1 00:00:00,160 --> 00:00:00,399 Speaker 1: T T. 2 00:00:00,840 --> 00:00:03,200 Speaker 2: I know, we already did an episode about scammers, The 3 00:00:03,320 --> 00:00:03,960 Speaker 2: Art of the Con. 4 00:00:04,360 --> 00:00:09,200 Speaker 3: Yes, we talked about what happened at Firefast. Firefast feels 5 00:00:09,240 --> 00:00:12,039 Speaker 3: like it was forever ago and yesterday. 6 00:00:11,840 --> 00:00:14,520 Speaker 2: Right, But you know what, I think it's gone all digital. 7 00:00:14,760 --> 00:00:18,919 Speaker 2: Between inventing Anna, the tender swindler, that couple that was 8 00:00:18,960 --> 00:00:20,640 Speaker 2: stealing bitcoin from people. 9 00:00:20,560 --> 00:00:23,000 Speaker 3: People are getting advanced in their scamming technology. 10 00:00:23,440 --> 00:00:26,320 Speaker 2: Yes, I've got to build up my digital fortress because 11 00:00:26,760 --> 00:00:29,760 Speaker 2: it's looking grim out here. Yes, I've been getting so 12 00:00:29,840 --> 00:00:33,360 Speaker 2: much digital spam that is actually scamming on the back end, 13 00:00:33,440 --> 00:00:36,279 Speaker 2: like links that say track your package here, even if 14 00:00:36,280 --> 00:00:39,080 Speaker 2: I haven't purchased any ash that has. 15 00:00:38,960 --> 00:00:42,159 Speaker 3: Been going around a lot. I've gotten text messages that 16 00:00:42,200 --> 00:00:46,080 Speaker 3: are like track your UPS package, which I might have 17 00:00:46,120 --> 00:00:49,040 Speaker 3: a UPS package on the way, and so you're tempted 18 00:00:49,080 --> 00:00:51,640 Speaker 3: to click it. But there's what is it? 19 00:00:51,920 --> 00:00:55,160 Speaker 2: Scamware, spyware, ransomware, phishing attacks. 20 00:00:55,280 --> 00:00:56,520 Speaker 3: I don't know any of those words. 21 00:00:56,600 --> 00:00:58,840 Speaker 2: You remember when everybody was getting emails about those gift 22 00:00:58,840 --> 00:00:59,720 Speaker 2: cards and people. 23 00:00:59,520 --> 00:01:00,200 Speaker 1: Were buying them. 24 00:01:00,240 --> 00:01:03,560 Speaker 3: People were buying gift cards and was not the gift. 25 00:01:03,360 --> 00:01:04,400 Speaker 1: Yeah, just out of control. 26 00:01:05,760 --> 00:01:08,959 Speaker 3: I'm TT and I'm Zakiyah and from Spotify. This is 27 00:01:09,040 --> 00:01:35,440 Speaker 3: Dope Labs. Welcome to Dope Labs, a weekly podcast that 28 00:01:35,560 --> 00:01:39,160 Speaker 3: mixes hardcore science, pop culture, and a healthy dose friendship. 29 00:01:39,440 --> 00:01:42,720 Speaker 2: This week, we're talking all about cybersecurity. 30 00:01:42,120 --> 00:01:45,000 Speaker 3: And with everything that's going on in Russia and Ukraine 31 00:01:45,040 --> 00:01:47,200 Speaker 3: right now, there's been a lot of talks about a 32 00:01:47,360 --> 00:01:48,840 Speaker 3: possible cyber attack. 33 00:01:49,200 --> 00:01:51,480 Speaker 2: We really wanted to know more about how people's online 34 00:01:51,520 --> 00:01:54,760 Speaker 2: data is collected and used, what happens during a cyber attack, 35 00:01:54,880 --> 00:01:57,240 Speaker 2: and what we can do to stay safe. Ready for 36 00:01:57,320 --> 00:01:59,520 Speaker 2: the recitation, Yes, let's get into the resitation. 37 00:02:03,240 --> 00:02:03,960 Speaker 1: So what do we know? 38 00:02:04,400 --> 00:02:08,480 Speaker 3: Well? I know that we are always online, whether it 39 00:02:08,480 --> 00:02:11,840 Speaker 3: be for work or social media. Every time my phone 40 00:02:11,880 --> 00:02:14,000 Speaker 3: tells me how long I've been, like the amount of 41 00:02:14,000 --> 00:02:16,280 Speaker 3: screen time I've had, and I go and check the details, 42 00:02:16,280 --> 00:02:20,080 Speaker 3: I'm like, hm, hmm. I spent a lot of time 43 00:02:20,320 --> 00:02:24,400 Speaker 3: on TikTok and Instagram, And sometimes I'm ashamed because it'll 44 00:02:24,440 --> 00:02:26,720 Speaker 3: be like, you were on there today for nine hours. 45 00:02:26,919 --> 00:02:29,240 Speaker 3: How is that possible? When I work eight hours. 46 00:02:29,280 --> 00:02:31,959 Speaker 2: That's nobody's business, all right, that's the first. 47 00:02:31,760 --> 00:02:34,119 Speaker 3: Thing, that's my business, that's my visiness. 48 00:02:37,200 --> 00:02:39,040 Speaker 2: We also know that there have been some pretty big 49 00:02:39,120 --> 00:02:43,120 Speaker 2: cybersecurity breaches in the news. You remember the Colonial pipeline attack. 50 00:02:43,440 --> 00:02:45,200 Speaker 2: You know, it's one thing to feel like it's the 51 00:02:45,240 --> 00:02:47,400 Speaker 2: matrix and people are moving the zeros and ones and 52 00:02:47,400 --> 00:02:48,720 Speaker 2: they're green and moving down the screen. 53 00:02:48,760 --> 00:02:49,480 Speaker 1: But the gas. 54 00:02:49,520 --> 00:02:52,399 Speaker 3: Honestly, like, how is gas even involved with this? Those 55 00:02:52,400 --> 00:02:54,080 Speaker 3: types of things just go way over my head because 56 00:02:54,080 --> 00:02:56,119 Speaker 3: every time I think of cyber attack, I just think 57 00:02:56,320 --> 00:02:57,079 Speaker 3: digital stuff. 58 00:02:57,160 --> 00:02:59,720 Speaker 2: What isn't it in the cloud? That gas is real? 59 00:03:03,440 --> 00:03:06,080 Speaker 3: And right now with everything that's going on, all the 60 00:03:06,200 --> 00:03:10,720 Speaker 3: tensions because Russia is invading Ukraine, the US banks are 61 00:03:10,760 --> 00:03:15,680 Speaker 3: preparing for a potential retaliatory cyber attack from Russia. 62 00:03:15,720 --> 00:03:18,560 Speaker 2: In the topic of cybersecurity, we're seeing that blow up. 63 00:03:18,600 --> 00:03:21,360 Speaker 2: Even in entertainment. So I already mentioned inventing Anna, and 64 00:03:21,400 --> 00:03:24,160 Speaker 2: we talked about Tender Swindler, but there's also the Matrix, 65 00:03:24,280 --> 00:03:26,919 Speaker 2: So the old one and the reboot and Enemy of 66 00:03:26,960 --> 00:03:27,519 Speaker 2: the State. 67 00:03:27,360 --> 00:03:28,200 Speaker 1: Too, Yes? 68 00:03:28,800 --> 00:03:29,840 Speaker 3: Is that the one with Will Smith? 69 00:03:30,160 --> 00:03:30,520 Speaker 1: Yes? 70 00:03:30,919 --> 00:03:34,840 Speaker 3: Yes? So what do we want to know? 71 00:03:35,240 --> 00:03:37,800 Speaker 2: I want to know what's being collected? What are y'all 72 00:03:37,800 --> 00:03:39,640 Speaker 2: taking off of my phone in my computer? 73 00:03:39,960 --> 00:03:41,080 Speaker 1: What are you doing with it? 74 00:03:41,400 --> 00:03:42,320 Speaker 3: Why do you want it? 75 00:03:42,600 --> 00:03:43,000 Speaker 2: Yes? 76 00:03:43,720 --> 00:03:46,960 Speaker 3: First and foremost, why I am very born. You want 77 00:03:46,960 --> 00:03:49,960 Speaker 3: to see all these silly pet videos? I don't know why. 78 00:03:50,120 --> 00:03:53,640 Speaker 2: And then what's legal versus what's illegal? What are people 79 00:03:53,840 --> 00:03:58,080 Speaker 2: allowed to do with our information? Whatever they're collecting? My 80 00:03:58,200 --> 00:03:59,880 Speaker 2: question is what is rants? 81 00:04:00,160 --> 00:04:04,880 Speaker 3: Where? Here are a lot of things like ransomware, spyware? Where? Where? 82 00:04:05,520 --> 00:04:07,480 Speaker 3: Where is all the stuff coming? 83 00:04:07,600 --> 00:04:09,160 Speaker 1: Where isn't the where? Yeah? 84 00:04:09,600 --> 00:04:11,400 Speaker 3: I don't understand any of it, and so I just 85 00:04:11,440 --> 00:04:14,720 Speaker 3: want like clear definitions for all of this stuff. 86 00:04:14,920 --> 00:04:17,200 Speaker 2: Yeah, and like you said, who wants our stuff? Are 87 00:04:17,240 --> 00:04:20,440 Speaker 2: we the common people? Are we the targets of these 88 00:04:20,480 --> 00:04:23,680 Speaker 2: types of cyber attacks? Or are they like high value 89 00:04:23,720 --> 00:04:26,640 Speaker 2: assets like on mission impossible? Is it for the common people? 90 00:04:26,839 --> 00:04:28,479 Speaker 3: Right? Because I feel like there's not enough money in 91 00:04:28,480 --> 00:04:30,480 Speaker 3: my bank account for y'all to want to hack it. 92 00:04:30,720 --> 00:04:33,760 Speaker 2: Yeah, I don't understand. But if I am a target 93 00:04:35,080 --> 00:04:37,440 Speaker 2: just in case, what do I need to do to 94 00:04:37,480 --> 00:04:37,920 Speaker 2: be safe? 95 00:04:37,920 --> 00:04:38,120 Speaker 1: You know? 96 00:04:38,240 --> 00:04:40,160 Speaker 2: Because Norton isn't out here anymore? 97 00:04:40,440 --> 00:04:41,680 Speaker 3: No, I have Norton on myself. 98 00:04:42,040 --> 00:04:44,480 Speaker 2: Nobody's here to save me. So what do I need 99 00:04:44,560 --> 00:04:44,800 Speaker 2: to do? 100 00:04:44,920 --> 00:04:46,440 Speaker 3: That's just out of how old we are. 101 00:04:47,520 --> 00:04:48,680 Speaker 1: That's all right, I'm okay with that. 102 00:04:49,080 --> 00:04:50,400 Speaker 3: Let's jump into the dissection. 103 00:04:53,839 --> 00:04:56,080 Speaker 2: Our guest for today's lap is Christina Morillo. 104 00:04:56,360 --> 00:04:58,640 Speaker 4: My name is Christina Marillo. I am based out of 105 00:04:58,640 --> 00:05:02,080 Speaker 4: New York City. I am in information security and technology 106 00:05:02,279 --> 00:05:06,599 Speaker 4: practitioner with about two decades of combined experience and everything 107 00:05:06,640 --> 00:05:10,680 Speaker 4: from enterprise technology, information security, cloud. 108 00:05:11,440 --> 00:05:15,200 Speaker 3: Christina recently published a book called ninety seven Things Every 109 00:05:15,360 --> 00:05:19,080 Speaker 3: Information Security Professional Should Know, and it's a practical guide 110 00:05:19,120 --> 00:05:21,839 Speaker 3: from a variety of information security experts. 111 00:05:22,080 --> 00:05:25,360 Speaker 2: So we ask Christina, what exactly is cybersecurity? 112 00:05:25,640 --> 00:05:30,480 Speaker 4: Cybersecurity is pretty much the practice of protecting systems, networks, 113 00:05:30,520 --> 00:05:34,120 Speaker 4: and programs from digital attacks. It's like the equivalent of 114 00:05:34,279 --> 00:05:36,920 Speaker 4: an intruder coming into your home and taking your stuff 115 00:05:37,040 --> 00:05:39,080 Speaker 4: right or accessing or touching your stuff. 116 00:05:39,680 --> 00:05:41,479 Speaker 3: I can't imagine somebody coming to my house and just 117 00:05:41,520 --> 00:05:43,720 Speaker 3: touching stuff. Oh that just seems gross. 118 00:05:43,720 --> 00:05:46,599 Speaker 2: That makes me feel sick, even when I think about 119 00:05:46,640 --> 00:05:50,279 Speaker 2: stuff that I'm looking at on my phone, things that 120 00:05:50,320 --> 00:05:52,680 Speaker 2: I'm saving. Like, I know, I share a lot of links, 121 00:05:52,680 --> 00:05:54,440 Speaker 2: but I don't want everybody all up in my stuff. 122 00:05:54,440 --> 00:05:57,040 Speaker 2: And I don't know about it exactly exactly. I don't 123 00:05:57,080 --> 00:05:58,520 Speaker 2: know about you, but I keep a lot of tabs 124 00:05:58,560 --> 00:06:00,480 Speaker 2: in bookmarks. What would you do if you lost all 125 00:06:00,520 --> 00:06:01,080 Speaker 2: of that, I. 126 00:06:01,000 --> 00:06:03,400 Speaker 3: Wouldn't even know where to begin. I think a problem 127 00:06:03,440 --> 00:06:05,880 Speaker 3: that I have now is that because I use my 128 00:06:06,000 --> 00:06:09,760 Speaker 3: phone and my finger on my computer to enter my passwords, 129 00:06:09,839 --> 00:06:12,120 Speaker 3: I don't remember my passwords anymore. I don't feel like 130 00:06:12,200 --> 00:06:15,159 Speaker 3: I have to. But I know it's important because if 131 00:06:15,240 --> 00:06:17,920 Speaker 3: all that stuff was wiped away, I would still need 132 00:06:17,960 --> 00:06:20,520 Speaker 3: to have access to all of my things, yes, like 133 00:06:20,560 --> 00:06:23,640 Speaker 3: my email and everything that requires a password, right, So 134 00:06:23,640 --> 00:06:25,000 Speaker 3: I would feel some type of way. 135 00:06:25,240 --> 00:06:29,880 Speaker 2: And so all of this, you know, quote unquote stuff, numbers, passwords, 136 00:06:29,960 --> 00:06:33,040 Speaker 2: all of these things, and also like browsing behavior and 137 00:06:33,120 --> 00:06:35,800 Speaker 2: what we like and don't like. It's really hard to 138 00:06:35,880 --> 00:06:40,239 Speaker 2: understand what's legally collected versus, you know, what's illegally collected. 139 00:06:40,279 --> 00:06:43,400 Speaker 2: So let's start with the legal collection of our stuff 140 00:06:43,600 --> 00:06:44,240 Speaker 2: on the Internet. 141 00:06:44,400 --> 00:06:47,480 Speaker 4: The reason why data is collected in the first place 142 00:06:47,720 --> 00:06:51,720 Speaker 4: is to help answer like everyday questions, right, evaluate outcomes, 143 00:06:51,800 --> 00:06:54,480 Speaker 4: and also make predictions about trends. So all of our 144 00:06:54,560 --> 00:06:55,480 Speaker 4: data is valuable. 145 00:06:55,680 --> 00:06:57,760 Speaker 2: So this changes how we've been thinking about it. T 146 00:06:57,880 --> 00:07:00,839 Speaker 2: t Absolutely, people want to know when we see a page, 147 00:07:00,880 --> 00:07:02,440 Speaker 2: what we clicked on, why we clicked on it, to 148 00:07:02,480 --> 00:07:04,320 Speaker 2: help them understand what's useful. 149 00:07:04,480 --> 00:07:06,400 Speaker 3: Yeah, like if you come to this website, what are 150 00:07:06,440 --> 00:07:09,520 Speaker 3: most people clicking on? So that it gives like a 151 00:07:09,560 --> 00:07:12,280 Speaker 3: lot of people information like what's most popular? What are 152 00:07:12,280 --> 00:07:15,360 Speaker 3: people interested in? Christina likes to think about data in 153 00:07:15,480 --> 00:07:18,520 Speaker 3: four categories. The first is personal data. 154 00:07:18,720 --> 00:07:23,160 Speaker 4: That's like any personally identifiable information like social security numbers 155 00:07:23,520 --> 00:07:27,760 Speaker 4: or your gender, even your IP address, your device ID. Right, 156 00:07:27,840 --> 00:07:29,840 Speaker 4: like stuff that can be tied back to you as 157 00:07:29,840 --> 00:07:31,240 Speaker 4: a human, as an individual. 158 00:07:31,360 --> 00:07:35,600 Speaker 2: And in addition to personal data, there's also engagement data. 159 00:07:35,520 --> 00:07:38,200 Speaker 4: So that's how customers interact with the business. So that 160 00:07:38,240 --> 00:07:42,840 Speaker 4: could be like social media apps, texts, navigating to different websites. Right, 161 00:07:42,920 --> 00:07:45,600 Speaker 4: everyone is now aware of the cookie pop up that 162 00:07:45,640 --> 00:07:47,040 Speaker 4: comes up, which is super annoying. 163 00:07:47,120 --> 00:07:49,600 Speaker 2: We see this all the time on websites. But what 164 00:07:49,800 --> 00:07:50,960 Speaker 2: exactly are cookies? 165 00:07:51,120 --> 00:07:56,440 Speaker 4: Cookies are pretty much little software programs that retain information. 166 00:07:56,880 --> 00:08:00,480 Speaker 4: As an example, they retain maybe your pre di for instance, 167 00:08:00,640 --> 00:08:03,120 Speaker 4: if you like your website icons to be larger when 168 00:08:03,160 --> 00:08:06,280 Speaker 4: you visit CNN dot com, if you always search for 169 00:08:06,280 --> 00:08:09,920 Speaker 4: a specific topic, you know, if you have favorites listed 170 00:08:10,000 --> 00:08:13,040 Speaker 4: on the site for any reason. Also, you're signing your 171 00:08:13,040 --> 00:08:16,200 Speaker 4: logging information This is like little pieces of software that 172 00:08:16,240 --> 00:08:19,120 Speaker 4: are downloaded onto your computer to retain your history. 173 00:08:19,520 --> 00:08:23,920 Speaker 3: The cookie pop up is something that depending I might 174 00:08:24,000 --> 00:08:27,160 Speaker 3: just say, fine, whatever, just accept, but sometimes I take 175 00:08:27,160 --> 00:08:29,600 Speaker 3: this time. I'm like, no, just only collect what is 176 00:08:29,680 --> 00:08:32,400 Speaker 3: necessary or whatever it says, like I switch all those 177 00:08:32,440 --> 00:08:36,160 Speaker 3: things off. But I think my default is just like except. 178 00:08:35,840 --> 00:08:38,800 Speaker 2: No manage my settings. One trust. I want those things 179 00:08:38,880 --> 00:08:41,560 Speaker 2: all off. I only want the bare minimum that they need. 180 00:08:41,760 --> 00:08:44,920 Speaker 3: They're taking advantage of the impatient folks. I'm like, move 181 00:08:45,000 --> 00:08:47,360 Speaker 3: this thing out the way, let me see this toothpaste. 182 00:08:47,559 --> 00:08:50,839 Speaker 4: Then there's like behavioral data, So that's transactional information, so 183 00:08:50,960 --> 00:08:53,760 Speaker 4: your purchase history, usage. You know, when you swipe that 184 00:08:53,840 --> 00:08:56,840 Speaker 4: credit card, you swipe that debit card, all of that 185 00:08:56,880 --> 00:09:00,080 Speaker 4: information is being stored the credit card to you. There 186 00:09:00,160 --> 00:09:03,960 Speaker 4: is the time, the location the store all of that information. 187 00:09:04,200 --> 00:09:06,559 Speaker 2: And last is attitudinal data. 188 00:09:06,559 --> 00:09:09,920 Speaker 4: That's more about consumer satisfaction. So that's like looking at 189 00:09:09,920 --> 00:09:12,920 Speaker 4: criteria to purchase an item or a service. 190 00:09:13,120 --> 00:09:14,840 Speaker 2: That's a lot of different kinds of data. I think 191 00:09:14,920 --> 00:09:17,600 Speaker 2: previously I would have thought it was all just one thing. 192 00:09:17,760 --> 00:09:22,520 Speaker 2: So we've hit personal data, engagement data, behavioral data, and 193 00:09:22,559 --> 00:09:24,160 Speaker 2: then attitudinal data. 194 00:09:24,280 --> 00:09:27,760 Speaker 3: Yeah, I think most people just think it's your passwords. Yeah, 195 00:09:28,320 --> 00:09:29,240 Speaker 3: that's all they're selling. 196 00:09:29,320 --> 00:09:32,400 Speaker 2: And so all of these things can be legally collected. 197 00:09:32,720 --> 00:09:35,000 Speaker 2: But where does it all go? That's my question? 198 00:09:35,080 --> 00:09:37,480 Speaker 3: Yeah, and how are companies using that data? 199 00:09:37,600 --> 00:09:40,240 Speaker 4: So once you have all of this information, all of 200 00:09:40,240 --> 00:09:44,400 Speaker 4: this information is like dumped into the terabytes and petabytes 201 00:09:44,520 --> 00:09:46,000 Speaker 4: on hard drives and databases. 202 00:09:46,080 --> 00:09:49,840 Speaker 3: Right from there, the data is organized into large data sets. 203 00:09:50,200 --> 00:09:54,280 Speaker 3: Then the companies hire data scientists to develop software to 204 00:09:54,440 --> 00:09:57,480 Speaker 3: analyze the data sets, and from this they can use 205 00:09:57,480 --> 00:10:00,560 Speaker 3: the data to discover patterns and make p dictions. 206 00:10:00,840 --> 00:10:03,480 Speaker 4: So they take all this data and then they can say, okay, 207 00:10:03,480 --> 00:10:05,520 Speaker 4: well we can predict that. You know, I don't know 208 00:10:05,600 --> 00:10:08,920 Speaker 4: the twenty twenty one Nissan is going to sell more 209 00:10:08,960 --> 00:10:11,040 Speaker 4: than any other vehicle in twenty twenty two. 210 00:10:11,320 --> 00:10:15,240 Speaker 2: So okay, if there's a lot of engagement around a 211 00:10:15,280 --> 00:10:18,920 Speaker 2: big collection or something that comes out, people can't predict. 212 00:10:19,080 --> 00:10:20,760 Speaker 2: This is going to make a big splash. People are 213 00:10:20,760 --> 00:10:22,280 Speaker 2: going to spend a lot of money here. People are 214 00:10:22,280 --> 00:10:26,720 Speaker 2: clicking here, there's this much interest. Maybe companies adjust once 215 00:10:26,760 --> 00:10:29,320 Speaker 2: they see how people are responding to things they put out. 216 00:10:29,400 --> 00:10:30,960 Speaker 3: Right, Yeah, and I can see how that can be 217 00:10:31,040 --> 00:10:33,760 Speaker 3: valuable to a business. You want to know where to 218 00:10:33,760 --> 00:10:36,880 Speaker 3: put your marketing dollars. So you're like, if I know 219 00:10:37,000 --> 00:10:40,200 Speaker 3: that everybody wants this twenty twenty one Nissan, I'm going 220 00:10:40,280 --> 00:10:42,480 Speaker 3: to put my marketing dollars behind that twenty twenty one 221 00:10:42,559 --> 00:10:46,240 Speaker 3: Nissan and not another car, because then it just be 222 00:10:46,280 --> 00:10:48,160 Speaker 3: wasting money. Or if I am, I'm just going to 223 00:10:48,280 --> 00:10:50,800 Speaker 3: like put more here and a little bit less there. 224 00:10:50,880 --> 00:10:53,120 Speaker 2: That makes a lot of sense. And this really highlights 225 00:10:53,120 --> 00:10:56,520 Speaker 2: what Christina told us is the motivation behind collecting this 226 00:10:56,640 --> 00:10:57,600 Speaker 2: data in the first place. 227 00:10:57,880 --> 00:11:00,400 Speaker 4: At the end of the day, though, it truly about 228 00:11:00,480 --> 00:11:03,760 Speaker 4: getting us to buy more or use more of something. 229 00:11:04,240 --> 00:11:06,960 Speaker 2: So, just like you said, TT companies are using this 230 00:11:07,000 --> 00:11:11,440 Speaker 2: for marketing. They're trying to create specific targeted marketing campaigns. 231 00:11:11,520 --> 00:11:14,480 Speaker 4: It's getting us to use more social media, getting us 232 00:11:14,520 --> 00:11:17,400 Speaker 4: to buy more at Target. Right, Like, for example, when 233 00:11:17,440 --> 00:11:19,480 Speaker 4: you go to Target and you go in to buy soap, 234 00:11:19,559 --> 00:11:22,120 Speaker 4: but you coincidentally walk out with like four hundred dollars 235 00:11:22,120 --> 00:11:24,560 Speaker 4: worth of stuff that you didn't really need. It's not 236 00:11:24,679 --> 00:11:25,719 Speaker 4: by coincidence. 237 00:11:25,840 --> 00:11:28,480 Speaker 3: Right. There have been so many times where I have 238 00:11:28,840 --> 00:11:33,000 Speaker 3: online shop and I'm like, I just need a plane 239 00:11:33,440 --> 00:11:36,680 Speaker 3: white blouse and next thing, I know, my car is 240 00:11:36,720 --> 00:11:40,920 Speaker 3: filled with fourteen items and I've got to figure out 241 00:11:41,200 --> 00:11:43,120 Speaker 3: what is going on and how did those items get 242 00:11:43,120 --> 00:11:46,240 Speaker 3: in there. I know I put them there, but it 243 00:11:46,400 --> 00:11:48,920 Speaker 3: just feels like everything is being put in front of 244 00:11:48,960 --> 00:11:51,320 Speaker 3: me in a very specific way that makes me want 245 00:11:51,400 --> 00:11:52,040 Speaker 3: to purchase. 246 00:11:52,280 --> 00:11:55,320 Speaker 2: Do you know how on some of the sites, it'll say, Okay, 247 00:11:55,360 --> 00:11:58,240 Speaker 2: you're looking at this white blouse, and other shoppers who 248 00:11:58,240 --> 00:12:01,000 Speaker 2: looked at this also looked at this tan belt with 249 00:12:01,040 --> 00:12:03,640 Speaker 2: this gold detail. Yes, I want that with my white glass. 250 00:12:03,880 --> 00:12:06,960 Speaker 3: You know, they also like I'm like, oh no, you 251 00:12:07,040 --> 00:12:07,960 Speaker 3: know I also like. 252 00:12:08,040 --> 00:12:10,920 Speaker 2: This, yes, And so all of that, I guess is 253 00:12:11,000 --> 00:12:15,240 Speaker 2: behavioral and attitudinal data that is being collected to inform 254 00:12:15,280 --> 00:12:18,439 Speaker 2: my shopping, to make me continue to shop. I'm reinforcing 255 00:12:18,480 --> 00:12:20,959 Speaker 2: the algorithm because you know, I'm adding it to my cart. 256 00:12:20,920 --> 00:12:25,920 Speaker 3: Always, always, always. All of this feels a little bit creepy, but. 257 00:12:25,960 --> 00:12:29,000 Speaker 1: It is legal and it is working. It is right. 258 00:12:29,080 --> 00:12:31,400 Speaker 2: I wanted to see that, and I think that's the 259 00:12:31,440 --> 00:12:34,680 Speaker 2: strangest part. Do you remember TT when we went to 260 00:12:35,080 --> 00:12:36,239 Speaker 2: we were in New York. 261 00:12:36,280 --> 00:12:38,240 Speaker 3: Yes, I know this story, and we. 262 00:12:38,080 --> 00:12:41,840 Speaker 2: Were shopping and I was really torn on these pink Adidas. 263 00:12:42,000 --> 00:12:44,720 Speaker 2: They were what Stella McCartney, Yes, I think they might 264 00:12:44,760 --> 00:12:46,640 Speaker 2: have been Stella McCartney. And they had this really interesting 265 00:12:46,640 --> 00:12:49,360 Speaker 2: gum soul that was pinkish reddish, but it was really 266 00:12:49,360 --> 00:12:52,560 Speaker 2: giving me all the vibes I needed. And we stood 267 00:12:52,559 --> 00:12:54,240 Speaker 2: there and I was like, Oh, I just bought an 268 00:12:54,240 --> 00:12:55,480 Speaker 2: orange Stella McCartney hat. 269 00:12:55,520 --> 00:12:55,880 Speaker 1: Instead. 270 00:12:56,800 --> 00:13:01,360 Speaker 2: We left and that shoe showed up everywhere. Yeah, and 271 00:13:01,880 --> 00:13:03,679 Speaker 2: any chance there was for me to get an ad 272 00:13:04,040 --> 00:13:04,719 Speaker 2: it showed up. 273 00:13:04,800 --> 00:13:07,800 Speaker 3: It also showed up for me. Yeah, I got Instagram 274 00:13:07,840 --> 00:13:11,880 Speaker 3: ads about that specific shoe, which let us know that 275 00:13:12,320 --> 00:13:16,320 Speaker 3: even like where you're standing within a store, Like some 276 00:13:16,440 --> 00:13:19,920 Speaker 3: of these businesses have worked with companies that let them 277 00:13:20,120 --> 00:13:22,520 Speaker 3: track where you're standing, how long you're standing there. 278 00:13:22,360 --> 00:13:25,120 Speaker 2: Bluetooth Wi Fi all even if you don't connect, you 279 00:13:25,240 --> 00:13:28,040 Speaker 2: still have device IDs, right, and that's your personal information. 280 00:13:28,440 --> 00:13:31,240 Speaker 2: And so this divitation kids, we know it likes this 281 00:13:31,400 --> 00:13:32,920 Speaker 2: type of stuff, Hugh. 282 00:13:33,480 --> 00:13:34,800 Speaker 1: And it's all legal. 283 00:13:35,080 --> 00:13:38,679 Speaker 4: Yes, it's all of these statistics, and it's all around 284 00:13:38,679 --> 00:13:41,800 Speaker 4: the data science and the psychology around it. It's usually 285 00:13:41,840 --> 00:13:46,120 Speaker 4: coordinated by like different demographics, right, it could be based 286 00:13:46,160 --> 00:13:49,959 Speaker 4: on age, sex, location, how much you make if you've 287 00:13:50,000 --> 00:13:50,880 Speaker 4: gotten your education. 288 00:13:51,360 --> 00:13:53,960 Speaker 3: And some companies don't just use data for their own 289 00:13:54,000 --> 00:13:57,960 Speaker 3: marketing purposes, they also package and sell the data to 290 00:13:58,000 --> 00:14:02,440 Speaker 3: different companies and organizations. Christina points to Facebook as one example. 291 00:14:02,720 --> 00:14:06,400 Speaker 4: They collect a bunch of information, including attitude and on data. Right, 292 00:14:06,720 --> 00:14:10,280 Speaker 4: they know of you're feeding, side, depressed, lonely, and they're 293 00:14:10,320 --> 00:14:14,760 Speaker 4: able to then serve up content that matches your mood, 294 00:14:14,840 --> 00:14:18,000 Speaker 4: your demographic, how much money you make, what you like, 295 00:14:18,080 --> 00:14:18,720 Speaker 4: et cetera. 296 00:14:18,520 --> 00:14:18,880 Speaker 1: Et cetera. 297 00:14:19,040 --> 00:14:21,280 Speaker 2: I'm not a big Facebook user, but I can say 298 00:14:21,360 --> 00:14:24,640 Speaker 2: on Instagram, yes, if something is happening and I like 299 00:14:24,800 --> 00:14:27,840 Speaker 2: one of those you know, text posts, and I'm like, hmm, 300 00:14:28,200 --> 00:14:31,120 Speaker 2: if wait and see, or if I can show you 301 00:14:31,120 --> 00:14:32,520 Speaker 2: better and I can tell you was a person when 302 00:14:32,520 --> 00:14:35,280 Speaker 2: I'm feeling spicy, and I like that. It serves me 303 00:14:35,360 --> 00:14:37,600 Speaker 2: up more content just like that, even if I'm not 304 00:14:37,640 --> 00:14:39,160 Speaker 2: following people exactly. 305 00:14:39,480 --> 00:14:43,600 Speaker 3: Look at your explore page. Your explore page is curated 306 00:14:43,760 --> 00:14:46,920 Speaker 3: based off of the posts that you like, and my 307 00:14:47,080 --> 00:14:49,600 Speaker 3: explore page does not look like your Explore page. 308 00:14:49,680 --> 00:14:49,760 Speaker 1: Right. 309 00:14:49,760 --> 00:14:54,600 Speaker 2: As a kid, yes, mine is all cooking videos, sassy quotes, and. 310 00:14:56,440 --> 00:14:56,960 Speaker 1: Animals. 311 00:14:58,200 --> 00:15:02,960 Speaker 3: Mine is like eyebrow babies acting silly I don't even 312 00:15:03,000 --> 00:15:04,040 Speaker 3: know travel blog stuff. 313 00:15:05,120 --> 00:15:08,840 Speaker 2: And now Instagram also has suggested posts in the feed, 314 00:15:09,000 --> 00:15:11,800 Speaker 2: so they're constantly giving us content so that we'll say yes, 315 00:15:11,840 --> 00:15:13,200 Speaker 2: I like it, no I don't. They're just trying to 316 00:15:13,240 --> 00:15:14,560 Speaker 2: learn what we like and don't like. 317 00:15:14,800 --> 00:15:16,800 Speaker 4: The more they learn about you, the better they can 318 00:15:16,880 --> 00:15:20,560 Speaker 4: serve you. Now, because Facebook collects all of this data, 319 00:15:20,600 --> 00:15:24,160 Speaker 4: that makes them extremely valuable. Because now if I'm another corporation, 320 00:15:24,240 --> 00:15:26,160 Speaker 4: let's say I'm Colgate and I want to sell you 321 00:15:26,200 --> 00:15:29,560 Speaker 4: more toothpaste, I need to know how you tick, why 322 00:15:29,640 --> 00:15:31,880 Speaker 4: you shop, how you feel a certain way, how I 323 00:15:31,920 --> 00:15:35,600 Speaker 4: can market to you as the consumer or to your demographic. 324 00:15:36,080 --> 00:15:38,440 Speaker 4: And so I would go to a company like Facebook 325 00:15:38,440 --> 00:15:40,560 Speaker 4: and I would say, Okay, can I buy this data set? 326 00:15:40,680 --> 00:15:43,080 Speaker 4: Can I pay a charge to access this data set? 327 00:15:43,360 --> 00:15:47,080 Speaker 4: Or can I pay a feed to market on your platform? 328 00:15:47,120 --> 00:15:49,800 Speaker 4: Because I want to sell more toothpaste and the demographic 329 00:15:49,840 --> 00:15:52,080 Speaker 4: I really want to sell to, you know, our top 330 00:15:52,240 --> 00:15:54,800 Speaker 4: users on Facebook. What a lot of people don't understand 331 00:15:54,920 --> 00:15:57,240 Speaker 4: is that when we do not pay for a service, 332 00:15:57,440 --> 00:15:58,400 Speaker 4: we are the product. 333 00:15:58,760 --> 00:16:02,400 Speaker 3: Zakia, you say this all the time. 334 00:16:02,840 --> 00:16:06,720 Speaker 2: Yes, if you're not paying for it, you're on the shelf, baby. 335 00:16:06,600 --> 00:16:09,800 Speaker 3: Okay, nothing in this life is free. You paying somehow. 336 00:16:10,600 --> 00:16:12,400 Speaker 4: We don't pay for Twitter, we don't pay for Facebook, 337 00:16:12,440 --> 00:16:15,560 Speaker 4: we don't pay for Google, we don't pay anything. What 338 00:16:15,680 --> 00:16:17,200 Speaker 4: we pay with is our data. 339 00:16:17,400 --> 00:16:20,160 Speaker 2: We don't pay cash, but we pay an information about 340 00:16:20,200 --> 00:16:23,440 Speaker 2: who we are, what we believe, what we're interested in, 341 00:16:23,720 --> 00:16:27,320 Speaker 2: what we will buy. All of those things, inform companies 342 00:16:27,360 --> 00:16:30,400 Speaker 2: and help them make money off of our clicks, off 343 00:16:30,480 --> 00:16:33,080 Speaker 2: what we choose to share. All of those things are 344 00:16:33,240 --> 00:16:36,280 Speaker 2: just embedded into the process. You can feel kind of helpless, 345 00:16:36,320 --> 00:16:38,760 Speaker 2: right because if you don't choose to let this information 346 00:16:38,840 --> 00:16:48,520 Speaker 2: be shared, you can't use the site. Do you remember 347 00:16:48,520 --> 00:16:51,360 Speaker 2: when there were all those emails coming out about companies 348 00:16:51,440 --> 00:16:52,840 Speaker 2: updating their privacy policy. 349 00:16:53,440 --> 00:16:56,400 Speaker 3: Yes, Oh my gosh, that was a wild time. I 350 00:16:56,560 --> 00:16:57,840 Speaker 3: completely forgot about that. 351 00:16:57,880 --> 00:17:00,000 Speaker 2: It was like everybody was sending emails at the same time. 352 00:17:00,120 --> 00:17:02,880 Speaker 2: I'm about what they would and would not collect and 353 00:17:02,920 --> 00:17:04,919 Speaker 2: all of this stuff. And that wasn't even tied to 354 00:17:04,960 --> 00:17:05,800 Speaker 2: the United States. 355 00:17:06,000 --> 00:17:09,520 Speaker 3: Right. In May twenty eighteen, the General Data Protection Regulation 356 00:17:09,800 --> 00:17:12,920 Speaker 3: or GDPR was put into effect. And this is an 357 00:17:12,920 --> 00:17:16,439 Speaker 3: Internet privacy and security law passed by the European Union. 358 00:17:16,600 --> 00:17:20,200 Speaker 3: But since the Internet is global and most websites process 359 00:17:20,320 --> 00:17:24,960 Speaker 3: data from EU citizens. It pretty much affected the entire Internet, and. 360 00:17:24,920 --> 00:17:29,360 Speaker 2: So what did that mean for our privacy? As users 361 00:17:29,400 --> 00:17:30,359 Speaker 2: of these websites. 362 00:17:30,480 --> 00:17:33,439 Speaker 4: People basically own their data. They have a right to 363 00:17:33,520 --> 00:17:37,480 Speaker 4: delete their data, to collect their data, to request that 364 00:17:37,560 --> 00:17:39,879 Speaker 4: a company delete their data. So because of that, there 365 00:17:39,880 --> 00:17:42,560 Speaker 4: has been a lot of legislation around privacy and more 366 00:17:42,560 --> 00:17:48,120 Speaker 4: discussions around privacy and security. So now companies have to 367 00:17:48,160 --> 00:17:51,680 Speaker 4: tell us that they're collecting and what they're collecting. It's 368 00:17:51,720 --> 00:17:55,960 Speaker 4: a great win for privacy. It's a terrible hit to useability. 369 00:17:56,080 --> 00:17:59,240 Speaker 4: It makes experience terrible because people rarely know what they're 370 00:17:59,280 --> 00:18:02,800 Speaker 4: clicking on. People also don't know what they're being asked 371 00:18:02,840 --> 00:18:03,359 Speaker 4: to click on. 372 00:18:03,840 --> 00:18:06,280 Speaker 2: Yes, it slows down the process where you're going from 373 00:18:06,280 --> 00:18:07,080 Speaker 2: site to site. 374 00:18:07,240 --> 00:18:09,320 Speaker 3: Yeah, Like I said, if I'm in a rush, I'm 375 00:18:09,359 --> 00:18:11,879 Speaker 3: just hitting accept because I just need to get to 376 00:18:12,000 --> 00:18:13,919 Speaker 3: what I'm looking for. And I'm like, I don't have 377 00:18:14,000 --> 00:18:16,600 Speaker 3: time for this. Yes, except the cookies. I love cookies, 378 00:18:16,600 --> 00:18:19,280 Speaker 3: It's perfect. I prefer chocolate chill and so I just 379 00:18:19,359 --> 00:18:21,199 Speaker 3: click accept and keep it moving. You know. 380 00:18:21,320 --> 00:18:24,080 Speaker 2: Another option is to use Duck Duck Go. That's a 381 00:18:24,119 --> 00:18:28,400 Speaker 2: browser that limits what can be collected about your browsing activity. 382 00:18:28,440 --> 00:18:30,320 Speaker 1: My mom actually put me onto Duck duck Go. 383 00:18:30,760 --> 00:18:33,600 Speaker 3: Really mm hmyh VICKI you want it. 384 00:18:34,640 --> 00:18:37,480 Speaker 4: I use a browser called Duck Duck Go. I use 385 00:18:37,520 --> 00:18:39,520 Speaker 4: it when I want to go navigate something and I 386 00:18:39,560 --> 00:18:43,040 Speaker 4: don't want to be trapped or I don't want any 387 00:18:43,160 --> 00:18:46,119 Speaker 4: potential malicious by whear or anything to be installed. 388 00:18:46,200 --> 00:18:49,560 Speaker 2: I think this helps us get a really solid understanding 389 00:18:49,720 --> 00:18:52,880 Speaker 2: of what all the various types of data are, how 390 00:18:52,920 --> 00:18:55,280 Speaker 2: it's being used by companies. I mean, it seems like 391 00:18:55,320 --> 00:18:58,080 Speaker 2: it's being used in aggregate, you know, so in groups 392 00:18:58,400 --> 00:19:01,679 Speaker 2: to understand trends and behavior and what people like. And 393 00:19:01,720 --> 00:19:04,240 Speaker 2: all this stuff is legal. But we're going to take 394 00:19:04,240 --> 00:19:05,760 Speaker 2: a break and when we come back, we're going to 395 00:19:05,840 --> 00:19:08,359 Speaker 2: talk about the things that are illegal. So what happens 396 00:19:08,400 --> 00:19:11,320 Speaker 2: when there's a data breach or a cyber attack, and 397 00:19:11,400 --> 00:19:13,600 Speaker 2: what we can do to keep our data protected. 398 00:19:27,320 --> 00:19:30,520 Speaker 3: We're back and we've been talking to expert Christina Morillo 399 00:19:30,640 --> 00:19:34,120 Speaker 3: about data privacy and how to have more control over 400 00:19:34,160 --> 00:19:36,600 Speaker 3: the data that's shared with companies online. 401 00:19:36,800 --> 00:19:39,800 Speaker 2: Next week, we're talking about organ transplants. We'll explore the 402 00:19:39,840 --> 00:19:43,120 Speaker 2: science behind donor matching with our guest expert, doctor Dave 403 00:19:43,200 --> 00:19:46,760 Speaker 2: Low from Thermo Fisher. Turns out it's a lot more 404 00:19:46,800 --> 00:19:48,600 Speaker 2: complicated than just matching blood types. 405 00:19:48,920 --> 00:19:50,160 Speaker 3: Now let's get back to the lab. 406 00:19:54,119 --> 00:19:55,919 Speaker 2: So, now that we know our data is being tracked 407 00:19:55,920 --> 00:19:58,920 Speaker 2: and analyzed all the time, are there protections in place 408 00:19:58,960 --> 00:19:59,960 Speaker 2: to keep our personal inform? 409 00:20:00,400 --> 00:20:00,560 Speaker 1: Say? 410 00:20:00,960 --> 00:20:03,199 Speaker 2: Yes, I understand that what I click on and what 411 00:20:03,240 --> 00:20:05,360 Speaker 2: you click on and all of our device IDs, all 412 00:20:05,359 --> 00:20:08,880 Speaker 2: that stuff is supposed to be analyzed in bulk in groups, 413 00:20:09,080 --> 00:20:14,960 Speaker 2: functionally making it anonymous. But is anonymized data a real 414 00:20:15,000 --> 00:20:17,440 Speaker 2: thing and is it actually keeping our information safe? 415 00:20:17,520 --> 00:20:20,560 Speaker 4: We ask Christina, Well, what it's opposed to mean is 416 00:20:20,600 --> 00:20:24,000 Speaker 4: that any information that is collected is stripped of any 417 00:20:24,160 --> 00:20:28,159 Speaker 4: personally identifiable information. If you're collecting my data, right, if 418 00:20:28,160 --> 00:20:30,639 Speaker 4: you're collecting my information, that means that you're going to 419 00:20:30,680 --> 00:20:33,240 Speaker 4: strip my social Security number, You're going to strip my 420 00:20:33,320 --> 00:20:36,680 Speaker 4: location data, any information that can be tied back to 421 00:20:36,720 --> 00:20:39,159 Speaker 4: me as a person, you're stripping it. And that's what 422 00:20:39,160 --> 00:20:42,240 Speaker 4: that means by anonymized, So you're only collecting information that 423 00:20:42,640 --> 00:20:45,600 Speaker 4: you really need. So it could be city state, things 424 00:20:45,640 --> 00:20:49,240 Speaker 4: that are very generic that can apply to a population, 425 00:20:49,560 --> 00:20:54,600 Speaker 4: versus things that are very specific to me as an individual. Now, 426 00:20:54,840 --> 00:20:58,040 Speaker 4: we don't really have a guarantee. There's really no assurance. 427 00:20:58,119 --> 00:21:01,439 Speaker 4: We basically have to trust that what companies say is 428 00:21:01,520 --> 00:21:03,919 Speaker 4: correct until there's a breach and they say, you know, 429 00:21:04,000 --> 00:21:07,760 Speaker 4: we really care about your security and care about your privacy. However, 430 00:21:07,960 --> 00:21:10,080 Speaker 4: you know your data has been exposed in this breach. 431 00:21:10,320 --> 00:21:12,000 Speaker 1: Yes, I don't want my data in the breach. 432 00:21:12,200 --> 00:21:15,320 Speaker 3: Yes, but it always seems like everybody's data is in 433 00:21:15,320 --> 00:21:17,879 Speaker 3: the breach. It always just blows my mind. There'll be 434 00:21:17,920 --> 00:21:21,200 Speaker 3: a security breach and I'm just like, but I literally 435 00:21:21,240 --> 00:21:24,439 Speaker 3: have never even used this before, So how is my 436 00:21:24,560 --> 00:21:25,480 Speaker 3: information there? 437 00:21:25,840 --> 00:21:26,080 Speaker 1: Yes? 438 00:21:26,480 --> 00:21:30,080 Speaker 2: And what exactly is the breach? Wikipedia defines a data 439 00:21:30,119 --> 00:21:33,760 Speaker 2: breach as the intentional or unintentional release of secure or 440 00:21:33,800 --> 00:21:38,840 Speaker 2: private confidential information. But it feels wrong, right, It's not secure. 441 00:21:38,920 --> 00:21:41,840 Speaker 2: If somebody accessed it and it was released, it's not secure. 442 00:21:41,920 --> 00:21:44,840 Speaker 2: It's no longer private. Yeah, it definitely wasn't secure enough. 443 00:21:44,880 --> 00:21:46,760 Speaker 3: It's just like you know those diaries we used to 444 00:21:46,800 --> 00:21:49,160 Speaker 3: have when we were kids and had those bowlocks, and 445 00:21:49,200 --> 00:21:51,480 Speaker 3: we thought everybody's secure, but all you had to do 446 00:21:51,600 --> 00:21:53,879 Speaker 3: is just pull it and it would just pop right open. 447 00:21:54,200 --> 00:21:57,040 Speaker 3: That's what these companies are using to protect our data. 448 00:21:57,080 --> 00:21:59,760 Speaker 3: That's what it feels like. Them little pink locks ain't 449 00:21:59,800 --> 00:22:03,000 Speaker 3: doing nothing. And you know, it feels like these things 450 00:22:03,040 --> 00:22:04,879 Speaker 3: are happening more and more. So. 451 00:22:04,920 --> 00:22:08,399 Speaker 2: There was recently a report reviewing the data breaches in 452 00:22:08,440 --> 00:22:11,560 Speaker 2: the first six months of twenty nineteen, and that report 453 00:22:11,600 --> 00:22:16,440 Speaker 2: showed that there were thirty eight hundred publicly disclosed data breaches. 454 00:22:16,640 --> 00:22:18,600 Speaker 2: And do you want to know how many records were compromised? 455 00:22:18,760 --> 00:22:19,760 Speaker 3: I feel sick already. 456 00:22:20,160 --> 00:22:21,840 Speaker 1: Four point one billion. 457 00:22:21,960 --> 00:22:23,879 Speaker 2: We're gonna link this in the show notes billion with 458 00:22:23,920 --> 00:22:26,040 Speaker 2: a B with a B baby. 459 00:22:26,119 --> 00:22:28,639 Speaker 3: Oh my gosh, it's everybody. 460 00:22:29,200 --> 00:22:32,080 Speaker 2: And just to give you a sense of magnitude, three 461 00:22:32,119 --> 00:22:35,200 Speaker 2: point two billion of that four point one billion, three 462 00:22:35,200 --> 00:22:37,879 Speaker 2: point two billion of those records were exposed by just 463 00:22:38,040 --> 00:22:40,280 Speaker 2: eight breaches. Somebody has too much access. 464 00:22:43,080 --> 00:22:45,640 Speaker 3: That is crazy. Only eight breaches and you got three 465 00:22:45,640 --> 00:22:48,320 Speaker 3: point two billion of those records. 466 00:22:48,359 --> 00:22:51,520 Speaker 2: And the actual type of data that was exposed. It 467 00:22:51,560 --> 00:22:54,359 Speaker 2: had email addresses that was in seventy percent of the 468 00:22:54,400 --> 00:22:57,600 Speaker 2: data and passwords that was also in sixty five percent 469 00:22:57,600 --> 00:22:58,320 Speaker 2: of those breaches. 470 00:22:58,480 --> 00:22:59,760 Speaker 1: So we in trouble. 471 00:23:00,160 --> 00:23:01,480 Speaker 3: We in big trouble. 472 00:23:02,160 --> 00:23:05,240 Speaker 1: Yeah. 473 00:23:05,720 --> 00:23:08,000 Speaker 2: And so when we think about these data breaches. We 474 00:23:08,119 --> 00:23:11,280 Speaker 2: know that's not from a company wanting to know whether 475 00:23:11,320 --> 00:23:13,720 Speaker 2: I like a red top or a white top, right exactly. 476 00:23:13,800 --> 00:23:17,320 Speaker 2: This is something that's a little more malicious and is illegal. 477 00:23:17,480 --> 00:23:20,360 Speaker 3: We all know that data is valuable, especially for companies 478 00:23:20,359 --> 00:23:22,840 Speaker 3: who use data to inform their business strategies, and if 479 00:23:22,840 --> 00:23:25,520 Speaker 3: it's not properly protected, then there's a risk for a 480 00:23:25,520 --> 00:23:29,760 Speaker 3: cyber attack, such as a security breach or a ransomware attack. 481 00:23:30,000 --> 00:23:33,480 Speaker 3: But we wanted to know more about ransomware and the 482 00:23:33,520 --> 00:23:34,879 Speaker 3: people behind them. 483 00:23:34,800 --> 00:23:40,240 Speaker 4: Cyber criminals. They basically want access to your bank accounts, money, right, 484 00:23:40,359 --> 00:23:42,919 Speaker 4: or something of value that then they can sell on 485 00:23:43,000 --> 00:23:47,600 Speaker 4: the dark web. It's malicious software and the sole purpose 486 00:23:47,680 --> 00:23:50,879 Speaker 4: of it is to encrypt, which is lock rate, to 487 00:23:51,040 --> 00:23:52,760 Speaker 4: encrypt your files. 488 00:23:53,000 --> 00:23:55,120 Speaker 2: It's always about the money. It's always about what can 489 00:23:55,160 --> 00:23:58,800 Speaker 2: be sold. Cash rules everything around me. Yes, dollar dollar bill, y'all. 490 00:23:59,320 --> 00:24:02,119 Speaker 2: And it just seems that in the new digital age, 491 00:24:02,280 --> 00:24:03,439 Speaker 2: ransomware is the method. 492 00:24:03,720 --> 00:24:07,800 Speaker 4: So in mainencrypt your entire seed drive, so every file 493 00:24:07,840 --> 00:24:11,160 Speaker 4: you have on your computer is locked, right. Sometimes it'll 494 00:24:11,200 --> 00:24:13,760 Speaker 4: have a nice little lock Sometimes you'll see some kind 495 00:24:13,760 --> 00:24:17,359 Speaker 4: of like logo on your screen that says you've been ransomed. 496 00:24:17,480 --> 00:24:20,000 Speaker 3: Some of these things. You feel like it's obvious, like 497 00:24:20,080 --> 00:24:21,760 Speaker 3: I shouldn't click on this because you click on a 498 00:24:21,800 --> 00:24:24,320 Speaker 3: website and these things just start popping up and flash, 499 00:24:24,359 --> 00:24:25,960 Speaker 3: and it's like, if you click here, you get a 500 00:24:25,960 --> 00:24:28,320 Speaker 3: million dollars in a trip to Aruba. And you know, 501 00:24:28,560 --> 00:24:31,920 Speaker 3: random text messages from unknown numbers that have weird links. 502 00:24:31,960 --> 00:24:34,760 Speaker 3: I'll be getting a lot of those recently. Do you 503 00:24:34,800 --> 00:24:38,000 Speaker 3: remember the Facebook acts and when you get weird links 504 00:24:38,040 --> 00:24:40,879 Speaker 3: from like friends in your messenger and then if you 505 00:24:40,920 --> 00:24:43,760 Speaker 3: click the link, your profile sends it to all of 506 00:24:43,800 --> 00:24:44,800 Speaker 3: your friends. 507 00:24:44,560 --> 00:24:47,800 Speaker 2: Everybody in your contacts. And this was happening not just 508 00:24:47,840 --> 00:24:50,080 Speaker 2: on Facebook. You know, I used to dabble in Facebook. 509 00:24:50,119 --> 00:24:52,959 Speaker 2: I don't anymore, but this was happening on other platforms, 510 00:24:52,960 --> 00:24:54,879 Speaker 2: and people would say, oh, that wasn't me. If you 511 00:24:54,880 --> 00:24:57,199 Speaker 2: get a message from me, don't click the link, you know, 512 00:24:57,280 --> 00:24:57,919 Speaker 2: stuff like that. 513 00:24:58,200 --> 00:25:00,520 Speaker 3: Yeah, I got an Instagram DM from I'm a friend 514 00:25:00,520 --> 00:25:02,800 Speaker 3: that was saying knockoff Guji bags. You can get a 515 00:25:02,880 --> 00:25:06,200 Speaker 3: knockoff Gucci bag for twenty dollars. So I text him 516 00:25:06,400 --> 00:25:09,399 Speaker 3: and say, hey, you need to change your bat's word. 517 00:25:09,359 --> 00:25:11,000 Speaker 2: Yes, because you're selling Gucci bags. 518 00:25:11,000 --> 00:25:11,639 Speaker 1: I don't know if you know. 519 00:25:12,440 --> 00:25:16,800 Speaker 2: And it happens in this world of convenience where FedEx 520 00:25:16,880 --> 00:25:19,480 Speaker 2: is saying click here to check your tracking link, or 521 00:25:20,080 --> 00:25:23,040 Speaker 2: somebody else is saying, hey, want to see the latest 522 00:25:23,080 --> 00:25:26,080 Speaker 2: sales styles, or one in on this great travel deal, 523 00:25:26,119 --> 00:25:30,040 Speaker 2: and links are everywhere, emails, text messages, and everybody's using 524 00:25:30,080 --> 00:25:33,000 Speaker 2: these little shorthand bitley and all this stuff. All it 525 00:25:33,040 --> 00:25:35,160 Speaker 2: takes is one click, and it's so easy to do 526 00:25:35,240 --> 00:25:37,640 Speaker 2: if you let your guard down just a little bit. 527 00:25:38,280 --> 00:25:40,199 Speaker 4: So you click on a link it takes you to 528 00:25:40,800 --> 00:25:45,080 Speaker 4: a bad website that downloads malicious software, or you click 529 00:25:45,080 --> 00:25:49,520 Speaker 4: on an attachment via email that has malicious code attached 530 00:25:49,520 --> 00:25:53,760 Speaker 4: to it, which downloads that bad software onto your computer 531 00:25:54,200 --> 00:25:57,880 Speaker 4: and then does its thing, which is locking off your files. 532 00:25:58,280 --> 00:26:00,399 Speaker 3: What I would need to know is something like this 533 00:26:00,440 --> 00:26:02,879 Speaker 3: happened to me, is how do I get my things back? 534 00:26:03,000 --> 00:26:06,119 Speaker 3: I would like my things back? So after a cyber attack, 535 00:26:06,440 --> 00:26:07,760 Speaker 3: how do you get out of it? 536 00:26:07,840 --> 00:26:07,959 Speaker 1: Like? 537 00:26:08,000 --> 00:26:11,040 Speaker 3: How do you loose yourself from the grips of these 538 00:26:11,080 --> 00:26:13,280 Speaker 3: people who are attacking your software? 539 00:26:13,600 --> 00:26:17,840 Speaker 4: Pay the ransom right, which is risky because the criminal 540 00:26:17,920 --> 00:26:20,200 Speaker 4: or the attacker can decide not to provide the key. 541 00:26:20,320 --> 00:26:22,959 Speaker 4: They can decide, oh, you know, I got your money, sucker, 542 00:26:23,000 --> 00:26:25,080 Speaker 4: and I'm not going to give you back your data, right, 543 00:26:25,320 --> 00:26:27,960 Speaker 4: Or they can say, ah, you paid me, I don't 544 00:26:27,960 --> 00:26:30,880 Speaker 4: know one hundred and fifty million dollars, and so here 545 00:26:31,000 --> 00:26:33,720 Speaker 4: here's a key, and here's access to your data. Maybe 546 00:26:33,760 --> 00:26:35,960 Speaker 4: maybe not. You never know. There's no guarantee, right, it 547 00:26:35,960 --> 00:26:38,359 Speaker 4: doesn't come with a warranty. The other option is that 548 00:26:38,440 --> 00:26:42,639 Speaker 4: companies or individuals do not pay the ransom, and then 549 00:26:42,680 --> 00:26:45,200 Speaker 4: they do restore all their data from their backups because 550 00:26:45,200 --> 00:26:48,080 Speaker 4: they were smart and they did have backups. But the 551 00:26:48,160 --> 00:26:52,560 Speaker 4: risk there is that whatever information the attacker collected can 552 00:26:52,600 --> 00:26:54,760 Speaker 4: now be leaked and sold on the dark web. 553 00:26:55,000 --> 00:26:56,360 Speaker 3: I don't have one hundred and fifty million dollars. 554 00:26:56,359 --> 00:26:57,600 Speaker 1: I don't either, do you have a no? 555 00:26:57,760 --> 00:27:01,320 Speaker 3: Okay, that's what I didn't want to listen, But now 556 00:27:01,359 --> 00:27:02,480 Speaker 3: you know we don't got it. 557 00:27:02,640 --> 00:27:03,840 Speaker 1: You know how I live, and you know I do 558 00:27:03,880 --> 00:27:06,000 Speaker 1: not have a one hundred and fifty million dollars. I didn't 559 00:27:06,000 --> 00:27:08,320 Speaker 1: want one hundred fifty thousand either, okay. 560 00:27:09,119 --> 00:27:11,360 Speaker 2: And I think the other thing is if I had 561 00:27:11,359 --> 00:27:13,560 Speaker 2: to live off my last backup, I might as well 562 00:27:13,600 --> 00:27:14,040 Speaker 2: start over. 563 00:27:14,400 --> 00:27:17,679 Speaker 3: Yeah, just give me a brand new everything. Right before 564 00:27:18,160 --> 00:27:21,280 Speaker 3: my qualifying example, I had to write a portion of 565 00:27:21,280 --> 00:27:23,560 Speaker 3: my dissertation and I lost the whole thing because my 566 00:27:23,640 --> 00:27:25,719 Speaker 3: hard drive crash. I had an external hart drive, that 567 00:27:25,760 --> 00:27:29,680 Speaker 3: thing broke and I basically had to start all over again. 568 00:27:29,800 --> 00:27:33,000 Speaker 3: And that's when I started using the cloud. Yes, but 569 00:27:33,080 --> 00:27:35,720 Speaker 3: now even the cloud ain't safe because we've seen celebrities 570 00:27:35,760 --> 00:27:38,080 Speaker 3: clouds get hacked and you know, some of their racy 571 00:27:38,160 --> 00:27:41,600 Speaker 3: photos make it out to the common mess ye, And 572 00:27:41,680 --> 00:27:44,800 Speaker 3: so it ain't safe anywhere. And so the next thought 573 00:27:44,960 --> 00:27:48,520 Speaker 3: is how do we avoid these problems in the first place? Yes, 574 00:27:48,680 --> 00:27:50,760 Speaker 3: how do we get to a place where we are 575 00:27:51,200 --> 00:27:55,359 Speaker 3: aware of all these goings on and protect ourselves? 576 00:27:55,680 --> 00:27:58,560 Speaker 4: Cyber awareness is pretty much kind of like the education 577 00:27:58,680 --> 00:28:00,800 Speaker 4: piece of that, right, So it's like, what do we 578 00:28:00,800 --> 00:28:02,720 Speaker 4: need to do to protect these systems? What do we 579 00:28:02,720 --> 00:28:06,600 Speaker 4: need to do to protect our networks, our software applications? 580 00:28:06,720 --> 00:28:08,879 Speaker 4: What does that look like in real life? 581 00:28:08,960 --> 00:28:11,280 Speaker 2: And it's all about taking these small steps every day 582 00:28:11,320 --> 00:28:14,840 Speaker 2: to start building that awareness around our data to know 583 00:28:14,920 --> 00:28:17,520 Speaker 2: what's important, what you should be protecting. Things that don't 584 00:28:17,520 --> 00:28:20,040 Speaker 2: feel important to you may be useful to someone else. 585 00:28:20,280 --> 00:28:20,680 Speaker 3: Mm hmm. 586 00:28:20,920 --> 00:28:24,480 Speaker 4: Think about it like you're protecting yourself when you come 587 00:28:24,520 --> 00:28:27,320 Speaker 4: home at night, you lock your doors, right, just kind 588 00:28:27,320 --> 00:28:30,600 Speaker 4: of taking those small steps where make sure your passwords 589 00:28:30,640 --> 00:28:33,040 Speaker 4: and your accounts, your bank accounts are secure. 590 00:28:33,160 --> 00:28:35,359 Speaker 2: Christina gave us some really good advice. You know, don't 591 00:28:35,359 --> 00:28:36,200 Speaker 2: share your password. 592 00:28:36,320 --> 00:28:38,360 Speaker 3: But another thing is that you shouldn't use the same 593 00:28:38,360 --> 00:28:42,080 Speaker 3: password for everything. Now this, I know lots of people 594 00:28:42,120 --> 00:28:44,040 Speaker 3: have a Problemly, you know, you got a different password 595 00:28:44,040 --> 00:28:46,400 Speaker 3: for everything. How are you supposed to remember what it 596 00:28:46,440 --> 00:28:49,000 Speaker 3: is for each thing. Some things do have like a 597 00:28:49,120 --> 00:28:52,960 Speaker 3: multi factor authentication. I love that me too. They'll send 598 00:28:53,000 --> 00:28:55,360 Speaker 3: you a text message or an email that says, hey, 599 00:28:55,400 --> 00:28:57,040 Speaker 3: here's this code. Put it in so that we can 600 00:28:57,160 --> 00:28:59,200 Speaker 3: verify that it's you and not somebody else that's trying 601 00:28:59,240 --> 00:28:59,720 Speaker 3: to log into. 602 00:29:00,160 --> 00:29:03,600 Speaker 2: Just press yes, push it directly to my device. Christina 603 00:29:03,640 --> 00:29:06,000 Speaker 2: also told us not to play sketchy games. 604 00:29:06,280 --> 00:29:09,160 Speaker 3: Yeah, like those websites that let you play blackjack and 605 00:29:09,200 --> 00:29:10,200 Speaker 3: stuff like that. 606 00:29:10,120 --> 00:29:12,320 Speaker 2: Right, because some of those games are actually tied to 607 00:29:12,600 --> 00:29:15,800 Speaker 2: bank account information. So it's different if you're just accumulating 608 00:29:15,840 --> 00:29:18,080 Speaker 2: coins that are not real. But once you start tying 609 00:29:18,120 --> 00:29:21,040 Speaker 2: bank info, that feels a little dangerous. I know this 610 00:29:21,120 --> 00:29:22,840 Speaker 2: is gonna be hard for you friend, Yes, you know, 611 00:29:22,920 --> 00:29:23,440 Speaker 2: I like that. 612 00:29:24,440 --> 00:29:27,240 Speaker 3: And the last thing was don't give out personal information 613 00:29:27,360 --> 00:29:30,480 Speaker 3: like your address on social media because once it's online, 614 00:29:30,840 --> 00:29:33,320 Speaker 3: it's there forever. You might delete the tweet, delete the 615 00:29:33,320 --> 00:29:37,800 Speaker 3: Instagram post, those pixels exist in perpetuity for all time. Yeah, 616 00:29:37,840 --> 00:29:41,880 Speaker 3: so you have to be really, really careful about what 617 00:29:41,920 --> 00:29:43,480 Speaker 3: you're putting out on the internet. 618 00:29:43,680 --> 00:29:46,479 Speaker 2: All this is telling me is that we must remain 619 00:29:46,600 --> 00:29:50,480 Speaker 2: diligent when we are using these devices. Just think about 620 00:29:50,480 --> 00:29:53,000 Speaker 2: how easy it is to just zone out online or 621 00:29:53,040 --> 00:29:56,040 Speaker 2: on social media and just click click, mindleusly scrolling. 622 00:29:56,280 --> 00:29:59,640 Speaker 3: I have fallen asleep scrolling on Instagram to have almost 623 00:29:59,640 --> 00:30:01,760 Speaker 3: purchase something. I was like, why does it only take 624 00:30:01,800 --> 00:30:03,160 Speaker 3: three taps to purchase something? 625 00:30:03,360 --> 00:30:06,960 Speaker 2: It's so easy to almost retweet a thing around ust 626 00:30:07,040 --> 00:30:09,960 Speaker 2: click a link, and we could really compromise something in 627 00:30:10,000 --> 00:30:12,040 Speaker 2: our personal and because we're all working from home now 628 00:30:12,280 --> 00:30:13,160 Speaker 2: professional too. 629 00:30:13,760 --> 00:30:16,160 Speaker 1: In our personal and professional lives, we're spending. 630 00:30:15,880 --> 00:30:18,840 Speaker 3: A lot more time on the internet at home, so 631 00:30:18,840 --> 00:30:20,880 Speaker 3: we're feeling a little bit more relaxed, a little bit 632 00:30:20,920 --> 00:30:23,720 Speaker 3: more comfortable, so a lot more susceptible. 633 00:30:23,920 --> 00:30:28,160 Speaker 4: As employees, we basically have a professional responsibility to keep 634 00:30:28,200 --> 00:30:31,000 Speaker 4: the security and privacy of our company and customer data. 635 00:30:31,080 --> 00:30:34,960 Speaker 4: So whether it's our information or employer's information, we need 636 00:30:35,000 --> 00:30:37,600 Speaker 4: to make sure that we are doing the best and 637 00:30:37,680 --> 00:30:41,440 Speaker 4: everything that we can to ensure security. And also companies 638 00:30:41,480 --> 00:30:45,760 Speaker 4: have also a responsibility to provide that cyber security awareness, right, 639 00:30:45,840 --> 00:30:48,640 Speaker 4: talk about Hey, this is what we value. If you're 640 00:30:48,640 --> 00:30:51,720 Speaker 4: on your work computer, please refrain from using it for 641 00:30:51,760 --> 00:30:55,000 Speaker 4: your personal matters, et cetera. So it really depends on 642 00:30:55,040 --> 00:30:57,360 Speaker 4: the company. But I think education is a big part 643 00:30:57,360 --> 00:30:59,160 Speaker 4: of it because there's only so much that we can 644 00:30:59,160 --> 00:31:00,920 Speaker 4: do from a system point of view. 645 00:31:01,120 --> 00:31:03,520 Speaker 2: And like you said, you're also more relaxed when you're 646 00:31:03,560 --> 00:31:05,440 Speaker 2: working from home. It's easy to click on stuff when 647 00:31:05,440 --> 00:31:06,560 Speaker 2: I'm in my pajama pants. 648 00:31:06,840 --> 00:31:10,320 Speaker 3: Absolutely, I got my bondet on my at home glasses. 649 00:31:10,840 --> 00:31:13,000 Speaker 1: M different glasses for at home. 650 00:31:13,360 --> 00:31:15,960 Speaker 4: Yeah, you know, it really depends on what in the 651 00:31:16,000 --> 00:31:18,240 Speaker 4: security community we like to call your threat model. 652 00:31:18,360 --> 00:31:19,240 Speaker 3: That sounds scary. 653 00:31:19,400 --> 00:31:23,040 Speaker 2: Threat modeling sounds like now we're really in a spy movie. 654 00:31:23,200 --> 00:31:26,719 Speaker 2: Threat modeling is a process that identifies security vulnerabilities and 655 00:31:26,760 --> 00:31:28,680 Speaker 2: countermeasures to manage risks. 656 00:31:28,880 --> 00:31:30,560 Speaker 4: Who are you, what do you do for work, and 657 00:31:30,560 --> 00:31:32,480 Speaker 4: what are you trying to protect. If you're a diplomat, 658 00:31:32,560 --> 00:31:34,280 Speaker 4: what you need to protect is a little bit different 659 00:31:34,320 --> 00:31:38,000 Speaker 4: than let's say a mom or just a banker, a teller. 660 00:31:38,160 --> 00:31:40,960 Speaker 4: So it really depends on who you are and what 661 00:31:41,000 --> 00:31:42,960 Speaker 4: the risks are of you being attacked. 662 00:31:43,160 --> 00:31:45,400 Speaker 2: Listen, I may not be a diplomat, but that doesn't 663 00:31:45,400 --> 00:31:47,920 Speaker 2: mean I want people going all through my cookies and 664 00:31:47,960 --> 00:31:49,680 Speaker 2: I don't want my data to be up for grabs. 665 00:31:49,840 --> 00:31:52,080 Speaker 2: That's right, and Christina says one of the best ways 666 00:31:52,120 --> 00:31:53,959 Speaker 2: to protect your data is just to make sure you 667 00:31:54,000 --> 00:31:54,960 Speaker 2: have a backup. 668 00:31:54,720 --> 00:31:55,480 Speaker 3: Have a backup. 669 00:31:55,720 --> 00:31:58,600 Speaker 4: Always have a backup of your information, right, same as 670 00:31:58,680 --> 00:32:00,400 Speaker 4: when you have your credit cards in your life, you 671 00:32:00,400 --> 00:32:02,440 Speaker 4: should always like have a copy or something or at 672 00:32:02,520 --> 00:32:03,920 Speaker 4: least know what you have in your wallet so that 673 00:32:03,920 --> 00:32:05,840 Speaker 4: if your wallet gets laws, you can call in cancel. 674 00:32:05,920 --> 00:32:06,120 Speaker 1: Right. 675 00:32:06,200 --> 00:32:08,840 Speaker 3: Okay, So we have to back up everything on every device. 676 00:32:09,160 --> 00:32:11,880 Speaker 3: For a lot of us, that means our computers, our phones, 677 00:32:12,000 --> 00:32:15,120 Speaker 3: and any other device that we use every day. For companies, 678 00:32:15,160 --> 00:32:16,920 Speaker 3: that could end up being a lot of data that 679 00:32:16,960 --> 00:32:19,760 Speaker 3: needs to be backed up, depending on how many employees 680 00:32:19,800 --> 00:32:20,040 Speaker 3: they have. 681 00:32:20,680 --> 00:32:23,320 Speaker 4: They need to have a backup of their environment, have 682 00:32:23,360 --> 00:32:28,280 Speaker 4: a backup of their valuable data, their secret saws, their 683 00:32:28,320 --> 00:32:32,000 Speaker 4: customer information, whatever it is that makes a business run 684 00:32:32,040 --> 00:32:33,960 Speaker 4: or that allows a business to run, they should have 685 00:32:34,000 --> 00:32:38,240 Speaker 4: a backup. Unfortunately, many companies and many individuals do not 686 00:32:38,360 --> 00:32:40,600 Speaker 4: have a backup. So what that means is that if 687 00:32:40,600 --> 00:32:44,440 Speaker 4: they do get ransomed and their files are locked or encrypted, 688 00:32:44,960 --> 00:32:46,200 Speaker 4: then they cannot recover. 689 00:32:48,800 --> 00:32:50,640 Speaker 2: This has been eye opening for me. I feel like 690 00:32:50,680 --> 00:32:52,400 Speaker 2: I have a lot of apps I need to delete, 691 00:32:53,080 --> 00:32:55,440 Speaker 2: I have a lot of practices I need to change same, 692 00:32:55,600 --> 00:32:59,080 Speaker 2: and a lot of passwords that must get updated right away. 693 00:32:59,200 --> 00:33:00,959 Speaker 3: I'm really just going to take the time and go 694 00:33:01,000 --> 00:33:04,040 Speaker 3: through each thing and change my password. It's time. It's time. 695 00:33:04,160 --> 00:33:07,560 Speaker 3: It absolutely is time. And I think that the advice 696 00:33:07,800 --> 00:33:12,200 Speaker 3: that we got from Christina was really really important, and 697 00:33:12,480 --> 00:33:14,560 Speaker 3: I think that everybody should be trying to do that 698 00:33:14,600 --> 00:33:17,280 Speaker 3: so that we can, you know, fend off these attackers. 699 00:33:17,440 --> 00:33:19,880 Speaker 2: Yeah, you know, she said, the Internet is like the 700 00:33:19,920 --> 00:33:22,320 Speaker 2: deep sea or deep space, where we only know a 701 00:33:22,440 --> 00:33:24,760 Speaker 2: very small percentage of it. And let me tell you something. 702 00:33:24,960 --> 00:33:27,800 Speaker 2: I don't want to beat the dark web, Okay. I 703 00:33:27,800 --> 00:33:30,920 Speaker 2: want to stay right here in this galaxy, the lights web. Yes, 704 00:33:32,200 --> 00:33:34,600 Speaker 2: I want to step into the light Caroline, Okay, and 705 00:33:34,680 --> 00:33:38,040 Speaker 2: I do not want my information all out there in 706 00:33:38,080 --> 00:33:38,680 Speaker 2: those streets. 707 00:33:39,600 --> 00:33:41,240 Speaker 4: We just have to stay alert, and we have to 708 00:33:41,280 --> 00:33:45,200 Speaker 4: say vigilant to keep ourselves and our companies or just 709 00:33:45,280 --> 00:33:47,840 Speaker 4: personal information safe as safe as possible. 710 00:34:00,240 --> 00:34:03,120 Speaker 3: All Right, it's time for one thing. What's your one 711 00:34:03,120 --> 00:34:03,680 Speaker 3: thing this week? 712 00:34:03,760 --> 00:34:07,400 Speaker 2: Ze, I hope my one thing is our thing. Yes, 713 00:34:07,680 --> 00:34:10,919 Speaker 2: this is an event called Dope Labs Unplugged and it's 714 00:34:10,920 --> 00:34:14,480 Speaker 2: with the Boston Museum of Science on Thursday, April fourteenth. 715 00:34:14,719 --> 00:34:17,759 Speaker 2: Guess what, It's free ninety nine. So all you have 716 00:34:17,800 --> 00:34:19,960 Speaker 2: to do is register and you can join us in 717 00:34:20,000 --> 00:34:23,839 Speaker 2: person in Boston April fourteenth at seven pm. We're going 718 00:34:23,880 --> 00:34:26,719 Speaker 2: to have a live show. Come get these laughs and 719 00:34:26,760 --> 00:34:28,200 Speaker 2: these facts in person. 720 00:34:28,239 --> 00:34:30,040 Speaker 3: We want to see y'all faces. Come. 721 00:34:38,440 --> 00:34:41,080 Speaker 2: That's it for Lab fifty five. I hope that after 722 00:34:41,160 --> 00:34:44,200 Speaker 2: listening to this episode, you're gonna do something a little 723 00:34:44,239 --> 00:34:46,759 Speaker 2: bit different. Maybe change those settings on your phone. Call 724 00:34:46,840 --> 00:34:49,719 Speaker 2: us at two zero two five six seven seven zero 725 00:34:49,719 --> 00:34:51,560 Speaker 2: two eight and tell us what you thought, or give 726 00:34:51,640 --> 00:34:53,280 Speaker 2: us an idea for a lab you think we should 727 00:34:53,280 --> 00:34:55,560 Speaker 2: do this semester. We like hearing from you, so call us. 728 00:34:55,600 --> 00:34:58,279 Speaker 2: That's at two zero two five six seven seven zero 729 00:34:58,280 --> 00:35:00,960 Speaker 2: two eight and don't forget that there's so much more 730 00:35:01,000 --> 00:35:03,120 Speaker 2: for you to dig into on our website. There will 731 00:35:03,160 --> 00:35:05,640 Speaker 2: be a cheat cheat there for today's lab and additional 732 00:35:05,680 --> 00:35:08,319 Speaker 2: links and resources in the show notes. Plus, you can 733 00:35:08,360 --> 00:35:10,399 Speaker 2: sign up for our newsletter, so check it out at 734 00:35:10,440 --> 00:35:14,760 Speaker 2: Dope labspodcast dot com. Special thanks to today's guest expert, 735 00:35:14,880 --> 00:35:17,880 Speaker 2: Christina Morillo. You can find and follow her on Twitter 736 00:35:17,920 --> 00:35:22,040 Speaker 2: and Instagram at Divine Techygirl, d I v I n 737 00:35:22,120 --> 00:35:25,680 Speaker 2: E t E c h y g i r L. 738 00:35:26,239 --> 00:35:28,719 Speaker 3: You can find us on Twitter and Instagram at Dope 739 00:35:28,800 --> 00:35:30,080 Speaker 3: Labs Podcast. 740 00:35:29,719 --> 00:35:32,680 Speaker 2: And TT's on Twitter and Instagram at d R Underscore 741 00:35:32,760 --> 00:35:33,600 Speaker 2: T s h O. 742 00:35:34,000 --> 00:35:37,040 Speaker 3: And you can find Zakia on Twitter and Instagram at 743 00:35:37,160 --> 00:35:41,200 Speaker 3: z said So. Dope Labs is a Spotify original production 744 00:35:41,360 --> 00:35:44,960 Speaker 3: from Mega Ownmedia Group. Our producers are Jenny Ratlickmast and 745 00:35:45,040 --> 00:35:48,879 Speaker 3: Lydia Smith of Wavebrunner Studios. Our associate producer from Mega 746 00:35:48,920 --> 00:35:54,120 Speaker 3: Ohmedia is Brianna Garrett. Editing in sound design by Rob Smerciak. 747 00:35:53,719 --> 00:35:55,320 Speaker 2: Mixing by Hannes Brown. 748 00:35:55,600 --> 00:35:59,440 Speaker 3: Original music composed and produced by Taka Yasuzawa and Alex 749 00:35:59,520 --> 00:36:05,440 Speaker 3: Sugu from Spotify Creative producers Candice Manriquez Wren and Corin Gilliard. 750 00:36:05,760 --> 00:36:10,239 Speaker 3: Special thanks to Shirley ramos Yasmin of Fifi, camu Elolia, 751 00:36:10,719 --> 00:36:12,600 Speaker 3: Till krat Key and Brian. 752 00:36:12,320 --> 00:36:15,920 Speaker 2: Marquis, executive producers from Mega OH Media Group, r us 753 00:36:16,040 --> 00:36:31,000 Speaker 2: T T Show Dia and Zakiah Wattley