Transcript
A (0:00)
Thank you for attending another webcast edition of bhis. Talking about news as always, we are joined by Monopixel, Dale, myself Ralph and Ryan the shootist. We have some interesting stories. Today we'll be talking about ransomware because I promised that we wouldn't. But now here we are talking about ransomware.
B (0:19)
We're going to be talking the name of the show, I guess.
A (0:21)
Yeah, it's just talking about ransomware.
C (0:23)
Talking about ransomware.
A (0:25)
Talking about ransomware. To be talking about Texas moms pretending to be 13 year old girls, which is what I thought that a lot of moms were trying to do anyway by. By listening to a lot of SoundCloud rap. And then we'll talking about ransomware and containers and whether or not password managers are safe. So, Ryan, do you want to take us into the intro?
C (0:43)
S.
A (0:59)
I'm in a different studio today because that's what I do is I go to different studios, but all of my gear is on its way to Wild West Hacking Fest in Reno or Way West Hacking Fest. So I have to use the backup. Backup backup studio, which is the office upstairs. And yes, I have no ceiling and I'm perfectly aware of that. I appreciate it. What is the first news story that we have for the day? What do we want to talk about here, guys?
C (1:23)
Here we go.
A (1:24)
So start off, Ryan, do you want to tell us a little bit about the reason why you want to throw this one in? Because I disagreed and you had a point. I'm like, you know what? He's right. He's right.
B (1:33)
Well, it reminded me of some Darknet Diaries episode I heard once upon a time about, you know, breaking into physical locations. And it occurred to me reading this article that this woman was physically pen testing this school. She just did not have authorization to do so.
B (1:54)
So maybe she has a future career change in mind.
A (1:57)
I don't know.
B (1:58)
But I just thought. I thought it was kind of a funny story just because of that angle.
A (2:02)
So. And that was the reason whenever you brought that up, I was like, that's probably a really good point as just kind of a point of reference to anybody that's listening to this and they're thinking, you know, what I want to do is I want to hack someplace to prove it's insecure or I want to break into someplace to prove it's insecure. Don't do that if you don't have permission. It's called trespassing. And that is illegal, even though the point itself may be valid. And somebody once explained it to me, me, for like physical pen testing. If you're like, well, I just wanted to prove that I could get there. How would you feel if somebody just showed up into your house and started walking around? It's always possible to gain ingress in most places, right? It is. You can come in through a window, you can come in through doors. Locks are not that hard to bypass. I'm not talking about picking, I'm talking about kicking them open. There's a number of ways that you can actually gain access to places. And the point is, it doesn't prove anything at all. And the quote on this one that I hate is the but the children quote. You know, this is about our children and the safety of our children. That's all I'm trying to do is prevent another mass shooting. She didn't prove anything. And that also gets into like the idea of a threat model. As much as I hate that phrase in the industry, you cannot develop a threat model that can deal with somebody that's showing up with like semi automatic weapons and pipe bombs and things like that. There's always going to be damage that's going to be done. You can set up proper reactions. You can do a number of different things. But in what possible scenario would the school have enough security to actually stop someone who's heavily armed from entering and creating some level of damage? So really she didn't prove anything other than she's just kind of. Kind of dumb, I guess. So what are you guys thoughts on this?
![Talkin' About Infosec News - 6/7/2021 - Talkin' Bout [Infosec] News cover](/_next/image?url=https%3A%2F%2Fimg.transistor.fm%2FAukI425sRBc3M3UIa9lVng7qjeNeYEQ8BZfzCEXhALs%2Frs%3Afill%3A0%3A0%3A1%2Fw%3A1400%2Fh%3A1400%2Fq%3A60%2Fmb%3A500000%2FaHR0cHM6Ly9pbWct%2FdXBsb2FkLXByb2R1%2FY3Rpb24udHJhbnNp%2Fc3Rvci5mbS8xZTA1%2FZWZhNDcxZGM4ZTFj%2FZGJhMTMwNmYzMmJj%2FZjBkNi5wbmc.jpg&w=1920&q=75)