state, local law enforcement, anybody that had the key, the ability to decode any intercepted voice or data transmissions. It was introduced in 93 and was thank goodness. [00:31:19] Defunct by 1996. So it used something called skipjack, man. I remember that a lot and use it to transfer Dilley or defi, excuse me, Hellman key exchange. I've worked with that maybe for crypto keys that used it. Use the Dez algorithm, the data encryption standard, which is still used today. And the Clinton administration argued that the clipper chip was. [00:31:46] Absolutely essential for law enforcement to keep up with a constantly progressing technology in the United States. And a lot of people believe that using this would act as frankly, an additional way for terrorists to receive information and to break into encrypted information. And the Clinton administration argued that it would increase national security because terrorists would have to use it to communicate with outsiders, bank, suppliers, contacts, and the government could listen in on those calls, are we supposed to in the United States have a right to be secure in our papers and other things, right? That the federal government has no right to come into any of that stuff unless they get a court order. So they were saying we would take this key. We'll make sure that it's in a lock box, just like Al gore social security money. [00:32:41] And no one would be able to get their hands on it, except anyone that wanted to, unless there was a court order and you know how this stuff goes. And it just continues to progress. A lot worse. There was a lot of backlash by it. The electronic privacy information center, electronic frontier foundation boast, both pushed back saying that it would be. [00:33:05] Only have the effect of have not, excuse me, have the effect of, this is a quote, not only subjecting citizens to increased impossibly illegal government surveillance, but that the strength of the clipper Chip's encryption could not be evaluated by the public as it's designed. It was classified secret and that therefore individuals and businesses might be hobbled with an insecure communication system, which is absolutely true. [00:33:33] And the NSA went on to do some things like pollute, random number generators and other things to make it so that it was almost impossible to have end-to-end encrypted data. So we were able to kill. Many years ago. Now what about 30 years ago? When they introduced this thing? It took a few years to get rid of it, but now the EU is out there saying they want to stop and end encryption. [00:34:00] The United States has already said that the new director of Homeland security has, and as well as Trump's again Homeland security people said we need to be able to break the. And we've talked about some of those stories, real world stories of things that have happened because of the encryption. [00:34:20] So the EU is now got our proposal forward. That would force tech companies to scan private messages for child sexual abuse material called CSM and evidence of grooming. Even when those messages are supposed to be protected by indenting. So we know how this goes, right? It starts at something that everybody can agree on, right? [00:34:48] This child, sexual abuse material abductions of children, there's still a lot of slavery going on in the world. All of that stuff needs to be stopped. And so we say, yeah. Okay. That makes a whole lot of sense, but where does it end? Online services that receive detection orders. This is from ARS Technica under the pending European union legislation would have obligations concerning the detection, the reporting, the removal, and blocking of known and. [00:35:20] Child sexual abuse material, as well as the solicitation of children. So what we're starting to see here in the us is some apps, some companies that make smartphones, for instance, looking at pictures that are sent and shared to see if it looks like it might be pornographic in. Because again, we're seeing the younger kids who are sending pictures of each other naked or body parts and they get to others. [00:35:46] If you can believe that. Absolutely incredible. But what happens when you send them using an end-to-end encrypted app? Now, my advice for people who want to keep information private, you're a business person you're working on a deal. You don't go to Twitter like Elon Musk and put it out there for the world. [00:36:08] Although, I'm sure he's got some ulterior motives in doing that. You use an app called signal. That's certainly the best one that's out there right now. It provides a whole lot of encryption and privacy, and even has some stuff built in to break the software. That's often used to break into the end to end encryption systems. [00:36:29] So they're trying to get this in place here. They're calling it an important security tool. But it's ordering companies to break that end to end encryption by whatever technological means necessary. It's going to be hard because it's, frankly, it's going to be impossible for them to enforce this because you can take encrypted data and make it look like. [00:36:53] Anything, and man has that happened for a long time? Think of the microdots way back when, certainly in rural world war two and on, they were very popular there's techniques to encrypt data and embedded in a photograph and make it almost impossible to detect. So again they're not going to get to do what they're hoping to do. [00:37:18] And I think that's an important thing for everybody. Please pay close attention to, so they do want to get rid of end-to-end there's WhatsApp out there, which I don't really trust because it's owned by Facebook, but that's supposedly end to end. There's end to end encryption on apple. I message. Although. [00:37:38] Apparently, there are some ways to get into that. I think apple is now maintaining a secondary key that they can use to decrypt, but the back doors that the us has called for and other people have called for. I have been pushed back by companies like apple CEO, Tim cook, oppose the government mandated back doors. [00:38:01] Of course, apple got a major backlash from security experts when in veiled, a plan to how I phones and other devices, scan user photos for child sexual abuse images. That's what I was referring to earlier. And apple put that plan on hold and promised to make changes. But this is apple all over again. And it's hard to say what's the least privacy intrusive way, because if the ISP can read them all, if the company that's providing new with the app that you're using to send the message. [00:38:34] I can read them all, how much privacy is there and if they can read it, who else can read it and what can be done with it? Blackmail has happened many times in the past because someone got their hands on something. So what happens when a Congressman or the military or someone in the military uses that's another problem. [00:38:54] Because if we don't know the way the encryption is being used or is made just like, was true with a clipper chip. And then we move on to the next step, which is okay. So what do we do now with this data that we're storing? Are they going to keep that data confidential? Can they keep it out of the hands of the criminals. [00:39:17] We've certainly found that they just haven't been able to. And if you're talking about grooming, which is what the European union wants. In other words, someone that's trying to get a child to the point where they're doing something that would be important. You've got two. Look at all of the messages, you have to have them analyze by some sort of an AI artificial intelligence, and then ultimately analyzed by people. [00:39:42] It's just going to get worse and worse. This is the most sophisticated mass surveillance machinery. That has ever been deployed outside of China in the USSR. It's absolutely incredible when you look at it from a crypto graphic standpoint. And again, we understand protecting the children. We all want to do that, but how far will this end up going? [00:40:06] I also want to point out that. Nu insider show notes that I've been sending out over the last few weeks have had some amazing responses from people. I've had people saying that this is what they look for in their mailbox. It's the first piece of email they read that it's the most relevant news. But you can only get it one way and that's by going to Craig peterson.com, you can sign up there. [00:40:33] It's easy enough to do. There's no obligation on your part, right? This is not my paid newsletter. This is absolutely free. And it's incredibly valuable. Plus I'll also be sending you once a week. Ish, a small training, just, it takes you a few minutes to read. I just last week went through the firewall in your windows machine, the firewall. [00:40:56] And gave you step-by-step instructions. Is it turned on? What is it doing? What should it do? How do you turn it on and how do you use it? So you can only get that one way and that's, if you are on my email list, so it's important to be there. And if you have any questions, you can hit reply. Any of those emails where there's a training, or if it's the insider show notes, just hit reply. [00:41:22] And I'll go ahead and answer your question. You might have to wait a few days cause I can get pretty busy sometimes, but always answer. So me M e@craigpeterson.com. Anybody can send me email and you can also text me at 6 1 7 503 2 2 1 6 1 7 5. 3, 2, 2, 1 with any questions? That's it for right now, there is so much more. [00:41:51] Make sure you sign up right now. And of course there's more coming right up. So stick around. . [00:42:04] Jam packed today. We're going to start with non fungible tokens. If you don't know what those are, this is a very big deal because so many people are investing in them right now. Are they really investments? I've got a bit of a blow back here. Most people think that Bitcoin is anonymous. We're going to talk about how it absolutely is not. [00:42:24] We're going to talk about anonymous. In fact, the Russians, Microsoft, what they're doing against the Russians and this little comedic thing about cars. [00:42:32] NFTs or very big deal. [00:42:34] I'm going to pull up here on my screen right now. This is a picture of Mr. Jack Dorsey. We'll go full screen, an article from a website called CoinDesk. CoinDesk is one of these sites that really tries to track what's happening out there in the Bitcoin community. Of course, nowadays it's much more than Bitcoin. [00:42:57] Isn't it? We're talking about all kinds of. Different currencies that have a blockchain backend. They're called cryptocurrencies basically. But the big one was of course, Bitcoin. And there is a whole concept. Now, when we're talking about things like cryptocurrencies and these non fungible tokens. People have been investing them in them. [00:43:23] Like crazy people are making millions of dollars every week. Now, remember, I am not an investment advisor and particularly I'm not your investment advisor. So take all the. To your investment advisor. I'm not telling you to buy them. I am telling you to be cautious here though, because these non fungible tokens are designed to give you the ability to be able to just, own something in the digital world. [00:43:52] What might you own in the digital world? We've had a lot of different stuff. We've seen some just crazy monkey things. Have you seen those, these little pictures of monkeys there? Graphic designed and it's all animated. If you will. It's like cartoons and people pay money for them. One of the things that people paid money for was the rights to the first tweet ever on Twitter. [00:44:20] So that's what you're getting. When we're talking about an NFT on a non fungible transaction, it is now yours. So this particular NFT we're talking about was of our friend here, Jack Dorsey. We'll pull it up again, this article, and he had a tweet that was sold last year for $48 million. That is a lot of money. [00:44:47] So people look at this as an investment, but it's not the same as hanging art on the wall. You've got a Picasso that has some intrinsic value. It's a painting. It has all the oil paint on that, it was designed by and painted by a crazy man years ago. And you can take that Picasso and you can. [00:45:11] Turn it around and sell it. It has some real value. If you own the rights to something, let's say it's one of these monkey pictures. It reminds me of a postage stamp and you paid real money for it. Some of these things are going, as I said, for over a million dollars and this Jack Dorsey first tweet went for $48 million. [00:45:31] So let's say that's what you did, right? You bought this thing for $48 million. Really? What do you have? Because anybody can go online and look at that tweet. Anybody can print it up and stick it on a wall. Anybody can go out and get that picture of the monkeys right there. The guy drew, and you can look at it. [00:45:54] In fact, I can pull it up right now, if you want to do. But people paid real money for that. So they've got what really? What do they have? You can't take it off the wall, like you're Picasso and salad, right? Or Banksy, if you're into the more modern art, it's just not. What is doable? How do you make this work? [00:46:15] Only the NFT only gives you bragging rights in reality. That's what it does. You have bragging rights because you could take that digital picture and make a hundred quadrillion copies. Yeah, you'd still own the NFT you would still have in the blockchain for whatever NFT company you're using the rights to it. [00:46:41] They would say this, you owned it. So let's talk about the blockchain behind it. There are a lot of companies that are trying to give you that. Okay. All right. I get it. Yeah, I get to to own it. But who's running the blockchain behind it. Who's validating that you own it with Bitcoin and many of these other blockchain currencies that are out there. [00:47:08] There are various. Companies and individuals who are registered, who have all of the paperwork, if you will saying who owns, how much of what, and who paid, who and everything. And that by the way, is why it takes so long for some of these Bitcoin and other transactions to occur. But how about the NFT? There are tons of companies out there that say they will certify the NFT. [00:47:38] So it gets to be real problem. And when we get into this Jack Dorsey tweet and this article about it, which are let me pull it up again here for you guys. This guy Sina bought the very first tweet ever from Twitter founder, Jack Dorsey for $2.9 million last year. And he decided that he wanted to sell it. [00:48:07] So he listed it for sale again at $48 million last week. Real. He put it up for open bid and this article and CoinDesk is talking about that. And you can see that if you're watching me on rumble or YouTube, I'm showing you my screen here right now. But this Iranian born crypto entrepreneur named of again. [00:48:32] As TAVI purchased it for $2.9 million in March, 2021. Last Thursday, he announced on Twitter where out, that he wanted to sell this and Ft. And he said, Hey, listen, I'm going to put 50% of the proceeds to charity while the auction closed. This was an open auction. People could go and bid on it and head auction closed. [00:49:00] With a, an offer of basically $288, $277 at current prices when this article was written $277 and the lowest bid was $6. And as I recall, this is not in this article, but there were only. I handful of bids. Like when I say handful, I mean a half a dozen beds. Crazy. This is a real problem because the deadline is over. [00:49:31] He paid how much for it, right? How much did he pay? Pull that up again. $2.9 million last year. And his highest bid was in the neighborhood of $280. Isn't that crazy. So did he get money on this? Did he win money on this? I don't know. I'm looking at those saying is it worth it to buy something like that? [00:49:59] That you might think, oh, the very first apple computer, an apple. While that's going to be worth some serious money. Yeah, it is. It's something, you can grab onto, you can hold onto it, it's something and you can sell it. You can trade it. You can take a picture of it. You can't make digital copies of it. [00:50:20] You, you, it's a physical thing. That's worth something. Same thing with that Picasso on the wall, it's really worth something that has some basic intrinsic. Jack's true tweet. The very first tweet. How much is that thing worth? It basically nothing. So the tweet is showing he'll pull it up on the screen again that he's selling ad Jack 2000 6 0 3 21 at eight 50 14:00 PM. [00:50:50] Just setting up my Twitter. So there you go. There's Jack is very first to. And it's absolutely amazing. Is it worth it? Let me pull up some other stuff here for you guys. I'm going to pull this up here is Coinbase launching an NFT marketplace in hopes of appealing to crypto on mainstream users. So here's some examples from a man and FTEs. [00:51:16] I'm going to zoom in on this for those of you guys watching on rumble or on Twitter. All right. Mean. Yeah actually you can see it on Twitter too, but YouTube, here you go. Here's some NFTs it's artwork and it's a creature. So you can buy creature number 7, 8 0 6 right now for six Eve. So let me see. [00:51:39] Value of six. Ethereum is what ether, M two us dollars. So for 3000. And $84. As of right now, you can get a crappy picture that even I could have draw okay. Of this guy and look at all of the work this artist has put in. There's how many of these up here? 1, 2, 3, 4, or five, 10 of them. And it's the same head. [00:52:08] Each time it looks like this almost the same eyes. He changes colors and he's got different background. It's absolutely not. So that's what they're trying to do right now, trying to sell these NFT. So who's going to buy that. Who's going to pay $3,000 for artwork that hunter Biden could have done with a straw. [00:52:30] Anchored around. Here's another one. This is from ledger insights. NBA's launching dynamic NFTs for fans, baseball cards for the NBA that are basically just worthless. They're NF. Non fungible tokens. It has taken the crypto world by storm and people are losing millions as you look, but it really is changing the e-commerce world. [00:52:58] Stick around. We'll be right back. [00:53:02] Bitcoin blockchain. All of the rage, a lot of people are talking about it, but I got to say most people who are talking. I don't know much about it. And when it comes to anonymity, Bitcoin is probably the worst thing you could possibly do. It's amazing. [00:53:20] There are a lot of misconceptions out there when it comes to technology, you have almost any kind of technology and blockchain and Bitcoin are examples of a very misunderstood technology. [00:53:35] Now I'm not talking about how does it work? How are these ledgers maintained? How does this whole mining thing work? Why has Chan. Bandit. Why are a lot of countries going away from it, one country. Now the dictator said, yeah, we're going to use Bitcoin as our we're official currency. In addition to the U S dollar what's going on. [00:53:57] It is complicated behind the scenes. It's complicated to use. Although there are some entrepreneurs that have made some great strides there. I saw a documentary on what has been happening in that one country. I mentioned. They are able to pay in us dollars using Bitcoin. So they'll go up to a vendor on the street. [00:54:22] Quite literally they'll have their smartphone with them. The vendor has their smartphone. They type in 15 cents for the taco and a hit send. It goes to the other person and they have 15 cents worth of Bitcoin. By the way, these types of micro-transactions with the way Bitcoin is structured behind the scenes, make things even less manageable in the Bitcoin world than they have been in the past. [00:54:50] And that's why in case you didn't know, Bitcoin is making some major changes here fairly soon. They've got to change the way all of this ledger stuff works because it takes too long. To record and authorized transactions. And these ledgers just get way too long when it comes to all of these kinds of microtransaction. [00:55:14] So there's stuff going on, Bitcoin, there, there are many of these types of currencies out there. Theories comes one. You've heard about doge coin because of course that's Elon Musk has been talking about and many others and they're all different somewhat, but the main concepts are the. One of the big concepts, I'm going to pull an article up here on the screen for those watching on YouTube or also on rumble. [00:55:39] But this is an article from our friends at wired magazine. And now you have subscribed to wired for many years. This particular one is about what wired is calling the crypto. Trap now that's a very big deal. It is a trap and it's a trap and a lot of different ways. And that's what we're going to talk about right now. [00:56:05] Crypto is not what its name implies. A lot of people look at it and say, oh, crypto that's cryptography. That's like the German enigma machine in world war two and all of this new, great crypto that we have nowadays. And there are some pretty amazing new cryptographic technologies that we've been using, but no, that's not. [00:56:26] What's really going on. You see the basic premise behind all of these technologies is the concept of having a. And this wallet has a unique identifier. It has a number assigned to it. So if I'm sending money to you, I'm going to have your wallet, ID, your wallet number, and I'm going to now send you some amount of fraction, most likely of a cryptocurrency. [00:56:55] It's certainly if it's Bitcoin, it's almost certainly a fraction. And so I'm going to send you $100 worth of, let's say. What ends up happening now is these ledgers, which are public, are all going to record the Craig's sent you a hundred dollars worth of Bitcoin. Of course, it's going to be in a fraction of a Bitcoin. [00:57:16] So sometimes there's rounding errors is not going to be really exactly a hundred dollars. Plus there's the amazing amount of. Tivoli volatility in the cyber currencies. So even though I meant just hitting a hundred dollars, mine ended up being 110 of it goes up. It might be 90. If it goes down you get that. [00:57:34] You don't understand how that works. So the problem now is I have sent you a hundred dollars. And public ledgers that anyone can gain access to now say wallet number 1, 2, 3, 4 cent, a hundred dollars, two wallet, number 5, 6, 7, 8. Obviously the wallet numbers bruises a lot longer than that. So then it's fine. [00:57:58] And there's a degree of anonymity there it's really called pseudo anonymity because in reality, it's not completely anonymous because people know the transaction occurred and they know the wallet numbers. Correct. It's like a bank account, and if I'm putting money into your bank account, that bank account number knows that the money came from a check that I wrote. [00:58:21] Can you imagine that someone writing a check and that check I had a number on it, a bank account number, right? So it can all be tracked while much. The same thing is true when it comes to cryptocurrencies, these cryptocurrencies are in public ledgers and those public ledgers can be used with a little bit of work to figure out. [00:58:42] Who you are. So this article here from our friends at wired gets really hairy. And it might be of interest to you to read, but this is talking about a take-down that happened, and this is a massive take down. This take down was of a whole group of people who were involved in some really nasty stuff. [00:59:09] In this particular case, what it was kitty. Just a terrible thing and the abuse surrounding it. So this logical goes into not a lot of detail. I'm not going to read it because here on the air, because I don't want to upset too many people. Cause it's some of the details of this evening to think about them are incredible. [00:59:29] But. This the police broke into this middle-class suburb home in the outskirts of Atlanta. And he there was Homeland security. It was a guy from the IRS and they came in, they took all of their electronic devices. They separated the family, putting the father who is an assistant principal at the local high school assistant printers. [00:59:57] And he was the target of this investigation. So they had him in one room, they had his wife and another room and they put the two kids into a third room and they started questioning him. Now, this is part of a takedown of a, as I said, a whole ring of these people, including this assistant. Principal at a school. [01:00:20] Can you believe that? So this IRS guy had flown in from Washington DC to have a look over what was going on, but this agent from the IRS and his partner whose name is let's see, his name was Jenn S Scouts. I probably got that wrong. And Tigran GAM bar Yan, Cambodian, and they had a small group of investigators and they were at a whole bunch of different federal agencies, not just the IRS. [01:00:48] What once seemed to be. Untraceable was no longer traceable. Now I've talked on this show before about a lecture I went to by the secret service about how they had tracked down and shut down the world's largest website that was being used to sell illegal materials online. And it's fascinating what they did. [01:01:12] But frankly, they're calling this particular boss to proof of concept and that's why they are IRS was in on this as well, but it was huge. Here's a quote from the IRS agent in this wired magazine article. He's saying he remembers how the gravity of this whole thing. Let me pull this up on the screen too. [01:01:32] So you can read along here, but this was a high school administrator, a husband, and a father of two, whether he was guilty or innocent. The accusations, this team of law enforcement agents were leveling against him. There are mere presence in the home would almost certainly ruin his life. And he, as well as these other people were counting on anonymity from Bitcoin. [01:01:59] Now, obviously I'm glad they got taken down, but listen, folks, if you think that it's safe, that it's anonymous, it ain't Bitcoin just ain't there. Craig peterson.com stick around. [01:02:15] I've been blamed for really complaining about people not updating their software. And that includes things like firewalls. The FBI has stepped in and they are going ahead and doing updates for you. [01:02:30] So once you get into this, because this is, I think something that should concern all of us, what should we be doing as a country? [01:02:40] People are. Updating their software. They're not updating their hardware. And particularly our hardware take a look at what's been happening with the firewalls and the firewall concerns. Everybody has some sort of firewall will almost everybody, but enough people that we can say, everybody has a firewall, you get your internet from you, name it. [01:03:05] And because of the fact they're using something called Nat network address translation, they've got some sort of firewall in front of you. So for instance, You've got your phone, right? You're using your phone and it's got internet on it. You're going through whoever your carrier is. And that carrier is giving you internet access, right? [01:03:28] They don't have enough IP addresses, particularly IPV four, in order for you to get your very own unique little address out on the. No they do. When it comes to V6 things a little bit different, but your device is not completely exposed on the internet. Windows comes to the fire. And by default, the windows firewall is turned on. [01:03:50] Now this gets more than a little concerning because that firewall that's turned on. Isn't really doing anything because I've got a firewall turned on and yet every service is accessible from outside, which is defeating the purpose of the firewall. Again, it's a complaint I've had about Microsoft now for. [01:04:10] Decades, which is they have features that are just check boxes. Yes. Yes. It's got a firewall. Yeah, it's turned on, but the features don't work. So having a firewall and having everything open defeats the purpose of a firewall max do not have a firewall turned on by default, but they do have their services disabled. [01:04:33] Which is just as effective if not more effective. So one of the things we advise people to do is go into your windows system, into the firewalls and your security settings, and turn off any services that you're not using. If you're not sharing file systems, then turn that off. In other words, You're mounting the G drive or whatever you might call it from another computer, then you don't need it. [01:04:59] If you're not as server for what's called SMB, then you don't need to share it. So turn off everything that you don't need. That's going to happen is one of your programs isn't going to work, right? And the, what you did last year, you're going to turn it back on and you can do a lot of research online to find out what they are. [01:05:18] We have over 200 settings that we change in windows. When we get a customer. Now on the Mac side, you can turn it on. I liked turning it on. I liked turning off the ability to see my machine. So in other words, the ability to be able to. So I turned it on and I enable specific services. And again, you can do some research on that. [01:05:44] I've got an improving windows security course that people have taken, and we should probably do that again, if not just have some free webinars on how to do this. So you guys can learn how to do it, but not that hard to do. Anyhow, bottom line is. People aren't updating their computers, even the Macs and windows. [01:06:06] We have a client that would just started a new client and we're tightening things up and we've been finding Mac computers that are major multiple major revisions behind. And that to me is shocking. Apple Macs are just so easy to update. It is extremely rare that an apple update will make your computer break unlike in the windows world, where it's pretty common. [01:06:32] So windows guys, I can understand, but your even more exposed, your bigger target, you need to keep up to date. So how about all of the other equipment that we. I've had warnings again and again, with you guys about what's happening with our smart devices that are out there, right? Our security cameras we have up in the corner, right? [01:06:56] We have these smart thermostats, people are using the list goes on and on of all of this equipment that we're using that is exposing us because when was the last time you have. How about the firmware in your router or your wifi, right? Some of the devices that I recommend to people, and if you have any questions, just email me M e@craigpeterson.com. [01:07:19] I can give you recommendations, even if you're a home user. Although my business obviously is working with businesses on what kind of wifi to buy, what you should get, what you should do. I don't charge for any of that stuff. Okay. You get it. But you have to ask. Me@craigpeterson.com. So you get this information and you go ahead and you buy whatever it is, but you don't keep it up to date, which is why I tend to only recommend stuff that automatically updates. [01:07:48] But that also means every few years you're going to have to replace it because unless you're using the good Cisco equipment where you can get a seven year life out of it you're not gonna find that in consumer grid. So what's happened here. I'm going to pull this up on my screen for people watching this on YouTube or on rumble. [01:08:07] But here is a thing that came straight out of our friends here from the FBI. This is from CSO. This is a a magazine that I do follow. But they're talking about what they call psych clock. Blink. So the article says for the second time in a year, the FBI has used search and seizure warrant to clean malware from devices owned by private businesses and users without their explicit approval. [01:08:40] The FBI used this approach to disrupt a botnet, believed to be the creation of right. Government hackers. So the calling this SYEP clock cycle clubs, blink malware discovered earlier this year. So here's the problem. What do you do if you're the federal government, how do you try and keep your country safe? [01:09:05] Now we know. We've got these military contractors. They make missiles that take out missiles, right? The provide defensive systems. You've heard of iron dome from years ago, all the way through all of the current stuff. That's what they do, but what do they do? What can they do when there's a botnet? A botnet is where there are multiple computers in this case, probably tens of thousands of computers located in the United States that are acting like sleeper. [01:09:36] They sit there and they wait for commands as to what they should do. Should they try and attack a machine? Should they try and spread more? Malware, what should they be doing? And the, these things are vicious. They are absolutely nasty. And in this case, we're looking at Russian malware. So Russia effectively like the Americans. [01:09:59] You might remember that TV show. It was great show, but that. Computers that are owned by you and me and our businesses and government agencies that are under the control of the Russians. Now you don't even know it. You're using your computer or you're playing games. You're going to Facebook, whatever it is you do on your computer. [01:10:20] Your computer is under command and control of the Russians. So the FBI goes to a court and says, Hey, we've got to go ahead and shut this down. We need a warrant. They get the warrant and the search and seizure warrant lets them now. Get on to these machines that are part of the bot net or the controlling machines for the bot net, and either remove the malware or go ahead and take control of the botnet themselves. [01:10:49] So it can't be used. And by the way, our friends at Microsoft they've gotten involved in this too, which is really frankly, cool in shutting down some of these botnets, Hey, I want to encourage everyone. Take a couple of minutes, go to Craig peterson.com/subscribe. That's Craig Peterson. CREI G P T R S O N. [01:11:12] And subscribe, and I'll be sending you a special report on passwords. Plus two more. I send out the most popular special reports that anybody has ever asked for. [01:11:25] Hey, I've got a little bit more to discuss on what's happening with Russia and Microsoft and more, but I'm also going to talk about QR codes. There is a great explanation. That's in your newsletter from Monday about why you shouldn't trust him. [01:11:41] Let's finish up this Russian thing. And then we're going to get into why you cannot trust QR codes and a brand new way. [01:11:51] The bad guys are using QR codes to really mess with us. Now, if you're watching over on either YouTube or on rumble, you'll see this. Let me pull up my screen for you. But here we go. Okay. This is very interesting. Then the last segment, we talked a little bit about what our friends over at the FBI had been doing, which is they have been removing malware from people's computers because people haven't been keeping their computers up-to-date right. [01:12:26] Part of the botnets. So we explained. At the FBI, isn't the only one out there trying to stop these Russians and the hackers anonymous has been very big at it. In fact, let me pull up this other article. This is from security affairs. And here we go. And it's talking about this whole army of these anonymous hackers. [01:12:50] Now none of us have been a nightmare for many businesses that they didn't like. I had an anonymous we'll go ahead and they'll do usually pretty basic stuff. They'll do denial of service attacks and some other things, so they don't like you because of. The don't say gay bill in Florida, and, without bothering to do any research, they'll just start attacking organizations that support it, or organizations that don't support it depending on how they want to do it. So this is an interesting article here, because it's talking about these various. Websites that they've hacked. Now, some of them are government site and some of them are private industries. Now, one of the cool things, bad things about hacking private industry and releasing the emails is now the competitors to these businesses know what they're doing. [01:13:46] And in some cases there's proprietary technology that's being released. Now, when it comes to Russian proprietary technology. The Western world doesn't care a whole lot about some of it, but here's some examples of what these hacktivists of GoDaddy. This is a company called forest 37,000 emails stolen from the company, Russian logging and wood manufacturing firm. [01:14:09] Again, it would give a little bit of an idea into the whole Russian, what are they doing? In the forest industry. This one, I think is a little more concerning for the Russians Aero gap. This is an engineering company that focuses in the oil and gas industry. Their clients include a whole bunch of Russian companies. [01:14:30] They've leaked approximately 100,000 emails from Aero gas. That is a huge deal because so much of the country's revenue, the number one industry in Russia is oil and gas. Petro Fort one of the largest office space and business centers in St. Petersburg, the hackers have leaked approximately 300,000 emails from Petro fork. [01:14:56] Again, you can use that to find out what's happening in your economy. What. Doing how are businesses doing? Are they going to go under so you can see some tweets here. I've got them up on my screen on YouTube and rumble anonymous. What they're saying that they've done and you can follow anonymous directly on Twitter. [01:15:14] Particularly fond of them. They've done a lot of things that I disagree with. This is really telling us about a whole new approach to warfare, right back in the day, you and I couldn't get involved, we could potentially take up arms and go and fight right there and think about the Spanish American war. [01:15:33] Think about what's happening now in Ukraine, where Americans have just gone over there. Taken up firearms in order to help them defend Ukraine. People who are maybe of Ukrainian descent, maybe not right. We have never seen this type of involvement by average citizens because anonymous is not like some big fancy company or government agency anonymous is a bunch of people who are trying to be anonymous and do something. [01:16:05] So they stole 145 gigabytes. Look at this. It's just crazy. So here. The anonymous Twitter thread itself, right? Talking about what. It's absolutely incredible. Incredible. So that's what anonymous is up to. They are hacking Russia and they're hacking Russia in a big way. Now, next stop. We have our friends at Microsoft. [01:16:30] Microsoft has been seizing Russian domains that they are accusing of having been linked to these Russian hackers that have been going after think tanks and government agencies in the U S and the. He kn
Did You Hear About the Latest Rip-Off? Non-Fungible Tokens (NFTs) Are Already Losing Steam! [10:54] How Law Enforcement Tracks Bitcoin! It is Absolutely NOT Anonymous [20:05] The FBI Is Actively Removing Malware From Private Machines -- Without The Owner's Permission [29:10] Why and When You Shouldn't Trust QR Codes [41:08] Cybercrime in Russia Tracked to a Single Office Building in Moscow! [52:29] The Newest Phishing Scams [01:01:32] Using Wordpress? How Supply Chain Attacks are Hurting Your Business Website [01:10:43] Cybersecurity Tools You Should Be Using! Jam packed today. We're going to start with non fungible tokens. If you don't know what those are, this is a very big deal because so many people are investing in them right now. Are they really investments? I've got a bit of a blow back here. Most people think that Bitcoin is anonymous. We're going to talk about how it absolutely is not. [00:00:20] We're going to talk about anonymous. In fact, the Russians, Microsoft, what they're doing against the Russians and this little comedic thing about cars. [00:00:28] NFTs are very big deal. [00:00:31] I'm going to pull up here on my screen right now. This is a picture of Mr. Jack Dorsey. We'll go full screen, an article from a website called CoinDesk. CoinDesk is one of these sites that really tries to track what's happening out there in the Bitcoin community. Of course, nowadays it's much more than Bitcoin. [00:00:53] Isn't it? We're talking about all kinds of. Different currencies that have a blockchain backend. They're called cryptocurrencies basically. But the big one was of course, Bitcoin. And there is a whole concept. Now, when we're talking about things like cryptocurrencies and these non fungible tokens. People have been investing them in them. [00:01:19] Like crazy people are making millions of dollars every week. Now, remember, I am not an investment advisor and particularly I'm not your investment advisor. So take all the. To your investment advisor. I'm not telling you to buy them. I am telling you to be cautious here though, because these non fungible tokens are designed to give you the ability to be able to just, own something in the digital world. [00:01:48] What might you own in the digital world? We've had a lot of different stuff. We've seen some just crazy monkey things. Have you seen those? These little pictures of monkeys are. Graphic designed and it's all animated. If you will. It's like cartoons and people pay money for them. One of the things that people paid money for was the rights to the first tweet ever on Twitter. [00:02:16] So that's what you're getting. When we're talking about an NFT on a non fungible transaction, it is now yours. So this particular NFT we're talking about was of our friend here, Jack Dorsey. We'll pull it up again, this article, and he had a tweet that was sold last year for $48 million. That is a lot of money. [00:02:43] So people look at this as an investment, but it's not the same as hanging art on the wall. You've got a Picasso that has some intrinsic value. It's a painting. It has all the oil paint on that, it was designed by and painted by a crazy man years ago. And you can take that Picasso and you can. [00:03:07] Turn it around and sell it. It has some real value. If you own the rights to something, let's say it's one of these monkey pictures. It reminds me of a postage stamp and you paid real money for it. Some of these things are going, as I said, for over a million dollars and this Jack Dorsey first tweet went for $48 million. [00:03:27] So let's say that's what you did, right? You bought this thing for $48 million. Really? What do you have? Because anybody can go online and look at that tweet. Anybody can print it up and stick it on a wall. Anybody can go out and get that picture of the monkeys right there. The guy drew, and you can look at it. [00:03:51] In fact, I can pull it up right now, if you want to do. But people paid real money for that. So they've got what really? What do they have? You can't take it off the wall, like you're Picasso and salad, right? Or Banksy, if you're into the more modern art, it's just not. What is doable? How do you make this work? [00:04:12] Only the NFT only gives you bragging rights in reality. That's what it does. You have bragging rights because you could take that digital picture and make a hundred quadrillion copies. Yeah, you'd still own the NFT you would still have in the blockchain for whatever NFT company you're using the rights to it. [00:04:37] They would say this, you owned it. So let's talk about the blockchain behind it. There are a lot of companies that are trying to give you that. Okay. All right. I get it. Yeah, I get to to own it. But who's running the blockchain behind it. Who's validating that you own it with Bitcoin and many of these other blockchain currencies that are out there. [00:05:04] There are various. Companies and individuals who are registered, who have all of the paperwork, if you will saying who owns, how much of what, and who paid, who and everything. And that by the way, is why it takes so long for some of these Bitcoin and other transactions to occur. But how about the NFT? There are tons of companies out there that say they will certify the NFT. [00:05:34] So it gets to be real problem. And when we get into this Jack Dorsey tweet and this article about it, which are will, let me pull it up again here for you guys. This guy, Sina S bought the very first tweet ever from Twitter founder, Jack Dorsey for $2.9 million last year. And he decided that he wanted to sell it. [00:06:03] So he listed it for sale again at $48 million last week. Real. He put it up for open bid and this article and CoinDesk is talking about that. And you can see that if you're watching me on rumble or YouTube, I'm showing you my screen here right now. But this Iranian born crypto entrepreneur named of again. [00:06:28] As TAVI purchased it for $2.9 million in March, 2021. Last Thursday, he announced on Twitter where out, that he wanted to sell this and Ft. And he said, Hey, listen, I'm going to put 50% of the proceeds to charity. The auction closed, this was an open auction. People could go and bid on it and head auction closed. [00:06:55] With an offer of basically $288, $277 at current prices when this article was written $277 and the lowest bid was $6. And as I recall, this is not in this article, but there were only. I handful of bids. Like when I say handful, I mean a half a dozen beds. Crazy. This is a real problem because the deadline is over. [00:07:27] He paid how much for it, right? How much did he pay? Pull that up again. $2.9 million last year. And his highest bid was in the neighborhood of $280. Isn't that crazy. So did he get money on this? Did he win money on this? I don't know. I'm looking at those saying is it worth it to buy something like that? [00:07:54] That you might think, oh, the very first apple computer, an apple. While that's going to be worth some serious money. Yeah, it is. It's something, you can grab onto, you can hold onto it, it's something and you can sell it. You can trade it. You can take a picture of it. You can't make digital copies of it. [00:08:15] You, you, it's a physical thing. That's worth something. Same thing with that Picasso on the wall, it's really worth something that has some basic intrinsic value. Jack's true tweet. The very first tweet. How much is that thing worth? It basically nothing. So the tweet is showing he'll pull it up on the screen again that he's selling ad Jack 2000 6 0 3 21 at eight 50 14:00 PM. [00:08:46] Just setting up my Twitter. So there you go. There's Jack is very first to. And it's absolutely amazing. Is it worth it? Let me pull up some other stuff here for you guys. I'm going to pull this up here is Coinbase launching an NFT marketplace in hopes of appealing to crypto on mainstream users. So here's some examples from a man and FTEs. [00:09:11] I'm going to zoom in on this for those of you guys watching on rumble or on Twitter. All right. Mean. Yeah actually you can see it on Twitter too, but YouTube, here you go. Here's some NFTs it's artwork and it's a creature. So you can buy creature number 7, 8 0 6 right now for six Eve. So let me see. [00:09:34] Value of six. Ethereum is what ether, M two us dollars. So for 3000. And $84. As of right now, you can get a crappy picture that even I could have draw okay. Of this guy and look at all of the work this artist has put in. There's how many of these up here? 1, 2, 3, 4, or five, 10 of them. And it's the same head. [00:10:03] Each time it looks like this almost the same eyes. He changes colors and he's got different background. It's absolutely not. So that's what they're trying to do right now, trying to sell these NFT. So who's going to buy that. Who's going to pay $3,000 for artwork that hunter Biden could have done with a straw. [00:10:25] Anchored around. Here's another one. This is from ledger insights. NBA's launching dynamic NFTs for fans, baseball cards for the NBA that are basically just worthless. They're NF. Non fungible tokens. It has taken the crypto world by storm and people are losing millions as you look, but it really is changing the e-commerce world. [00:10:54] Bitcoin blockchain. All of the rage, a lot of people are talking about it, but I got to say most people who are talking. I don't know much about it. And when it comes to anonymity, Bitcoin is probably the worst thing you could possibly do. It's amazing. [00:11:12] There are a lot of misconceptions out there when it comes to technology, you have almost any kind of technology and blockchain and Bitcoin are examples of a very misunderstood technology. [00:11:25] Now I'm not talking about how does it work? How are these ledgers maintained? How does this whole mining thing work? Why has Chan. Bandit. Why are a lot of countries going away from it, one country. Now the dictator said, yeah, we're going to use Bitcoin as our we're official currency. In addition to the U S dollar what's going on. [00:11:48] It is complicated behind the scenes. It's complicated to use. Although there are some entrepreneurs that have made some great strides there. I saw a documentary on what has been happening in that one country. I mentioned. They are able to pay in us dollars using Bitcoin. So they'll go up to a vendor on the street. [00:12:13] Quite literally they'll have their smartphone with them. The vendor has their smartphone. They type in 15 cents for the taco and a hit send. It goes to the other person and they have 15 cents worth of Bitcoin. By the way, these types of micro-transactions with the way Bitcoin is structured behind the scenes, make things even less manageable in the Bitcoin world than they have been in the past. [00:12:40] And that's why in case you didn't know, Bitcoin is making some major changes here fairly soon. They've got to change the way all of this ledger stuff works because it takes too long. To record and authorized transactions. And these ledgers just get way too long when it comes to all of these kinds of microtransaction. [00:13:04] So there's stuff going on, Bitcoin, there, there are many of these types of currencies out there. Theories comes one. You've heard about doge coin because of course that's Elon Musk has been talking about and many others and they're all different somewhat, but the main concepts are the. One of the big concepts, I'm going to pull an article up here on the screen for those watching on YouTube or also on rumble. [00:13:30] But this is an article from our friends at wired magazine. And now you have subscribed to wired for many years. This particular one is about what wired is calling the crypto. Trap now that's a very big deal. It is a trap and it's a trap and a lot of different ways. And that's what we're going to talk about right now. [00:13:56] Crypto is not what its name implies. A lot of people look at it and say, oh, crypto that's cryptography. That's like the German enigma machine in world war two and all of this new, great crypto that we have nowadays. And there are some pretty amazing new cryptographic technologies that we've been using, but no, that's not. [00:14:17] What's really going on. You see the basic premise behind all of these technologies is the concept of having a. And this wallet has a unique identifier. It has a number assigned to it. So if I'm sending money to you, I'm going to have your wallet, ID, your wallet number, and I'm going to now send you some amount of fraction, most likely of a cryptocurrency and it's certainly if it's Bitcoin, it's almost certainly a fraction. [00:14:49] And so I'm going to send you $100 worth of, let's say. What ends up happening now is these ledgers, which are public, are all going to record the Craig's sent you a hundred dollars worth of Bitcoin. Of course, it's going to be in a fraction of a Bitcoin. So sometimes there's rounding errors is not going to be really exactly a hundred dollars. [00:15:12] Plus there's the amazing amount of. Tivoli volatility in the cyber currencies. So even though I meant just hitting a hundred dollars, mine ended up being 110 of it goes up. It might be 90. If it goes down you get that. You don't understand how that works. So the problem now is I have sent you a hundred dollars. [00:15:33] And public ledgers that anyone can gain access to now say wallet number 1, 2, 3, 4 cent, a hundred dollars, two wallet, number 5, 6, 7, 8. Obviously the wallet, our bruises, a lot longer than that. So then it's fine. And there's a degree of anonymity there it's really called pseudo anonymity because in reality, it's not completely anonymous because people know the transaction occurred and they know the wallet numbers. [00:16:03] Correct. It's like a bank account, and if I'm putting money into your bank account, that bank account number knows that the money came from a check that I wrote. Can you imagine that someone writing a check and that check I had a number on it, a bank account number, right? So it can all be tracked while much. [00:16:19] The same thing is true when it comes to cryptocurrencies, these cryptocurrencies are in public ledgers and those public ledgers can be used with a little bit of work to figure out. Who you are. So this article here from our friends at wired gets really hairy. And it might be of interest to you to read, but this is talking about a take-down that happened, and this is a massive take down. [00:16:51] This take down was of a whole group of people who were involved in some really nasty stuff. In this particular case, what it was kitty. Just a terrible thing and the abuse surrounding it. So this logical goes into not a lot of detail. I'm not going to read it because here on the air, because I don't want to upset too many people. [00:17:15] Cause it's some of the details of this evening to think about them are incredible. But. This the police broke into this middle-class suburb home in the outskirts of Atlanta. And he there was Homeland security. It was a guy from the IRS and they came in, they took all of their electronic devices. [00:17:38] They separated the family, putting the father who is an assistant principal at the local high school assistant printers. And he was the target of this investigation. So they had him in one room, they had his wife and another room and they put the two kids into a third room and they started questioning him. [00:18:00] Now, this is part of a takedown of a, as I said, a whole ring of these people, including this assistant. Principal at a school. Can you believe that? So this IRS guy had flown in from Washington DC to have a look over what was going on, but this agent from the IRS and his partner whose name is let's see, his name was Jenn S Scouts. [00:18:26] I probably got that wrong. And Tigran GAM bar Yan, Cambodian, and they had a small group of investigators and they were at a whole bunch of different federal agencies, not just the IRS. What once seemed to be. Untraceable was no longer untraceable. Now I've talked on this show before about a lecture I went to by the secret service about how they had tracked down and shut down the world's largest website that was being used to sell illegal materials online. [00:19:01] And it's fascinating what they did. But frankly, they're calling this particular boss to proof of concept and that's why they are IRS was in on this as well, but it was huge. Here's a quote from the IRS agent in this wired magazine article. He's saying he remembers how the gravity of this whole thing. [00:19:21] Let me pull this up on the screen too. So you can read along here, but this was a high school administrator, a husband, and a father of two, whether he was guilty or innocent. The accusations, this team of law enforcement agents were leveling against. There are mere presence in the home would almost certainly ruin his life. [00:19:44] And he, as well as these other people were counting on anonymity from Bitcoin. Now, obviously I'm glad they got taken down, but listen, folks, if you think that it's safe, that it's anonymous, it ain't Bitcoin just ain't there. Craig peterson.com stick around. [00:20:05] I've been blamed for really complaining about people not updating their software. And that includes things like firewalls. The FBI has stepped in and they are going ahead and doing updates for you. [00:20:21] What should we be doing as a country? [00:20:26] People are. Updating their software. They're not updating their hardware. And particularly our hardware take a look at what's been happening with the firewalls and the firewall concerns. Everybody has some sort of firewall will almost everybody, but enough people that we can say, everybody has a firewall, you get your internet from you, name it. [00:20:50] And because of the fact they're using something called Nat network address translation, they've got some sort of firewall in front of you. So for instance, You've got your phone, right? You're using your phone and it's got internet on it. You're going through whoever your carrier is. And that carrier is giving you internet access, right? [00:21:14] They don't have enough IP addresses, particularly IPV four, in order for you to get your very own unique little address out on the. No they do. When it comes to V6 things a little bit different, but your device is not completely exposed on the internet. Windows comes to the fire. And by default, the windows firewall is turned on. [00:21:35] Now this gets more than a little concerning because that firewall that's turned on. Isn't really doing anything because I've got a firewall turned on and yet every service is accessible from outside, which is defeating the purpose of the firewall. Again, it's a complaint I've had about Microsoft now for. [00:21:55] Decades, which is they have features that are just check boxes. Yes. Yes. It's got a firewall. Yeah, it's turned on, but the features don't work. So having a firewall and having everything open defeats the purpose of a firewall max do not have a firewall turned on by default, but they do have their services to say. [00:22:18] Which is just as effective if not more effective. So one of the things we advise people to do is go into your windows system, into the firewalls and your security settings, and turn off any services that you're not using. If you're not sharing file systems, then turn that off. In other words, You're mounting the G drive or whatever you might call it from another computer, then you don't need it. [00:22:44] If you're not as server for what's called SMB, then you don't need to share it. So turn off everything that you don't need. That's going to happen is one of your programs isn't going to work, right? And the, what you did last year, you're going to turn it back on and you can do a lot of research online to find out what they are. [00:23:04] We have over 200 settings that we change in windows. When we get a customer. Now on the Mac side, you can turn it on. I liked turning it on. I liked turning off the ability to see my machine. So in other words, the ability to be able to. So I turned it on and I enable specific services. And again, you can do some research on that. [00:23:30] I've got an improving windows security course that people have taken, and we should probably do that again, if not just have some free webinars on how to do this. So you guys can learn how to do it, but not that hard to do. Anyhow, bottom line is. People aren't updating their computers, even the Macs and windows. [00:23:51] We have a client that would just started a new client and we're tightening things up and we've been finding Mac computers that are major multiple major revisions behind. And that to me is shocking. Apple Macs are just so easy to update. It is extremely rare that an apple update will make your computer break unlike in the windows world, where it's pretty common. [00:24:17] So windows guys, I can understand, but your even more exposed, your bigger target, you need to keep up to date. So how about all of the other equipment that we. I've had warnings again and again, with you guys about what's happening with our smart devices that are out there, right? Our security cameras we have up in the corner, right? [00:24:41] We have these smart thermostats, people are using the list goes on and on of all of this equipment that we're using that is exposing us because when was the last time you have. How about the firmware in your router or your wifi, right? Some of the devices that I recommend to people, and if you have any questions, just email me and e@craigpeterson.com. [00:25:05] I can give you recommendations, even if you're a home user. Although my business obviously is working with businesses on what kind of wifi to buy, what you should get, what you should do. I don't charge for any of that stuff. Okay. You get it. But you have to ask. Me@craigpeterson.com. So you get this information and you go ahead and you buy whatever it is, but you don't keep it up to date, which is why I tend to only recommend stuff that automatically updates. [00:25:33] But that also means every few years you're going to have to replace it because unless you're using the good Cisco equipment where you can get a seven year life out of it you're not going to find that in consumer grid. So what's happened here. I'm going to pull this up on my screen for people watching this on YouTube or on rumble. [00:25:52] But here is a thing that came straight out of our friends here from the FBI. This is from CSO. This is a a magazine that I do follow. But they're talking about what they call psych clock. Blink. So the article says for the second time in a year, the FBI has used search and seizure warrant to clean malware from devices owned by private businesses and users without their explicit approval. [00:26:25] The FBI used this approach to disrupt a botnet, believed to be the creation of right. Government hackers. So the calling this SYEP clock cycle clubs, blink malware discovered earlier this year. So here's the problem. What do you do if you're the federal government, how do you try and keep your country safe? [00:26:51] Now we know. We've got these military contractors. They make missiles that take out missiles, right? The provide defensive systems. You've heard of iron dome from years ago, all the way through all of the current stuff. That's what they do, but what do they do? What can they do when there's a botnet? A botnet is where there are multiple computers in this case, probably tens of thousands of computers located in the United States that are acting like sleeper. [00:27:21] They sit there and they wait for commands as to what they should do. Should they try and attack a machine? Should they try and spread more? Malware, what should they be doing? And the, these things are vicious. They are absolutely nasty. And in this case, we're looking at Russian malware. So Russia effectively like the Americans. [00:27:44] You might remember that TV show. It was great show, but that. Computers that are owned by you and me and our businesses and government agencies that are under the control of the Russians. Now you don't even know it. You're using your computer. You're playing games. You're going to Facebook, whatever it is you do on your computer. [00:28:06] Your computer is under command and control of the Russians. So the FBI goes to a court and says, Hey, we've got to go ahead and shut this down. We need a warrant. They get the warrant and the search and seizure warrant lets them now. Get on to these machines that are part of the bot net or the controlling machines for the bot net, and either remove the malware or go ahead and take control of the botnet themselves. [00:28:34] So it can't be used. And by the way, our friends at Microsoft they've gotten involved in this too, which is really frankly, cool in shutting down some of these botnets, Hey, I want to encourage everyone. Take a couple of minutes, go to Craig peterson.com/subscribe. That's Craig Peterson. CREI G P T R S O N. [00:28:57] And subscribe, and I'll be sending you a special report on passwords. Plus two more. I send out the most popular special reports that anybody has ever asked for. [00:29:10] Hey, I've got a little bit more to discuss on what's happening with Russia and Microsoft and more, but I'm also going to talk about QR codes. There is a great explanation. That's in your newsletter from Monday about why you shouldn't trust 'em. [00:29:26] Let's finish up this Russian thing. And then we're going to get into why you cannot trust QR codes and a brand new way. [00:29:36] The bad guys are using QR codes to really mess with us. Now, if you're watching over on either YouTube or on rumble, you'll see this. Let me pull up my screen for you. But here we go. Okay. This is very interesting. Then the last segment, we talked a little bit about what our friends over at the FBI had been doing, which is they have been removing malware from people's computers because people haven't been keeping their computers up-to-date right. [00:30:11] Part of the botnets. So we explained. At the FBI, isn't the only one out there trying to stop these Russians and the hackers anonymous has been very big at it. In fact, let me pull up this other article. This is from security affairs. And here we go. And it's talking about this whole army of these anonymous hackers. [00:30:35] Now none of us have been a nightmare for many businesses that they didn't like. I had an anonymous we'll go ahead and they'll do usually pretty basic stuff. They'll do denial of service attacks and some other things, so they don't like you because of. The don't say gay bill in Florida, and, without bothering to do any research, they'll just start attacking organizations that support it, or organizations that don't support it depending on how they want to do it. So this is an interesting article here, because it's talking about these various. Websites that they've hacked. Now, some of them are government site and some of them are private industries. Now, one of the cool things, bad things about hacking private industry and releasing the emails is now the competitors to these businesses know what they're doing. [00:31:31] And in some cases there's proprietary technology that's being released. Now, when it comes to Russian proprietary technology. The Western world doesn't care a whole lot about some of it, but here's some examples of what these hacktivists of GoDaddy. This is a company called forest 37,000 emails stolen from the company, Russian logging and wood manufacturing firm. [00:31:55] Again, it would give a little bit of an idea into the whole Russian, what are they doing? In the forest industry. This one, I think is a little more concerning for the Russians Aero gap. This is an engineering company that focuses in the oil and gas industry. Their clients include a whole bunch of Russian companies. [00:32:15] They've leaked approximately 100,000 emails from Aero gas. That is a huge deal because so much of the country's revenue, the number one industry in Russia is oil and gas. Petro Fort one of the largest office space and business centers in St. Petersburg, the hackers have leaked approximately 300,000 emails from Petro fork. [00:32:41] Again, you can use that to find out what's happening in your economy. What. Doing how are businesses doing? Are they going to go under so you can see some tweets here. I've got them up on my screen on YouTube and rumble anonymous. What they're saying that they've done and you can follow anonymous directly on Twitter. [00:32:59] Particularly fond of them. They've done a lot of things that I disagree with. This is really telling us about a whole new approach to warfare, right back in the day, you and I couldn't get involved, we could potentially take up arms and go and fight right there and think about the Spanish American war. [00:33:18] Think about what's happening now in Ukraine, where Americans have just gone over there. Taken up firearms in order to help them defend Ukraine. People who are maybe of Ukrainian descent, maybe not right. We have never seen this type of involvement by average citizens because anonymous is not like some big fancy company or government agency anonymous is a bunch of people who are trying to be anonymous and do something. [00:33:50] So they stole 145 gigabytes. Look at this. It's just crazy. So he. The anonymous Twitter thread itself, right? Talking about what. It's absolutely incredible. Incredible. So that's what anonymous is up to. They are hacking Russia and they're hacking Russia in a big way. Now, next stop. We have our friends at Microsoft. [00:34:15] Microsoft has been seizing Russian domains that they are accusing of having been linked to these Russian hackers that have been going after think tanks and government agencies in the U S and the. He knew, I shouldn't say which I'm sure includes the UK cause UK has gotten involved. So this article from the verge is talking about how Microsoft has seized seven domains, belonging to fancy bear apt 28 which is we've seen them active in a number of companies here, right in the Northeast United States. [00:34:57] These companies who are. Trying to provide materials, software, hardware for government contracts, right? So they're not even direct government contractors for the feds. They are just a sub contractors. And then we've seen fancy bear in there. We've seen the Chinese in these companies. It's incredible. [00:35:19] They have no. DIA that all of their intellectual property is being stolen, which is why the federal government has started cracking down on contractors and subcontractors and the, this whole paragraph 70 12 thing. We're getting geeky here, but companies that have to protect even unclassified information, confidential, classified, and they haven't been so Microsoft. [00:35:46] Obtained a court order. You can see this on my screen, over at YouTube and at rumble to take control of each domain on April six, that then started redirecting them to a sinkhole. So what they do is they take control of the DNS for the domain. So the root name servers, now, point to a Microsoft name server, and then send them to a sinkhole. [00:36:09] A sinkhole is basically nowhere you go there. There's nothing on the site, right? Or in this case also servers used by cybersecurity experts to capture and analyze malicious connections. And they'll do this. Oftentimes, when we're talking about these botnets, like we talked about a little earlier today, so apparently they're trying to establish long-term access to the system. [00:36:33] So the targets, what did we just talk about? Long-term acts. But net, right? That's what button that saw. So Microsoft has gotten involved. They've been doing this now for a little while. It's obviously not their normal business model, but it is something that they've been doing. They were also, by the way, the fancy bear link to these cyber attacks on the DNC in 2016. [00:36:57] And they also targeted the UFC election in 2020, which is why, part of the reason why anyways, don't use electronic equipment for our elections, have paper ballot, have people count those ballots yet it takes longer. You can't have the instant thing on TV, which is why all of these new services, they all don't do that. [00:37:18] That's ridiculous. But it's the only thing we can guarantee that these guys, like I got it up on the screen again. Fancy bear the Chinese et cetera. It's the only way they can get in. And if we were doing paper ballots and we had bipartisan people counting the ballots and independence, counting the ballots, observing this, we wouldn't have all of these problems that we had with the last election where people were saying it was stolen. [00:37:48] It was hacked. How do we know it was stolen? How do we know it? Wasn't stolen? How, go back to paper ballots, get rid of the scanning machines and particularly get rid of these electronic voting machines where you touch the screen to cast your vote. Those things are ridiculous. What if there's a software bug in it? [00:38:06] How can you go back and change the vote? People that complained about it again, and wait a minute. I voted for this guy and you had to record my vote for the other guy. It's ridiculous. Anyways. Back to QR codes. Okay. I'm going to pull this up on this screen because I think this is a cool article here. [00:38:25] This is from a, actually a site over in India. It's called scroll.in, and they're talking in here about how hazardous it can be. To use QR codes. Now they're not saying don't use QR codes, we've all had to use them. I've got up on my screen, this picture of being at a table. And you scan the QR code in order to get the menu. [00:38:48] In order to order, I did that. I was in Vermont and we were riding motorcycles or buddy, and I go into the little tiny. Restaurant, small restaurant and I had a half a dozen tables and they didn't have menus. You scanned it, the QR code that was there on the table and you placed your order. And off it goes a lot of places they've been doing that with menus. [00:39:11] You've seen that more and more saves them money as well and lets them change their prices more frequently. Yeah. Thanks for that inflation guys. Why shouldn't you use these QR codes? Why should you be extra careful? Here's the answer. QR codes are the URL of a webpage. That's the bottom line. Would you click a random URL that came in an email? [00:39:37] Would you click on a random URL in an ad or on a web page? We certainly know better than to cook URLs in our email. But that's exactly what the QR code is. And on top of it, the URL in a QR code tends to be what we call a shortened URL. So it might be Bitly, so might be bit.ally/and then some random characters. [00:40:04] How do you know where it's going to take? You don't all you know, is it's going to take you to Bitly, but that Bitly URL could be sending you to a malicious site. And now your phone could be hacked. It could be using your phone for Bitcoin mining for who knows what. So be very careful and the bad guys are using these in a different way that you might not have seen before, which is they are embedding QR code graphics. [00:40:34] Into emails. And they're thinking that people are going to hold up their phone to the email and what are they going to do? They're going to scan the QR code that was in their email. And now they're in trouble. Yeah, that's simple. Hey, visit me online. Craig peterson.com. Make sure you sign up for my newsletter. [00:40:53] Craig peterson.com/subscribe course, Craig Peterson, S O n.com. And I'm going to send you. Top three special reports, absolutely free. We got to take care of these bad guys. [00:41:08] This is a big deal, quite literally a big deal. Russian malware. We have been able to track it down now, track it down to a single site. Yeah. All of these bad guys are in one building in Moscow. [00:41:25] Hi everybody. Of course, you're listening to Craig Peterson. Thanks for taking a little bit out of your day today. As we continue to really talk about the stuff that's most important in the world, and there could be nothing more important, I think, than some of our cyber security, our lives, our fortunes, et cetera. [00:41:44] Last year we have to pay attention to well, This is a very big story and it's a bit of a scary one as well. We've had a lot of ransomware over the years and a lot of ransomware. Have you had it yourself? I bet you, if you haven't, someone who has had ransomware because frankly it is pervasive in every aspect of pretty much everybody's life out there. [00:42:12] So when you get hit with ransomware, Lately something a little different has happened. It's really gone through three phases. The first phase was the ransomware would get on to your system. Usually it came as an attachment, probably embedded in like a word file it's been embedded in PDFs, embedded in all kinds of stuff. [00:42:35] Even drive by downloads on websites, have brought malware. But in this case yeah, it was annoying. It was a problem. It would give you a red screen. You've probably seen it before warning about the ransomware and it told you, okay, here's what you can do to get your files back. And in order to get your files back, you usually. [00:42:57] To go to some exchange online, take dollars, buy of course, Bitcoin, or some other cryptocurrency. And then that cryptocurrency would be used in exchange now for you to get a key that would hopefully decrypt everything. And in reality, it often didn't encrypt hardly anything. So it's been a problem and a problem for a lot of people. [00:43:23] The FBI said that at the time. So this is a gen one of ransomware. You were lucky if 50% of the time you got all your data back, gen two of ransomware is when the bad guys started getting a little bit smarter. They didn't just take your files. Thumb and then say, Hey, pay up buddy. What they did at this point is that got onto your systems and they poked around. [00:43:46] They went we call in the industry, east west on the network. So they got onto you, maybe your kid's computer may, maybe you were hooked up via VPN to the office to do work. And it wasn't a great VPN. And the kid's computer had that virus and that virus weaseled his way all the way over the VPN, directly to the office, because remember. [00:44:09] VPNs are. A network private in that. Yeah. Okay. It's encrypted. And so someone who's got a wire tap isn't necessarily going to get anything, but it's a VPN, it's a tunnel. And that tunnel was used a many times for malware, like brand summer to creep over to the office network. That's an east west is going from. [00:44:30] One machine to another machine. And in businesses, man, you saw that one a lot as that ransomware moved around. So that was the second one. So the rents were going on the machine. It would then look for files that is. You might not want to have exposed. So it looked for files with bank account numbers in them, social security numbers, maybe intellectual property. [00:44:57] We saw a lot of that. Theft is continuing to go on primarily from the Chinese and then an intellectual property theft. And what happened next? While of course it ended up moving the data, the files, and then what they would do. It's encrypt your desk. So before they gripped your desk, they got copies of all of the stuff they thought might be important to you. [00:45:20] So now the threat was in version two of ransomware pay up, or if you don't pay up, you are going to have to pay us to not release your files. If you didn't want all of that client information online, if by law, you would get nailed for having that client information out online. And that's true in most states now, and the federal government's from putting some teeth on some of their laws as well, then what are you going to do? [00:45:49] Yeah, you paid the. So that was version two version three that we're seeing right now of ransomware is simply destructive. And if you go way back in history, you may remember I got hit with the Morris worm, which was one of the first pieces of nastiness out on the internet. And that was early nineties. [00:46:13] My business that I owned and was running, got hit with this thing. Even before that, There was ran. There was a nasty where viruses, if you will, that would get on the computer and destroy everything. It was just a malicious, as I remember, somebody at UC Berkeley, some researcher in it. And he didn't like what that of the researchers were saying about him. [00:46:35] So he put some floppy disk together and on them, he put. Erasing malware and shared all of the stats with anybody. And of course, you plugged that disc into your, that little floppy disc into your windows computer. And it says, okay, I'm going to go ahead and open it up. And, oh, look at this, a virus. [00:46:56] And so he then wiped out the computer of everybody else. That was a competitor of his out there in the industry. Yeah, a little bit of a problem if he asked me, so how did that end up getting around? What ended up happening while everybody got really upset with him, nobody really found out what was happening, who did it, et cetera. [00:47:19] That's what's happened. Now, so version three of malware is like some of the very first malware we ever saw version three of ransomware. So some, again, some of that very first ransomware was pretty nasty is not the sort of stuff you want to see running destroying files, but at least you could get back from a. [00:47:40] Nowadays, a lot of people are doing backups by attaching a disc directly to their machine, or they're backing up to another machine on the same network. Remember that whole east west thing, you didn't want the data going back and forth, it causes problems. Yeah. So what happens now? The Russians apparently are just trying to cause havoc with businesses, anybody who has decided that they're going to be anti-Russian in any way there they're attacking. [00:48:13] So they'll, reraise your desks. They'll erase all of your data. If you have backups on that thumb drive or that USB external. The good news erase that if you have backups on another machine, on the network, hopefully from their standpoint, there'll be able to get onto that machine and erase all of your backups, which is again, why we'd like 3, 2, 1 backups. [00:48:34] At the very least, there's some others that are even better. And if you're interested, send me an email me@craigpeterson.com. I'll send you a webinar that I did on this. I'm not charging you for. But it was a free webinar to begin with what a webinar on backup and how to backup properly and why to do it this way. [00:48:54] Again, me, M E Craig peterson.com. Be glad to do that. What we're seeing now is a huge problem. Let me see if this is going to work for us. Yeah. Okay. It is. I am, by the way, live here we go on my computer. So people who are watching. I can see my desktop. So here we go. This is Russian companies who are linked to this Russian malware. [00:49:24] Ransomware are hiding in plain sight is what they're calling it. So what does it mean. To hide in plain sight. While in this case, what it means is money that's been paid by American businesses to these Russian ransomware gangs, some of who by the way, are actively going after anyone that criticizes Russia found these American researchers. [00:49:50] Yeah. Led to one of Moscow's most prestigious addresses. You can see it up here on my screen. This is a New York times article. It's just a random actor, journalism people, sometimes even the New York times gets it. And they're saying millions of dollars have gone through this. So they've been tracing. [00:50:10] Where did they go? The Biden administration has also apparently zeroed in on the building is called Federation tower east. It's the tallest skyscraper in the Russian Capitol. How would that be to have a business and just this beautiful tall skyscraper and have a view that would be really cool. So they have targeted some companies in the tower. [00:50:32] As what it's trying to do is stop the ransomware guy gang. Maiden cryptocurrencies. Russian law enforcement usually has an answer to why don't you just shut down these bad guys that are out there trying to steal all of our money. They say there is no case open in Russian jurisdiction. There are no victims. [00:50:51] How do you expect us to prosecute these honorable people? That apparently is a quote from this Massachusetts based secure cybersecurity. Called recorded future, but I'm looking at a picture it's up on my screen right now. You guys can see it, but this is the Moscow financial district called Moscow city. [00:51:10] 97 floor Federation tower east. This is really pretty, you wouldn't know this isn't like London or any other major European capital. There's some cranes in the background building up new buildings. The cyber crime is really fueling some growth there in Moscow, which is, if you ask me the exact reason why lad is happy as a clam to just go ahead and have these Russian cyber crime guys. [00:51:43] Just go and bring money in right. Money is bringing in great money for them. The treasury department, by the way, it's estimated the Americans have paid $1.6 billion in ransom since 2011. Huge one ransomware strain called RIAA committed an estimated $162 million. Last year. It is really something. [00:52:07] So when we come back, we've got a lot more to talk about. We're going to talk about the cloud. If it's more secure or why is it calm, broken, give masks work. Why aren't they working right. Anyways, we'll talk about that. When we get back and visit me online, Craig Peter sohn.com. [00:52:26] Stick around. [00:52:29] I hate to say it, but there's another big scam out there right now. And it is hitting many of us, particularly the elderly quite hard. We're going to talk about that right now, what you can do about it and how you can recognize when it's happening. [00:52:45] Interesting article that came out this week in wired. [00:52:49] It's actually in Wired's. Let's see, what is a March 2022 issue. It wasn't this week. Nevermind. And it's talking about a serious problem. I'm going to show you guys who are watching I have this on rumble, YouTube, Facebook as well. So you guys can see along and of course, right here, too. [00:53:11] Now let's not forget about that, but this is an article that says we were calling or excuse me, they were calling for help. Then they stole. Thousands of dollars. I'm going to read parts of this article. It's just amazing. It's by Becca, Andrew's a back channel. What is that? Okay, so that's just a cat. [00:53:33] On December more one December morning, my mother's phone rang. She tugged the iPhone from the holster. She kept clipped to the waist, her blue jeans and wondered who might be calling perhaps somebody from the church who was checking in on her recovery from Corona virus. Hello. She said the voice that greeted her was masculine. [00:53:53] This is just great writing. The color sounded concerned and he told her something was. With her Amazon account, somebody has access to your bank accounts through Amazon and they can take all your money. I'm calling to it. Her mind raced or Lord, she prayed silently. The voice was warm and reassuring them. [00:54:15] My mom tried to focus closely on his words. My dad was driving to work in his truck and she was home alone. She'd been cooped up in the house for weeks with COVID isolated from her community and she missed the bomb. Friendly voice. I D I just love her language here. It's just phenomenal. She tried to steady herself. [00:54:36] The man said he needed to make sure the money was safe. He transferred her to a different male voice. Soothing reassuring, calm. She promised not to hang up a brain injury decades earlier, made it hard for her to follow his instructions, but she stuck with it. The voice explained slowly, carefully, how to swipe and tap her phone until she had installed an app that allowed him to see what was happening on her screen. [00:55:07] Now. You followed her every move. After some hour, she mentioned she had to relieve herself hours. It's okay. I'll stay on the line. He said she parked the phone, outside the bathroom and picked it back up. When she was done as Nooner approached, she told him I have to eat. I'll wait. It's okay. Don't hang up. [00:55:28] We'll lose all our progress. She set the phone down on the counter to make a sandwich, then pulled some chips from the cabinet and padded over to the kitchen. The phone buzz with the text. It was my father checking in. She typed back that there was a problem, but she was fixing it. She had it all taken care of. [00:55:48] She tapped the tiny white arrow next to the message field to send her reply. And then she heard the voice, its volume elevated as sounded angry. She frowned and brought the phone back up to her ear. Why would you do that? You can't tell anyone what if he's in. She felt confused that didn't make any sense, but she also didn't fully trust herself. [00:56:10] She was worn. From her slow recovery and the steroid, she was taken as a treatment, gave her a hollow buzz of energy. Now I want you guys to go have a look at this over on wired site. Read the whole article. It is a phenomenal. Absolutely phenomenal. But what it's doing is telling the story of this woman who was trying to, do the right thing, trusting other people, which many of us do? [00:56:40] I have a default trust with a little trepidation. I will admit that, but with the whole. Down the thing that happened, many of us have just been longing for a little bit of companionship and to hear a stranger who's trying to help out. That's a huge plus it goes on in this article and talks about how reassuring these guys were and what they did. [00:57:06] She installed this cash app and opened up PayPal downloaded. Coinbase set up Zelle so she could send money directly from her bank account. She doesn't know about any of these things. It's just incredible. So the afternoon wore on and the guy said Hey, we're almost done. And her husband of course, was on his way back. [00:57:30] And the sun was down. Father got home. He noticed right away that something was off. And she said she took care of it. And you said you took care of what I'm not supposed to tell you. It said, so the scammer had siphoned away. All of her personal information, the scammers had your social security number, date of birth driver's license number, and about $11,000. [00:57:55] These new financial apps like Zelle and others that are legitimate PayPal apps, right? Zell, you can use to send money legitimately to someone else. But it links into your bank account. That's why I don't like them. I have a friend that's been pushing me. Oh, this happens. Great. It saves you so much money on gas. [00:58:15] Look at how much money I've saved any. He sent a screenshot of it and I re I went online and had a look. And guess what? I read, reviews it again, like this tied into her bank account directly. And. What can happen? Like here, everything was emptied. So in the next few months this author of the story and her father tried to undo the damage. [00:58:40] Very frustrating, getting scanned of course, is really dehumanizing and it just breaks your trust and other people. How could someone do something like that? It's just incredible. Got to go through the stages of grief and everything. She got a, she talked to people, she said she got chili half replies, or just as often silence. [00:59:05] And she was calling around trying to find someone for some empathy. Okay. It's just incredible. Great article. If you can still find it, the March issue of wired, I'm sure it's available online. This goes on. And talks about her mother's seizures getting worse. And of course now they don't have the cash that they had been saving. [00:59:27] And it just very depressing. Now I have this, you might remember about a year ago, I talked about it. I had something like this happen to a friend of mine and I'm still not quite sure what happened, but it looks like it was a password sprain or password stuffing. And they got into his, the app that his company uses to pay people and sure enough, they got in and they directed his next two paychecks to their own account, which went right out of the country like that. [01:00:05] These are bad people. And how do you deal with this? It's incredible because if you've got someone like her mother who has mental problems due to no fault of her own and is a very trusting woman, what do you do? She's walking around all day with her phone on her hip. That's how we started this out. [01:00:27] Do you take that phone away from him? Th that would be dangerous, frankly. So this is a very problem. They had a USAA account was her bank account. USAA is usually good about this sort of stuff. In fact, my other friend had USAA as well. But they did help deactivate Zelle, but they didn't do anything about the $999 that were transferred through it. [01:00:51] Very bad. So they figured out maybe we should change our passwords. She had them change them. And if you would like information about password managers, again, I'm not selling anything. I'd be glad to send them to you. If you sign up for my email list, you're going to get them automatically. Craig peterson.com. [01:01:11] I've got a bunch of data information I want in your hands. It talks about the free stuff, talks about the paid stuff. None of which I'm selling you. Craig Peter sohn.com. Sign up right there on the top of the page. Thanks. Stick around. [01:01:32] We've had some serious supply chain attacks over the last couple of years. And they have caused all kinds of problems for tens of thousands of businesses. If you use WordPress, there was one of those this week. [01:01:47] We have had supply chain problems. Like you wouldn't believe. So let's start out by explaining what is a supply chain problem? [01:01:58] In this case, we're narrowing it down to cybersecurity because we've had supply chain problems from everything from our toilet paper to the food we eat. But what I'm talking about right now is. Supply chains when it comes to cyber security. And one of the biggest problems we had was a company that's supposedly providing cyber security for businesses, right? [01:02:29] Some of the biggest businesses in the world. And I'm looking at an article right now from security Boulevard, say saying how to protect the supply chain from vulnerable third party code. It can be a script that's downloaded online. It can be an open source library. We've seen big problems with get hub lately and pulling in libraries. [01:02:51] We've seen big problems with what are called containers lately, which are little mini versions of computers with all of the software. They're all ready to go. Ready and raring to go. All kinds of supply chain issues for a very long time now. And these supply chain, cyber attacks have been hitting some of our cybersecurity companies, really the hardest I'm pulling this up on my screen right now, if you're watching this on rumble or on YouTube, and you can see links to those, by the way, in my emails, I send out every week. [01:03:28] Craig peterson.com. Craig peterson.com. But you can see here, supply chain hits cybersecurity hard supply chain security is not a problem. It's a predicament. That's uninteresting look because we have to use some of the supply chain stuff. Seesaw the FBI or a sheer wean cybersecurity advisories because of the Russian attack over on Ukraine. [01:03:55] And then the U S the weakest link in supply chain security fears of rising fuel SISA FBI NSA and gestural partners. Issue is advisories Toyota stops production after possible cyber attack at a supplier. Isn't that something this goes on and on. What's a guy to do, right? Many of us are using websites to, in order to run our businesses. [01:04:24] Heck we got websites for our soccer team, for the kids, we got websites for pretty much everything that's out there today and those websites need software in order to run. So the basic idea of the website is nowadays. Content management system, they called CMS CMSs and there have been a lot over the years. [01:04:46] I've used quite a few myself off and on. This is very interesting though, because this particular piece of. Is code that runs a website. I'm going to show you this article from ARS Technica here on the screen, but it's talking about millions of WordPress sites that got a forced update to patch critical plugin flaws. [01:05:13] So when we're talking about supply chain, in this case, we're talking about something. WordPress right. And this WordPress software as good as it is, can have bugs. So WordPress is the content management system. So you load stuff up into, in fact, I'll bring up my site right now. So I'm going to bring up the Craig peterson.com. [01:05:37] And on my site, I have all kinds of stuff, which is why it's so slow to load. I've got to fix that one of these days, but this is an example of a WordPress site. So you can see right at the top of the site, I've got watch this week, show jobs, or top, of course, that was last week. You can watch it on rumble or a new tube, and then it's got my latest show. [01:05:59] So if you click on one of these, here you go. And you can listen to it. Starts right out here. C ta-da. So there, you can listen to my podcast right there on the site, and I've got an automated transcript of it. It's for you, depending on what you want. It's got links over here to take you to iTunes or YouTube or Spotify or SoundCloud or iHeart or Google player audible. [01:06:26] All of these links take you to different places. And this site in survey, Program a site in HTML. What we're doing is we're working. Putting some data in, so we say, okay, I want a default page. Somebody else has already set it up. Somebody else has already got an old program. It just works. And it's all right there for me. [01:06:49] Here's some related posts on the side. Here's the most popular ones that we have right now. This is a content management system. And specifically this of course is WordPress. So what happened. If I had a, yeah. And here's what it looks like over an audible, you can listen for free on. This is what happened this last week, WordPress, which has this great software that I use and tens of thousands of others use out there very popular. [01:07:27] And in order to make it easy for me to have my website, probably your business, probably your kids' soccer club, you name it is using WordPress. It's just over the top hop healer. It is using code that was written by other people. The reason we can make programs so quickly nowadays is we're relying on other programs. [01:07:51] So we'll go ahead and we'll grab this program that does this part of what we need to have done, and ta-da we're up and we're running. I just have to write the glue right? To put it together. The API calls, whatever it might be, because the idea is let's make it easier for programmers. So you've got something called get hub here. [01:08:11] Let me pull it up so you can see that you can go online if you're following along. To get hub.com. And as it says right there on their front page where the world builds software as a beautiful world, isn't it? That blue, you can see the air around it. And that's what it's doing is where the world builds software. [01:08:33] So let's say we want something. What do we want? What's a, let's say we want something to make a chess program. We can talk about chess and let's say, oh, you have to. I Dan didn't want to do this, so I'm just going to skip that for now. But it would come up and tell me, okay here's all of the chess programs that are out there and I find one, that's close to what I want to do. [01:08:54] So what do I do? Point while I go ahead and have a look at the license, a lot of the programs up there have a very open license, so I can just take that code, modify it. And I have a chess program without having to write a chess. It's really that simple that's part of the supply chain. If you bought my chest program, you would actually not just be getting the code that I wrote, which is typically just glue code with maybe some API APIs or application programming interfaces. [01:09:25] In other words, you're using someone else's code would now make it who's program. It's like the Pharaoh's barge. It would make it other people's programs. Not my. So you got to figure out what's in my supply chain. I've got a new client. I do work as a virtual chief information security officer. [01:09:46] Actually, it's a fractional Cecil. And as a fractional Cecil, one of the things I have to do is look at the whole supply chain. Who are they buying even physical things from. And could there be. Did it into their software, into their systems, something that might be coming from yet another supplier. Man, does this get complicated? [01:10:09] Very fast, but this week, our friends at WordPress, they went ahead and forced all WordPress sites to update. Very good. Okay. Otherwise, people could have downloaded a full backup of the sites that are out there, something you really just don't want to happen. Anyways. Go right now, Craig Peter sohn.com while the bits are still hot and sign up right there. [01:10:36] Craig peterson.com for the newsletter and get those special reports that are going to get you started. [01:10:43] This is the moment you've been waiting for. We're going to talk about free cybersecurity services and tools that you can use. Now you have to be a little bit of a cybersecurity expert to use them, but not much. This is from the government. [01:10:59] This is I think an amazing thing. This only came out within the last few weeks. [01:11:07] I have it up on my screen. There we go right now, for those of you who are watching on rumble or YouTube, you can see it right there, free cybersecurity services and tools from. The cybersecurity and infrastructure security agency SISA reminds me of Marvel was shield, that really long name that came up with an acronym for as though they weren't aiming for that acronym in the first place, but there are some tools that you can use there's tools that I use as a cybersecurity professional. [01:11:42] And some of them are obviously going to be pretty darn. Complex. And if you're looking at my screen right now, or if you want to go online at csun.gov/free-cybersecurity-services, dash, and the as tools, or just look it up online, you'll find this on my website as well. I'm going to try and make sure I get that up. [01:12:07] But what they have done is they're showing you what they call their key or the known exploited vulnerabilities. Okay. And this is where they are showing the CVEs, which are. The frankly, these are the ones that I use. It is published by nest, which is the national institutes of standard and Sanders and technology. [01:12:31] And this gives all of the details. So this is CVE 20 21, 27. Okay, and this is detail, and of course I would be using detail. And it's telling you, here's the advisories, there's one from get hub Excel. Leon has one. Here's the weaknesses, the SA the known soccer configurations. So you can find where they all are at and everything. [01:12:56] So all of the details. So they're telling you about that. These are the ones, this was in the vendor product. Project, I should say. So we'll look at the data added to catalog. Here are a few in Cisco right now. So this is their small business series of routers, which we do not use for anyone because they don't provide the type of security you want, but Cisco is taking care of the problems, right? [01:13:23] Many of these update themselves, here's Microsoft windows. And installer contains an unexpected unspecified vulnerability, which allows for privilege escalation, a lot of stuff this week, this is crazy Apache Tomcat, which I am never been a fan of and problems. So all of these came out. On March 3rd and more rights. [01:13:47] This is just page one. So let's look at page two here. Oh wow. More Microsoft Excel exchange server, some more Cisco vulnerabilities. Why Cisco? Why Microsoft? Because they are frankly. The big boys on the block, that why do you Rob the bank? Because that's where the money is. So they list all of those right here, as he said, does the warning you do use multifactor authentication? [01:14:16] I don't want to sound like a broken record, so I'm not going to say use multifactor authentication today. Okay. I just refuse to say use multi-factor authentication. And this one talks about what it is, right? Many names. Now they're trying to make this. But really a Fido key fast at any online considered the gold standard or multi-factor authentication Walt for online. [01:14:40] It is websites, but not for authors. So how would you know that if you weren't an expert? So yeah, this is the government talking, right? So they have the service. So what does, what do I do right? Me, Mr. Idiot. I click on this and they are talking about the service that they've got them showing it up on the screen. [01:15:02] It's called SISA insight. And they're talking about website, defacement, destructive malware, or not Petya want to cry, right? All these things. What can you do
Mike & Nick on the recent subway shooting in NYC, President Biden & DOJ's new measure on ghost guns, plus LA Times congressional reporter Nolan McCaskill re-joins the pod to discuss the recent confirmation hearing of Justice Ketanji Brown Jackson, what upcoming legislation is being talked about in D.C., plus all the latest news & notes coming out of Congress.This episode is brought to you by Athletic Greens. Go to https://athleticgreens.com/EMERGING to get ONE FREE year supply of immune-supporting Vitamin D AND 5 FREE travel packs with your first purchase!And by Bones Coffee. Head to bonescoffee.com, use the promo code CANWEPLEASETALK for 15% off your first purchase!Support this show http://supporter.acast.com/can-we-please-talk. See acast.com/privacy for privacy and opt-out information.
In February, law enforcement raided the home of a Salem man who was found to be manufacturing more than 60 privately made firearms, or ghost guns, from the basement of his home. Ghost guns can be made from either a 3D printer or assembled at home from parts that can be legally purchased online and don't require a background check. They also lack serial numbers, which makes it difficult to trace them when used to commit a crime. Although the majority of guns used to commit a crime contain a serial number, police in Los Angeles and other large California cities have recorded a dramatic increase in the recovery of ghost guns at crime scenes since 2020. Joining us now is Ellen Rosenblum, Oregon's state attorney general, who has championed legislation to restrict ghost guns at the state and federal level.
It's been a while since I've done a speed dating bonus episode, and this one is all about Russian novels for the Reading Envy Russia novel quarter. I discuss books I tried, what I think of them, and books I read previously. We might be moving on to non-fiction officially, but that doesn't mean we have to leave Russian literature behind forever. Download or listen via this link: Reading Envy 243: Russian Novel Speed Date Subscribe to the podcast via this link: FeedburnerOr subscribe via Apple Podcasts by clicking: SubscribeOr listen through TuneIn Or listen on Google Play Or listen via StitcherOr listen through Spotify Or listen through Google Podcasts Books discussed:An Evening with Claire by Gaito Gazdanov, translated by Bryan KaretnykThe Sentence by Louise ErdrichFirst Love by Ivan Turgenev, translated by Richard FreebornEugene Onegin by Alexander Pushkin, translated by Leo TolstoyOblomov by Ivan Goncherov, translated by Stephen PearlLolita by Vladimir NabokovZuleikha by Guzel Yakhina, translated by Lisa C. HaydenThe Time of Women by Elena Chizhova, translated by Simon Patterson and Nina ChordasUntraceable by Sergei Lebedev, translated by Antonina W. BouisOblivion by Sergei Lebedev, translated by Antonina W. BouisBrisbane by Eugene Vodolazkin, translated by Marian SchwartzLaurus by Eugene Vodolazkin, translated by Lisa C. HaydenAnna K.: A Love Story by Jenny LeeAnna Karenina by Leo Tolstoy, translated by Constance GarrettThe Brothers Karamazov by Fyodor Dostoyevsky, translated by David McDuffThe Master and Margarita by Mikhail Bulgakov, translated by Richard Pevear and Larissa VolokhonskyA Constellation of Vital Phenomena by Anthony MarraThe Tsar of Love and Techno by Anthony MarraCity of Thieves by David BenioffA Gentleman in Moscow by Amor TowlesThe Bookworm by Mitch SilverA Terrible Country by Keith GessenFardwor, Russia! by Oleg Kashin, translated by Will EvansRelated episodes: Episode 228 - Full of Secrets with Audrey Episode 135 - Speed Dating 2018, Round 5Episode 113 - Speed Dating 2018, round 1Episode 117 - Speed Dating 2018, round 2Episode 120 - Summer Reading; Speed Dating 2018, round 3 Episode 128 - Poetry and Whale Guts (Bonus episode; Speed Dating 2018, round 4)Episode 063 - Desolation Road (book speed dating and books on grief)Episode 059 - Are you Inspired Yet? bonus book speed datingEpisode 047 - Sex with Elvis: Bonus Book Speed Dating EpisodeEpisode 035 - Speed Dating Books Stalk us online:Jenny at GoodreadsJenny on TwitterJenny is @readingenvy on Instagram and Litsy All links to books are through Bookshop.org, where I am an affiliate. I wanted more money to go to the actual publishers and authors. I link to Amazon when a book is not listed with Bookshop.
Untraceable poisons. Soviet espionage. Modern codebreaking. Any, none, or all of these things may have something to do with why nobody can identify the Somerton Man. Learn more about your ad choices. Visit podcastchoices.com/adchoices