374: Did your SSN get leaked?! (...probably yes)

Episode 374 August 22, 2024 01:09:46
374: Did your SSN get leaked?! (...probably yes)
Technado
374: Did your SSN get leaked?! (...probably yes)

Aug 22 2024 | 01:09:46

/

Show Notes

A $14 million crypto heist, a breach exposing over 2 billion records, and an AMD deal worth nearly $5 billion: this week’s news cycle is putting up some big numbers! Plus, a cyberattack disrupts Microchip Technology’s manufacturing facilities, McAfee unveils a tool to sniff out deep fakes, and SteamOS may offer support for rival systems. Catch all this and more on this week’s episode of Technado!

View Full Transcript

Episode Transcript

[00:00:04] Speaker A: You're listening to Technado. Welcome back. Thanks for joining us for another episode of Tech NATO. Quick reminder, tech NATO is sponsored by ACI learning the focus behind it pro. And you can use that code tech NATO 34 discount on your it pro membership. I was trying to beat my record. There you go. [00:00:18] Speaker B: That was quick. [00:00:19] Speaker A: Welcome and thank you for being here. We are excited to get into today's news. We got some breaking stuff. We got some behind bars. We even got some por pork chop sandwiches towards the end. And, yeah, indeed, I think you're gonna enjoy it. I think Daniel's a little tired today. [00:00:31] Speaker B: I'm a little pissed off is what I am. [00:00:34] Speaker A: Do you wanna share the story or. No, it's not worth it. [00:00:38] Speaker B: The vending machine guy or whomever that stuffs our vending machine is a moron and has impeded my slow poisoning of myself with monster. Because instead of refilling the row, which was not empty, by the way, and putting the new cans of monster in the back, they put them in the front. So when I vended out my monster can, it was piss warm. [00:01:06] Speaker A: It's true. It was. [00:01:07] Speaker B: It was temperate. It's like the one little creature comfort in life that I look forward to is one time a week as I get a monster and I do technado with you good folks. [00:01:18] Speaker A: And they ruined it. They ruined it. So if Daniel seems a little. A little grumpy, that's why. [00:01:27] Speaker B: Yeah, that's why my wife. Flashlight. She said, you're turning into a grumpy old man. I'm like, well, I am an old man. I feel like it just comes with the territory. [00:01:36] Speaker A: It's at least half true. [00:01:38] Speaker B: I look forward to spiraling into full curmudgeon. Yeah. [00:01:41] Speaker A: But we're still gonna enjoy today's episode, even if it's. Even if there's a little bit less energy in Daniel's system and he can't poison himself. [00:01:50] Speaker B: Listen, we're getting to the two minute mark, and we haven't talked with tech news. I know there's some people out there that are ready to, like, put us on. [00:01:55] Speaker A: Well, then let's get into it. We are gonna start off with one of our favorite segments, breaking news. Breaking news. [00:02:04] Speaker B: I just had a minor heart attack. [00:02:06] Speaker A: You didn't know Christian was gonna do that? [00:02:07] Speaker B: I had no clue. [00:02:08] Speaker A: Christian likes to come in the speakers and give us our sound effects, so we appreciate that. First up for breaking news today, McAfee unveils tool to identify potential deepfakes. [00:02:17] Speaker B: Do you say McAfee or McAfee? [00:02:19] Speaker A: I say McAfee only because, like, McAfee. [00:02:21] Speaker B: Is it Mac? [00:02:22] Speaker A: It may be. It's not, but, like, so I say McAfee. Yeah. I don't know. That's just how I've always heard pronounced McAfee. What do you think? Let us know. [00:02:30] Speaker B: How is it pronounced? [00:02:31] Speaker A: Give us your input. We'd love to hear it. [00:02:32] Speaker B: Hear from. John himself pronounces his last name. [00:02:35] Speaker A: Yeah, let's talk to him. At least his first name's easy. But McAfee. McAfee. JM. Good old JM has introduced a tool to detect deepfakes been added to the, to that JM portfolio. It's going to be made available on PCs. So this is, I think I has a potential to be a great thing. Usually anytime I see something involving AI and deepfakes, I'm like, oh, boy, here we go again. Because it's talked about all the time. But in this case, deepfakes are becoming a real problem. [00:02:59] Speaker B: Yeah, they're, they're getting really good at what they do. And if you read this article, it specifically starts calling out the idea of, like, yes, well, there are video deepfakes and, you know, just like, image deepfakes, the ones that are most common and most commonly used, especially to, you know, pilfer the pockets of the poor population out there. There's a lot of p's in that sentence. Is the audio deepfakes? Right? Yeah, I can generate an audio deepfake, makes it sound like I'm your granddaughter or whoever, and we just had an accident, I need some money and blah, blah, blah, blah, blah. Or if you go take it into the corporate sphere where, hi, I'm your CFO, or I'm with finance, or I'm your direct supervisor or whatever the case is, and they use that to kind of like, get you to do something you shouldn't do. Click a link. Hey, I'm going to send you this. Make sure you click that, fill out that form and do the x, y and z, and you're none the wiser because, yeah, the deepfake audio technology is phenomenally good. We messed around with deepfaking your voice at one time, didn't we? [00:04:03] Speaker A: We did. Christian created some fun little clips of my voice doing stuff, and it doesn't always work perfectly. Like, there was what we did, and it just made me going, ah, yeah. It made me start screaming in the middle of the audio. Like it was funny. It was just kind of jarring because. [00:04:17] Speaker B: I was the normal part. [00:04:18] Speaker A: It was, yeah, the screaming was coherent. [00:04:21] Speaker B: Sentences the speech was. I was like, there's no way this is Sophia. [00:04:24] Speaker A: She can't read past third grade level. There's no way that's her. [00:04:26] Speaker B: No, no. She was raised by wolves. [00:04:29] Speaker A: It's, like, as funny as it was, it was kind of jarring because it's like, oh, that's my voice. And that's, like, I definitely didn't do that. It's just. It's off putting. So weird. I think you're right in that. And even if there's not criminal intent behind it, like, the examples you were giving about, like, oh, they need money and all that kind of stuff, it still. I feel it can be misleading because you might get somebody that doesn't really know that that's as big of a problem as it is. And they hear, like, a celebrity or political candidate saying something. [00:04:53] Speaker B: Yeah. [00:04:53] Speaker A: And unless it's, like, outlandishly ridiculous, if. [00:04:56] Speaker B: You want to watch them play cs, go and listen to the headphones. They're very funny. They're very funny. [00:05:02] Speaker A: So it has potential to be a. [00:05:04] Speaker B: Fun, good thing like, that alone justify its existence. [00:05:07] Speaker A: Just stop there. [00:05:09] Speaker B: Yeah. Only see us go that far. [00:05:12] Speaker A: That's it. But, yeah, I think this is good news. It'll be interesting to see where this goes. I've gotten to the point where now I'm, like, paranoid, and I'll see. Christian did, like, a promo for one of our courses, and I genuinely was like, oh, you used AI generated footage in that? Cause there was, like, stock footage of people. No, they were real people. But I'm looking at it. I'm like, there's no. She blinked too slow. It's AI. It's not. So I'm, like, paranoid now. She's, like, doing this slow lizard. Blink. And I'm just like, there's no way that's real. [00:05:37] Speaker B: I just literally saw there was this baby that was born recently that had six fingers on each hand. And I'm like, everybody's gonna believe every one of her photos is AI. Poor kid. [00:05:48] Speaker A: Oh, that poor kid. [00:05:49] Speaker B: Like, that's AI. It's not real. It's not a real person. [00:05:52] Speaker A: So I would say as far as breaking news goes, that's. That's a pretty positive one. It's neat that the. Yeah, we're doing something, working on something to try to combat these issues that come up. [00:06:01] Speaker B: Figure it out. [00:06:01] Speaker A: Of course, we do have to have some. Some black pill. [00:06:04] Speaker B: No, no. Most of it's dumpster fire. [00:06:06] Speaker A: Most of it's awful. Most of it's just terrible. So on the other side of our breaking news segment, we have cyber attack disrupts microchip technology manufacturing facilities. Oh, great, another cyber attack. And again, this is breaking. So this just happened or this just. [00:06:17] Speaker B: This story just wrote this technology. I'm reading the article, so this article. [00:06:22] Speaker A: So I don't know. I know usually a lot of times when like, oh, hey, there was an attack or there was a breach. It'll be like, we don't have any details yet. We gotta wait. So I'm not sure. [00:06:30] Speaker B: They don't how much. They have no details. [00:06:32] Speaker A: Okay, so this is normal. This is standard procedure. [00:06:35] Speaker B: Yeah. Step one. It's just the, the fact that it was a microchip, and they're called microchip technology as the name of the company. They've disclosed a cyber attack that has impacted operations at some of its manufacturing facilities. And they do say, and I quote, as a result of the incident, certain. That's fun. Certain of the company's manufacturing facilities are operating at less than normal levels, and the company's ability to fulfill orders is currently impacted. The company is working diligently to bring the affected portions of its IC systems back online, restore normal business operations, and mitigate the impact of the incident. Unfortunately, they make computer chips for 123,000 customers across the industrial, automotive, consumer, aerospace, defense, communications, and computing sectors. That's a problem. [00:07:24] Speaker A: That's encouraging. [00:07:25] Speaker B: Yeah. To know that. So the little bit of detail they did give in this is that it's, I say detail. It seems like they're hinting that it's a ransomware attack, so they get crypto unlocked, they're back to business. But how much do you trust, like, we're making chips? This is a supply chain for some fairly, you know, important industries, aerospace, defense, communications. Who is the attacker? Where are they from, and what are their motivations? Yeah, it's always nice to pull some dollars out of the pockets of your victims there, but. [00:08:04] Speaker A: But to. For this specifically. Yeah, and, I mean, if it's. I would imagine it probably takes a pretty sophisticated attack to. Unless their security practices were just awful behind the scenes. [00:08:14] Speaker B: And, you know, it's funny. Did they say. Yeah, it does say. It says the company is working diligently. So it does say something about the IT systems. I want to say that they. Yeah. The company revealed in a regulatory filing on Tuesday that it detected suspicious activity on its IT systems on August 17, and on August 19, it determined that certain servers and business operations had been disrupted. So is it just in the it, like, only their IT systems were affected or. And that's what's causing the slowdowns in the manufacturing of their chips, or are the OT systems also been affected? We don't know. [00:08:53] Speaker A: Like, somebody was able to gain access to IT systems, and then through that, we're able to get access to. [00:08:58] Speaker B: Imagine they make a chip that runs a, you know, robot that makes welds. Right. It's a welder. And I remember hearing this at, like, RSA. And that ship has now been affected. It's been compromised to where the weld that the robot makes isn't up to the standards. To the human eye, it looks fine, but in all actuality, it's not meeting the standards. And that it becomes like a bridge beam. Right. That's a problem. [00:09:26] Speaker A: Right. [00:09:27] Speaker B: These are issues we'd like to avoid because somebody thought it would be a good idea to affect how well that robot does its job by affecting the chip that runs the robot. You get the idea. Right. Now I don't know if it's going to go that far. I don't know exactly. Maybe these are all just blank chips, but maybe they're putting back doors into them. Who knows what's going on? And it's affecting chips. And God knows we've been through what happens when we don't have enough chips. [00:09:51] Speaker A: Yeah. [00:09:52] Speaker B: We've gone through a chip shortage in the recent past, and that's not fun for. [00:09:55] Speaker A: Yeah. Our vending machine, it was totally empty. I'm sorry. I don't mean to trigger you. [00:10:00] Speaker B: And I will rule you. [00:10:02] Speaker A: I don't mean triggers. [00:10:03] Speaker B: You've never seen the movie ready to rumble? Very entertaining. [00:10:07] Speaker A: Okay, I'll add it. [00:10:08] Speaker B: Very entertaining. David Arquette and Scott Khan speaking. Not goodfellas, but the godfather. Right. His father is. He played Sonny. His father. Sonny. [00:10:20] Speaker A: Really? [00:10:20] Speaker B: And the godfather. Yeah, I can't. [00:10:21] Speaker A: Oh, James. [00:10:22] Speaker B: Yeah, James. [00:10:23] Speaker A: Yeah. [00:10:23] Speaker B: His name was escaping me. [00:10:25] Speaker A: Yeah. [00:10:25] Speaker B: Scott Cahn's. [00:10:26] Speaker A: Okay, interesting. [00:10:28] Speaker B: It was at the height of, like, wrestling entertainment. Ah, it's all about wrestling. It's got ready to rumble. Very funny. [00:10:38] Speaker A: Is it better or worse than the other, like, martial arts movies you've had me watch, like, fighting movies. [00:10:42] Speaker B: So it is a comedy. [00:10:43] Speaker A: Okay. [00:10:44] Speaker B: Right. [00:10:44] Speaker A: So, like, intentionally. It's a comedy. [00:10:47] Speaker B: Intentionally funny. [00:10:48] Speaker A: Okay. [00:10:49] Speaker B: Interesting. And does do the job. [00:10:50] Speaker A: All right. [00:10:51] Speaker B: It's very dated at this point now. So it'd be kind of like watching a time capsule. [00:10:56] Speaker A: Most of the movies you have kind of, it's kind of like they talk. [00:11:00] Speaker B: About, like, Britney Spears and stuff being relevant. [00:11:02] Speaker A: Okay. She is still relevant. Just very different way. Yeah. Now she's relevant because people are like, is she okay? [00:11:07] Speaker B: Not her music, though, of course. [00:11:09] Speaker A: I guess that's always kind of been a thing. Is she okay? [00:11:12] Speaker B: Girls been through a lot. [00:11:15] Speaker A: Yeah. Yeah. So both sides of the breaking news corn, we have some good news. We have maybe not so good news and want to see how this plays out in the future. But moving on to some not as breaking, but still. [00:11:26] Speaker B: Still relatively new. [00:11:28] Speaker A: Still relatively new. Yeah. New news. Sure. [00:11:30] Speaker B: Recent new news. [00:11:32] Speaker A: So we have this. You probably have already heard about this mostly, and maybe you're a little concerned. I had, like, my mom and stuff reach out to me, be like, what is going on? And why didn't we know about this? [00:11:43] Speaker B: For those of you in the back that have yet to hear, for those. [00:11:45] Speaker A: Of you have yet to hear. Yes. National public data confirmed that there was a breach, exposing some Social Security numbers and. Oh, isn't that fun? And, of course, other data as well. But it was, I believe, like a couple billion records, if I'm remembering correctly, and billions. I thought when. Yes. [00:12:03] Speaker B: I thought it was like 270 million. I thought it was 270 something million. [00:12:07] Speaker A: Two point. Okay. So the leak started after a threat actor in April used the alias UsDod to offer to sell for $3.5 million. [00:12:17] Speaker B: 2.9 billion records. [00:12:18] Speaker A: 2.9 billion records. So that is no small potatoes, in theory. Could be every individual in the United States, their Social Security number. So freeze your credit, you know, just. Just to be safe. But this is something that came up in recent weeks, and it was just. It wasn't until, like, this past week that there was a little bit more information about it. Yeah. [00:12:37] Speaker B: Right. Because. Oh, that's how all things start. Right? There's the. We've realized something may have happened, and now we have to investigate it and then verify. Oh, yeah, there was a security incident, and now we have to disclose if we're especially for under regulation or legal ramifications necessary, since this was, if I'm not mistaken, a government entity that holds this. Obviously, that must be, you know, transparency. Actually, what we hope for. Was it a government agency? [00:13:04] Speaker A: I'm curious. So national public data is the organization. [00:13:07] Speaker B: Yeah. [00:13:08] Speaker A: But I don't think they're, like, a. [00:13:09] Speaker B: Contractor for the government, right? [00:13:12] Speaker A: Probably, yeah. [00:13:14] Speaker B: Was it a dot gov site? [00:13:16] Speaker A: You know, how, like. Well, I don't know, public data. You know, how, like, there are some organizations that, like, seem like they'd be government organizations, but they're actually privately owned. [00:13:25] Speaker B: Yeah. [00:13:25] Speaker A: So I'm just wondering if it's one of those. [00:13:27] Speaker B: So. No, it says nationalpublicdata.com, so it is like a. [00:13:30] Speaker A: But. But they may. [00:13:31] Speaker B: Right. They probably do a lot of work for. [00:13:34] Speaker A: Right. [00:13:35] Speaker B: Government and stuff. So the fact that they were holding all the data on just about everybody on. [00:13:42] Speaker A: Yeah. [00:13:42] Speaker B: Planet Earth. [00:13:43] Speaker A: It's kind of scary, right. [00:13:45] Speaker B: That has ever touched the computer because. [00:13:47] Speaker A: It'S used for background checks and stuff. [00:13:48] Speaker B: Right. [00:13:48] Speaker A: Like the fact that it was just one. One click away or one breach away from it. This just spilling out and being available everywhere. So it was. It was a list or a collection of data that appeared from this user, USDOD, which is not the Department of Defense. It's just the username they chose. [00:14:07] Speaker B: Right. [00:14:07] Speaker A: Clearly this. This here. I don't know that that's representative of the Department of Defense. [00:14:11] Speaker B: Obviously that's NSA. [00:14:13] Speaker A: Yes, yes. This is their profile picture they've chosen. [00:14:16] Speaker B: So I was at a b sides one time in Vegas, and the NSA was there and they were recruiting. Oh, they. They did not, you know, sponsor a booth or anything. They just grabbed a table, like a stand up table, like a cocktail table, and they took a pizza box and they wrote an essay with a marker and said, yes, that NSA, we are recruiting. Please talk to one of the agents about a possible interesting employment opportunity. [00:14:49] Speaker A: I feel like that, to me, I'd be like, sure you're NSA. Sure you are. [00:14:53] Speaker B: Yeah. [00:14:54] Speaker A: Seems. [00:14:55] Speaker B: Seems unreasonable. They just thought they were being funny. [00:14:57] Speaker A: You can have all my information, which. [00:14:58] Speaker B: I mean, to them. If you think about if it is, if it was the actual NSA that did that, not. Not the breach, but the pizza box thing. Right. That was actually really brilliant. [00:15:09] Speaker A: Yeah. [00:15:09] Speaker B: Because what do you think, NSA? You think stodgy? You think government suits here, right? I gotta wear suit and tie and they're like, having fun and showing it that they can have fun. Now, that may be a total lie. They are the NSA, by the way. [00:15:24] Speaker A: Yeah, that's true. [00:15:25] Speaker B: It's kind of their stock in trade. It's a lot of people. [00:15:28] Speaker A: Fair enough. [00:15:29] Speaker B: Collect information. [00:15:30] Speaker A: Fair enough. [00:15:31] Speaker B: But yeah. Yeah, I just thought that was like, if that really is down, this is. I thought it was pretty funny. Everybody wanted to stop and talk to that booth. [00:15:37] Speaker A: It is pretty funny. [00:15:38] Speaker B: Yeah. Table with a pizza box on it. [00:15:40] Speaker A: That's pretty creative. [00:15:41] Speaker B: Yeah. Back to this, though. [00:15:43] Speaker A: Yeah. Like with any other leak, it's. Of course, you know, when personal information is out there, you gotta beware of phishing attacks and stuff because people will use your information, you know, for all kinds of nefarious stuff just to. Just to try to convince you. Hey, click on this link. But in this case, whenever you see, like, Social Security number? That is like, oh, boy, that's pretty scary. That's not just my email address. This is. This is pretty big deal. So for your credit, monitor financial accounts for signs of potentially fraudulent activity, that kind of stuff. There's really not much you can do other than that. Right? [00:16:12] Speaker B: Because it's like, well, yeah, freeze your credit. [00:16:14] Speaker A: It's leaked. Like, it's out there. [00:16:15] Speaker B: Yeah. Once, like, are you gonna change your Social Security number? [00:16:18] Speaker A: There's a chance you're not one of the 2.9. [00:16:19] Speaker B: Can you change your Social Security number? I feel like you probably can, but. [00:16:23] Speaker A: I feel like it's like it's gotta. [00:16:25] Speaker B: Be like some serious rigmarole. [00:16:27] Speaker A: You can't go to the DMV and get like a copy of your registration without providing documents. Can you change, I wonder, your ssn. Let's find out. [00:16:36] Speaker B: Yeah, I've seen wood turn into petrified stone faster than the DMV move. [00:16:41] Speaker A: It's meant to stay with you for life and never change. But it does say to apply, you must visit a Social Security office in person so you can apply for a new one. I guess maybe if difficult, that is to do. Experiment. Technato on location next to you at the local. [00:16:56] Speaker B: It's like, can I get a new Social Security card just because I want one? Or, I mean, I can make it. I can make viable case, right, of my data is compromised. I remember when I was a kid, I want to say that the Social Security cards used to say on them, or maybe they still do, or that maybe I'm just, you know, Mandela affecting this, that this is not to be used as identification. This is not an id. [00:17:19] Speaker A: Right. [00:17:19] Speaker B: Right. Don't use it for identification. We use it for identification all the time. All the time. And that's why it's on all these databases, because it's tied to your id. And now it's like, maybe that was smart and we should go back to that. Stop using Social Security. [00:17:36] Speaker A: Well, because then if it does, if something does happen, it's like you're screwed. That's the only number you get for life. So what are you supposed to do? And they have the reasons listed of, like, what they'll do or the cases. [00:17:47] Speaker B: In which they'll bump the font on that control plus that a bit. [00:17:49] Speaker A: The cases in which they'll assign a different one. So sequential numbers are causing problems if people get the same number. Victim of identity theft, harassment, abuse or life endangerment. Um, certain numbers. Oh, I guess like if you're christian and you get like 666 in your Social Security number. [00:18:02] Speaker B: This is religious. [00:18:03] Speaker A: And you're like, I don't want that. Uh, I don't want that bet. [00:18:06] Speaker B: So I just have to create a religion. Yeah, make my number the one two three. I said religion. [00:18:13] Speaker A: Yeah, exactly. Just give me a new one. [00:18:15] Speaker B: Yeah, I'll have to. Oh, yeah, I'll go through it, man. I'll get a 501 three c right now. It is 501 three c. Isn't that the. [00:18:22] Speaker A: You're going to. You're going to carry out this whole night? [00:18:25] Speaker B: I'm going to L. Ron Hubbard. This. [00:18:26] Speaker A: Okay. All right, well, we'll see how that plays out. [00:18:31] Speaker B: And then, like, everything that has ever been tied to me is now just garbage. [00:18:35] Speaker A: Now, you found a kind of a different thread on this story that relates to this from Krebs on security that has to do with the national public data publishing its own passwords. So this is something that Daniel dug up here and not dug up. It's recent. It's like, as of a couple days ago. So they publish their own passwords. I would say that's still bad. I don't know that it's as bad as Social Security numbers, but that's still. [00:18:58] Speaker B: No, this is the thing you want to avoid. If you like security. Security is usually done way better than this. Usually, where you don't put plain text passwords of how to log into your site in the source code of the site, or in a zip file that's on the index page, landing page of your site. That's a. That's a bad idea. [00:19:19] Speaker A: Generally not considered a best practice. [00:19:20] Speaker B: I. I wouldn't do it. Let me put it that way. I wouldn't do that because that's a great way, apparently, to get a bunch of records leaked to the dark web. [00:19:30] Speaker A: So it would seem. Yeah, absolutely. [00:19:32] Speaker B: See, how interesting is this, though, that this is something that happened in today's day and age. [00:19:39] Speaker A: Yeah. [00:19:39] Speaker B: The fact that somebody's running a website. Now, let me see here. It does say that the review of that archive. [00:19:50] Speaker A: Okay, that's members zip was the name of the archive. [00:19:54] Speaker B: Yeah, members dot zip. But I think this was like a third party, right? Was it actually the NPD? So was it a different site? [00:20:06] Speaker A: Says that it was that cybercriminal US DoD guy that began selling data stolen from the MPD in July. Somebody leaked what was taken. NPD acknowledged it in August and early August. [00:20:15] Speaker B: So it's a records check. Records check is the site. Okay, so here it is, a review of that archive, which was available from the records check website. Until just before publication this morning shows. That is right. Is records check the site, it says. [00:20:34] Speaker A: Okay, so the exposed archive indicates records check users were all initially signed the same six character password, instructed to change it, but many did not. So it sounds like the members in this membership file are records check users. [00:20:44] Speaker B: So, so is. But is that the NPD site? Is records check a. A subdomain or a landing page like an endpoint on the NPD site? Or is records check its own site? Because I remember reading about how the guy that runs the records check thing, that was, he's like an actor. [00:21:04] Speaker A: Yeah. [00:21:05] Speaker B: That started this site and they were like a third party that were off, that were basically facilitated for the NPD. [00:21:17] Speaker A: What's he been in? [00:21:18] Speaker B: Am I wrong? It's like four. [00:21:19] Speaker A: You're right. [00:21:19] Speaker B: He looked up as IMDb. [00:21:20] Speaker A: Yeah, he's an actor. [00:21:22] Speaker B: Am I just looking over this? I do not see that information here. [00:21:25] Speaker A: The only connection I can see is that the passwords that were included in that archive are identical to credentials exposed in data breaches involving that guy's email address. Okay, so that's the connection there. And he is the founder of the MPDH of the national public data. Oh, that's NPD's founder, actor and retired sheriff's deputy Salvatore Varini. This is crazy Salvatore, or however he pronounces it, it is crazy talk. So it's a bit chaotic. [00:21:50] Speaker B: Retired actor slash sheriff. [00:21:53] Speaker A: Yeah, sheriff's deputy. [00:21:53] Speaker B: Sheriff. Deputy. [00:21:54] Speaker A: What a. What a resume. [00:21:56] Speaker B: Alvareni. This sounds like he's like a magician. So what's funny? In the movie ready to rumble, we're back there, right? It's all about ready to rumble today. [00:22:06] Speaker A: It's only a matter of time. [00:22:08] Speaker B: They hire a wrestling coach and his name is Sal Bandini. [00:22:12] Speaker A: Oh wow. [00:22:13] Speaker B: And he says, sal bandini, wanna wrestle? And he's like this old man. He just wrecks them. It's so funny. [00:22:19] Speaker A: It's like remarkably close to Sal Marini. It's kind of weird. What are the odds? [00:22:23] Speaker B: It's some sort of like. It's obviously a simulation we're in. [00:22:26] Speaker A: I feel like. Yes, Salvatore Verini sounds like the name of like a snake oil salesman that I would see. I'm not saying that this guy is. I'm not trying to insult him, I'm just saying that name. [00:22:33] Speaker B: No, no, no. [00:22:34] Speaker A: Sounds to me like Salvatore Verini. Step right up and buy your blah, blah, blah, blah. It does. It sounds a little. It sounds like a very character name. [00:22:41] Speaker B: Yes. [00:22:42] Speaker A: But yeah. So bad luck for Sal. Sorry about your luck. Sal that sucks for you. And bad luck for NPD and bad luck for records. Check. [00:22:48] Speaker B: Lesson learned. Don't put that kind of stuff in plain text on your landing page. [00:22:54] Speaker A: Don't put your members zip file. [00:22:55] Speaker B: Just saying there as a download link. [00:22:58] Speaker A: For everybody to see. Yeah, right. [00:23:00] Speaker B: That's. That's a bad idea. [00:23:01] Speaker A: Yeah. Well, moving on. [00:23:03] Speaker B: Cannot comment. That says it's because it's an open investigation and it makes me look really bad. [00:23:08] Speaker A: Right. [00:23:09] Speaker B: That part. I might have op ed it, but. [00:23:10] Speaker A: That'S always it, isn't it? We can comment at this time. We don't have any details. And also, I'm panicking a little bit. We'll wait on that one. [00:23:17] Speaker B: I've. I've had four cry sessions this morning alone. [00:23:20] Speaker A: So maybe. Maybe in the future, this guy, this UsDOD guy that's responsible for this stuff, maybe he'll get his just desserts. [00:23:26] Speaker B: Maybe. [00:23:27] Speaker A: We do see that happen sometimes here on Technato. We see people end up in a lovely. What do you call it? A state sponsored prison or something? State sponsored hotel. [00:23:34] Speaker B: County hotel. [00:23:35] Speaker A: County Hotel. Yeah, that's what you call it. So, anyway, speaking of which, this is behind bars. [00:23:44] Speaker B: I was ready. [00:23:45] Speaker A: Behind bars. All right. Poor Christian. I just, like, spring that on him out of nowhere. So, on the positive side of things, hackers linked to $14 million holograph crypto heist. Oh, is he doing the effect now? [00:24:00] Speaker B: I have no idea. [00:24:01] Speaker A: We've lost control of the show. Listen, things are off the rails. [00:24:05] Speaker B: We're all pretty drunk. [00:24:07] Speaker A: Except for you. You didn't get your drink this morning. [00:24:13] Speaker B: It's a real burr in my saddle, I'm not gonna lie. And you keep kicking that scab open. Not helping. [00:24:19] Speaker A: I'm sorry. I'm sorry. Yeah. So people were arrested, they committed a crime, and they got arrested. So, going a little bit more into. [00:24:25] Speaker B: Detail, they're probably filling vending machines with bullshit. [00:24:29] Speaker A: This happened in Italy. These hackers were linked to a $14 million holograph crypto heist, and that is no small amount of money. And of course, they got the AI generated v for vendetta mask. Anonymous hackers up there. Guy Fox, guy Fawkes. Yes. I haven't seen that movie in forever. I only watched it because it had Natalie Portman in it. [00:24:50] Speaker B: Remember? Remember the 5 November? [00:24:52] Speaker A: I'm glad I watched it. She was great in that movie. So their police force found it was four individuals suspected watch that movie. V for vendetta. [00:24:59] Speaker B: Yeah. [00:25:00] Speaker A: Yeah, I would agree. I would agree. It's. If nothing else, it's a very well done movie. [00:25:03] Speaker B: And also a good one if you haven't seen it, is equilibrium Christian bale. [00:25:06] Speaker A: Is that the one where they take pills so they don't feel emotion? [00:25:08] Speaker B: Yes. [00:25:09] Speaker A: Okay. You told me about that a while ago. Great flick, but I haven't watched it. And I like Christian Bale. [00:25:13] Speaker B: Great flick if you like action. Dystopian futures and Christian Bale. And was it Sean Bean? I think even though he, as he does, he dies. Really interesting flick. Brilliant. [00:25:26] Speaker A: I do like dystopian futures when they're not. [00:25:28] Speaker B: I'll give you a fun little weird fact that you might not notice until you notice it, is that when people get shot in the movie, like, puffs of dust come off of their body. And when I was watching this in, what was it, 99 or 2000, whenever I saw this, I was like, are they mummy people? What is. What is happening here? Why. Why is every time somebody gets shot, like, blasts of concrete. [00:25:53] Speaker A: Yeah. [00:25:54] Speaker B: Dust flying off of their body. It was very strange. But, hey, it worked. [00:25:58] Speaker A: Oh, so you don't know why. [00:25:59] Speaker B: No. There's sword fights as well, by the way. [00:26:01] Speaker A: Oh, okay. I thought it was gonna be like. Oh. Cause, yeah, fun fact, they're actually made out of plaster. I thought it was gonna be like. [00:26:05] Speaker B: I haven't sold it to you enough. I'm gonna say two words and just look it up. Gun kata. [00:26:11] Speaker A: Gun Kata. [00:26:13] Speaker B: Oh, man. [00:26:13] Speaker A: Okay. [00:26:14] Speaker B: Oh. I'm gonna go home and watch this movie. [00:26:16] Speaker A: Okay. I'll look. [00:26:18] Speaker B: I lifted my spirits just thinking about it. [00:26:20] Speaker A: I'll look that up on a non work sponsored machine. [00:26:22] Speaker B: No, there's nothing dangerous about it. [00:26:24] Speaker A: Okay. I don't know. I don't know if I trust you. [00:26:26] Speaker B: Nor should you. [00:26:27] Speaker A: But anyway, speaking of danger, criminals arrested. Yeah. Jumping on the computer. No, that's okay. That's okay. I do appreciate the movie recommendations. It was four folks suspected of cybercrime and money laundering. They had been living in a luxury villa as. As they usually do. Way to lay low. You know, I feel like. Why? I feel like if I had stolen all this money and bit. Don't they say, like in all the mob movies? Like, don't buy. Make any big purchases. Don't buy anything big. [00:26:48] Speaker B: I believe in the movie that you have on your shirt. [00:26:50] Speaker A: Yes, yes, that was referenced. It's like it's in my mother's name. It's no big deal. Take it back. [00:26:54] Speaker B: As he do, he goes out and buys the biggest cadillac, right? [00:26:57] Speaker A: And Henry Hills, Lincoln or whatever. These guys are crazy. And then he goes and buys them. [00:27:00] Speaker B: He's got a huge tree. [00:27:01] Speaker A: Yeah. [00:27:02] Speaker B: Yeah. [00:27:02] Speaker A: And it's just. Come on, common sense. So these guys. Clearly. And that took place in Italy or the movie didn't, but this took place in Italy. [00:27:08] Speaker B: Yeah. So Sal Bandini. [00:27:12] Speaker A: It'S full circle. There were some arrests, some seizures. Not that kind. And two of the four individuals were arrested. The other two were investigated, but for now they're free. So we'll see if they get brought in at a later date. But they seized cryptocurrency, wallet, private keys, codes, ledger keys, various electronic devices, and the remainder of the stolen funds will be returned to holograph, presumably. So that's good. [00:27:35] Speaker B: The story has a happy ending. [00:27:36] Speaker A: I would say it's as happy as an ending as it can be. [00:27:39] Speaker B: You know, think about being the two douchebags that did this. Right? And correct me if I'm wrong, they believe this was an insider threat. It was people that were either, like, contractors or whatever that worked and they had inside knowledge of their systems. [00:27:55] Speaker A: I think that is how malicious actors exploited a smart contract flaw that allowed them to arbitrarily mint 1 billion HLG, which is holograph's token at the bottom. But it's entirely possible. And I would imagine having inside access to that stuff would make pulling something off like this. [00:28:14] Speaker B: Yeah, that's an issue. So insider starts becoming a lot more. But. But I'm just thinking to myself, I mean, these guys, I got this. I got $14 million. I am living it. I'm basically a movie criminal at this point. [00:28:28] Speaker A: Yeah. [00:28:28] Speaker B: Because I'm in Italy. [00:28:29] Speaker A: This is Ocean's eleven, and I'm making. [00:28:31] Speaker B: It rain on people. And, you know, just by. Yeah, the Ferrari down there. Mine. Right. And what do you mean the police are here? What would they like to speak to me about? Obviously, I'm a business. [00:28:46] Speaker A: Money fair and square. I got it playing craps in Vegas. [00:28:49] Speaker B: Exactly. [00:28:49] Speaker A: You can't prove anything. [00:28:50] Speaker B: No, you cannot. [00:28:52] Speaker A: And this was, I believe, USD, I'm pretty sure. So even more worth even more in Italy. [00:28:57] Speaker B: So, yeah, maybe this was wrong. We read a lot of articles. They can't bleed together. [00:29:02] Speaker A: Yeah, they do bleed together. Also, we're. [00:29:03] Speaker B: I was reading another cryptocurrency, and maybe that was what it was, another cryptocurrency breach. [00:29:08] Speaker A: It's entirely possible it was. [00:29:09] Speaker B: Yeah, that's what it was. It was a different one. [00:29:11] Speaker A: So whatever's left presumably will be returned to holograph, which is great. It's funny because, like, you read about stuff like this and, like, as a kid, when it's in movies and stuff, and, oh, there was a heist or something was stolen. The happy ending is people get their money back. They get their stuff back. Like, and it's almost never like that in real life. Like, if I had a bunch of money stolen out of my bank account, I probably would not get a lot of that back, because it's like, well, all these charges were made on your card, and we can't. Like, we can stop it and we can maybe get the guy that did it, but, I mean, I don't know. Unless I go to court, like, I don't know what I would do to get that money back. There's a good chance I won't see a lot of it. [00:29:43] Speaker B: Yeah. So, you know, you're insured by your bank and the FDIC, that if they prove that it's fraud, then up to $100,000. [00:29:52] Speaker A: Right. [00:29:53] Speaker B: So. [00:29:53] Speaker A: Which I definitely don't have. [00:29:55] Speaker B: You should get your money back. [00:29:56] Speaker A: So maybe I'd be good. [00:29:57] Speaker B: Yeah, those charges would bleed, but they'd have to prove there would be an investigation. And then if they deem that it was fraud, you'll get your money. [00:30:05] Speaker A: It'd probably take a little bit. Yeah, I just. [00:30:06] Speaker B: Yeah, I. My wife had $1,000 stolen out of her account. And she was like, oh, no. What's happening? So we called the bank, and props to Wells Fargo, they just went, oh, you have your money back. Like it was a phone call. I went, yeah, you're good. [00:30:26] Speaker A: That's nice. [00:30:26] Speaker B: Here's your money back. We'll put a freeze on that. [00:30:28] Speaker A: Huh? [00:30:29] Speaker B: Because they hadn't actually transferred the funds. [00:30:31] Speaker A: Yet, so it was, like, still pending. [00:30:33] Speaker B: Yeah, it was in a penny. Why did they. [00:30:35] Speaker A: That's good. That's good. [00:30:36] Speaker B: The purpose of that, it was like, yeah, it was like a grand. And so they just said, yeah, we just, you know, canceled the transaction, and now you're good. [00:30:45] Speaker A: For all their faults, I know Wells Fargo's had some. Some bumps over the years. [00:30:49] Speaker B: They. They have been. I have, in my experience with them, had another person trying to use our card, and they called me, and I was like, yeah, bullcrap. [00:31:01] Speaker A: Yes. [00:31:01] Speaker B: Fargo doesn't call me. Right. They send me something. They're like, by all means, call. Call us back. Call the number and ask. My name is such and such. I said, okay. Click. And I went to Wells Fargo. I found the support line, and I called it, and I asked for whoever it was, Bill. And I was like, hey, Bill. He's like, told you. [00:31:25] Speaker A: Yeah. I was gonna say, in my experience, I know that they've had some bumps, just like every organization has, but in my experience, I've always been happy with Wells Fargo. And they, like, I think I told you my brother was trying to rent an apartment. He's trying to steal your money, right? Well, maybe when he was younger. Sure, yeah, that's why I don't live at home anymore. But he was trying to rent an apartment, and it was. Somebody was like, oh, yeah, I've got. You've got people that will lease to college students. Like, older folks that are like, yeah, my kids are all moved out. I've got this spare bedroom. If you want to, like, rent from me, that's fine. And so it's not abnormal, uh, at least in the area he was looking, and so didn't think anything of it. And it wasn't until he'd already tried to pay, like, a deposit, like a couple of times. [00:32:04] Speaker B: Oh, yeah, I remember we were. We were together when that happened. We were at. [00:32:07] Speaker A: Yes, we were at hackscon. And then my mom's like, hey, so I think somebody might be trying to steal money. And I'm like, hang on. And there's like, of course the signal's crap. And I'm like, great, this. [00:32:16] Speaker B: We were inside of a, like a giant metal building. [00:32:19] Speaker A: Yeah, it's like a tin can. [00:32:19] Speaker B: Yeah. [00:32:20] Speaker A: I'm like, okay, hang on. I'm trying to. Killing my, like, a $100 hamburger from the cafeteria. And I'm like, okay, give me a second. And it was the only reason that the person that was trying to take advantage of them didn't succeed was because Wells Fargo blocked every single one of them. Was like, this looks weird. This usually looks suspicious. And it was like three or four attempts, and so they could have easily. Okay, fine. But they didn't. And it was only because of Wells Fargo blocking. This is not sponsored by Wells Fargo, by the way. It's just, you know, I'm happy to have them. And I think they, especially on an individual level, they do good work. But, yeah, these guys got arrested. [00:32:51] Speaker B: One of my happy days. [00:32:52] Speaker A: One of your many. Yeah. He keeps his money divided. [00:32:55] Speaker B: That's right. It doesn't sit all in one pot. [00:32:57] Speaker A: It's in offshore accounts. I'm kidding. I'm just kidding. Well, lots of big, big money that we're talking about here. We are going to take a quick break just to reach about the halfway point of the show, but we have more big money news coming up, so don't go away. We'll be right back here on Technado. Hey, I'm Sophie Goodwin, edutainer at ACI learning and subject matter expert for our new course, cybersecurity fundamentals. If you're new to cybersecurity, this is the course for you. Anyone from high school students to professional switching careers. These episodes are designed for you as an introduction to essential security terms and concepts. So we'll walk through security principles, governance, risk and compliance, access controls, threats and attacks, incident response, network security, and we'll look at some best practices for security operations. Security doesn't have to be scary. Check out cybersecurity fundamentals in the ACI learning course library. Welcome back. Thanks for sticking with us through that break. It is approximately four degrees in here. My hands are numb and I am ready to get in the way. [00:33:58] Speaker B: I cannot feel my fingers. [00:34:00] Speaker A: It is crazy. That's why we have to type so much, to keep the feeling in them. If you are enjoying this episode, we hope that you'll consider subscribing so you never miss an episode in the future. Leave a like if you're enjoying this episode and comment down below, let us know what you enjoyed, what you want to see in the future. And we do love to hear opinions on these stories. [00:34:14] Speaker B: Yeah. [00:34:15] Speaker A: So make sure to make sure to do that. We'll give you a positive Yelp review. [00:34:19] Speaker B: The thing or something. [00:34:20] Speaker A: Yeah. But I did promise that we had another story that had to do with some big money, and I was not lying. I'm not gonna make a liar of myself. AMD signed a $4.9 billion deal to challenge Nvidia's AI infrastructure lead. Now, upon reading this, initially, I was like, oh, great, another acquisition of. Because we talked a while ago about that, how Microsoft was acquiring companies, and it was like this really big deal, like huge money. And it was like, wow, Microsoft just going to go around and buying up all these smaller businesses or companies. [00:34:48] Speaker B: Fun fact, Bill Gates is one of the largest farm owners in the world. [00:34:53] Speaker A: That's interesting. Yeah, we could probably. [00:34:57] Speaker B: That's odd farms. [00:34:58] Speaker A: Yeah, that's really odd. [00:34:59] Speaker B: Crazy, right? [00:35:00] Speaker A: Yeah, that's a whole podcast episode in of itself. [00:35:02] Speaker B: What are you doing, Bill? [00:35:04] Speaker A: My mom's gonna have something to say about that one. [00:35:06] Speaker B: I like to throw conspiracy stuff just like a grenade. There you go. Have fun. [00:35:12] Speaker A: I'm gonna get a phone call about that later. My grandma's gonna be like, so, Sophie. But in this case, it seems to me like AMD's trying to be a more, I don't know, worthy competitor, I guess, of Nvidia. Because Nvidia's like, got the lead on this stuff. And so to me, it's like, I think competition's always great. I think it's great to have competition. [00:35:31] Speaker B: It only benefits the consumer. [00:35:32] Speaker A: Yeah, absolutely. So in this case, if buying this, they bought a company called ZT Systems. It's an artificial intelligence infrastructure group that I guess years ago, they used to be called ZT Group, and they weren't involved in AI or anything. They sold other stuff. And it's only recently they've gotten into the AI game, as everybody has. As everybody has, but 4.9 billion cash in stock transactions. So this group, I mean, that's a win for ZT systems that is making all. [00:35:58] Speaker B: Yeah, yeah. They're gonna be able to buy a new house or something, a new earth. [00:36:02] Speaker A: How much does the earth cost? How much does the earth cost? So this AMD is a California based group. They said that they're hoping this accelerates the adoption of. They have a line of AI data center chips called the instinct line, and they compete. They're supposed to compete directly with Nvidia's GPU's. So it will be interesting to see if they do hold up to that standard and if they can provide some. Some good competition to that. But it's just like, you look at this stuff and it's like, that's more money that I could ever imagine in my entire life. And this is just like, yeah, just cost of doing business. [00:36:36] Speaker B: Oh, was it 4.9 billion? [00:36:38] Speaker A: 9 billion. [00:36:39] Speaker B: So correct me if I'm wrong, but, like, when Disney bought the Star wars franchise in, like, 2009 or so, it was four and a half billion dollars. [00:36:54] Speaker A: 4.05 million. [00:36:55] Speaker B: Zero. [00:36:56] Speaker A: 5 billion in the form of cash in stock. [00:36:57] Speaker B: That was. That was many years ago. Does that mean the Star wars franchise is worth more than AI? [00:37:06] Speaker A: That's a good question. [00:37:07] Speaker B: Right? [00:37:07] Speaker A: To be fair, the Star wars franchise, I feel like, has been around, at least in the public eye, a lot longer than I am. [00:37:14] Speaker B: But it's just interesting thought to put these two things together. [00:37:17] Speaker A: And this isn't even the biggest acquisition that AMD has gone through. They bought a company called Xilinx Zilinks X I L I n X for 35 billion in 2022. $35 billion? [00:37:28] Speaker B: Whoa. [00:37:29] Speaker A: Like, are you kidding me? That's insane. [00:37:31] Speaker B: That's a. That's a lot of money. [00:37:33] Speaker A: And I'm hoping that this isn't like a typo, because watch. Watch it be like, oh, we met million. Sorry. I think, yeah, no, 35 billion. That is insane. And this other article says that it was 49 billion, somewhere up in the tens of billions of dollars was their last acquisition back in 2022. So this isn't even the biggest acquisition they've undergone. [00:37:54] Speaker B: So Amd's doing okay. [00:37:55] Speaker A: Monetary, they're doing fine. They're doing fine. [00:37:57] Speaker B: Apparently Nvidia hasn't hurt them too bad, right? [00:38:01] Speaker A: Yeah, Nvidia, it sounds like, has the lead on this stuff, but AMD is coming up fast. [00:38:07] Speaker B: Someone in the comments section said, it'll be interesting to see if this is just, if this is, quote, just in time for the AI crash. End quote. As companies start realizing that they haven't figured out how to make any money from this AI stuff yet. That's funny. [00:38:22] Speaker A: That is interesting. There were a couple comments that were like, I don't know if this is conspiracy stuff, but it was like, oh, how convenient. AI becomes big just as bitcoin mining starts to fizzle out and they put AI in quotes. So I'm like, what is, we just. [00:38:34] Speaker B: Repurpose all your bitcoin mining? [00:38:36] Speaker A: Yeah. Like what? [00:38:37] Speaker B: AI. [00:38:38] Speaker A: Okay. [00:38:39] Speaker B: It's basically the same requirements. [00:38:41] Speaker A: Yeah. [00:38:41] Speaker B: You need a lot of GPU power, right? [00:38:45] Speaker A: Yeah, I guess that's true. [00:38:46] Speaker B: Fairly decent horsepower system. [00:38:48] Speaker A: And that is interesting. [00:38:50] Speaker B: You're running AI. I was literally just looking up between the break on how can I build an AI system at home for fun and profit. [00:38:58] Speaker A: No profit. Definitely for fun and loss of money. [00:39:01] Speaker B: Yeah, for fun and loss of money. Exactly. It'll just end up costing me for. [00:39:05] Speaker A: Fun and cost to build the system. [00:39:07] Speaker B: That it requires to make AI at home. [00:39:10] Speaker A: But, and it does seem like a lot of the consensus is that, hey, competition, this is great. But somebody did mention, like, okay, yes, competition is good, but the lack of competition doesn't mean that more giant consolidation efforts are the answer. So both sides of it, you know. [00:39:26] Speaker B: Right. You basically end up with just two companies that do it. [00:39:29] Speaker A: Right. [00:39:30] Speaker B: And that's, that's not really competition. [00:39:32] Speaker A: That's true. [00:39:33] Speaker B: Right. [00:39:34] Speaker A: If you only had like, yes, you might. Because what is that? [00:39:36] Speaker B: A be more decentralized. [00:39:38] Speaker A: A monopoly is like one company, right? [00:39:39] Speaker B: Is one. Yeah. [00:39:41] Speaker A: I don't think it would be an oligarchy, though, because an oligarchy is where like, you have more than one company and they have like an agreement. Right. [00:39:46] Speaker B: Oligarchy is kind of like a oligopoly. [00:39:48] Speaker A: Oligopoly is what I'm thinking. [00:39:50] Speaker B: Wrong word. [00:39:50] Speaker A: Wrong word. [00:39:51] Speaker B: Look, it's, don't you ask chat GPT what oligopoly is. [00:39:56] Speaker A: You stop it. You leave me alone. A state of limited competition. A market is shared by a number, a small number of producers or sellers. So technically, yes, that would be it. I thought I remembered learning about it, and it was like when you have competitors, but they kind of have an agreement to like, okay, I won't charge any more than this. If you don't charge any more than this. Maybe I'm thinking of something else. [00:40:13] Speaker B: Wink, wink, nod, nod. [00:40:14] Speaker A: Right. [00:40:15] Speaker B: All in it together. Even though we're separate. [00:40:17] Speaker A: Yeah. Somebody, some economists in the comments will. [00:40:19] Speaker B: Be like, you idiots, this is the most based episode we got. Bill Gates, lion Farms, and, yeah, somebody's. [00:40:26] Speaker A: Gonna come out of their office and be like, stop the show. [00:40:28] Speaker B: Yes. None of this red pill stuff. [00:40:31] Speaker A: But, but anyway, so I saw 4.9 billion of headline. I was like, whoa, that's not small potatoes. So I figured we would maybe mention that. And it was an interesting, interesting development. Good for AMD. I guess we'll have to see how this plays out. We do have some gaming news, which is. Which is great. [00:40:47] Speaker B: I'm wearing a gaming shirt. [00:40:49] Speaker A: Oh, my gosh, you are. I just noticed that it didn't even register. I just. [00:40:52] Speaker B: Atari. [00:40:52] Speaker A: Atari. Yeah. That's good. [00:40:54] Speaker B: At all. [00:40:55] Speaker A: That's good. I think. I think the people understood. I think they got it. [00:40:58] Speaker B: I don't know if you've heard of them. [00:41:00] Speaker A: You mean like the band? [00:41:00] Speaker B: Check them out. The. [00:41:02] Speaker A: Atari's the band. They got some good stuff. [00:41:04] Speaker B: It's just a bunch of consoles sitting. [00:41:05] Speaker A: On the floor playing like the eight bit music. So there was. I think it was Gamescom or something that happened this week. And there was a bunch of games that were announced. But in other gaming news, Valve has confirmed it's going to support the Rog ally, which is a handheld with its Steam deck operating system. And this. It's a competitor of Steam, technically. [00:41:27] Speaker B: Yeah, it is. It is a steam competitor, which makes you wonder what's in it for. What's in it for Valve. [00:41:33] Speaker A: Yeah. Like, to be like, sure. [00:41:35] Speaker B: Is. Is access to Steam more important? Even though you probably still could. Okay, I haven't played with an RGLI. [00:41:44] Speaker A: I have not either, but. [00:41:47] Speaker B: So the Steam deck gives you access to your library on steam, and you can stream those games on the stream deck. [00:41:55] Speaker A: Right. [00:41:56] Speaker B: Everybody's happy, right? It's a cool thing. It's actually a really nice piece of equipment. Rog Ally is a windows based computer with a screen and some joy. Like, it's really nice. Don't get me wrong, it was a really sweet machine with all the. You know. It is a gaming console. It's a handheld gaming console. [00:42:15] Speaker A: Kind of looks like a PSP. [00:42:17] Speaker B: That's right. Yeah. It's running windows eleven. [00:42:19] Speaker A: Okay. But interesting. [00:42:22] Speaker B: Yeah, there's, there's multiple versions of it. I think you're looking at more recent one maybe. [00:42:26] Speaker A: Yeah, I don't know, it just, it. [00:42:27] Speaker B: Looks like, yeah, there you go. This thing's a beast, right? Nice. [00:42:30] Speaker A: Pretty cool looking. [00:42:31] Speaker B: But now it's supporting the, the valve OS or. Valve. Or valve Os. The steam Os. What? Again, what's in it for valve to do this? Are they making more money on access to steam through? I like. There's got to be a monetary, there's no reason they didn't settle the goodness of their heart. Go, you know what, competitor, just go ahead. [00:42:54] Speaker A: We just want to have an oligopoly help you help us. [00:42:58] Speaker B: Right. We're going to have a gentleman's agreement that this is cool. We're friends in some way. [00:43:04] Speaker A: I was really hoping to see some. Cause there's usually people in the comments that are like, there was gonna be naysayers like, you know, no matter what it is, it could be like water for everyone, like free water for thorough countries. And people would be like, no, you know, like, there's always gonna be somebody that's against something, but there's nobody here that I can see that has that, like, oh, well, this is bad. Yeah, it's. Or like, why are they doing this? Nobody's raised that point. Like, what's, what's the motivation? There's got to be. [00:43:31] Speaker B: Right. [00:43:31] Speaker A: It sucks to feel like you have to be cynical like that, but it's like, like you said, people don't do this out of the kind. [00:43:35] Speaker B: It's business. Right. Businesses are in businesses to do one thing, and that is make money. [00:43:39] Speaker A: Yeah. [00:43:40] Speaker B: Right. I don't care. Only the smaller businesses are really focused on their customers and really care. Right. But once, once it becomes like corporate and enterprise level, it's impossible. They're, they're, they have investors, they have boards, they have all this stuff that is behind them going, I don't care about your product. I, what I cared about was how fast you were growing. [00:44:03] Speaker A: Yeah. [00:44:04] Speaker B: And you pitched the idea that if I give you money, I'm going to get a bunch of money in return. And therefore. So once you're at that level, it becomes less about the customers per se and more about the return on the investment. [00:44:19] Speaker A: Okay. [00:44:20] Speaker B: Okay. So obviously steam is at that level. They are no small mom and pop shop for sure. [00:44:25] Speaker A: Yeah. [00:44:25] Speaker B: Okay. That's, that's just what's up. So what's in it for them. How do they see a return monetarily? By opening this up. And I'm just not privy to that kind of, yeah, I'm not, I'm not deep enough in the weeds. I just saw this was like, that's interesting. [00:44:45] Speaker A: Well, so Christian has an opinion. Christian has some input. [00:44:48] Speaker B: He did say, right. [00:44:50] Speaker A: He said he thinks that is to push developers to add more support for Linux and also to sell more games and to compete with the Epic Games store. Steam Os kind of forces users to buy games on Steam and not their competitors. [00:45:00] Speaker B: Gotcha. Gotcha. I'm not familiar with the Epic Games store. [00:45:05] Speaker A: Gosh, Epic Games. Don't they do like Clash of Clans or something? Epic Games is like one of those things where it's like you wouldn't know it just by the name, but then it's like, oh, they have this, they have that. And you're like, oh, right, that game. Let's see. [00:45:18] Speaker B: It was very informative. [00:45:19] Speaker A: Epic Games does Fortnight. [00:45:21] Speaker B: Oh, okay. [00:45:22] Speaker A: That's the one I was thinking of, Fortnite. Like I don't know Epic Games, but. [00:45:25] Speaker B: I know Fortnite because, you know, everybody knows. Yeah, absolutely. Yeah. And they made, okay, so it increases their, their like landscape, I guess. Right. That they, they're basically kind of renting land over in Rog ally other handhelds that they're gonna eventually support according to this, that they, that they expect that to occur, that they're going to continue to open up support for other handheld systems. [00:45:51] Speaker A: Yeah. [00:45:51] Speaker B: Right. So that broadens their market to steam, making them more money. There you go. Seems like that seems to be the reasonable case. [00:46:03] Speaker A: It sounds like a win win. [00:46:05] Speaker B: We'll go with it. [00:46:06] Speaker A: It seems like we'll see. We're not going to end that article on a cynical note. [00:46:10] Speaker B: Right. Because like how does, what does wrong do to give you games? Like, I know it's like an emulation station, right. So if you want to emulate, it's a powerhouse for emulation. You can do things like was it called moonlight where if I have like an Xbox or a P, a PlayStation or something, I can moonlight the game to, to the handheld. [00:46:29] Speaker A: Well, it comes bundled with three months of Xbox Game Pass ultimate for free. [00:46:32] Speaker B: Alright. So obviously has access. Xbox Game Pass. Probably you can also do PlayStation as well. [00:46:39] Speaker A: So interesting. Well that's pretty cool. See, I'm not, I've never used that handheld. The only handheld I think I've ever used is. I guess the Switch counts as a handheld because. [00:46:47] Speaker B: Yeah, it does. It's kind of a bridge between handheld and console hybrid. Yeah. [00:46:53] Speaker A: Yeah. [00:46:53] Speaker B: It's really crazy. [00:46:54] Speaker A: Not sponsored by Switch. But we do. We do enjoy the switch. [00:46:56] Speaker B: That's neither. That's not an endorsement in any way. That's just a fact. [00:47:00] Speaker A: Yeah. And then the Nintendo DS I did. [00:47:03] Speaker B: Enjoy that switch has an OLED screen. Not sponsored by. [00:47:08] Speaker A: I don't know. I don't know if the Wii U counts as a handheld because it had that. The gamepad that came with it. [00:47:13] Speaker B: Yeah, it was kind of a similar. Because that was right before the Switch. [00:47:16] Speaker A: Yeah. [00:47:16] Speaker B: Right. It was obviously them moving toward that style of system. [00:47:21] Speaker A: Yeah, it was. It was like they were just getting right. Yeah, but it was separate. Like the Wii was still its own thing, but the game had came with it and you could use it to like, you could use that to play Wii games or you could play multiplayer. So like, it wasn't a hybrid, but. [00:47:35] Speaker B: It was like, it was like proto. Hi. [00:47:37] Speaker A: It was like the step towards. Yeah, the Switch. Anyway, so. [00:47:40] Speaker B: Yeah, this was a fun conversation. [00:47:41] Speaker A: Although allowing Steam OS on a competitor device, that's pretty cool. So Daniel. [00:47:47] Speaker B: Yeah. [00:47:48] Speaker A: You. You brought this one up a couple days ago and your general reaction to it was what the hell is going on? Or what the hell is this? So there's a zero click exploit that is. Oh yeah. Zero clear exploit concerns are driving the urgent patching of a Windows TCP IP flaw. And that by itself is like, oh, okay, interesting. Yeah, there's, there's a little more to it. It sounds like. [00:48:09] Speaker B: Well, the thing that made me go, what? Not that once I like got over the initial natural shock of it, you go, yeah, I guess that makes sense. [00:48:21] Speaker A: Yeah. [00:48:21] Speaker B: Right. So obviously we're talking about the Windows TCP iP. Zero click or zero. Yeah, zero click flaw. Totally bad. Turn off IPV six and you're good. 9.8 is basically. Yeah, it's a big deal. [00:48:36] Speaker A: Yeah. [00:48:37] Speaker B: So. Well, some people are saying it's a big deal and some people are saying it's not that big of a deal. Right. But that wasn't my big takeaway from the article, honestly. [00:48:46] Speaker A: Okay, right. [00:48:47] Speaker B: Because this, this headline hit the news everywhere about. I saw this all over every single stinking news outlet was talking about this TCP IP flaw with Windows operating system. What really got me was. Let's see here. Oh yeah, here we go. Right here. Let's. Let's get into this. Under new vulnerability disclosure laws, companies and researchers in China are required to report vulnerabilities to a government authority for review prior to the issue being shared with the product or service. Owner experts have long warned that China based nation state threat actors are taking advantage of the legal mandate to, quote, stockpile zero days for use in apt attacks. By law, if you're a researcher in China, you gotta give over your findings to the government before you give it a, to the product vendor. [00:49:51] Speaker A: Interesting. [00:49:52] Speaker B: That is really interesting. I'm sure they just are like, hey, we're going to hold on to this for you. [00:49:58] Speaker A: Yeah. [00:49:59] Speaker B: Safe. Just in case something bad might happen. [00:50:03] Speaker A: Yeah. [00:50:03] Speaker B: Not that they're involved in any kind of like, ongoing massive apt nation state bull shenanigans. That's my, that's my new term. Bullshinannery bullshit. Speaker one. [00:50:16] Speaker A: Okay, well, especially because it's not like the rule is that, okay, you've got to disclose this to go to the government and the product vendor or whatever, but you can't disclose it publicly like that. I could see, like, okay, you don't want to disclose it publicly, maybe for security reasons, but you can't even share it with the, the vendor or service owner, whoever where you found the flaw. That to me is like, so if I create a product and there's a flaw in it, I can't even know about it. Or like, so obviously if it's discovered, you can't tell me about it. [00:50:48] Speaker B: Correct? Not yet. [00:50:50] Speaker A: Right. [00:50:51] Speaker B: Right. Big brother needs it first. [00:50:54] Speaker A: Yeah. [00:50:55] Speaker B: Right again. Welcome to the most based episode of. [00:50:59] Speaker A: I don't like that. [00:51:01] Speaker B: Right there is straight up orwelliandeh. [00:51:04] Speaker A: I don't like that. [00:51:05] Speaker B: That makes me feel bad inside that. That's what goes on. Like, we don't, we don't have that here. [00:51:12] Speaker A: Yeah. [00:51:13] Speaker B: Right. So it's very foreign to us. You know, in America, we are the, we will serve no sovereign. [00:51:21] Speaker A: Right. [00:51:22] Speaker B: You know, sneck. Sneck. Bad. Snack. Hurt. Snack. Bite. Step on snack. [00:51:28] Speaker A: Yeah, no, step on snack. There you go. Yeah, that's. It is. It's a bizarre concept. You're right. Especially in the context that we live in, because it's like, I couldn't imagine that here. [00:51:40] Speaker B: Very crazy. [00:51:41] Speaker A: Now I'm just thinking of like, I wonder if there's ever been a case where somebody has tried to disclose a vulnerability to like. Cause you know, sometimes there will be like, oh, Apple corrected this. Apple patched that or whatever. But it doesn't disclose who told them about the vulnerability or what it was. They'll just say like, oh, it was patched. It's just like some dude in China that's like hiding. And he's like, I'm doing this for the good of humanity. New action movie yeah. [00:52:04] Speaker B: Well, let's, let's continue down the line of thought right here. Let's say I'm a software vendor and I'm. For what? I'm not even going to name a big tech company. I'm just going to say big tech company X. [00:52:16] Speaker A: Okay. [00:52:16] Speaker B: Actually, that is a tech company doesn't work anymore. Big tech company. [00:52:21] Speaker A: You tried J. [00:52:25] Speaker B: J and not J the letter, but like J A y g e I h. Okay. Yeah. Right. Help me help you. [00:52:38] Speaker A: Okay. [00:52:38] Speaker B: So, J, I'm tech company J, and a researcher in China has discovered a critical zero day. Yeah, zero click, like nightmare scenario. And I know that he can't or she can't give it to me immediately. I have to wait for the government, who now has a copy of it. And now I don't feel good about this arrangement as just a software vendor. As a technology company, I do not feel good about this at all. [00:53:15] Speaker A: So. Okay. This is kind of a half baked thought, so just bear with me, which. [00:53:20] Speaker B: Most of our thoughts are. [00:53:21] Speaker A: It's true. [00:53:22] Speaker B: Just FYI. [00:53:23] Speaker A: So you know how in recent, we're. [00:53:25] Speaker B: Thinking in real time, which is very dangerous. [00:53:27] Speaker A: Very dangerous. But over the last several weeks, there's been a lot of talk of Kaspersky in the news. Right. And how, like, us government said, uh uh, we don't want your business here. We can't, can't be trusted, whatever. [00:53:39] Speaker B: Russia's bad. [00:53:40] Speaker A: Russia bad. Right. So I just wonder if, if there. [00:53:46] Speaker B: Are any sanctions on China like this. Like, are we saying, hey, we are not going to do business with China? [00:53:55] Speaker A: Well, and I guess, like, in theory. [00:53:56] Speaker B: I don't know, shut down our economy if it did. [00:53:58] Speaker A: Let's just say somebody's here from China on a, I don't know, work visa or whatever, they're here and there are some kind of researcher and what, they're here on american soil and they're dealing with american companies, but technically they're still, they're going to head back to China. So are they still susceptible, do you think, to those laws? [00:54:13] Speaker B: I would say in a way, yes. Right. So let's say I'm a chinese national. I'm here on a work visa, I'm doing whatever, and I discover a flaw and I go, Yolo, I'm not in China anymore. And I give it to Apple, I give it to Microsoft. I do give it to whomever. Right. And then CCP finds out that I did that. I'm going home one day. [00:54:38] Speaker A: Yeah. [00:54:38] Speaker B: And they're not going to be too pleased about it. [00:54:41] Speaker A: Yeah. Basically everything's riding on the fact that they find out. You just have to hope they won't find out that you did that. Huh? Yeah. I don't know. Like I said, but just given that. [00:54:50] Speaker B: At the very least, your social credit score is going in the shitter. [00:54:55] Speaker A: Yeah. Yeah. That's fair. [00:54:56] Speaker B: And you're not gonna be able to use the train. [00:54:58] Speaker A: So, like, is it worth personal risk that you're taking to do that? Yeah, that's. That's an action movie. I would watch that somebody like, absolutely. They're doing what they can. [00:55:07] Speaker B: Right. That. That would be a cool plot for a movie. [00:55:09] Speaker A: Good movie. [00:55:09] Speaker B: Like, there someone who's like, this would benefit mankind, and I have to get it out. Yeah, but my government is chasing me down and going after. They know I've got the secret plans to this. [00:55:20] Speaker A: That's the plot of a lot of movies. I feel like now that I'm thinking about it. Yeah, of course it would make a good movie because it exists somewhere. [00:55:25] Speaker B: Yeah. [00:55:25] Speaker A: It's just not specifically about this. [00:55:27] Speaker B: It was an underrated movie. Eagle eye. [00:55:29] Speaker A: Eagle eye, yeah. [00:55:30] Speaker B: Shia labeouf. [00:55:31] Speaker A: Really? [00:55:32] Speaker B: Yep. [00:55:32] Speaker A: Recent Shia LaBeouf or Shia LaBeouf in like, 2000? [00:55:35] Speaker B: Early in the two thousands, maybe 2008. [00:55:37] Speaker A: Okay. Jerry and Rachel. Jerry Shaw. That's his name. [00:55:41] Speaker B: It's like a satellite in the sky. I could see everything. It was falling. It was really cool. [00:55:45] Speaker A: Interesting. I'll look into that. Rosario Dawson. Billy Bob Thornton. Oh, all star cast. Great. I can get down with that. I'll have to add that to the list. But I like that you brought this up, because obviously the story initially is like, okay, well, there's this exploit. We've got this problem, but that the. [00:56:02] Speaker B: Research that they discover, it was chinese national. [00:56:05] Speaker A: Yeah. [00:56:06] Speaker B: Which means that the CCP has had this for longer than Microsoft and. [00:56:12] Speaker A: Yeah. Just. [00:56:14] Speaker B: Does that make you feel good? [00:56:16] Speaker A: I would think, like, responsible disclosures, like, as soon as you can, you tell the vendor or whoever it is that can fix this. So it just seems like it's antithetical to, like, what? Why? [00:56:25] Speaker B: The purpose of responsible disclosure is to keep it out of the hands of everybody else. [00:56:30] Speaker A: You want to address as few people. [00:56:32] Speaker B: On this as possible. As far as, like, having access to the fact that this vulnerability exists until it's patched. [00:56:39] Speaker A: That's just. Yeah. I don't know. I. Maybe I'm missing something because last time. [00:56:43] Speaker B: I checked, and United States does this at least this part as well. If we discover zero days, if we have NSA hackers discovering zero days, they'll. They'll hold on to them. They become a part of their kit unless they think it's so findable, which they have done in the past, I think where they're like, yeah, we're not going to be able to keep the lid on this and use this for very long. So let's just go ahead and disclose to Microsoft. Right. So it's not that we don't do something similar. We just don't make researchers give it to us. [00:57:16] Speaker A: Yeah. I just would think if I'm in a position similar to that. Right. What would you say? NSA? If I, if I work for them, I'm an agent. I'm not. Clearly. But like, if I did work for them and, and I find something and it's like, oh, I'm going to hang out of this. We can use this, whatever. Right. Because, oh, it's fine. It's not that big a deal. No business. Well, then eventually, if it does end up coming out and somebody's, oh, it's been exploited and da da da da. Am I not then kind of partially responsible because I knew about it and didn't say anything in America, I guess. Yeah. Or in general. [00:57:44] Speaker B: Well, it just depends. Right. [00:57:45] Speaker A: Yeah. [00:57:46] Speaker B: If you're, if you're bound by your law not to, then I don't know how you could be blamed. [00:57:52] Speaker A: Yeah. [00:57:53] Speaker B: Right. You. You would be putting yourself at extreme, or could be possibly putting yourself at extreme risk. [00:57:59] Speaker A: Right. I. [00:57:59] Speaker B: So, but if you were in America and you had this and you were, if you sat on it and you thought, this is extremely exploitable and extremely findable, I'm not going to be the only person that found this, then maybe you're, like, criminally negligent in some way. [00:58:21] Speaker A: Yeah. [00:58:22] Speaker B: Right. If you work for the NSA and you discover these things and you disclose to your bosses that you have found this, and then they don't, like, you've run it up the chain of command. [00:58:33] Speaker A: You'Ve done what you're supposed to do. [00:58:34] Speaker B: And ultimately, like, anything you've done as an NSA employee is. It's national security. [00:58:41] Speaker A: Yeah. [00:58:42] Speaker B: You can't, you can't disclose it. [00:58:45] Speaker A: You take it, you don't have the clearance. [00:58:46] Speaker B: Right. [00:58:46] Speaker A: Yeah. [00:58:47] Speaker B: You take it to your bosses and your bosses. And maybe that was the thing with here. I don't know, but it doesn't seem like it. And I could be wrong again. I read an article on the Internet. Anybody with, like, more information about. This is a really interesting topic. [00:59:00] Speaker A: Yeah, definitely. There's definitely a lot of, like, legal and ethical conversations to be had, I think, around that kind of stuff. [00:59:08] Speaker B: Yeah. [00:59:08] Speaker A: A lot of. A lot of interesting implications there, so. [00:59:10] Speaker B: Absolutely. [00:59:11] Speaker A: Thanks for bringing that up. Yeah, that was a bit of a. [00:59:13] Speaker B: Just thought that was like a WTF moment, you know? [00:59:16] Speaker A: Well, hey, you know, since you brought it up, speaking of WTF moments, I think it's time that we end the show with one of our favorite segments, pork chop sandwiches. [00:59:25] Speaker B: Pork chop sandwiches. That's what he says. [00:59:33] Speaker A: Christian's doing our audio. [00:59:35] Speaker B: He's doing the audio for us. It's like it was. [00:59:38] Speaker A: I think we should just replace the sounds with Christian doing a narration. That's what I think. [00:59:43] Speaker B: Not for that one. [00:59:46] Speaker A: That's true. Yeah. And also, Christian would get in some trouble, so probably nothing. We kind of talked a little bit about this, and Daniel was like, yeah, this is definitely a WTF. There is a plane tracker called flight aware that just admitted user passwords and Social Security numbers have been exposed for years. For years, this has been going on, I believe about three and a half years, to be exact, made. The admission, via a notification filed last week with the attorney general in California, says the leak began January 1, 2021, and was detected on July 25 of this year. So it's been ongoing and then was detected about. About a month ago, I guess. And now it's been disclosed. And the full list of data points is just so wonderful. Of course, it's all the standard stuff, like email addresses and names and passwords, but also information about your credit card number, the last four digits, and Social Security number, I believe, is the big one that people are. That people usually tend to get worried about. [01:00:40] Speaker B: Everything you need to sign up for. [01:00:42] Speaker A: Something, everything you need to. It's an identity theft kit. Nice. With a bow for you. [01:00:48] Speaker B: So what made this? A pork chop sandwiches for me? And this is Sophia's article. You found this article, right? I was like, who's using this app? Because you said that one of the data points was, like, pilot status information about aircraft owned. [01:01:03] Speaker A: Yeah. [01:01:03] Speaker B: Like, is this for pilots? Is this for businesses that lease and airplanes? Or, like, who is using this app? And then as we read the article and we looked at a little bit more, it was like. And we went to the website. If I'm not mistaken, Sophia, I think you kind of jumped over to their website and it seemed like it was for everyone. [01:01:27] Speaker A: I mean, yeah, you can use their website to search for flights and stuff, but then they also. [01:01:31] Speaker B: Aircraft enthusiasts and the app is free. [01:01:34] Speaker A: But, yeah, aircraft enthusiasts and pilots. Pilots being one of the groups. [01:01:38] Speaker B: Okay. Okay. You didn't say that before when I did, about it being free. [01:01:43] Speaker A: Oh, yes. So that's because I didn't know. [01:01:45] Speaker B: Didn't tell me that. [01:01:46] Speaker A: That I did. I didn't. I didn't know that. [01:01:48] Speaker B: All right, so let's play a fun game. We're getting ready to have some fun here. Live and in color. [01:01:52] Speaker A: Oh, boy. [01:01:52] Speaker B: Right? So we're looking at what made this. Pork chop sandwiches. Yeah. The airplane thing, app tracking app. And, uh. Oh, it's been leaking data for years. Womp, womp, womp. Okay. These things happen. But then we were looking at. I was like, all these data points, like, wow, man. Shitload of data. Like, what are they doing? They're collecting a bunch of stuff. Why do companies collect data? [01:02:21] Speaker A: Because they can sell it. [01:02:23] Speaker B: So they can sell it. And when you did, what you didn't tell me before was that the app is free. [01:02:30] Speaker A: I didn't know. [01:02:31] Speaker B: I know. It doesn't matter. You just told me now. [01:02:33] Speaker A: Yeah. [01:02:34] Speaker B: I'm not accusing you. [01:02:35] Speaker A: I wasn't, like, withholding the information. [01:02:37] Speaker B: See, this is how. This is what I gotta live with. You can't just observe a fact. It has to be accusatory because you. [01:02:44] Speaker A: Said, like, well, you didn't tell me that before. I'm like, well, yeah. [01:02:46] Speaker B: Which is true. [01:02:49] Speaker A: Yes, it is. It is a free app. [01:02:51] Speaker B: It was a piece of information I was not aware of until just now. [01:02:53] Speaker A: There are in app purchases, but it looks like it's just to pay for, like, the ad free version, which they still shouldn't be required to collect the credit card information for because you can do that through the app store. You. [01:03:01] Speaker B: How the hell is it getting a credit card? [01:03:03] Speaker A: Yeah, so I'm wondering, because then there were people in the comments talking about how they had, like, a subscription. And it is the same app. It's flight aware. It is the same act that they're talking about. So I don't know if this is like, without actually going in and, like, creating an account, downloading the app. I don't know. There's not a ton of information about it on their site. [01:03:20] Speaker B: It's just fill out the. We should get like a spin up a burner account. Yeah, like a burner account. Let's install the app and see if it asks for a credit card number. [01:03:29] Speaker A: Fly to it. Installed on my computer, on my phone. [01:03:31] Speaker B: No, no, not on any of your actual devices. [01:03:34] Speaker A: Well, but I can. [01:03:34] Speaker B: Got a huge data leak. You didn't read the article? [01:03:37] Speaker A: I'm saying I can't, like, sign up for it. I don't think. Without downloading the app. I don't think so. [01:03:42] Speaker B: What I mean is, like, run Jenny motion or something with, like, a virtual machine or go buy a phone that's $20 at Walmart. [01:03:48] Speaker A: I'm not gonna do that. [01:03:48] Speaker B: And you go, that's why we. Jenny motion. [01:03:50] Speaker A: Do you not know me? How lazy I am? [01:03:52] Speaker B: Come on, Mandy. [01:03:54] Speaker A: And when I. Okay, so I can just. [01:03:56] Speaker B: Amount of effort, ladies and gentlemen. [01:03:57] Speaker A: I can. Yeah. Work smarter, not harder. [01:04:01] Speaker B: Is that what you call it? [01:04:02] Speaker A: Yeah. Yeah. That's how I justify it. I can register for flight aware on their website, but it doesn't ask for any that information. It asks for a first and last name and email address, username and password, and that I'm older. Older than 16. That's all it asked for initially on the first registration page. But beyond that, it's like, okay, I can. I can be join flight aware. It brings you to the same page. So they don't do a great job of advertising. Like, oh, usually it'll be like, here's the subscription plans we have if it's paid. [01:04:30] Speaker B: So it is just such a weird thing. [01:04:33] Speaker A: It's pork chop sandwiches. Why? [01:04:35] Speaker B: What? [01:04:36] Speaker A: The whole thing is a giant sickle. [01:04:37] Speaker B: Is going on with this app. Why are people using. Why do they have so many things? Like, and how many? How many, how many people? 12 million registered users. 12 million register. What are you doing with this? [01:04:53] Speaker A: Well, and you can use it to track flights, right? So, like, if I'm going on a. [01:04:56] Speaker B: Plane, so does my American Airlines app. [01:04:58] Speaker A: So that's just it. It's like, you can usually do that. [01:05:00] Speaker B: Which I already have, because when I'm on a stinking flight, I want to have the in flight experience. [01:05:07] Speaker A: And, like, I can send my mom my flight information, and she can just click that link. And without creating an account or sending in anything, she can track the flights. [01:05:12] Speaker B: So it's like, so what are 12 million people doing? [01:05:16] Speaker A: Yeah. [01:05:17] Speaker B: With this on their phone. [01:05:19] Speaker A: It is interesting. And I think regardless of whether maybe they have paid options and maybe it's a subscription thing and you don't know until you, oh, you had the account for a few months, da da da da, and all that. Regardless, they shouldn't have a Social Security number. They don't need that. So that, to me is like, whether you've got my credit card information or whatever, whether I've paid you for something, what do you need my Social Security number for? And I guess it's just, if they ask, people tend to just be like, okay. Like, it's just people get so used to giving information away. Like, you need my username okay, you need my name. Okay, you need my number. My Social Security number. Sure, go ahead. [01:05:51] Speaker B: Yeah. [01:05:51] Speaker A: I had this conversation with my mom the other day about, like, you go to the doctor and they ask for it and you don't technically have to give it. [01:05:57] Speaker B: So, fun story. [01:05:58] Speaker A: Oh, okay. [01:05:59] Speaker B: When I was, I went to ITT tech because I thought at the time they were on every tv, every commercial breakout of ITT tech. You want to get a job in tech? This is where you go. What you do all these success stories. I don't know if you remember the commercials, but they were huge. [01:06:13] Speaker A: Okay. [01:06:14] Speaker B: So I went to ITT tech, and one day after, like, the first semester, somebody from their job services came to our class and was like, hey, we want to be able to help you guys get jobs. Right? That's the whole thing we do. I'm like, cool. Sounds awesome. I totally want a job in tech one day. Sounds why I'm here. And they had us fill out this form to give them authorization to kind of, like, act on our behalf, to look for work and to share resumes and things like that. [01:06:45] Speaker A: Okay. [01:06:46] Speaker B: Okay. Following you so far on that form. Guess what was on there that they requested as part of the information. [01:06:54] Speaker A: They want your social. [01:06:55] Speaker B: They want a Social Security number. [01:06:57] Speaker A: Odd. [01:06:57] Speaker B: And I just went. [01:07:01] Speaker A: Like that at ITT tech? [01:07:03] Speaker B: Yeah. And the guy goes, yes, how can I help you, young man? Because I was a young man at the time. [01:07:08] Speaker A: Sure. [01:07:09] Speaker B: And I said, what do you need my Social Security number for? He goes, so that I can differentiate between you and the next person. And I go, but, yeah, there's also a box right here that says student id. Are they not also different? But not also student id number is different. We can have the same name. That's possible. [01:07:24] Speaker A: Sure. [01:07:25] Speaker B: Right. But my student id number, which they gave me a card with my picture on it. [01:07:30] Speaker A: Yeah. [01:07:30] Speaker B: That is student. Like, there's an id number on there. Is that not different from everybody else's? And will be continue to be different. Why do you need my social? And he got all pissy with me and was like, well, if you don't want our help, don't fill it out. I go, no problem. Now you can go romance yourself. [01:07:50] Speaker A: I wonder. I wonder if you had put, like a fake or just left it blank. I wonder if they ever would have noticed or if they just put it on there because it's. [01:07:57] Speaker B: To me, it was just like, again, I grew up being told you do not use your Social Security number as a form of identification. [01:08:05] Speaker A: Yeah. [01:08:06] Speaker B: Why are you asking for it from me as a form of identification. [01:08:09] Speaker A: If you're not the IR's and I'm not filing my taxes, especially when you. [01:08:12] Speaker B: Have a very valid and useful built in homegrown form of id for your. [01:08:18] Speaker A: Services that you gave me and you're not going to use it. Yeah, it seems like there's a hundred other things you could use for identification before you have to use a Social Security number. [01:08:27] Speaker B: Yeah. [01:08:27] Speaker A: Even, just like, even if we had the same name, we were both Daniel Lowry. Thank God we're not. But even if we were, we've got different birthdays. We've got like, there's so many other different. So it just, yeah, I don't know that there's a lot of defendable cases for asking for an SSN and certainly not, like, keeping it. And like, what do I know though, right? What do I know? [01:08:44] Speaker B: See it with banks, tax forms, anything government. [01:08:46] Speaker A: Right, right. [01:08:47] Speaker B: Obviously anything government. The government issued it. [01:08:49] Speaker A: Mm hmm. Sure. If I'm. Yeah, like I said, if I'm paying my tax, losing my mind, it's cause you didn't have your monsters. So this is the problem. [01:08:57] Speaker B: You see the problem, ladies and gentlemen. [01:08:59] Speaker A: He'S never gonna buy. [01:09:00] Speaker B: I don't get my fix. [01:09:02] Speaker A: He's scratching your arm the whole. [01:09:05] Speaker B: Listen. Yeah, yeah. Y'all got that zero sugar monsters up in here. [01:09:10] Speaker A: It could be worse. [01:09:11] Speaker B: I need one man. [01:09:13] Speaker A: It could be worse. I'd rather you be addicted to that than anything else. So we'll let you go take a trip to the local gathering. Thank you. [01:09:20] Speaker B: Thank you. [01:09:21] Speaker A: So you can get your fix. We'll go, yeah. Thanks so much for, this is the most based episode of Techno we've ever done. Thanks for that. Leave a comment, let us know what you thought. Subscribe so you never miss an episode in the future. Thank you so much for joining us, and we'll see you next week. Thanks for watching. If you enjoyed today's show, consider subscribing so you'll never miss a new episode.

Other Episodes

Episode

September 21, 2017 00:40:16
Episode Cover

ITProTV Podcast 8: Win10 Inline Ads (Audio)

To follow suit with Apple, Microsoft has shifted to giving the O/S away recently. But there had to be a catch, right? In this...

Listen

Episode

July 21, 2022 00:47:47
Episode Cover

Technado, Ep. 265: MFA Phishing Attack

The Technado team was back together in the studio this week to discuss the new Intel Core i9-12900K benchmarks, Microsoft's shift in Windows development...

Listen

Episode

September 14, 2017 00:45:25
Episode Cover

ITProTV Podcast 5: Whitewood Security (Audio)

Up until now, random numbers have actually been anything but. And if you need entropy in your workflow, that's not ideal. Don Pezet talks...

Listen