1 00:00:00,240 --> 00:00:02,160 Speaker 1: Is really trying to keep us all safe, keep us 2 00:00:02,160 --> 00:00:04,880 Speaker 1: out of trouble. Of course, when it comes to your business, 3 00:00:04,920 --> 00:00:08,320 Speaker 1: computer needs business courier says intrust it. Dave's company is 4 00:00:08,360 --> 00:00:10,080 Speaker 1: the best you can find them a lot of interest 5 00:00:10,160 --> 00:00:12,319 Speaker 1: I dot Com and Dave Hatter, we always appreciate interest. 6 00:00:12,400 --> 00:00:15,320 Speaker 1: I t sponsoring this segment valuable. It is welcome back 7 00:00:15,320 --> 00:00:17,000 Speaker 1: and happy happy good Friday to you. 8 00:00:18,239 --> 00:00:20,599 Speaker 2: Thanks Brian, always good to be here, Happy good Friday 9 00:00:20,600 --> 00:00:21,959 Speaker 2: to you and showing all your listeners. 10 00:00:22,320 --> 00:00:24,880 Speaker 1: All right, I know you love when this happens. We've 11 00:00:24,880 --> 00:00:26,960 Speaker 1: got a couple of or weel issues here. First segment 12 00:00:27,000 --> 00:00:30,680 Speaker 1: and next segment, we're gonna start with the ring doorbell things. Now, 13 00:00:30,960 --> 00:00:32,800 Speaker 1: we all learned in the Super Bowl that they'll help 14 00:00:32,840 --> 00:00:34,919 Speaker 1: you find your dog because I guess all the ring 15 00:00:35,000 --> 00:00:38,479 Speaker 1: cameras immediately operate or start recording when a dog runs by. 16 00:00:38,520 --> 00:00:41,040 Speaker 1: I don't know how it works, but they're expanding this 17 00:00:41,200 --> 00:00:44,760 Speaker 1: surveillance network beyond dogs. Dave, what is going on here? 18 00:00:45,320 --> 00:00:48,000 Speaker 2: Yeah, so this is an article from four oh four, 19 00:00:48,080 --> 00:00:50,440 Speaker 2: And you know, Brian, I'll post all this stuff on 20 00:00:50,440 --> 00:00:53,600 Speaker 2: my substacks. If people can go read these articles for themselves. 21 00:00:53,680 --> 00:00:58,200 Speaker 1: LinkedIn dot com search, Dave Hadder links LinkedIn dot com search, 22 00:00:58,280 --> 00:00:58,760 Speaker 1: Dave Hatdter. 23 00:00:58,800 --> 00:00:59,120 Speaker 3: There you go. 24 00:01:00,120 --> 00:01:02,520 Speaker 2: Defined Yeah, you can find me on x as well. 25 00:01:02,600 --> 00:01:08,000 Speaker 2: But so you know, headlines suits, leaked emails, suggests Ring 26 00:01:08,040 --> 00:01:12,559 Speaker 2: plans to expand search party. That's this feature surveillance beyond dogs, right, 27 00:01:13,040 --> 00:01:15,160 Speaker 2: so yeah, during the Super Bowl they had this ad, 28 00:01:15,280 --> 00:01:17,319 Speaker 2: and then you know, there are also some talk about 29 00:01:17,680 --> 00:01:21,399 Speaker 2: integration with flock cameras, the highly controversial license plate reading 30 00:01:21,440 --> 00:01:24,319 Speaker 2: cameras that have propped up in many places, and the 31 00:01:24,440 --> 00:01:27,080 Speaker 2: idea And you know, Brian, this is the problem with 32 00:01:27,160 --> 00:01:28,560 Speaker 2: so much of this stuff. You know, I'm not a 33 00:01:28,600 --> 00:01:30,720 Speaker 2: fan of the Internet of Things. I don't have ring 34 00:01:30,800 --> 00:01:33,959 Speaker 2: doorbells or nest doorbells or thermostats or any of this stuff. 35 00:01:34,640 --> 00:01:38,039 Speaker 2: And it's because a most people don't really understand how 36 00:01:38,080 --> 00:01:40,760 Speaker 2: these things work or what they're capable of. And what 37 00:01:40,800 --> 00:01:44,400 Speaker 2: I mean by that is it has a feature set today. Right, 38 00:01:44,440 --> 00:01:46,360 Speaker 2: if you have a device that has a microphone and 39 00:01:46,360 --> 00:01:49,360 Speaker 2: the cameraet, it has certain features when it ships, what's 40 00:01:49,360 --> 00:01:52,720 Speaker 2: got software in it, right, and that software can be 41 00:01:52,800 --> 00:01:56,360 Speaker 2: upgraded to add additional new features to that at some 42 00:01:56,480 --> 00:02:01,440 Speaker 2: future point. We've all seen things like a feature gets 43 00:02:01,480 --> 00:02:03,840 Speaker 2: turned off, or you know, they add some new feature 44 00:02:03,880 --> 00:02:05,840 Speaker 2: at some future point and maybe now you need to 45 00:02:05,880 --> 00:02:07,960 Speaker 2: pay for that feature. You know, a lot of these 46 00:02:08,000 --> 00:02:11,600 Speaker 2: things will use a what is often called a freemium model, 47 00:02:11,600 --> 00:02:15,720 Speaker 2: where you get certain core functionality at an entry level 48 00:02:15,760 --> 00:02:18,120 Speaker 2: price or maybe for free, and then if you want 49 00:02:18,160 --> 00:02:20,360 Speaker 2: advanced capabilities you have to pay for it. 50 00:02:20,680 --> 00:02:22,320 Speaker 3: I'm sure many of your listeners have seen. 51 00:02:22,360 --> 00:02:24,639 Speaker 2: And this is another thing that I'm not happy about 52 00:02:24,760 --> 00:02:27,679 Speaker 2: in our software driven future. And again you're talking to 53 00:02:27,720 --> 00:02:30,240 Speaker 2: a guy who wrote software for twenty five years. The 54 00:02:30,320 --> 00:02:33,680 Speaker 2: idea that because now things are controlled by software, I 55 00:02:33,680 --> 00:02:36,000 Speaker 2: can make you subscribe to things. Oh, the heated seats 56 00:02:36,000 --> 00:02:37,800 Speaker 2: in your car, you get three free months, and then 57 00:02:37,800 --> 00:02:39,679 Speaker 2: if you want to use those in the future, you 58 00:02:39,760 --> 00:02:41,800 Speaker 2: now have to pay for it. Oh you want AM 59 00:02:41,919 --> 00:02:43,920 Speaker 2: radio in your car, Well, okay, you're going to have 60 00:02:43,919 --> 00:02:46,480 Speaker 2: to pay for that or whatever it is, right, because 61 00:02:46,600 --> 00:02:51,160 Speaker 2: I can turn functionality on or turn functionality off. Here 62 00:02:51,280 --> 00:02:54,320 Speaker 2: this search party feature. The idea is you have a 63 00:02:54,360 --> 00:02:57,600 Speaker 2: lost pet. All these ring cameras can potentially work together 64 00:02:57,680 --> 00:03:01,200 Speaker 2: so as a dog goes by, it picks up the 65 00:03:01,280 --> 00:03:04,040 Speaker 2: dog and can identify the dog and help you find 66 00:03:04,080 --> 00:03:06,840 Speaker 2: your dog. That's great, right, I mean, who wouldn't really want. 67 00:03:06,800 --> 00:03:09,240 Speaker 1: That's the initial reaction because as someone who grew up 68 00:03:09,280 --> 00:03:11,280 Speaker 1: with the dog Buffy the West Toll of White Terry 69 00:03:11,320 --> 00:03:13,959 Speaker 1: that ran away and would never come back, you'd to 70 00:03:13,960 --> 00:03:15,440 Speaker 1: go out with the search party and find him. That 71 00:03:15,440 --> 00:03:17,760 Speaker 1: was anxiety inducing. So my first reaction when I saw 72 00:03:17,760 --> 00:03:19,640 Speaker 1: that it was, oh, that's really cool. But then you 73 00:03:19,680 --> 00:03:24,079 Speaker 1: pause anything but but yes, button is what Dave's gonna 74 00:03:24,080 --> 00:03:25,560 Speaker 1: show about right now, as. 75 00:03:25,400 --> 00:03:28,799 Speaker 2: This article points out right, and so I'm reading directly 76 00:03:28,840 --> 00:03:31,880 Speaker 2: from the article, Rings ceo told staff. 77 00:03:32,000 --> 00:03:32,480 Speaker 3: Now, this is. 78 00:03:32,480 --> 00:03:35,840 Speaker 2: Again in regards to the search party feature, Rings ceo 79 00:03:35,960 --> 00:03:40,000 Speaker 2: told staff the feature is quote first for finding dogs unquote, 80 00:03:40,240 --> 00:03:41,920 Speaker 2: indicating a plan to expand. 81 00:03:43,160 --> 00:03:43,240 Speaker 3: It. 82 00:03:43,280 --> 00:03:45,720 Speaker 2: Goes on to say rings controversy with AI powered search 83 00:03:45,760 --> 00:03:48,640 Speaker 2: party feature isn't intended to always be limited to only dogs, 84 00:03:48,640 --> 00:03:51,160 Speaker 2: the company founder Jamie Simonov told Ring employees in an 85 00:03:51,160 --> 00:03:54,560 Speaker 2: internal email obtained by four oh four Media. You know 86 00:03:54,640 --> 00:03:57,960 Speaker 2: it says this feature was loucht in October and on 87 00:03:58,080 --> 00:04:00,960 Speaker 2: by default feature. So this is another thing, another reason 88 00:04:00,960 --> 00:04:04,080 Speaker 2: why I don't like these Internet things devices. So, whether 89 00:04:04,160 --> 00:04:07,920 Speaker 2: it's a ring, doorbell, an as thermostat a smart coffeemaker, 90 00:04:07,920 --> 00:04:12,600 Speaker 2: smart TV or whatever. These things are generally designed with 91 00:04:12,840 --> 00:04:15,280 Speaker 2: speed to market, ease of use, and market share in mind, 92 00:04:15,400 --> 00:04:19,480 Speaker 2: and collecting as much of your data as possible. Yeah, 93 00:04:20,000 --> 00:04:23,559 Speaker 2: they're not focused on your privacy and security. Most people 94 00:04:23,600 --> 00:04:25,800 Speaker 2: don't know how to set things up correctly from a 95 00:04:25,839 --> 00:04:29,240 Speaker 2: security and privacy standpoint. They don't understand all the settings. 96 00:04:29,360 --> 00:04:31,920 Speaker 2: I would argue that in many cases the settings are 97 00:04:31,960 --> 00:04:37,120 Speaker 2: obtuse purposely, very deep inside on purpose. In the business, 98 00:04:37,120 --> 00:04:39,200 Speaker 2: this is known as dark patterns, to make it difficult 99 00:04:39,200 --> 00:04:41,160 Speaker 2: for you to find things that you might want to 100 00:04:41,200 --> 00:04:43,480 Speaker 2: turn off that are beneficial to the company but not 101 00:04:43,520 --> 00:04:46,839 Speaker 2: beneficial to you exactly. And again this article says on 102 00:04:46,960 --> 00:04:50,400 Speaker 2: by default. So you install one of these things, it's 103 00:04:50,720 --> 00:04:53,600 Speaker 2: this capability search party turned on by default feature links 104 00:04:53,600 --> 00:04:55,919 Speaker 2: together ring cameras in a neighborhood and uses AI to 105 00:04:55,920 --> 00:04:59,839 Speaker 2: search for specific lost dogs, essentially creating a network automatic 106 00:05:00,000 --> 00:05:02,359 Speaker 2: availance system. So if you don't want that, do you 107 00:05:02,400 --> 00:05:04,640 Speaker 2: know how to turn it off? What new feature will 108 00:05:04,680 --> 00:05:06,200 Speaker 2: they roll out that's on by default? 109 00:05:06,279 --> 00:05:06,440 Speaker 3: Right? 110 00:05:07,040 --> 00:05:08,960 Speaker 2: If you're an adult and you buy one of these 111 00:05:08,960 --> 00:05:11,200 Speaker 2: things and you understand how it works, and you understand 112 00:05:11,200 --> 00:05:12,960 Speaker 2: how to set it up, you understand how to keep 113 00:05:13,000 --> 00:05:16,280 Speaker 2: it updated, and you opt into these features. Okay, you're 114 00:05:16,279 --> 00:05:19,159 Speaker 2: an adult, your choice, you have yeah, fully informed consent 115 00:05:19,200 --> 00:05:21,240 Speaker 2: and you opt in. Great, but so much of this 116 00:05:21,279 --> 00:05:24,760 Speaker 2: stuff you're not opted. You don't opt in. You have 117 00:05:24,839 --> 00:05:27,520 Speaker 2: to opt out. You have to understand what it's doing. 118 00:05:27,680 --> 00:05:30,640 Speaker 2: You have to understand how to turn it off. Automatic 119 00:05:30,720 --> 00:05:33,360 Speaker 2: content recognition. On these new smart TVs, most of them 120 00:05:33,440 --> 00:05:35,680 Speaker 2: have this turned on, so they're literally, like every so 121 00:05:35,800 --> 00:05:39,080 Speaker 2: many seconds, capturing everything you're watching on TV, everything you're doing. 122 00:05:39,560 --> 00:05:41,680 Speaker 2: You can turn it off. Do you do you even 123 00:05:41,680 --> 00:05:43,680 Speaker 2: know that's happening? Do you know what it's called? Do 124 00:05:43,680 --> 00:05:44,520 Speaker 2: you know how to turn it off? 125 00:05:44,560 --> 00:05:46,520 Speaker 3: Probably? Not so? Yeah. 126 00:05:46,560 --> 00:05:50,360 Speaker 2: And then again this, the leaked emails seem to insinuate 127 00:05:50,400 --> 00:05:53,640 Speaker 2: that the you know, long term intent is to use 128 00:05:53,680 --> 00:05:54,360 Speaker 2: this for people. 129 00:05:54,640 --> 00:05:54,839 Speaker 3: Yeah. 130 00:05:54,839 --> 00:05:56,520 Speaker 2: Now, I know there are folks that will argue, well, 131 00:05:56,520 --> 00:05:59,279 Speaker 2: this is you know, great for the security and safety and. 132 00:05:59,360 --> 00:06:01,680 Speaker 1: Finance and bad guys finally lost children. 133 00:06:01,800 --> 00:06:06,760 Speaker 2: Yeah, yeah, same argument for Flock. You know, after this ad, 134 00:06:06,800 --> 00:06:08,839 Speaker 2: there was a lot of pushback on this. The Flock 135 00:06:08,880 --> 00:06:11,600 Speaker 2: thing apparently has fallen apart with them, and I mean, 136 00:06:11,640 --> 00:06:13,159 Speaker 2: here's another. 137 00:06:12,600 --> 00:06:15,640 Speaker 1: Article we're getting way over time, so I'm gonna grab 138 00:06:15,720 --> 00:06:18,440 Speaker 1: this one up and we'll get to well a correlad 139 00:06:18,520 --> 00:06:20,560 Speaker 1: to this, what are high tech scarecrows and why are 140 00:06:20,560 --> 00:06:22,720 Speaker 1: they watching us? We'll continue with Dave Ocurious to the 141 00:06:22,800 --> 00:06:25,400 Speaker 1: Dalk Station Brian Thomas with intrust it dot COM's Dave 142 00:06:25,400 --> 00:06:28,400 Speaker 1: hat Or doing Tech Friday. This one's actually even scarer 143 00:06:28,440 --> 00:06:30,520 Speaker 1: than the ring doorbell reality Dave Hatter. We can move 144 00:06:30,520 --> 00:06:32,919 Speaker 1: these scarecrows around to watch anyone, but they're designed to 145 00:06:32,920 --> 00:06:35,400 Speaker 1: be seen and apparently to serve as a deterrent for 146 00:06:35,480 --> 00:06:38,240 Speaker 1: would be criminals. Dave, let's dive on into this one. 147 00:06:38,440 --> 00:06:40,640 Speaker 2: Yeah, this is a story from the New York Post. 148 00:06:40,839 --> 00:06:42,880 Speaker 2: I would bet you every one of your listeners has 149 00:06:42,920 --> 00:06:46,000 Speaker 2: seen these things around, sometimes maybe in the parking lot 150 00:06:46,000 --> 00:06:49,040 Speaker 2: of a grocery store or something. Usually what you see 151 00:06:49,040 --> 00:06:52,960 Speaker 2: as a long pole with you know, one or more 152 00:06:52,960 --> 00:06:56,080 Speaker 2: cameras on the top, sometimes flashing blue lights, and usually 153 00:06:56,080 --> 00:06:58,720 Speaker 2: a big solar panel kind of positioned on a generator. 154 00:06:58,800 --> 00:07:04,919 Speaker 2: These things are mobile, and it's essentially a rolling security 155 00:07:04,960 --> 00:07:08,240 Speaker 2: system that can be deployed wherever you want it. In 156 00:07:08,320 --> 00:07:11,400 Speaker 2: the article, they call it cameras on wheels or cows, 157 00:07:11,440 --> 00:07:14,240 Speaker 2: they say, popping up in business, parking lots, construction sites, 158 00:07:14,280 --> 00:07:18,480 Speaker 2: car lots, events and communities recovering from wildfires even and 159 00:07:18,960 --> 00:07:22,640 Speaker 2: you know, again, Brian, kind of as we just discussed 160 00:07:22,640 --> 00:07:25,680 Speaker 2: and have discussed a lot in the recent past. The 161 00:07:25,800 --> 00:07:29,000 Speaker 2: bottom line is we are. And I wanted to say 162 00:07:29,040 --> 00:07:30,560 Speaker 2: because and then we ran out of time. In the 163 00:07:30,600 --> 00:07:33,920 Speaker 2: last segment from that same site four oh four, in 164 00:07:33,960 --> 00:07:37,360 Speaker 2: alignment with the ring doorbell search party feature, we talked 165 00:07:37,360 --> 00:07:40,600 Speaker 2: about it. Here's another headline ties right into this with ring. 166 00:07:40,840 --> 00:07:44,840 Speaker 2: American consumers built a surveillance dragnet. You know, whether it's 167 00:07:44,920 --> 00:07:50,320 Speaker 2: flock cameras, it's ring doorbells, it's all these different Internet 168 00:07:50,360 --> 00:07:56,640 Speaker 2: of Things devices that have cameras and potentially microphones. We're 169 00:07:56,720 --> 00:07:59,560 Speaker 2: adding all this surveillance in and I know that we 170 00:07:59,680 --> 00:08:02,480 Speaker 2: arguing on one hand, yes, we are doing it. Businesses 171 00:08:02,480 --> 00:08:05,360 Speaker 2: are doing it, individuals are doing it. It's not necessarily 172 00:08:05,360 --> 00:08:08,040 Speaker 2: the government doing it. It's you know, the cost of 173 00:08:08,080 --> 00:08:12,200 Speaker 2: this equipment has fallen to near zero because it's driven 174 00:08:12,240 --> 00:08:14,840 Speaker 2: by software. You know, the features can be constantly upgraded, 175 00:08:14,880 --> 00:08:16,720 Speaker 2: including things like facial recognition. 176 00:08:16,880 --> 00:08:17,720 Speaker 3: I don't remember if it was. 177 00:08:17,760 --> 00:08:19,720 Speaker 2: Last week or the week before, that we talked about 178 00:08:19,720 --> 00:08:23,080 Speaker 2: the story where a grandma from Tennessee ended up in 179 00:08:23,160 --> 00:08:25,960 Speaker 2: jail for almost six months because she was wrongly identified 180 00:08:25,960 --> 00:08:29,960 Speaker 2: for bank frauds by facial recognition and AI. So again, 181 00:08:30,920 --> 00:08:34,160 Speaker 2: I understand why some folks will argue that these are 182 00:08:34,200 --> 00:08:37,439 Speaker 2: a good thing. But this technology is moving very quickly. 183 00:08:37,520 --> 00:08:39,560 Speaker 2: There are plenty of examples out there that shows you 184 00:08:40,080 --> 00:08:43,720 Speaker 2: how it does not work the way it's intended to work. 185 00:08:43,800 --> 00:08:47,080 Speaker 2: And or you have this scope creep over time, and yeah, 186 00:08:47,120 --> 00:08:52,040 Speaker 2: we're basically building an orwelly in society of constant surveillance 187 00:08:52,120 --> 00:08:56,560 Speaker 2: everywhere you go with little regard to the potential consequences 188 00:08:56,559 --> 00:09:00,760 Speaker 2: of it. Again, you know, if you are, let's say, 189 00:09:00,800 --> 00:09:04,880 Speaker 2: at a local retail establishment and some AI camera from 190 00:09:04,920 --> 00:09:07,040 Speaker 2: one of these things picks you up, and next thing 191 00:09:07,080 --> 00:09:10,120 Speaker 2: you know, you're getting arrested because it has wrongly identified you. 192 00:09:10,760 --> 00:09:13,520 Speaker 2: Even if you're ultimately cleared of all charges, Well, what 193 00:09:13,679 --> 00:09:15,880 Speaker 2: is the impact on you as a person. Yeah, that 194 00:09:16,440 --> 00:09:18,760 Speaker 2: grandma that went to jail was apparently in jail for 195 00:09:18,800 --> 00:09:19,679 Speaker 2: almost six months. 196 00:09:19,760 --> 00:09:23,200 Speaker 3: I can't apparently me either. It's crazy. 197 00:09:23,360 --> 00:09:26,200 Speaker 2: I encourage people, you know, go look me up and 198 00:09:26,200 --> 00:09:28,360 Speaker 2: you can find a link to that story from a 199 00:09:28,400 --> 00:09:31,520 Speaker 2: couple of weeks ago. You know, apparently, according to the reporting, 200 00:09:31,640 --> 00:09:33,600 Speaker 2: she lost her home, lost her car, lost her dog 201 00:09:33,640 --> 00:09:36,439 Speaker 2: because she couldn't pay her bills during that time. And yeah, 202 00:09:36,520 --> 00:09:38,480 Speaker 2: I'm sure she'll end up suing and getting a large 203 00:09:38,520 --> 00:09:41,440 Speaker 2: settlement out of that. But again, all of this bad 204 00:09:41,480 --> 00:09:46,240 Speaker 2: things happened along the way. You know, we really need 205 00:09:46,280 --> 00:09:48,680 Speaker 2: to think about the societal impact of all this stuff. 206 00:09:49,880 --> 00:09:52,240 Speaker 1: National security, Dave, let me just interject this, because you know, 207 00:09:52,280 --> 00:09:54,679 Speaker 1: the Chinese companies, party know, the nefarious actors be able 208 00:09:54,720 --> 00:09:57,000 Speaker 1: to hack into these things, because these things are we'll 209 00:09:57,040 --> 00:09:58,800 Speaker 1: have holes in their security. You point this out all 210 00:09:58,840 --> 00:09:59,959 Speaker 1: the time, you did in the last segment. 211 00:10:00,080 --> 00:10:00,280 Speaker 3: Yep. 212 00:10:00,320 --> 00:10:02,360 Speaker 1: So if you got that, you have this nest of 213 00:10:02,440 --> 00:10:05,480 Speaker 1: cameras all over on the ground reflecting real time what's 214 00:10:05,480 --> 00:10:08,360 Speaker 1: going on in any given neighborhood anywhere in the United States. 215 00:10:08,480 --> 00:10:11,240 Speaker 1: Wouldn't that be helpful to a foreign adversary who's considering 216 00:10:11,280 --> 00:10:14,960 Speaker 1: invading or otherwise, you know, militarily attacking a country. I 217 00:10:14,960 --> 00:10:19,400 Speaker 1: would think, well would Brian. And there's the demonstrative evidence 218 00:10:19,440 --> 00:10:22,720 Speaker 1: of that. Yes, you know, there's reporting that before the 219 00:10:22,800 --> 00:10:26,840 Speaker 1: attacks were launched on Iran, their security cameras were hacked. 220 00:10:27,320 --> 00:10:29,040 Speaker 3: Russia has done this to Ukraine. 221 00:10:29,520 --> 00:10:32,480 Speaker 2: And the more of this technology we put out there, 222 00:10:32,480 --> 00:10:36,680 Speaker 2: whether it's you know, video cameras and cars, it's these 223 00:10:37,040 --> 00:10:42,599 Speaker 2: roving cameras on wheels things, it's you know, consumer oriented. 224 00:10:42,120 --> 00:10:44,720 Speaker 3: Devices like this. Yes, they can be hacked. 225 00:10:44,800 --> 00:10:47,520 Speaker 2: You can guarantee it, even if the company is putting 226 00:10:47,520 --> 00:10:50,040 Speaker 2: out perfect software, which I guarantee you they're not. Most 227 00:10:50,040 --> 00:10:51,880 Speaker 2: of this stuff comes from China, but it might have 228 00:10:51,960 --> 00:10:55,400 Speaker 2: back doors in it to begin with. People don't know 229 00:10:55,440 --> 00:10:58,040 Speaker 2: how to set this stuff up right, they have bad passwords. 230 00:10:58,080 --> 00:10:59,800 Speaker 1: How about a law, dame, you know me, I don't 231 00:10:59,800 --> 00:11:02,040 Speaker 1: like law, but how about if you have something like that, 232 00:11:02,120 --> 00:11:05,080 Speaker 1: you must provide upfront a disclosure that this stuff is 233 00:11:05,120 --> 00:11:08,240 Speaker 1: automatically working and what it does, what it means to you, 234 00:11:08,840 --> 00:11:13,160 Speaker 1: and specific detailed instructions designed for a second grader to 235 00:11:13,280 --> 00:11:16,120 Speaker 1: turn it off or otherwise set things up. Simple solution, 236 00:11:16,360 --> 00:11:18,960 Speaker 1: easily addressed, and provides more information for the customers so 237 00:11:18,960 --> 00:11:20,360 Speaker 1: they can make an informed decision. 238 00:11:20,920 --> 00:11:22,760 Speaker 2: And you know, Brian, I'm gently with you on the 239 00:11:22,920 --> 00:11:25,720 Speaker 2: less laws or better, but I would take yours even 240 00:11:25,760 --> 00:11:29,040 Speaker 2: a step further and say these things should come configured 241 00:11:29,280 --> 00:11:34,079 Speaker 2: by default to do basically nothing. Okay, in the security 242 00:11:34,120 --> 00:11:38,280 Speaker 2: world that the idea is principle of least privileged, don't 243 00:11:38,440 --> 00:11:41,080 Speaker 2: you know, lock things down, don't allow people to do 244 00:11:41,160 --> 00:11:43,439 Speaker 2: things you don't want them to do, and then if 245 00:11:43,480 --> 00:11:46,280 Speaker 2: they need that capability at some future point, then you 246 00:11:46,480 --> 00:11:50,160 Speaker 2: allow it after there's been a discussion and it's documented, right, 247 00:11:50,880 --> 00:11:54,880 Speaker 2: denied by default, allow by exception, turn all this stuff 248 00:11:54,920 --> 00:11:57,280 Speaker 2: off and make people go in and turn it on 249 00:11:57,679 --> 00:11:59,640 Speaker 2: if they want it and understand. 250 00:11:59,200 --> 00:12:02,839 Speaker 1: It to accomplished. Problem completely solved right here on the 251 00:12:02,880 --> 00:12:04,640 Speaker 1: fifty five Carsy Morning Show, We're gonna do one more 252 00:12:04,640 --> 00:12:08,240 Speaker 1: than Interest. I s Dave Hadder. Update your iPhone, says 253 00:12:08,320 --> 00:12:10,960 Speaker 1: Dave Hatter, and apparently iPhones too, So don't go away, 254 00:12:11,040 --> 00:12:14,880 Speaker 1: Chris cross Country Mortgage. Who's that look? Yeah, six fifty 255 00:12:14,880 --> 00:12:17,840 Speaker 1: two fifty five KRC Detalk Station Tech Friddidave Hatter, Interest 256 00:12:17,880 --> 00:12:22,199 Speaker 1: it dot Com and it's time to upgrade your iPhone. Apparently. 257 00:12:22,280 --> 00:12:24,280 Speaker 1: I just texted my daughter over the break because she's 258 00:12:24,320 --> 00:12:27,800 Speaker 1: got one. I said, update your iPhone. Apparently thirty seven 259 00:12:27,920 --> 00:12:30,880 Speaker 1: fixes for security holes. This illustrates your point. You think 260 00:12:30,920 --> 00:12:32,720 Speaker 1: of all the companies in the world, Apple would have 261 00:12:32,760 --> 00:12:35,320 Speaker 1: security all you know, worked out before they issue some 262 00:12:35,360 --> 00:12:37,720 Speaker 1: sort of software, But no, lo and behold, they discover 263 00:12:37,920 --> 00:12:39,040 Speaker 1: problems after the fact. 264 00:12:40,080 --> 00:12:43,520 Speaker 2: Yes, Brian, So again, as a guy who wrote software 265 00:12:44,040 --> 00:12:47,360 Speaker 2: or businesses for over twenty five years, hundreds of different 266 00:12:47,400 --> 00:12:51,320 Speaker 2: applications for hundreds of different businesses, I created all kinds 267 00:12:51,320 --> 00:12:54,840 Speaker 2: of bugs, never on purpose. Plus, I will tell you 268 00:12:55,360 --> 00:12:58,520 Speaker 2: I'm using other people's software to write my software. True, 269 00:12:58,640 --> 00:13:02,679 Speaker 2: might be Microsoft sequels, ser Microsoft dot Net. Okay, the 270 00:13:02,960 --> 00:13:05,760 Speaker 2: Net software from Microsoft has bugs in it. The SEQL 271 00:13:05,800 --> 00:13:08,160 Speaker 2: server software has bugs in it, So there's bugs I'm 272 00:13:08,200 --> 00:13:11,040 Speaker 2: creating on top of their bugs. The Windows operating system 273 00:13:11,120 --> 00:13:15,320 Speaker 2: has bugs in it. Right, these things have to be fixed, Okay, 274 00:13:16,160 --> 00:13:18,599 Speaker 2: And the more software you have, the more bugs that 275 00:13:18,679 --> 00:13:21,680 Speaker 2: are because human beings create this stuff. They're not doing 276 00:13:21,720 --> 00:13:23,959 Speaker 2: this on purpose most of the time. Now, if something 277 00:13:24,000 --> 00:13:25,839 Speaker 2: is coming from China and I want to circle over 278 00:13:25,880 --> 00:13:29,480 Speaker 2: to that and tie these two things together. This is 279 00:13:29,480 --> 00:13:32,080 Speaker 2: why people like me are constantly harping. And it's not 280 00:13:32,200 --> 00:13:36,679 Speaker 2: just people like me. It's the FBI, it's DHS, it's Microsoft, 281 00:13:36,760 --> 00:13:39,840 Speaker 2: Google constantly saying you have to keep your software updated. 282 00:13:39,960 --> 00:13:43,440 Speaker 2: Center for Internet Security, all of these different organizations that 283 00:13:43,520 --> 00:13:45,720 Speaker 2: have skin in the game of trying to protect you 284 00:13:45,760 --> 00:13:49,800 Speaker 2: as a consumer, protect businesses, protect governments, protect our society. 285 00:13:50,240 --> 00:13:53,360 Speaker 2: Are constantly warning about software updates. So yes, this latest 286 00:13:53,520 --> 00:13:57,960 Speaker 2: story here Apple puts out updates. I encourage people as 287 00:13:58,280 --> 00:14:01,880 Speaker 2: soon as you can install the updates on your devices 288 00:14:01,960 --> 00:14:04,960 Speaker 2: or smart devices, your phones, your computers, whatever, your car, 289 00:14:05,559 --> 00:14:08,839 Speaker 2: because you know, sometimes it's adding functionality or fixing problems 290 00:14:08,880 --> 00:14:11,840 Speaker 2: with functionality, but in many cases, and as our society 291 00:14:11,840 --> 00:14:15,960 Speaker 2: becomes increasingly dependent on this, it's solving problems that allow 292 00:14:16,080 --> 00:14:18,559 Speaker 2: hackers to do bad things. So I know we'll run 293 00:14:18,559 --> 00:14:20,160 Speaker 2: out of time and maybe we hit this one again 294 00:14:20,200 --> 00:14:24,000 Speaker 2: next week. This is so important. Federal Bureau of Investigations 295 00:14:24,040 --> 00:14:29,280 Speaker 2: Public service announcement just this week headline data security risks 296 00:14:29,400 --> 00:14:34,520 Speaker 2: of using foreign developed mobile apps in the United States FBI. 297 00:14:34,680 --> 00:14:38,720 Speaker 2: So again, Now, obviously Apple is an American company, but 298 00:14:38,880 --> 00:14:41,440 Speaker 2: you know people are downloading apps to their phones, to 299 00:14:41,520 --> 00:14:44,040 Speaker 2: their computers, coming from all over the place, in many 300 00:14:44,080 --> 00:14:45,880 Speaker 2: cases China. So I'm just going to hit the high 301 00:14:45,880 --> 00:14:49,480 Speaker 2: points before we run out of time. This PSA, which 302 00:14:49,520 --> 00:14:52,119 Speaker 2: I'll post today so people can read it for themselves. 303 00:14:53,040 --> 00:14:56,040 Speaker 2: As early as of early twenty twenty six, many of 304 00:14:56,040 --> 00:14:58,600 Speaker 2: the most downloaded, top grossing apps in the United States 305 00:14:58,600 --> 00:15:01,080 Speaker 2: are developed and maintained by form and in companies, particularly 306 00:15:01,120 --> 00:15:04,520 Speaker 2: those based in China. The apps to maintain digital infrastructure 307 00:15:04,520 --> 00:15:07,840 Speaker 2: and China are subject to China's extensive national security laws, 308 00:15:07,920 --> 00:15:12,120 Speaker 2: enabling the Chinese government to potentially access mobile apps user data. 309 00:15:12,480 --> 00:15:15,000 Speaker 2: And then it's got a lot of details with tips 310 00:15:15,040 --> 00:15:18,120 Speaker 2: and so forth. But again, this isn't doomsday Dave Hatter 311 00:15:18,200 --> 00:15:21,120 Speaker 2: warning you about this. Here's the FBI telling you. 312 00:15:21,240 --> 00:15:23,080 Speaker 3: Now. I've been saying this for a long time. 313 00:15:23,360 --> 00:15:27,760 Speaker 2: I only have on my very lockdown, very updated Apple 314 00:15:27,800 --> 00:15:30,760 Speaker 2: phone a very small number of apps that didn't come 315 00:15:30,800 --> 00:15:33,680 Speaker 2: on the phone, mostly stuff from Microsoft that I. 316 00:15:33,640 --> 00:15:36,240 Speaker 3: Need to do my job. I have a few others 317 00:15:36,240 --> 00:15:36,680 Speaker 3: on there. 318 00:15:36,920 --> 00:15:39,440 Speaker 2: I have a very small number of apps, and I 319 00:15:39,560 --> 00:15:42,800 Speaker 2: update them constantly. My phone is as lockdown as it 320 00:15:42,840 --> 00:15:45,160 Speaker 2: can be and still do what I needed to do. 321 00:15:46,120 --> 00:15:48,520 Speaker 2: This is what the FBI is telling you, right, And 322 00:15:48,840 --> 00:15:52,400 Speaker 2: if something is coming from China, we maybe hit this 323 00:15:52,440 --> 00:15:54,440 Speaker 2: one next week. You know, the FCC just came out 324 00:15:54,480 --> 00:15:59,520 Speaker 2: now and banned going forward all these low end home 325 00:15:59,600 --> 00:16:03,520 Speaker 2: grade routers coming from China, right because you know they're 326 00:16:03,560 --> 00:16:06,400 Speaker 2: a security risk. I'm glad to see that we're finally 327 00:16:06,440 --> 00:16:08,160 Speaker 2: starting to try to put the word out and take 328 00:16:08,200 --> 00:16:10,800 Speaker 2: this seriously. And you know that causes problems. It's a 329 00:16:10,800 --> 00:16:11,760 Speaker 2: supply chain issue. 330 00:16:11,760 --> 00:16:12,160 Speaker 3: I get that. 331 00:16:12,240 --> 00:16:15,320 Speaker 2: But as more and more things become digital, as more 332 00:16:15,320 --> 00:16:17,760 Speaker 2: and more of your data flows through these apps and 333 00:16:17,800 --> 00:16:21,720 Speaker 2: these systems and this hardware, we keep seeing examples where 334 00:16:21,720 --> 00:16:25,440 Speaker 2: foreign adversaries in other wars and so forth are manipulating this. 335 00:16:25,880 --> 00:16:29,240 Speaker 2: Imagine for a second, Brian, if at some point a 336 00:16:29,240 --> 00:16:31,640 Speaker 2: adversary flip the switch and just turned all this off, 337 00:16:31,920 --> 00:16:33,160 Speaker 2: of what happened in this country. 338 00:16:33,280 --> 00:16:35,320 Speaker 1: I know, it's so scary when you think about it, 339 00:16:35,320 --> 00:16:40,320 Speaker 1: it just would be god I mean, existential crisis time. 340 00:16:40,400 --> 00:16:42,720 Speaker 1: I really is. So if the electricity goes off, we 341 00:16:42,840 --> 00:16:45,440 Speaker 1: are all collectively screwed. We can end on that real 342 00:16:45,520 --> 00:16:48,240 Speaker 1: positive note. Tech Friday, Dave Hatter, Happy Good Friday, Happy 343 00:16:48,280 --> 00:16:50,360 Speaker 1: Easter to you and your family. Dave, I thank you 344 00:16:50,360 --> 00:16:53,000 Speaker 1: and interest it for sponsoring the segment. Important it is 345 00:16:53,080 --> 00:16:57,120 Speaker 1: find him online LinkedIn dot com, LinkedIn dot com, get 346 00:16:57,120 --> 00:17:00,400 Speaker 1: all the articles and all the background information. Dave god Blew, sir, 347 00:17:00,480 --> 00:17:02,640 Speaker 1: thank you. We'll talk next Friday. Have a wonderful week 348 00:17:02,680 --> 00:17:04,720 Speaker 1: between now and then six fifty