A (66:08)
Let's see if we can find ourselves an interesting question or just some fun conversation. Looking for those questions. I don't see any cues yet. Oh, here we go. This comes from the real Kyle. Kyle, have you seen the Great Flood On Netflix? I call it. I'd call it a action drama about training, AI and the apocalypse. I have not seen this. The Great Flood. Oh, okay. Let me go look up this. The Great Flood. Netflix. Let's get a synopsis of this. It says the Great flood is a 2025 South Korean science fiction disaster film co written and directed by these people. Starring these other people. The film depicts the desperate struggle of those who have pinned their hopes on humanity's last days in a flooded apartment building. The film had its world premiere. Okay, good for him though. Here's the plot. An AI researcher and recent widow wakes in her apartment to find flood water rising in the 30 floor complex with her 6 year old son. She attempts to reach the floor, the roof and receives a call from the United nations officials who informs her that the agents are on route to extract her and her son by helicopter. She is saved by a. Saved from a tsunami by an agent named He Joe. He reveals that the United nations had known for years about an asteroid impact. Interesting. No, I have not seen this at all. Have to look into that. I could use a good. A good show. Is it a movie? Is. It's a movie, right? Yeah, film. Cool. That's a. That's. That's where. Thank you for letting us know about that. Let's see here. Questions? Oh man. You guys are talking about piracy. I. Tell me you're in. You. You grew up in the 90s? I'll tell me you grew up in the 90s or the mid or early 2000s. You wouldn't download a car, you wouldn't download music. The old FBI warnings that came in front of the DD DVDs. That is funny. Thank you, Phil. What the heck? Where am I? All right, looking for the cues. Looking for the cues. Yeah. The Internet used to be for nerds. It did. All right, I'm scrolling down to the bottom because I think that my chat is a little behind. Let me see if I go the other way. Here we go. This comes from zero keystrokes. I got a three to four old let win laptops. Got any fun unique ideas to use them in my labs? Absolutely. Like, you know what would be fun is to like take a couple of them and make them vulnerable lab machines. You know, go find some recent RCEs with some high CVSS scores that use un, you know, some unauthenticated RCE stuff and then build your proof of concepts, attack them. You know, do, do all your phases of pen testing, like scan and recon. Do all that fun stuff. Learn about that. Write it up as basically building your own hack the box. It could be a lot of fun. Or learn a new skill. Like, you know that MongoDB thing that's going on out there, Maybe you can recreate that. So spin up some mongodb, give it a very primitive web front end and then mess around with that and use AI to try to help you get all that stuff built. But make sure you're learning and understanding that stuff as you go. It'll be a great way for you get some hands on experience and say, well, I've actually installed MongoDB. I've actually created tables and rows and users and blah blah, blah. I guess it doesn't do it that way. I know MongoDB is a no, no SQL database, but I'm not really familiar with this form. Another database guy. See, I could do it myself. I could use that way. Yeah, that could be fun. Just anything, like what interests you. That's how I would go with it. Here's one from Arty. Does the NIST need to be revised to solve the issues in today's episode? Probably that. I guarantee it. It will be revised to solve the issues and they'll at least try to give you some guidance on them. They'll get together and they'll talk about it and then it'll be, you know, it's like a haircut, right? I find that frameworks and standards and anything that's in written format as guidance. It's like a haircut and you're like, how's that, Daniel? You see what happens is your hair. Well, back when I used to have hair, it would grow Right. And it grows and it becomes unruly. And you're like, it's time. I gotta go to the barber or the salon or whatever you do. And then they cut it and it looks horrible. And you're like, ah, that sucks. And you have to live with that for three weeks maybe. And then you get this one day of. It's like perfection. You're like, my hair looks amazing. And then the next day after, it looks horrible again. You gotta go get. It's time to get a cut. I feel like that's how, like, these written things are. Like all these standards and stuff is they. They're only good for a very short amount of time. I. I say that they have a lot of really good information. The good news is cyber security stuff doesn't. Like, old things are still relevant. It's the new things that we have to add to the old stuff. Right. That, that's. That's typically how it goes, at least in my estimation, in my experience. I like this. You dig the haircut analogy. I appreciate it. I hope it works. Right. It's all about trying to figure out how these things, like, operate and you have something tangible in your brain to, to connect it to. All right, give me those questions, man. We're only not even quite halfway through. Here's an interesting thing. Someone's asking Jay Gold this. How do you feel about a Zero Trust router? That's. That could. It depends on the. Right. I. I know this is for Justin, but I just thought that was an interesting thing because I. I don't think about that kind of stuff very often. A Zero Trust router, meaning basically that it never trusts where it's coming from or where it's going. It always verifies that that's what's going on. I would assume there'd be a bit of a performance hit on that. But this is where, you know, cyber security kind of does its cyber security thing is the more difficult things tend to be, the more secure they tend to be as well. Right. Not saying that they're perfection, but when you start adding complexity of security, the user experience tends to get a hit a bit, or to a great extent, just depending on what you're doing. So I found that that's why a lot of security does not get implemented, because they've. They prefer a better user experience than they do the security. And therefore. So you got to learn whether or not you. You'd be able to live with any kind of performance hits or whatever. Right. But I thought that was a cool question. I know it wasn't directed toward us, but good stuff gets the conversation going in a lot of people's minds. Here comes one question from Artie. If Tor or Threat Locker offered a privacy centric residual residential ISP service, would you pick it over a large carrier like Verizon or Comcast? It depends. It's. It's possible that I would do that because I prefer privacy centric things. I am not perfect at eating my own dog food and practicing what I preach on that kind of stuff. And, you know, that's just me being real. And I'm sure a lot of you, if you're honest as well, same, I'm sure there's the, the edge cases out there that are like, I don't even give a dang. I do whatever I want. I click on things, I do all that stuff. And then there's the people that are like, my OPSEC is perfect, but the people in the middle of the bell curve. Right? We are, yeah, I'll say. I'll throw myself. I'll lump myself in. Even though I probably do more security, more privacy than the average person, so I'm not completely dead center. But, you know, they just want things to be easy. That, that, that is going to be the, that's the kick. If they could make it easy, I can't. And, and here's the other problem. When it comes to privacy, people don't understand why they need privacy. They think, and I'm sure you've heard this before, I don't have anything to hide. It's like, that's not what it's about. It's not what it's about at all. It's not about. You're over there, like, looking at something you shouldn't look at or visiting websites that are probably morally questionable or things of that nature or that you're like becoming part of a terrorist cell. That. That's not what it's about. What it's about is, is the fact that the more, the more you increase your privacy, the less likely it is that your data will be available for a threat actor to utilize. And. Because what happens if someone steals my information and uses it to contact my wife and say, I'm stuck, I got this thing, I need you to wire me some money. Blah, blah, blah, Give me the routing number. I'm trying to buy this online and she thinks it's me, right? So the more people know about me now, I'm, I'm a bit of a public figure, so there's some trade off to that. That I have to live with. And I, I, I've kind of like found myself in that sphere. I didn't set off to be that. It just happened. So now I got to do a lot of backpedaling, go back and clean up my life or whatever or create a, or be, just be more privacy focus from here on out kind of thing. But for you regular folks that are out there just trying to live your life and have some privacy, right, that's the kind of things you got to look out for. And it doesn't. Because what hurts worse, right, that you know, a multi million dollar company gets hit for, you know, a million dollars. Yeah, it sucks. It hurts. They got insurance. Not that it makes it right or that they should have that happen or that it's any less wrong, but. Or Joe or Jane out there that gets popped for a thousand dollars that they ain't got and now the little they did had is gone. Right? And all it would have taken was some better security, some better privacy. But we're advertising to everything. They want to know everything about you. And that's, that's the problem. So I would be inclined to at least give it a shake. Artie. I, I and if it was usable, I'd go for it. That's the trick though. They have to make it usable. They have to make it at least user friendly enough. And that's a fine line to find and just ask Linux, right? It's, I think it's objectively a better operating system than Windows ever thought of being, but it's not as user friendly. So people opt for what they get. And they know instead of doing a little bit of hard work so that they can be more secure. So we have to come meet them where they are. All right, let's get, let's get going here. We got another 12 minutes to go. Jojo Rabbit. Morally questionable. Does Facebook count, judges? The judges will allow it. The judges will allow it. Facebook is morally questionable. This is so fun. All right, here we go from the real Kyle. Kyle, what do you think about security cameras in public that aren't encrypted? Not nothing good. I've been seeing stories about a lot of them. Yeah, those Flock cameras have default crits creds too. I know I've come across a few in my research. Yeah. So if I'm not mistaken in which I could be, I think the Flock cameras are a service that law enforcement and government systems use. So they're like a third party. They, they're not owned by them per se. Is that the way it is, is Flock security cameras. Is Flock security cameras owned by governments governance, or is it just a service? All right, it is not owned. They are contracted, says Flock safety. Cameras are owned by the company Flock safety, not by the governments or municipalities that contract with them, While the governments and businesses that use those cameras own the data they collect. And the physical cameras themselves are owned and operated by flock safety. This arrangement has raised concerns about data privacy and control rights, and that is what Kyle is getting to. And yes, I am concerned about that, especially with the lack of encryption, the lack of security this is. And it always starts off with, oh, well, no one will even know they're there. No one has access to this but us. It's like, get real, right? On what planet are you living? Because. Yeah, Right. Like jojo Rabbit here says, I told my wife we need a password. And she thought I was nuts. I then cloned her voice and called her. That was. That was an excellent thing to do. All this privacy and stuff. All. All rings true together. So that's why I'm glad to kind of put it. Put it here together with all this, that we should be opting into security and privacy as much as we possibly can. And you're going to find where it's like, wow, that's a bridge too far for me. And then you got to make that decision and go, is it worth the risk? And see, now you're doing a risk analysis and a risk impact analysis or business impact analysis on your personal business, which is you, your data. Is it worth it? What's the likelihood and probability of these things happening? Right. Utilize all the stuff that we talk about every day. Now, here we go. GRC had to make its way here. And you go, oh, okay, man. It does seem like it would be likely. And the impact is high of, like, catastrophic if that does occur. So we're just going to take the safety measure and implement a password between me and my family members so that anytime the words I need some money comes out of someone's head. Okay, cool. What's the password? And they're gonna be like, ah, shut up. Like, yeah, that's what I thought. Piss off. Stupid scammer. Oh, let's see here. Jesse Johnson's in the house. What's up, Jesse? Feels good to be back. Headed out to get an office chair from Facebook Marketplace. I need one myself. I have one. It's a nice one. It's just. It's not. When I sit in it for too long, I get my. My get, like a nerve that Pops up in my hip and does not like it. So it's time to go back to the, to the Facebook marketplace where all good chairs go to get sold. Let's see here. Any more questions? We got a few minutes left. The safe word is pineapple juice. That's funny. Efs. I'm sorry. The EFF has some good articles. That's awesome. So definitely that's the Electronic Freedom foundation, right? EFF Frontier Foundation. That's what it is. Electronic Frontier. They're basically privacy advocates and encryption and all that kind of stuff. So definitely check that out. Read some articles. Michelle Khan also has some stuff on his websites too. So definitely check that out. Here we go. We're getting into first amendment rights. Do you earnestly believe our first Amendment right to free to speech and fourth Amendment right to privacy realistically exist in today's it economy? It exists, it's just not being respected. Right. So if the argument you're making is because it's not being respected, no one's enforcing it, then it's therefore not really there. And I think that's how they hide behind this stuff is that they just get enforcement to go away or only enforced for specific things that, that would be the problem. What can we do to protect our right? Making security convenient. Decentralization is probably the best way to go. Utilizing encryptions and that kind of stuff on all your data. That, that could be another message going back to the whole crypto thing. I know a lot of people that are crypto advocates are so. Because of prying eyes of governments and they don't, they don't. You don't need to know what the heck I'm buying on Amazon. You just need to know that I made a transaction and you can. Right? Because they don't want the, the fear in a lot of people's minds are that. And of course here comes the tinfoil hats that if you can track what it is I'm buying and selling then and. Or you can control the currency in which I buy and sell with then you control me. Which I find it hard to. We did see that with the Canadian truck drivers. Right. They legit just took their, took their bank accounts, took all the money out of their bank accounts so they couldn't continue to do their protest. So whether you agree with that, with the protest or not is irrelevant. It's. Do you agree? Because I had this conversation with my brother in law one time. It's like it doesn't matter who's in office or who's in power or whatever. It could be the one way this day, it could be another way tomorrow. The reason that we protect the rights is so that no matter who's in charge, they can't, they can't fiddle with our business. Right. If I want to say things, I'm, I'm, I'm allowed to be critical of whoever's in, in power. I'm not allowed to slander them. Right. Not a free speech absolutist where I should be able to say whatever I want, whether it's lies and slander or labless whatever. Like, no, that's, that's not the case. And that was not the intention of American free speech either. It was meant to. In public forums, you have the right to be critical of things. So it's a, it's a sketchy topic. I don't know if Jerry wants me to get into this too much. I've tried to just kind of stay right there on the surface of that. If you, if you in at all care for your privacy, then you're going to be a free speech advocate. You're going to be someone that is going to be advocating for privacy. It is interesting. So demand it from your, from your IT stuff and implement as much as you can in your own IT environments and say, see, this can be done. Everybody doesn't need to know this. And that will actually help out businesses because if their information is being kept safe and more difficult, you had more layers of complexity to get at it, then threat actors are going to have a harder time. It's, it's a win, win for everyone. All right, here's, here's maybe the last one for the day. Let's see if we have time. After this, the rich asks, how do you feel about people who release zero days around major holidays? I'm on the fence because the threat actors don't play by our rules anyway. Like, are you talking about threat actors releasing? I mean, obviously that's a bad thing. Most people are on vacations, less likely to get triaged. Well, so, yeah, I, if you're talking about releasing zero days, there's no fix. They haven't done responsible disclosure kind of a hole business. I'm not for that at all. They should contact the vendor and let them know, work with them with the. So they can get it. I understand not every vendor jumps to when someone releases or gives them information that, hey, I found a vulnerability. They like to downplay, they like to slow roll, I get it, but that's going to be on them. That doesn't give you the Right. To then go, well, well, if you won't fix it, I will. Right.