1 00:00:00,000 --> 00:00:03,920 Speaker 1: The talk station six twenty nine on a Friday. It 2 00:00:03,960 --> 00:00:06,680 Speaker 1: is that time appointment listening, necessary listening, that is, if 3 00:00:06,680 --> 00:00:08,880 Speaker 1: you want to stay out of trouble in your online antics. 4 00:00:09,280 --> 00:00:12,200 Speaker 1: Brought to you by intrust it dot com. It's tech Friday. 5 00:00:12,200 --> 00:00:15,120 Speaker 1: But Dave Hatter interest I dot COM's Dave's company. If 6 00:00:15,120 --> 00:00:17,520 Speaker 1: you outstanding work, if you're a business, I know you've 7 00:00:17,520 --> 00:00:20,280 Speaker 1: got computers and computer needs. They are the default folks 8 00:00:20,320 --> 00:00:23,239 Speaker 1: to rely upon. Interest I dot com, the business courrier 9 00:00:23,280 --> 00:00:25,120 Speaker 1: says are the best in the business. And who can 10 00:00:25,160 --> 00:00:27,320 Speaker 1: doubt what they say about a Dave Hatter. Thank you 11 00:00:27,400 --> 00:00:29,000 Speaker 1: for what you do each and every day for my 12 00:00:29,080 --> 00:00:32,720 Speaker 1: listeners and their companies. Welcome back for another important discussion. 13 00:00:32,880 --> 00:00:36,159 Speaker 1: It's time for tech Friday. Good here, Happy Friday Day. 14 00:00:37,000 --> 00:00:39,559 Speaker 2: Yeah, Happy Friday to you, Brian and Joe and all 15 00:00:39,600 --> 00:00:41,760 Speaker 2: your listeners. Happy to be here, glad you are. 16 00:00:41,920 --> 00:00:45,840 Speaker 1: And this skimmer thing we've got I know you relied 17 00:00:45,880 --> 00:00:48,480 Speaker 1: on a local story about a convenience store card reader, 18 00:00:48,560 --> 00:00:51,519 Speaker 1: a skimmer thing. We can talk about that, but this 19 00:00:51,640 --> 00:00:54,840 Speaker 1: also goes along with the idea that they can capture 20 00:00:54,880 --> 00:00:59,279 Speaker 1: your card information by you know, digitally or through the waves, right, 21 00:00:59,320 --> 00:01:01,440 Speaker 1: I mean the elect tronically. They don't even need to 22 00:01:01,440 --> 00:01:04,640 Speaker 1: touch you or touch your card, that. 23 00:01:04,640 --> 00:01:07,200 Speaker 2: Is correct, Brian. I mean it depends on the type 24 00:01:07,240 --> 00:01:09,360 Speaker 2: of cards you have and the type of device they have. 25 00:01:09,480 --> 00:01:12,840 Speaker 2: But what you're describing really is just another form of skimming. Now. 26 00:01:12,920 --> 00:01:14,880 Speaker 2: You know, when you look at this, you hear different 27 00:01:14,959 --> 00:01:19,640 Speaker 2: terms skimming, shimming, that sort of thing. But basically, you know, 28 00:01:19,720 --> 00:01:22,280 Speaker 2: most credit cards still have a max right, some have 29 00:01:22,480 --> 00:01:25,560 Speaker 2: the chip. You know, you can use the near field 30 00:01:25,560 --> 00:01:28,639 Speaker 2: communication to pay, the tap to pay, you can wipe 31 00:01:28,640 --> 00:01:32,280 Speaker 2: your card. There's there's all these different ways that you know, 32 00:01:32,360 --> 00:01:34,680 Speaker 2: you can get the information off a credit card or 33 00:01:34,720 --> 00:01:38,480 Speaker 2: debit card. Now, this particular thing again, we've talked about 34 00:01:38,480 --> 00:01:40,800 Speaker 2: this before and it's showing up here once again in 35 00:01:40,840 --> 00:01:45,360 Speaker 2: the Tri State area. People using skimmers, which are basically devices. 36 00:01:46,040 --> 00:01:49,000 Speaker 2: Depending on the device, sometimes it's called a shimmer if 37 00:01:49,040 --> 00:01:52,880 Speaker 2: it goes inside, but essentially you either put a device 38 00:01:52,960 --> 00:01:56,200 Speaker 2: over the aperture of the credit card reader or inside 39 00:01:56,200 --> 00:01:58,440 Speaker 2: the credit card reader. Could be a gas pump, could 40 00:01:58,480 --> 00:02:01,080 Speaker 2: be an ATM, could be a point sales system sitting 41 00:02:01,080 --> 00:02:04,320 Speaker 2: on a counter somewhere. But you know, once you put 42 00:02:04,320 --> 00:02:07,279 Speaker 2: the card into it, it attempts to read the mag strip. 43 00:02:07,600 --> 00:02:09,840 Speaker 2: It attempts to read the chip again. Whatever it's designed 44 00:02:09,840 --> 00:02:13,200 Speaker 2: to do, or tap to pay, it can potentially, you know, 45 00:02:13,240 --> 00:02:15,160 Speaker 2: I could walk up to you with the right device 46 00:02:15,160 --> 00:02:17,880 Speaker 2: in my pocket, bump into you, and try to read 47 00:02:17,960 --> 00:02:20,200 Speaker 2: the cards in your wallet. So there's a variety of 48 00:02:20,240 --> 00:02:23,359 Speaker 2: different ways this works. We're just now seeing another real 49 00:02:23,360 --> 00:02:24,919 Speaker 2: world example where someone did. 50 00:02:24,800 --> 00:02:27,800 Speaker 1: It well, the old school way. The original way was 51 00:02:27,840 --> 00:02:31,120 Speaker 1: to put something over the top of the original card reader, correct. 52 00:02:31,160 --> 00:02:34,160 Speaker 1: I mean quite often you could tell that that had happened. 53 00:02:34,160 --> 00:02:36,320 Speaker 1: You could grab a hold of it and jiggle it. 54 00:02:36,320 --> 00:02:38,120 Speaker 1: It might pop off, and then it'd be revealed to 55 00:02:38,200 --> 00:02:40,680 Speaker 1: be in your hand. I mean, I at least there 56 00:02:40,720 --> 00:02:44,120 Speaker 1: was an opportunity for people to try or look for 57 00:02:44,160 --> 00:02:47,640 Speaker 1: something like that. How do they install these card skimming 58 00:02:47,680 --> 00:02:50,760 Speaker 1: devices inside that device? 59 00:02:50,919 --> 00:02:55,080 Speaker 2: Well, imagine just a small board, right, a small circuit board, 60 00:02:55,400 --> 00:02:57,240 Speaker 2: and you just drop it in the slot. I mean, 61 00:02:57,240 --> 00:03:00,320 Speaker 2: that's how small these things have gotten. Now, you know, 62 00:03:00,400 --> 00:03:02,760 Speaker 2: sometimes there's a second angle to this, because everything you 63 00:03:02,840 --> 00:03:05,400 Speaker 2: said is right about the older stuff. In many cases 64 00:03:05,400 --> 00:03:08,839 Speaker 2: it would literally fit over aperture for the credit card, 65 00:03:09,280 --> 00:03:12,240 Speaker 2: so you're sticking your card through their device. Sometimes I 66 00:03:12,320 --> 00:03:14,400 Speaker 2: might have a different color. It might be loose whatever 67 00:03:14,919 --> 00:03:18,000 Speaker 2: with this with these newer, smaller technologies, again, it could 68 00:03:18,040 --> 00:03:21,519 Speaker 2: be something if it's completely inside the slot, so you 69 00:03:21,560 --> 00:03:24,000 Speaker 2: wouldn't really see it. You wouldn't know what to look for. 70 00:03:24,080 --> 00:03:26,720 Speaker 2: Even if you looked inside. Right, Well, it looks like 71 00:03:26,720 --> 00:03:31,760 Speaker 2: a circuit board. This thing's electronic, it's probably okay. So yeah, 72 00:03:31,800 --> 00:03:33,680 Speaker 2: that's part of the issue with this, Brian, as if 73 00:03:33,680 --> 00:03:37,320 Speaker 2: they get more smaller and more sophisticated, they get more 74 00:03:37,360 --> 00:03:39,560 Speaker 2: difficult to detect. And in the old days too, and 75 00:03:39,840 --> 00:03:41,920 Speaker 2: many cases you'd have to come retrieve the thing is 76 00:03:41,960 --> 00:03:43,760 Speaker 2: the criminal to get the data out of it. But 77 00:03:43,880 --> 00:03:46,600 Speaker 2: now some of these things can support wireless protocols like 78 00:03:46,640 --> 00:03:49,040 Speaker 2: Bluetooth or Wi Fi or something like that, so once 79 00:03:49,080 --> 00:03:52,360 Speaker 2: I've deployed it, I don't necessarily need to ever touch 80 00:03:52,400 --> 00:03:54,240 Speaker 2: it again. As a criminal, I could just pull into 81 00:03:54,280 --> 00:03:56,000 Speaker 2: the lot and get the data off of it. So 82 00:03:56,600 --> 00:03:58,720 Speaker 2: they've gotten trickier. You know a couple other things you 83 00:03:58,720 --> 00:04:01,600 Speaker 2: should look for, and again this depends on the type 84 00:04:01,640 --> 00:04:04,400 Speaker 2: of skimmer they're using. Would be okay, if I have 85 00:04:04,440 --> 00:04:06,840 Speaker 2: a debit card, I got it. The criminal's got to 86 00:04:06,840 --> 00:04:09,600 Speaker 2: get my pen so sometimes they'll also deploy a tiny 87 00:04:09,640 --> 00:04:13,040 Speaker 2: camera or possibly an overlay over the keypad. So if 88 00:04:13,040 --> 00:04:15,840 Speaker 2: you wheel up on one of these devices and it 89 00:04:15,840 --> 00:04:18,240 Speaker 2: looks like it's been tampered with in any way, including 90 00:04:18,320 --> 00:04:21,320 Speaker 2: like the keypad looks funny. It looks like there's something 91 00:04:21,400 --> 00:04:24,760 Speaker 2: laid over the keypad where if you could potentially see 92 00:04:24,800 --> 00:04:26,400 Speaker 2: a camera. Now, I get this is a lot to 93 00:04:26,440 --> 00:04:29,279 Speaker 2: look for. You know, these guys want to place the 94 00:04:29,320 --> 00:04:30,960 Speaker 2: camera so they can see you type in your pin, 95 00:04:31,160 --> 00:04:33,520 Speaker 2: or they want to put an overlay over the keypad 96 00:04:33,560 --> 00:04:36,720 Speaker 2: so they can capture that pin. It gets tricky, and 97 00:04:36,800 --> 00:04:39,320 Speaker 2: you know, as they have to apply these other devices, 98 00:04:39,320 --> 00:04:41,479 Speaker 2: there's more likelihood to get caught. It sounds like, you know, 99 00:04:41,520 --> 00:04:46,480 Speaker 2: these guys got caught pretty quickly, but it's certainly something 100 00:04:46,520 --> 00:04:48,080 Speaker 2: to be on the lookout for. You know. A general 101 00:04:48,120 --> 00:04:51,919 Speaker 2: recommendation I would make to people is to try to 102 00:04:52,000 --> 00:04:57,400 Speaker 2: always use a device where it's in eye sight of 103 00:04:57,440 --> 00:05:00,280 Speaker 2: another human being. You know, pick the pump if it's 104 00:05:00,279 --> 00:05:02,919 Speaker 2: closest to the cashiers. Pick the pump where you know 105 00:05:03,000 --> 00:05:05,520 Speaker 2: there are security cameras. Again, it doesn't have to be 106 00:05:05,520 --> 00:05:07,720 Speaker 2: a gas pump though it could be an ATM. It 107 00:05:07,720 --> 00:05:09,440 Speaker 2: it could even in this case, it sounds like they 108 00:05:09,480 --> 00:05:12,320 Speaker 2: weren't tamping with the gas pumps, they were actually tampering 109 00:05:12,400 --> 00:05:17,279 Speaker 2: with the credit card readers inside the building. So it's 110 00:05:17,320 --> 00:05:19,719 Speaker 2: a tricky problem to solve, but if you know it's 111 00:05:19,720 --> 00:05:21,720 Speaker 2: a thing, at least you can be more cautious and 112 00:05:22,040 --> 00:05:25,440 Speaker 2: potentially use a credit card to avail yourself of the 113 00:05:25,480 --> 00:05:28,400 Speaker 2: Consumer protection City. Yes, credit cards versus debit cards. 114 00:05:28,400 --> 00:05:31,080 Speaker 1: I'm glad I was anticipating asking you about that. A 115 00:05:31,120 --> 00:05:34,000 Speaker 1: reminding listeners, uniform commercial code protects you. You're only liable 116 00:05:34,040 --> 00:05:37,080 Speaker 1: for fifty bucks if someone abuses your credit card, not 117 00:05:37,240 --> 00:05:39,880 Speaker 1: the case when you're using your pin and having the 118 00:05:39,880 --> 00:05:42,520 Speaker 1: money taken directly out of your bank account. That's danger 119 00:05:42,680 --> 00:05:45,320 Speaker 1: zone right there. That is a really really bad idea. 120 00:05:45,360 --> 00:05:47,760 Speaker 1: And I guess these card readers you said, someone needs 121 00:05:47,760 --> 00:05:49,280 Speaker 1: to maybe have a video camera to see your pin 122 00:05:49,400 --> 00:05:53,520 Speaker 1: or something. Can't they, you know, like record what numbers 123 00:05:53,560 --> 00:05:55,839 Speaker 1: you're typing in when you're putting your pin in with 124 00:05:55,920 --> 00:05:57,240 Speaker 1: these device readers. 125 00:05:58,680 --> 00:06:01,760 Speaker 2: Probably not with it, and I can't say for sure, 126 00:06:01,800 --> 00:06:04,680 Speaker 2: but with the reader itself, you know, typically it's just 127 00:06:04,920 --> 00:06:07,719 Speaker 2: electronic Okay, an electronic device is trying to read the 128 00:06:07,760 --> 00:06:11,320 Speaker 2: mag stripe you know, the keypad is separate, but in 129 00:06:11,360 --> 00:06:13,440 Speaker 2: many cases they'll put like a little overlay over it 130 00:06:13,480 --> 00:06:15,839 Speaker 2: so it looks, you know, it's it's another keypad sitting 131 00:06:15,839 --> 00:06:17,919 Speaker 2: over top of the real keypads, so when you punch 132 00:06:17,960 --> 00:06:21,320 Speaker 2: your number in, they're capturing it from that, or they're 133 00:06:21,360 --> 00:06:24,000 Speaker 2: placing a camera somewhere where they can see the keypad 134 00:06:24,120 --> 00:06:25,320 Speaker 2: so they can capture that pin. 135 00:06:25,600 --> 00:06:29,080 Speaker 1: Gotcha. And of course we can't end the segment without saying, 136 00:06:29,080 --> 00:06:31,719 Speaker 1: you know, with regard to the reading of your card 137 00:06:31,839 --> 00:06:35,800 Speaker 1: just by being near you Faraday wallet, right. 138 00:06:36,360 --> 00:06:40,640 Speaker 2: Yes, that's always a good thing, they said, blocking wallets. 139 00:06:40,720 --> 00:06:43,440 Speaker 1: Yeah, just type in Amazon. You just got I know 140 00:06:43,480 --> 00:06:45,560 Speaker 1: you people hate Amazon or love it either way. Just 141 00:06:45,600 --> 00:06:49,320 Speaker 1: type in RFID wallet or something. And maybe even I'm 142 00:06:49,320 --> 00:06:52,160 Speaker 1: presuming they make purses along the same way Faraday purses, 143 00:06:52,200 --> 00:06:54,280 Speaker 1: and you there you go. You'll be protected at least 144 00:06:54,320 --> 00:06:56,280 Speaker 1: from that type of shenanigans. We'll bring day back. We'll 145 00:06:56,279 --> 00:06:59,000 Speaker 1: talk about users apparently not liking or saying no to 146 00:06:59,000 --> 00:07:01,640 Speaker 1: the Windows eleven up, six thirty six. Right now, if 147 00:07:01,720 --> 00:07:08,600 Speaker 1: you five krcit talk talk station, it's six forty and 148 00:07:08,680 --> 00:07:11,080 Speaker 1: fifty five krsit the talk station doing that tech Friday 149 00:07:11,080 --> 00:07:13,160 Speaker 1: with Dave how It brought to you again by intrust 150 00:07:13,240 --> 00:07:16,920 Speaker 1: it online at interest dot com. I haven't been I 151 00:07:16,920 --> 00:07:19,480 Speaker 1: haven't used Windows, and I can't remember how long it's 152 00:07:19,520 --> 00:07:22,320 Speaker 1: been more than a decade. I went Apple and for 153 00:07:22,360 --> 00:07:26,000 Speaker 1: a different couple of reasons. But so I'm no longer 154 00:07:26,120 --> 00:07:28,840 Speaker 1: hip to the whole Windows upgrade thing. But why are 155 00:07:29,000 --> 00:07:31,720 Speaker 1: users saying no to the Windows eleven upgrade? 156 00:07:31,800 --> 00:07:35,200 Speaker 2: Dave hatter Well, Ron, I think it's a combination of things. 157 00:07:35,240 --> 00:07:38,320 Speaker 2: You know, first off, people get comfortable with the way 158 00:07:38,320 --> 00:07:41,440 Speaker 2: a particular operating system works and don't want to change. True. 159 00:07:41,480 --> 00:07:44,840 Speaker 2: I think people also don't really understand the risk of 160 00:07:44,880 --> 00:07:47,840 Speaker 2: having end of life systems, you know, whether it's Windows, Linux, 161 00:07:47,920 --> 00:07:52,720 Speaker 2: Mac Apple, iOS, Android, whatever, or a particular piece of 162 00:07:52,760 --> 00:07:54,920 Speaker 2: software like Chrome. For what it's worth, if you still 163 00:07:55,000 --> 00:07:57,800 Speaker 2: use Google Chrome, I suggest you dropped that. By the way, 164 00:07:57,800 --> 00:08:01,760 Speaker 2: it supposed to a privacy friendly browser like Brave, Firefox, 165 00:08:01,800 --> 00:08:04,160 Speaker 2: Tour or Safari. But if you still use Chrome, critical 166 00:08:04,240 --> 00:08:07,200 Speaker 2: updates came out the other day. My point being, when 167 00:08:07,240 --> 00:08:09,960 Speaker 2: you have end of life software or software that needs 168 00:08:10,000 --> 00:08:12,600 Speaker 2: to be updated, end of life means the manufacturer is 169 00:08:12,640 --> 00:08:14,880 Speaker 2: no longer putting out any updates, right, So it doesn't 170 00:08:14,880 --> 00:08:17,560 Speaker 2: really matter what the platform of software is. Once you 171 00:08:17,680 --> 00:08:21,520 Speaker 2: hit that point, then you are, over time increasing your 172 00:08:21,600 --> 00:08:24,800 Speaker 2: risk of some sort of attack against that vulnerability because 173 00:08:24,840 --> 00:08:27,240 Speaker 2: the bad guys will find them and the manufacturer's not 174 00:08:27,320 --> 00:08:30,320 Speaker 2: fixing them. Windows ten went end of life in October, 175 00:08:30,400 --> 00:08:32,960 Speaker 2: So whether it's people don't want to switch because they're 176 00:08:33,120 --> 00:08:35,200 Speaker 2: familiar with Windows ten, they don't want to spend the 177 00:08:35,200 --> 00:08:37,960 Speaker 2: money in some cases to upgrade from Windows ten to 178 00:08:38,000 --> 00:08:40,720 Speaker 2: Windows eleven you need to get a new computer because 179 00:08:40,720 --> 00:08:44,800 Speaker 2: the older hardware will not support Windows eleven, or it's 180 00:08:44,880 --> 00:08:47,080 Speaker 2: they don't understand the risk. I think those are probably 181 00:08:47,080 --> 00:08:50,360 Speaker 2: the four main reasons. Apparently from some recent reporting and 182 00:08:50,440 --> 00:08:52,840 Speaker 2: some information that came from Dell, obviously one of the 183 00:08:52,960 --> 00:08:57,560 Speaker 2: large PC manufacturers out there for the Windows operating system, 184 00:08:57,800 --> 00:09:00,280 Speaker 2: there are a huge number of people who so far, 185 00:09:00,679 --> 00:09:04,720 Speaker 2: despite Windows ten going into life in October, have not 186 00:09:05,040 --> 00:09:08,360 Speaker 2: made the leap to Windows eleven yet, and again as 187 00:09:08,400 --> 00:09:10,560 Speaker 2: time goes on, that's a bigger and bigger problem. 188 00:09:11,120 --> 00:09:13,559 Speaker 1: Well, I mean, I get all the points you're making, 189 00:09:13,840 --> 00:09:18,320 Speaker 1: but insofar as ten versus eleven, to your initial point, 190 00:09:18,320 --> 00:09:20,240 Speaker 1: people don't like the change or the look or whatever. 191 00:09:20,360 --> 00:09:22,200 Speaker 1: Are they that dramatically different. 192 00:09:23,920 --> 00:09:28,320 Speaker 2: In my opinion, No, Brian, But you know again, people 193 00:09:28,440 --> 00:09:31,040 Speaker 2: get used to something and then stuff gets moved around. 194 00:09:31,120 --> 00:09:34,120 Speaker 2: They don't like the way it looks, and you know it. 195 00:09:34,160 --> 00:09:37,920 Speaker 2: In my opinion, Now you know me, mister tin Floyd 196 00:09:37,920 --> 00:09:40,320 Speaker 2: hat guy here, I'm going to tell you that the 197 00:09:40,360 --> 00:09:43,720 Speaker 2: security risks to you, especially if you're not very technical 198 00:09:43,800 --> 00:09:46,480 Speaker 2: and you're not doing other things to mitigate those risks, 199 00:09:46,960 --> 00:09:50,080 Speaker 2: the security risks to you by not switching would well 200 00:09:50,120 --> 00:09:53,520 Speaker 2: outweigh the inconvenience you're going to experience for the first 201 00:09:53,559 --> 00:09:56,280 Speaker 2: several days while you get used to it. Now, you know, 202 00:09:56,400 --> 00:09:58,959 Speaker 2: people have other issues with Windows eleven. It's got a 203 00:09:59,040 --> 00:10:04,680 Speaker 2: lot more let's say, it's less privacy friendly than order versions. Again, 204 00:10:05,760 --> 00:10:07,840 Speaker 2: all of these big tech companies have their issues, but 205 00:10:08,000 --> 00:10:12,960 Speaker 2: just from a simple security perspective, not having an operating system, 206 00:10:13,000 --> 00:10:16,200 Speaker 2: since that's the fundamental part that drives everything else you 207 00:10:16,280 --> 00:10:22,160 Speaker 2: do on your device. And again this would be Apple, iOS, Android, Mac, 208 00:10:22,360 --> 00:10:25,000 Speaker 2: whatever you're using, if you hit a point where you 209 00:10:25,040 --> 00:10:28,839 Speaker 2: can't get updates anymore over time, you are going to 210 00:10:29,080 --> 00:10:32,040 Speaker 2: substantially put yourself at risk because there are bad guys 211 00:10:32,120 --> 00:10:35,959 Speaker 2: always looking for flaws these things have millions of lines 212 00:10:36,000 --> 00:10:38,280 Speaker 2: of code in them. There are flaws that are yet 213 00:10:38,400 --> 00:10:41,520 Speaker 2: to be discovered. I mean, Microsoft patch Tuesday once a 214 00:10:41,559 --> 00:10:45,800 Speaker 2: month usually is fixing dozens of things, not all security related. 215 00:10:45,880 --> 00:10:47,880 Speaker 2: You know, when you look at the Apple patches for 216 00:10:48,000 --> 00:10:51,400 Speaker 2: iOS for your phone, usually dozens of things are fixed. 217 00:10:52,000 --> 00:10:54,520 Speaker 2: As time wears on, and those don't get fixed, you're 218 00:10:54,520 --> 00:10:57,560 Speaker 2: putting yourself at risk. And now you may decide get 219 00:10:57,559 --> 00:10:59,880 Speaker 2: off Windows and go to Mac, use Linux, do so 220 00:11:00,080 --> 00:11:03,720 Speaker 2: something different. But if you're still running Windows ten or worse, 221 00:11:03,880 --> 00:11:07,560 Speaker 2: something like Windows eight or Windows seven, you are at 222 00:11:07,720 --> 00:11:10,520 Speaker 2: substantial risk with these older operating systems if you don't 223 00:11:10,559 --> 00:11:13,080 Speaker 2: upgrade them. I mean, just reading this Forbes article that 224 00:11:13,160 --> 00:11:16,000 Speaker 2: I sent to Joe about this, right, the headline is 225 00:11:16,200 --> 00:11:19,560 Speaker 2: security disaster, five hundred million Microsoft users saying no to 226 00:11:19,600 --> 00:11:22,080 Speaker 2: Windows eleven, and then you know it goes on to 227 00:11:22,160 --> 00:11:25,920 Speaker 2: say Microsoft's looming security disaster is worse than feared. Those 228 00:11:25,960 --> 00:11:28,880 Speaker 2: aren't my words, This is from Forbes. A staggering billion 229 00:11:28,920 --> 00:11:31,040 Speaker 2: Windows users are at risk is the sheer scale of 230 00:11:31,040 --> 00:11:33,960 Speaker 2: the task. You know, goes on YadA, YadA, YadA, But 231 00:11:34,559 --> 00:11:38,000 Speaker 2: they're just pointing out that you really need to get 232 00:11:38,040 --> 00:11:41,080 Speaker 2: off Windows ten and anything older than that. Absolutely you 233 00:11:41,200 --> 00:11:42,680 Speaker 2: need to get something different. 234 00:11:42,840 --> 00:11:45,680 Speaker 1: Well, that five hundred million figure serves to prove the 235 00:11:45,679 --> 00:11:47,840 Speaker 1: point you dis made. That's why the criminals are out 236 00:11:47,880 --> 00:11:51,640 Speaker 1: there looking for ways to exploit old, no longer serviced 237 00:11:51,679 --> 00:11:54,040 Speaker 1: operating systems. A lot of people have resisted so much 238 00:11:54,040 --> 00:11:55,400 Speaker 1: it makes them an easy target. 239 00:11:56,040 --> 00:11:58,640 Speaker 2: That's exactly right, Brian, And I want to point something 240 00:11:58,640 --> 00:12:01,160 Speaker 2: else out too. Now again, I'm I'm not here to 241 00:12:01,280 --> 00:12:04,600 Speaker 2: advocate for any particular platform at this point. I'm mostly 242 00:12:04,640 --> 00:12:07,440 Speaker 2: Windows based most of our customers and Windows based that's 243 00:12:07,440 --> 00:12:10,240 Speaker 2: how most business operates. But all of that said, there 244 00:12:10,240 --> 00:12:13,880 Speaker 2: are many choices at this point. Again, even something like 245 00:12:13,960 --> 00:12:16,079 Speaker 2: Chrome OS. Now, I'm not going to use products from 246 00:12:16,080 --> 00:12:17,920 Speaker 2: Google if I can help it. But you got Linux, 247 00:12:17,960 --> 00:12:21,280 Speaker 2: you got Mac. There's a lot of choices. But to 248 00:12:21,400 --> 00:12:24,400 Speaker 2: your point, you know, one of the reasons why Windows 249 00:12:24,440 --> 00:12:26,480 Speaker 2: is more attacked than others is because it has the 250 00:12:26,559 --> 00:12:29,120 Speaker 2: largest user base. Right, If I'm a criminal and I 251 00:12:29,160 --> 00:12:31,880 Speaker 2: want to steal your money or your data, or ideally both, 252 00:12:32,320 --> 00:12:35,080 Speaker 2: do I want to go after the smallest possible platform, 253 00:12:35,120 --> 00:12:38,160 Speaker 2: where you know I have less opportunities, or do I 254 00:12:38,160 --> 00:12:41,840 Speaker 2: want to go after the largest platform so again, I'm 255 00:12:41,840 --> 00:12:44,440 Speaker 2: not saying Windows doesn't have its issues. I'm just saying 256 00:12:44,480 --> 00:12:46,320 Speaker 2: one of the reasons why it's more attacked is because 257 00:12:46,320 --> 00:12:49,640 Speaker 2: it's a much larger user base. And as these systems 258 00:12:49,720 --> 00:12:52,920 Speaker 2: become obsolete, as you build up this technical debt, as 259 00:12:52,920 --> 00:12:55,959 Speaker 2: you have these systems that can't be patched, of course 260 00:12:55,960 --> 00:12:58,760 Speaker 2: they're going to go after those because it's easier for 261 00:12:58,840 --> 00:13:02,160 Speaker 2: them than the late and greatest version of whatever operating 262 00:13:02,200 --> 00:13:04,439 Speaker 2: system that's got all the latest and greatest security stuff. 263 00:13:04,440 --> 00:13:05,400 Speaker 2: And you're exactly right. 264 00:13:05,800 --> 00:13:07,920 Speaker 1: Well, i'll tell you what. We'll pause now and we'll 265 00:13:07,920 --> 00:13:11,600 Speaker 1: continue an attack on Google. Coming up next Dave's favorite 266 00:13:11,640 --> 00:13:14,000 Speaker 1: company six forty six right now for CD Talks Station. 267 00:13:14,160 --> 00:13:16,640 Speaker 1: I'm looking at him. He's in studio, Congressman Brad Well. 268 00:13:16,960 --> 00:13:18,840 Speaker 1: I'm sorry, Citizen Brad Winsor. I still want to call 269 00:13:18,880 --> 00:13:20,760 Speaker 1: him Congressman. Will be talking a full hour in the 270 00:13:20,760 --> 00:13:22,880 Speaker 1: next segment with him. In the meantime, Tech Friddy's Dave 271 00:13:22,920 --> 00:13:26,319 Speaker 1: hatters on yet another reason to hate Google. It's a 272 00:13:26,320 --> 00:13:30,280 Speaker 1: real grabbing headline. Google starts sharing all your text messages 273 00:13:30,320 --> 00:13:33,440 Speaker 1: with your employer. Well there's a red flag, Dave. 274 00:13:33,600 --> 00:13:37,720 Speaker 2: What, Well, Brian, you know the sort of typical of 275 00:13:37,920 --> 00:13:43,000 Speaker 2: clickbait headlines. Yeah, you know, for Forbes generally puts out 276 00:13:43,080 --> 00:13:45,720 Speaker 2: pretty good information in this space. You know, I read 277 00:13:45,760 --> 00:13:48,600 Speaker 2: a lot, and particularly this author, Zach Dorfmann. He's pretty 278 00:13:48,640 --> 00:13:52,360 Speaker 2: good in this privacy and security space. I understand what 279 00:13:52,480 --> 00:13:55,720 Speaker 2: he's saying. It's not quite as dire as it makes 280 00:13:55,760 --> 00:14:01,280 Speaker 2: this sound. And really it boils down to how text works. Right. 281 00:14:01,520 --> 00:14:03,640 Speaker 2: If you and I are both sending messages to each 282 00:14:03,679 --> 00:14:06,400 Speaker 2: other over Apple phones, they're into end encrypted because that's 283 00:14:06,440 --> 00:14:10,400 Speaker 2: the way Apple text works. Okay, But if you're on 284 00:14:10,400 --> 00:14:12,400 Speaker 2: an Android phone and I'm on an Apple phone, well 285 00:14:12,440 --> 00:14:15,680 Speaker 2: they work differently. So the end to end encryption potentially 286 00:14:15,760 --> 00:14:19,240 Speaker 2: goes away. And since the original version of text people 287 00:14:19,280 --> 00:14:21,320 Speaker 2: can think back to their flip phones and how limited 288 00:14:21,360 --> 00:14:24,600 Speaker 2: that was. Different protocols have been built to allow the 289 00:14:24,680 --> 00:14:29,280 Speaker 2: exchange of more rich information, right, things like pictures and 290 00:14:29,320 --> 00:14:31,080 Speaker 2: files and that sort of thing. Right, so that's come 291 00:14:31,120 --> 00:14:33,920 Speaker 2: on over time. Well, again, how Apple does it versus 292 00:14:33,920 --> 00:14:36,560 Speaker 2: how Android does it is different. One of the protocols 293 00:14:36,560 --> 00:14:38,720 Speaker 2: to make that work without getting too nerdy is something 294 00:14:38,760 --> 00:14:44,080 Speaker 2: called RCS Rich Communication Services, which basically allows you to 295 00:14:44,120 --> 00:14:46,800 Speaker 2: do things like see when the other person is typing again, 296 00:14:46,840 --> 00:14:49,760 Speaker 2: stuff that Apple's had for a long time. This works 297 00:14:49,840 --> 00:14:52,240 Speaker 2: back and forth even if you're not on an Apple phone, 298 00:14:53,160 --> 00:14:56,640 Speaker 2: voice messages, file sharing group chats, all this sort of stuff. Right, 299 00:14:56,680 --> 00:14:59,440 Speaker 2: So RCS in and of itself is a good thing 300 00:14:59,480 --> 00:15:02,480 Speaker 2: that allows you to be more compatible between different types 301 00:15:02,520 --> 00:15:07,440 Speaker 2: of texting systems. The problem, though, is is this article 302 00:15:07,480 --> 00:15:11,440 Speaker 2: points out if you know, most people are understand that 303 00:15:11,520 --> 00:15:14,920 Speaker 2: email is sort of inherently insecure unless it's encrypted, and 304 00:15:14,960 --> 00:15:18,000 Speaker 2: then it's easy to monitor. Most people sort of think, okay, 305 00:15:18,000 --> 00:15:21,680 Speaker 2: if I'm texting, my employer can't necessarily see that. And 306 00:15:22,080 --> 00:15:23,640 Speaker 2: what they point out here and again, why I say 307 00:15:23,640 --> 00:15:26,920 Speaker 2: it's a little bit clickbaity is because if you have 308 00:15:27,040 --> 00:15:31,000 Speaker 2: an employer supplied phone, right, they can turn on a 309 00:15:31,000 --> 00:15:33,920 Speaker 2: feature in the management of the phone that would allow 310 00:15:34,000 --> 00:15:38,280 Speaker 2: them to archive your text messages. Right, so they you 311 00:15:38,360 --> 00:15:41,280 Speaker 2: and I both have Android phones. Let's say we're texting 312 00:15:41,280 --> 00:15:43,560 Speaker 2: each other. Well, if that phone is supplied by the 313 00:15:43,560 --> 00:15:45,960 Speaker 2: company and they choose to turn on this feature, they 314 00:15:45,960 --> 00:15:48,800 Speaker 2: can archive my text messages. They're not really private. Now, 315 00:15:48,800 --> 00:15:50,840 Speaker 2: I would argue, and I think you probably would too, Brian. 316 00:15:51,160 --> 00:15:54,240 Speaker 2: If the employer supplies the phone, just like anything else 317 00:15:54,280 --> 00:15:56,240 Speaker 2: they supply, Well, they have the right to monitor it. 318 00:15:56,280 --> 00:15:58,400 Speaker 2: They're going to do what they want with it. I 319 00:15:58,400 --> 00:16:00,840 Speaker 2: think that the thing that this is trying to warn 320 00:16:00,880 --> 00:16:03,800 Speaker 2: about where this article is many people think that, you know, 321 00:16:03,840 --> 00:16:06,400 Speaker 2: they hear into end encryption. They talk about apps like 322 00:16:06,400 --> 00:16:08,480 Speaker 2: What's Happened Signaling this sort of thing, and they think 323 00:16:08,480 --> 00:16:12,120 Speaker 2: their texts are secure and if you have it, I 324 00:16:12,160 --> 00:16:14,840 Speaker 2: would argue, if you have an employer supplied device, the 325 00:16:14,880 --> 00:16:18,160 Speaker 2: employer can put tools on that device and ultimately read 326 00:16:18,200 --> 00:16:20,400 Speaker 2: anything they want. So I think this is just a 327 00:16:20,480 --> 00:16:22,800 Speaker 2: it's a good warning for folks. If you're on Android 328 00:16:22,840 --> 00:16:25,920 Speaker 2: and your phone is supplied by your employer, don't assume 329 00:16:26,000 --> 00:16:29,120 Speaker 2: that they can't access your text messages or you might 330 00:16:29,480 --> 00:16:31,840 Speaker 2: have some trouble on your hands depending on what you're doing. 331 00:16:32,160 --> 00:16:35,040 Speaker 2: But even better, Brian, I would just say this as 332 00:16:35,400 --> 00:16:38,960 Speaker 2: anything you do electronically can be can be accessed. Don't 333 00:16:39,000 --> 00:16:42,320 Speaker 2: assume anything you're doing in any electronic form is ultimately 334 00:16:42,640 --> 00:16:43,360 Speaker 2: private to you. 335 00:16:43,920 --> 00:16:45,080 Speaker 1: Well, I thought you were going to have a go 336 00:16:45,160 --> 00:16:47,800 Speaker 1: at Google, like Tom calls everyone and says, don't vote Democrat, 337 00:16:47,880 --> 00:16:48,880 Speaker 1: don't use Google. 338 00:16:50,160 --> 00:16:52,440 Speaker 2: Well, you know, if you're in a situation where that's 339 00:16:52,440 --> 00:16:55,080 Speaker 2: what your employer gives you. You may not have a choice, 340 00:16:55,440 --> 00:16:57,680 Speaker 2: so you know, you need to understand what could be 341 00:16:57,760 --> 00:17:01,400 Speaker 2: happening here. And you know this is I'm reading from 342 00:17:01,400 --> 00:17:03,840 Speaker 2: this Forbes article. Google says this is a quote dependable 343 00:17:03,840 --> 00:17:07,720 Speaker 2: Android supported solution for message archival, which is backwards compatible 344 00:17:07,720 --> 00:17:10,240 Speaker 2: with SMS and MMS message as well. Employees will see 345 00:17:10,240 --> 00:17:13,679 Speaker 2: a clear notification on their device when the archival feature 346 00:17:13,840 --> 00:17:16,199 Speaker 2: is active, So that's good news. You know, if you 347 00:17:16,240 --> 00:17:18,960 Speaker 2: have an employer's supply device and they turn this feature on, 348 00:17:19,400 --> 00:17:21,280 Speaker 2: it will tell you that. But I also get a 349 00:17:21,280 --> 00:17:24,280 Speaker 2: lot of people don't understand all this stuff, aren't paying attention. 350 00:17:24,280 --> 00:17:25,880 Speaker 2: And again I think the real heads up is if 351 00:17:25,880 --> 00:17:29,120 Speaker 2: you're an Android phone user and your device is supplied 352 00:17:29,119 --> 00:17:32,440 Speaker 2: by your employer, understand that any text messaging you're doing 353 00:17:32,480 --> 00:17:36,560 Speaker 2: on that device may be accessible by your employer. 354 00:17:36,760 --> 00:17:41,720 Speaker 1: Right, so don't act accordingly exactly. There is the underscoring 355 00:17:42,000 --> 00:17:45,000 Speaker 1: legitimately across the board, shenanigans and problems people might find 356 00:17:45,000 --> 00:17:48,080 Speaker 1: themselves in if they do text information in the world 357 00:17:48,560 --> 00:17:50,600 Speaker 1: that they don't want anybody else to read. I mean, 358 00:17:51,080 --> 00:17:53,000 Speaker 1: I find out people are so dumb when it comes 359 00:17:53,040 --> 00:17:56,199 Speaker 1: to that leaving, they're leaving a trail of evidence for 360 00:17:56,280 --> 00:17:59,520 Speaker 1: anybody down the road. So don't engage in untoward activities 361 00:17:59,520 --> 00:18:03,080 Speaker 1: whatever those might be, and documented on text. How's that? 362 00:18:04,359 --> 00:18:07,640 Speaker 2: Yes? And again you know, if you're worried about this, 363 00:18:07,920 --> 00:18:11,520 Speaker 2: get your own phone, use third party apps like Signal, 364 00:18:12,480 --> 00:18:14,720 Speaker 2: which I would recommend over What's happened because that's from 365 00:18:14,720 --> 00:18:18,080 Speaker 2: our friends at Meta. But also at the bottom line 366 00:18:18,119 --> 00:18:20,840 Speaker 2: is even if things are into and encrypted, even if 367 00:18:20,880 --> 00:18:23,359 Speaker 2: they're configured correctly, if you and I are messaging each 368 00:18:23,400 --> 00:18:26,600 Speaker 2: other to Signal Brian and we're doing something illegal, once 369 00:18:26,680 --> 00:18:29,760 Speaker 2: law enforcement has my device, if they can unlock the device, 370 00:18:29,920 --> 00:18:32,600 Speaker 2: well it unlocks the encryption and that's the content of 371 00:18:32,640 --> 00:18:35,880 Speaker 2: my Signal messages. So again, I think people watch TV 372 00:18:36,040 --> 00:18:37,879 Speaker 2: and they hear about in the end encryption and all 373 00:18:37,920 --> 00:18:40,560 Speaker 2: this security and privacy. But at the end of the day, 374 00:18:40,720 --> 00:18:43,240 Speaker 2: if I can unlock your device, will I unlock the 375 00:18:43,320 --> 00:18:46,400 Speaker 2: encryption that protects as messages I have them all? So again, 376 00:18:46,880 --> 00:18:50,200 Speaker 2: understand what this all really means, think about what privacy 377 00:18:50,320 --> 00:18:53,680 Speaker 2: is in today's world, and act accordingly. If you're doing 378 00:18:53,680 --> 00:18:56,679 Speaker 2: something illegal or something you don't want other people to know, 379 00:18:57,160 --> 00:19:00,320 Speaker 2: you can't assume that just because something is encrypted, that 380 00:19:00,440 --> 00:19:03,560 Speaker 2: it is protected, because if I can unlock your encryption, 381 00:19:05,000 --> 00:19:05,640 Speaker 2: I have it all. 382 00:19:06,600 --> 00:19:09,159 Speaker 1: Hey man interest dot Com that we find Dave and 383 00:19:09,160 --> 00:19:11,760 Speaker 1: the crew. Dave, thank you for you sponsoring this segment 384 00:19:11,800 --> 00:19:15,240 Speaker 1: that is so valuable and so informative and important. We'll 385 00:19:15,240 --> 00:19:17,240 Speaker 1: do it again next Friday. Have a great week between 386 00:19:17,280 --> 00:19:19,040 Speaker 1: now and then, and a wonderful weekend on top of it. 387 00:19:19,960 --> 00:19:22,520 Speaker 2: Always my pleasure, Brian. I look forward to chatting. 388 00:19:22,240 --> 00:19:25,120 Speaker 1: With you next week, Citizen Brad weinstrip in studio where 389 00:19:25,119 --> 00:19:27,240 Speaker 1: you're talking to him for a full hour. Plenty of 390 00:19:27,280 --> 00:19:29,359 Speaker 1: topics to talk about with Brad. 391 00:19:29,359 --> 00:19:29,960 Speaker 2: Be right back. 392 00:19:30,680 --> 00:19:32,800 Speaker 1: Today's top headlines coming on