A (53:52)
Oh, how fun. All right, well, we're gonna take a break and then we'll. We've been avoiding it, but I guess we'll have to talk about the government. There's a. There's a government information we gotta talk about. FCC's been busy. There's so much going on, in fact, even an AI angle on this. But stay tuned. We've got Joey Davila here, who coined one of Corey's best lines. I love it. Great to have you, Joey. GlobalNerdy.com is the website. Dan Patterson from news.dan patterson.com and Blackbird AI our show today, brought to you by this little. This little fella. Now, if you look at this, if you're not paying close attention, you might say, oh, that's. That's an external USB drive. It's about that shape, little black box. But maybe if you look closely, you'll see there's. There's a bird on there. Is that a. That's like a canary. Yes, this is the thinkst canary. And you know what this is? This is genius. This is the security device everybody needs to have inside their network. Here's a question for you. If a bad guy were to penetrate your. Your perimeter defenses, your firewall, if a bad guy were to get into your network and start roaming around, started exfiltrating information, started planting time bombs and ransomware, how would you know? Would you know that somebody's in your network? They're clever. They don't leave footprints behind. They erase their traces. How would you know? This is how you would know. The things canary this is a honeypot that is brilliantly designed. It can be deployed in minutes, it can impersonate anything. Now this one is a nas, a Synology nas. That's kind of what I always keep mine as. But you can make it a Windows server, you can make it a Linux server, you can light it up like a Christmas tree with every possible service or pick a few judicious services like, I don't know, Windows RDP to publish. You can even make it things like a SCADA device. This could be a Siemens SCADA device, this can be a SharePoint server. Anyway, there are literally dozens and dozens of things and it's as easy as a drop down menu picking the configuration. And it is a perfect image. That's why it's a good honeypot. It's got the right Mac address, it actually duplicates a Synology Mac address. It has the right login fields, the right everything looks real. But here's the thing. It doesn't look vulnerable to the bad guy. It looks like it's something valuable, something they're going to want to take a look at. Or there's another thing you can do with this thinkscanary. You can generate lure files, little files that can be anything from a wireguard configuration file to a Google Doc to a Word document, an Excel spreadsheet. And you could put them anywhere. By the way, I have on my Google Drive spreadsheets to say things like employee information. Oh man, that's juicy. You know a bad guy's going to try to open that. But the minute they open the lure files or they try to brute force your, you know, your fake internal SSH server, you're going to get an alert. Your Thinks Canary will tell you you got a problem, there's somebody in your network. No false alerts, just the alerts that matter. And by the way, any way you want it. Text messages, email, they support webhooks, they have an API, they support syslog, any way you want it. Just choose a profile for ThinksCanary device. In fact, it's so easy you might change that profile every day if you want. It's very easy. Register it with the hosted console for monitoring and notifications. And then you sit back, you relax, you wait. An intruder who's breached your network or an evil maid, a malicious insider, they cannot help but make themselves known by accessing those files. Or that that fake device your Thinks Canary. This is a must have for anybody who's got a network to protect. You know, we've always say security is a layered System. It's not just one thing. It's not just a perimeter defense. You've got to have something inside that'll tell you if you've been penetrated. Visit Canary Tools Twit. You know, if you're a big bank casino backend operation, you know somebody that's under attack, which is all of us these days you might have dozens or hundreds of these. A small business like ours might just have a handful. But I'll give you an idea. For 7,500 bucks a year, you get five things to Canaries. That includes your own hosted console, that includes upgrades, that includes support and maintenance. And by the way, if you use the code twit in the how did you hear about us Box, you're going to get 10% off for as long as you have your think scanneries. 10 off. You can always re. Oh, if there's any, you know, if you have any like, like qualms, you should know you can always return your thinks canary. With their two month money back guarantee, you'll get a full refund. Two months, 60 days. So there's no risk at all. I should tell you though, they've been advertising with us now nine years and that refund guarantee has never, not once been claimed. Because once you get these things canaries in your network, you're going to go, how did I live without it? Especially if it, if you get that alert. I did. You know, we've had these on our networks for some time. It's only been triggered once. No false alerts. That's what I love. But when you get that alert. We got the alert. Somebody is sniffing the IP address at the canary. We immediately was coming from inside the house. We tracked it down. It was a kind of a rogue western digital device that for some reason decided to check every port in the house immediately took that off the network, believe me. But I was really gratified to know if anybody's in there, I'm going to know about it. Canary Tool Twit. Enter the code twit in the how did you hear about US box. 10 off for as long as you have them. Canary Tools Slash Twit. We thank them so much for their support and for helping protect our little network, our little, our little podcast network. Yes, I did. Yes, we got off lucky. Well, it reminds you of a bird because it's the canary in the coal mine, right? It's warning you something's wrong. Something's wrong. One of the things that happened while we weren't paying attention. Congress has proposed a suite of bills that many of us have called the Bad Internet bills. There's the Screen Act. This is all from Salon. Congress may be about to create the bad Internet. Just want you to be aware of these. The Screen act is going to do federally what many states have done. An age verification requirement for any website. And why porn? No, Any website Congress decides is harmful to minors. Any website. That's the Screen Act. The Cooper Davis act would require any electronic communications service provider, your ISP to report knowledge of drug related offenses to the dea. Well, wait a minute. What if my communications are end to end? Encrypted? Oh, no, no. You have to know what's. You have to have the clear text. No encryption allowed.