Podchaser Logo
Home
Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Released Wednesday, 7th February 2024
Good episode? Give it some love!
Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Unforeseen Consequences - CISA's "Secure by Design" Initiative, Fastly's BoringSSL

Wednesday, 7th February 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

It's time for security now Steve Gibson is

0:02

ready. He's got some great stuff to talk

0:04

about including the

0:06

new sissa Recommendations

0:09

for home routers. I hope they're adopted

0:12

Some a massive flaw that Willie

0:14

affects every version of Linux It's

0:16

being patched or has been patched,

0:19

but you should know about it

0:21

post quantum crypto Added

0:23

to our favorite browser and then an

0:26

unforeseen consequence of

0:28

Google's new anti tracking changes That's all coming

0:30

up next on security now Podcasts

0:35

you love from people you

0:37

trust This

0:45

is security now with Steve Gibson episode 960

0:49

recorded Tuesday February 6th unforeseen

0:54

consequences Security

0:57

now is brought to you

1:00

by Melissa the data quality

1:02

experts all

1:04

data expires about 25% per

1:06

year Including

1:09

the data in your customer database

1:11

your supplier database your address records

1:13

for over 38 years Melissa

1:16

has helped companies Harness the

1:18

value of their customer data

1:21

to drive insight to maintain

1:23

data quality and support global

1:25

intelligence Melissa's flexible to fit

1:27

into any business model Melissa verifies addresses

1:29

for more than 240 countries on Prem

1:33

in the cloud as a sass app. There's

1:35

even an API so you can ensure you're

1:37

only Putting valid billing

1:39

and shipping addresses into your system You

1:42

can focus your spending where matters the most Melissa

1:45

offers free trials Sample codes

1:47

and flexible pricing and an

1:49

ROI guarantee plus unlimited

1:51

technical support to customers all around

1:53

the world You can even

1:55

try it on your phone download the Melissa app.

1:57

It's free on Google Play or

1:59

the iOS app store, no signups

2:02

required. Melissa has achieved

2:04

the highest level of security status

2:06

available by gaining FedRAMP authorization. That's

2:09

kind of peace of mind

2:11

for anybody using Melissa. Their solutions

2:13

and services are GDPR and CCPA

2:15

compliant. They make SOC 2 and

2:18

HIPAA high trust standards for information

2:20

security management. Your data is secure

2:23

at Melissa. Bottom line, make

2:25

sure your customer contact data is up to date.

2:27

It started today, 1000 records

2:29

cleaned for free at melissa.com.

2:34

That's melissa.com. It's

2:38

time for security now. Steve,

2:40

there he is. Or was

2:42

that one of the sounds that goes off

2:44

when something happens? One of the alerts. I

2:47

can't wait. And speaking of sounds, all of

2:49

our listeners will be glad to know that

2:51

little annoying beep in the

2:53

background finally died.

2:56

You couldn't find the smoke

2:58

detector, right? But you couldn't figure it out. Actually

3:02

it was a water alarm

3:04

which I had installed because

3:07

my air conditioning condenser was

3:09

backing up and overflowing so I

3:11

needed to be alerted if that

3:13

was happening. But I

3:15

replaced the whole AC system

3:18

a couple years ago with a

3:20

brand new one that has all that built in.

3:23

So I removed the water sensor

3:25

and just stuck it aside and

3:27

as happens here where we need

3:30

to have archaeological digs to find things.

3:32

Oh, it was in a pile somewhere.

3:35

Yes, it was just buried. Literally

3:39

buried. It was in a wooden heap

3:41

somewhere south of your living room. Okay.

3:44

And then at some point it began going beep. Very

3:48

briefly, very high pitch and

3:51

not often. And

3:53

some of our listeners began saying, Steve,

3:56

you've got to check the batteries in your

3:58

smoke detector because it's very... Apparently there's

4:00

a problem there. Well, no. And

4:02

I could not find it. And it had been

4:04

going on, I don't know, a couple years maybe? But

4:08

I stopped hearing it. I haven't

4:10

heard it recently. Has it still

4:12

been going? It

4:15

was going last week during last week's podcast. If

4:17

you play the podcast every so often, go

4:19

here. Anyway, so... And

4:21

that's kind of dry because we have a lot of

4:24

OCD listeners. I mean, people who really can't

4:26

handle that kind of thing. I

4:30

stopped hearing it. I had adapted to

4:32

my environment and I saw it's like,

4:34

you know, I step over things that

4:37

are in the way. Oh

4:39

my God! So when I came

4:41

in yesterday morning, I heard... Eeeeeeeeeeee!

4:48

So I thought, oh, thank God!

4:51

I knew at some point the

4:53

battery would actually finally

4:55

die so they couldn't even make

4:57

these beats. And

5:00

I was like, eeeeeeeeeeeeeeeeee! And

5:03

I went right to it!

5:06

Just directly, I just like,

5:08

I pulled some things out of the way, there

5:10

it was. That's indeed what it

5:12

was. Did you stamp on it? I

5:17

mean, even moving it around, it was just on

5:19

it's last volt. Oh

5:24

my God! Oh! Well

5:26

anyway... Silence? Was

5:28

somebody, Chickenhead21 in our chatroom, our

5:30

Discord wants to know, was Elaine

5:33

actually typing beep when it went

5:35

off in the transcripts? Bless

5:37

her heart, I wouldn't be surprised

5:39

if she had a little parenthetical

5:41

beep-beep! I

5:45

haven't heard it in months, I knew about it,

5:47

people have written in about it and I thought

5:49

you fixed it last year. I

5:52

just wasn't hearing it, maybe like you, I'd either grown

5:54

attuned to it or I'm so deep now that I

5:56

can't hear that frequency. Wow! Well

5:59

thank you! Thank you for fixing that. Thank

6:03

you for thanking me for my patience. It

6:06

is now finally gone. I

6:08

told you about that avenue. I remember when we

6:11

talked about this last, I told you about that

6:13

avenue 5 episode. I don't know if you ever

6:15

watched Avenue 5 after we talked about it, but

6:19

they're on the spaceship, right? And

6:21

there was a beep. Nobody could

6:23

figure out where it was. It

6:26

was keeping people up. It was the whole thing. So

6:29

this is not an unusual phenomenon. You

6:31

maybe should make a variation of

6:34

the portable dog killer that is

6:36

the portable beep locator. Believe

6:39

me, when this began, I gave it

6:41

some serious thought. It was impossible for

6:43

me to find it. So I considered

6:46

putting two microphones, some distance apart. Tranquilizing

6:48

it. Exactly. And locking

6:50

onto that sucker. But then I

6:52

thought, well, we really do want

6:54

Spinrite 61 eventually. Won't

6:58

you be glad when you retire that you can devote your

7:00

time to things like that, I think. Retire?

7:04

What? Never. Never.

7:07

Oh no. I've got to move Spinrite 7 onto the Vision

7:09

Pro. So yes. We

7:11

have that during Mac Break Weekly that you would

7:13

make a version for the

7:16

Vision Pro. Not a problem. Yes.

7:18

Imagine walking through the bits of

7:21

your mass storage, looking around, and

7:23

say, oh, look at that bad

7:25

spot there. Fluck that out. Oh

7:28

gosh. Yes. So what is

7:30

coming today on Security Now? Oh

7:32

boy. Business Security

7:34

Now 960 as we begin February. This

7:40

podcast is titled Unforeseen

7:42

Consequences, which sort of

7:44

crept up on me when I stumbled

7:46

upon an odd

7:49

reference to a piece in the

7:51

Financial Times. Now the Financial Times

7:54

has one of the strongest paywalls

7:56

you can find. I mean, they're

7:58

not screwing around. hey, you know,

8:01

we're just going to tease you with the headline. You're

8:04

not going any further. Except they also allow

8:06

themselves, like I just googled the

8:08

headline and there it was. So it's like, okay,

8:11

well, you're not that worried about, I mean, you

8:13

know, they want to bring people to their paywall

8:15

so you can decide if you want it.

8:18

Anyway, they had a really

8:20

interesting piece that is,

8:22

that talks about some, some

8:25

consequences we've never considered

8:28

that are like the dark side

8:31

of Google's killing

8:33

third party cookies. So

8:35

it's going to be really interesting.

8:38

I think this is going to be

8:40

a riveting episode, but first we're going

8:42

to talk about what move Sisa has

8:44

just made that affects our home routers.

8:47

What serious flaw was discovered

8:50

in a core C library

8:52

used everywhere by Linux? Does

8:55

open SSL still have

8:57

a future? And

9:00

what's Ross Komnonzor done

9:02

now? How can

9:04

a password manager become proactive with

9:07

passkey adoption? Which favorite

9:09

browser has just added post

9:11

quantum crypto? What prevents

9:13

spoofing of the images

9:15

taken by digital signing cameras,

9:17

if anything, and

9:19

why are those insecure PLC

9:22

devices, you know, the programmable

9:24

logic controllers, which run process

9:26

automation everywhere, ever

9:28

being attached to the internet? And

9:32

what may be an undesirable

9:35

and unforeseen consequence

9:38

of Google's anti tracking chain?

9:42

Yeah, it's going to be a great episode.

9:44

And oh, Leo, we do have a picture

9:46

of the week. I only see the caption.

9:48

I haven't scrolled up. But

9:51

I can tell from the caption, it's going to be a good.

9:54

Yes, it is. It may explain

9:56

the power outages you've been having.

9:58

Holy cow. Yeah. We

10:01

were in the middle of Twitter on Sunday. Fortunately,

10:03

we were not on the, we were actually

10:05

within minutes of ending it. And

10:07

everything just went dark. And I had to go home

10:09

and finish the show at home because there

10:11

was no power here. And then of course,

10:13

as you noticed, I come in the

10:15

studio and everything is all messed up because they

10:18

don't survive power outages very well. I had to

10:20

play with a bunch of things. Anyway, we got it

10:22

all working. We will get to the

10:24

show in a moment, but first, a

10:27

word from Delete Me, our sponsor. Have

10:29

you ever searched? Don't do this, but

10:32

I know you will because I'm going to say it. Have

10:34

you ever searched for your name online? It

10:37

is a terrifying experience. You won't

10:39

believe how much of your personal

10:41

information is available. The

10:44

next step should immediately be visit

10:47

joindeleteme.com/twit and sign up for

10:49

Delete Me. Delete Me helps

10:52

reduce risk and there are lots

10:54

of them associated with having all

10:56

that stuff online. Money theft, credit

10:58

card fraud, robocalls,

11:01

cyber security threats, harassment,

11:04

unwanted communications overall. We

11:06

started using Delete Me a couple of years

11:08

ago when a text went out from our

11:10

CEO's phone to her

11:12

direct report saying, I'm in a meeting, but

11:14

I need to get these Amazon gift cards

11:16

out to our hosts. Go

11:19

buy me some. Now thank

11:22

goodness our employees listen to

11:24

our shows and they're well trained and

11:26

they immediately smelled something suspicious. But honestly,

11:28

it came from her phone number. It

11:31

came to their phone number. In every

11:33

respect, it looked legit. Where

11:35

did they get all that information? How

11:38

did they know who our direct reports are? That

11:41

information is online. Data brokers

11:43

have it all. We sign up

11:45

immediately for Delete Me. And by

11:47

the way, it has been a huge boon. It

11:50

is a cyber security threat to your business.

11:52

If your executives, if your managers

11:55

are not, if their information is online, who

11:57

they boss around.

12:00

All that stuff is just meat

12:02

for these bad guys, these hackers. So

12:05

here's what you do. You go to

12:07

joindeleteme.com/twit. First step, you sign up. You

12:10

give them some basic personal information, information they're going to be

12:13

looking for. That's how they figure out it's yours, right? So

12:15

you have to tell them some stuff and

12:17

this is the stuff I want removed. Delete

12:20

me's experts and they do this, humans do

12:22

this, which is really important. You cannot do

12:24

this well automatedly. Humans go

12:27

out, they find your personal information. They

12:29

have lists of literally hundreds of data

12:32

brokers. New data brokers are added every

12:34

day. There is no regulation on these

12:36

guys. It's like the wild west. But

12:39

delete me knows who they are. They will go

12:41

there. They will reduce your online footprint. They will

12:43

keep you and your family and your business safe.

12:46

But then, and this is really important, they

12:49

will continue to scan and continue to remove

12:51

personal information regularly because there's a loophole. These

12:53

data brokers have to have a place where

12:55

you can say, I don't want you to

12:58

keep my data information. They'll delete

13:00

it and say, we deleted it. But then they

13:02

still gather information. If you should have happened somehow

13:05

to show up in that information, well,

13:08

they recreate your whole profile,

13:10

the whole thing's back. I'm

13:12

talking addresses, photos, emails,

13:15

relatives, phone numbers, social

13:17

media, your net worth,

13:19

your property value and more. Now

13:22

these expose, everybody's got a different threat

13:24

model, right? For instance, the privacy exposures

13:26

in these incidents would affect everybody differently.

13:29

Delete Me has real privacy

13:31

advisors you can talk to to help

13:33

you make sure that you're getting the support you

13:35

need and to help you understand what they're doing

13:38

and what you need to do. They're

13:40

very good. Protect yourself. Reclaim

13:42

your privacy. The website

13:44

again, joindeleteme.com/twit. The code is twit

13:47

for 20% off. So

13:49

it's a good price. Thank

13:52

you, deleteme.com/ twit.

13:54

Promo code twit at checkout. Thank

13:57

you, deleteme, for the job you did for Lisa and...

14:00

And for all of our listeners, join

14:02

the lead me.com/twit. Steve.

14:05

Now, Leo, you may scroll

14:07

up and reveal,

14:10

huh? And reveal the

14:12

cause of the power outages at

14:15

Twitch studios. But this is

14:17

the caption, but this is where

14:19

you said you wanted the dangerous

14:21

high voltage terminal box. Oh,

14:24

just sitting right out there, right

14:26

out there in the public. I bet you there's a

14:28

playground right next to it. Well, look

14:30

what's on it or aimed at it. Oh,

14:33

you scroll down a little further. Oh, I missed that

14:35

part. There

14:39

is a sprinkler sprinkling

14:41

it. So for

14:43

those who are listening, I hope it's weather

14:45

sealed. Holy cow. Out

14:48

in the middle of something is

14:50

this, you know, scary looking high

14:52

voltage box. Oh,

14:56

my box. It says

14:58

attention, attention with a with

15:01

the lightning bolts saying, you know,

15:03

high voltage. There's

15:05

a sprinkler, you know, one of

15:07

those like those things that shoes

15:09

out a beam of water that's

15:11

supposed to go about a thousand

15:14

yards, which, you know, slowly rotates

15:16

to water the entire park. Well,

15:18

this box is about three feet

15:20

away from it, receiving the full

15:22

force of this water blast right

15:24

in its face. You know,

15:26

it's surprising there aren't sparks flying out of

15:28

this thing. Oh, my God. Anyway, yeah, you

15:30

know, you want to step cautiously on the

15:32

wet lawn that surrounds this

15:36

electrical box. That's a great

15:38

picture. You could probably charge your Tesla just by parking on

15:40

the lawn next to it. Yeah,

15:42

great. Wow. It's

15:45

liquid cooled. Yes. Mashed potatoes

15:47

in our Discord. You said what? It's

15:50

liquid cooled. Liquid cooled, right? Yes. Never

15:53

gets hot. Okay,

15:56

so under the headline, CISA

15:58

and FBI. Release

16:00

secure by design alert

16:04

urging manufacturers to eliminate defects

16:06

in SOHO routers. And I

16:09

think everyone knows SOHO, small

16:13

office home office is what

16:15

that abbreviation is. So last

16:17

Wednesday, CISA and

16:19

the FBI published guidance. This is

16:21

the third such release of theirs.

16:23

They've kind of, and this is the

16:26

first aimed at down at the

16:28

consumer. Previously they were talking

16:30

at the enterprise level. So

16:32

they published guidance on

16:35

security design improvements

16:38

for SOHO device manufacturers, which

16:40

is part of their new

16:42

secure by design alert series,

16:45

which focuses on how

16:48

manufacturers should shift the

16:50

burden of security, thank God,

16:53

away from the customers who, you know,

16:55

they just want this stuff to work,

16:57

plug it in, set it and forget

16:59

it, by integrating security

17:02

into the product design and

17:04

its development. So

17:07

this third publication in

17:09

CISA's series examines how

17:11

manufacturers can eliminate what

17:13

they call the path

17:15

threat actors, the

17:21

path threat, I'm sorry, which actors are

17:24

taking to compromise small

17:26

office and home office routers.

17:29

Now they were specifically

17:31

referring to a recent

17:33

initiative. There is a group

17:35

out of China known as

17:38

the Volt Typhoon Group, which

17:41

the FBI just, somewhat

17:45

controversially took down by

17:49

patching these routers. And

17:51

it was my intention initially to

17:53

talk about that as our main

17:55

topic this week, but I ran

17:57

out of space actually on that.

17:59

the podcast at time and

18:02

I really needed to talk about the

18:05

consequences of what I realized was going

18:08

to be happening as a consequence of

18:10

stumbling upon this Financial Times piece. So

18:14

I have that queued up

18:16

for next week. But

18:18

there was something that caught

18:21

my attention in this which

18:23

was unsuspected or unanticipated. They

18:27

said, Sisa did in

18:30

this joint FBI release,

18:33

that they wanted

18:35

manufacturers to do three things.

18:39

Automate update capabilities,

18:42

remove web management from the

18:44

WAN interface and

18:47

require a manual override to

18:50

remove security settings. Okay,

18:53

so all of these podcast

18:55

listeners have probably grown tired of hearing

18:57

me talk about those first two points.

19:00

Automate updates and remove all

19:03

device management from the public

19:05

facing interface, the WAN

19:07

interface, right? You

19:10

just don't need to use

19:13

a web interface aimed

19:16

at the internet so that you can

19:18

access your

19:20

device across the internet. What

19:25

we keep learning is that we don't

19:27

know how to do that safely

19:29

because everyone keeps making mistakes. And

19:32

you don't have to expose it to

19:34

the public because there are plenty of

19:36

ways to get over onto the private

19:38

LAN from the public internet and

19:40

then access the device from the LAN side. That's

19:48

the way we should do it. The

19:51

third one was

19:53

really interesting. I think it's brilliant.

19:56

They say require a manual

19:59

override. to remove

20:01

security settings. In other words, routers

20:04

should not accept remote

20:07

or any even local over-the-wire

20:10

instructions which

20:12

reduce their security in

20:15

the absence of a

20:17

manual physical local

20:20

confirmation of some kind.

20:23

There's no substitute for the

20:26

affirmation of one's physical presence

20:28

at a router's location. Pressing

20:32

a I want to

20:34

change my router's configuration button

20:37

is the one thing no remote

20:40

attacker in Beijing

20:43

is able to do from the

20:45

comfort of their cyber warfare bunker.

20:47

I think

20:49

that the best way to do this

20:52

would be to require a button to

20:54

be pressed in order to place

20:56

the router into configuration

20:59

change mode. So if a user

21:01

logs into their router, you know,

21:03

they're welcome to do that. They're welcome

21:06

to poke around and look at the

21:08

router's various settings. But

21:10

the moment the user attempts

21:12

to change something which

21:15

is important to the security of the

21:17

system, the router's UI will

21:19

pop up a little box and

21:21

say, please press

21:24

the enable configuration

21:26

changes button on your

21:30

router to proceed. And

21:33

it'll just wait. Once

21:35

the button is pressed, the router

21:37

will take down that little message

21:39

and will allow the user to

21:41

change its configuration until the user

21:43

either logs out of the interface

21:46

or after some period of inactivity because

21:48

most people just leave their login cookie

21:50

present and logged in so they can

21:52

get back to it easily if they

21:54

need to. So would

21:57

this be potentially a pain in the butt?

22:00

Yeah, especially if the router is in

22:02

the attic. But, you

22:04

know, it's a classic trade-off

22:06

between security and convenience. Requiring

22:08

a one-time password is certainly

22:10

not as convenient as not

22:12

using one. But, you

22:14

know, that requirement is clearly much more

22:17

secure. So the

22:19

problem being addressed is,

22:21

you know, in this case is

22:23

very real. You know, we are

22:26

populating the world with

22:28

insecure, yet increasingly

22:31

powerful consumer routers, which

22:33

are actually being taken over

22:36

by malign remote forces that

22:39

wish to exploit our traditional lack

22:41

of focus on security. So once

22:44

again, I give big props

22:46

to Sisa for leading this truly

22:48

necessary change. I think this makes

22:50

so much sense. You know, yes,

22:53

again, it will be a

22:56

bit of an annoyance to have to

22:58

go to physically go to the router

23:01

and press the button saying,

23:03

I want to enable configuration

23:05

changes. But it's

23:08

a brilliant requirement. And I do hope that we

23:10

see this. And really, we're not doing this all

23:12

the time. And if you are, don't put your

23:15

router in the attic. Put it somewhere a little

23:17

more accessible. And that'll just become,

23:19

you know, the way we do things

23:21

in the future. I think this makes so

23:23

much sense. While

23:28

we were recording last

23:30

week's podcast, the

23:33

QALIS Threat Research Unit, they call

23:35

it the TRU, which is kind

23:37

of a cool abbreviation, was

23:40

informing the world that

23:42

they had recently unearthed

23:45

four significant vulnerabilities in

23:48

the GNU C library,

23:50

which forms a cornerstone

23:53

for countless applications in

23:55

the Unix, I'm sorry,

23:57

in the Linux. Well, probably Unix too. Well, not

23:59

Unix. not GNU, but in

24:02

the Linux environment, one of these

24:04

four, which they found, is

24:07

a severe vulnerability tracked as

24:09

CVE-2023, notice it's late last

24:11

year, 6246. This vulnerability affects

24:19

major distros, like, well,

24:23

every version of Linux, I think

24:25

it's safe to say, but of

24:27

course, including Debian, Fedora, Red Hat,

24:29

and Ubuntu. It's C-lib, right? Yes,

24:31

it's G-lib C. Yeah,

24:34

G-lib. Yeah, yeah, yeah, yeah, yeah, that's everywhere.

24:36

That's the core C library that C depends

24:41

upon. It's basic standard functions.

24:43

Yeah. Yes, it's linked into

24:45

everything. Yep. So the

24:47

bug impacts versions going back

24:49

to August of 2022, which

24:52

is when the bug was introduced. It

24:55

is an elevation of privilege flaw

24:57

that can allow local

25:00

attackers with access to

25:02

a system to obtain

25:04

root privilege access. So, you

25:06

know, we dodged a big

25:08

bullet here, folks, because if

25:10

this had allowed remote attackers

25:13

to get root. Oh, then we'd

25:15

have trouble. Yeah. Oh,

25:19

baby. So here's what Qualys

25:21

explained about their discoveries. They started

25:23

by saying, before diving into the

25:25

specific details of the vulnerabilities, it's

25:28

crucial to understand these

25:31

findings, broader impact and importance.

25:34

The GNU C library, or

25:36

G-lib C, is

25:38

an essential component of

25:40

virtually every Linux-based system

25:43

serving as the core interface

25:45

between applications and the Linux

25:48

kernel. The recent discovery

25:50

of these vulnerabilities is not just

25:52

a technical concern, but

25:55

a matter of widespread

25:57

security implications. And Actually,

26:01

more about the bullet that

26:03

flew by and we

26:05

dodged. We'll get to more of that in a

26:07

second. In other words, it

26:10

was more than a little bit

26:12

shocking to Qualys to

26:14

discover serious exploitable

26:17

vulnerabilities in a core

26:19

component of a system

26:22

that is this widespread. Needless

26:24

to say, Linux is everywhere, including

26:26

in every one of those Soho

26:29

routers we were just talking about.

26:31

We all need to keep

26:33

in mind that fixing it

26:35

today doesn't automatically fix it

26:38

yesterday, which is

26:40

another strong argument for allowing

26:42

autonomous updating of unattended and

26:44

unmanaged IoT devices. Anyway,

26:47

Qualys continues writing, the

26:50

vulnerabilities identified in Glib-C's

26:53

syslog and QSort

26:55

functions highlight a critical

26:57

aspect of software security. Even

27:00

the most foundational and trusted

27:02

components are not immune to

27:04

flaws. The ramifications

27:06

of these vulnerabilities extend far

27:08

beyond individual systems, they write,

27:11

affecting many applications and

27:13

potentially millions of users

27:15

worldwide. This article aims

27:18

to shed light on the specific

27:20

nature of these vulnerabilities, their potential

27:22

impacts and the steps taken to

27:24

mitigate them. The first

27:26

vulnerability, CVE-2023-6246, a significant security

27:28

flaw, has been identified in

27:36

the GNU C libraries v-syslog

27:39

internal function affecting

27:42

syslog and v-syslog.

27:45

This heap-based buffer overflow vulnerability

27:47

was inadvertently introduced in Glib-C

27:50

version 2.37 in August of

27:52

2022 and subsequently backported to

27:54

Glib-C-2. version

28:01

2.36, an earlier one,

28:04

while addressing a different, less

28:06

severe vulnerability. So oops, it

28:09

actually went, you know, the

28:14

flaw was introduced in 3.3.7 and then they

28:16

thought they

28:19

were fixing an earlier vulnerability in

28:21

3.3.6 so they moved

28:23

that code back into, I'm sorry, into

28:27

2.36 and broke it as well.

28:31

They write major Linux distributions like Debian, that

28:33

would be 12 and 13, Ubuntu, 23.04 and

28:35

23.10 and Fedora, 37, 38 and 39 are

28:37

confirmed to

28:47

all be vulnerable. This

28:50

flaw allows local privilege

28:52

escalation, enabling an

28:54

unprivileged user to gain full

28:57

root access as demonstrated in

28:59

Fedora 38. So again, somebody

29:01

standing in

29:04

front of a machine where

29:07

you are relying on them

29:09

not having root and

29:11

only being able to log in and

29:14

do things as a non-root user, that

29:17

reliance broke completely.

29:21

They said in our analysis, the

29:23

same function affected by CV 2023, 6246, this

29:25

one, they said we identified two

29:31

additional, albeit less

29:33

severe vulnerabilities. One is off

29:36

by one heat-based buffer overflow,

29:38

also in the V syslog internal

29:41

function and an integer overflow issue

29:43

also in the same function, but

29:45

not nearly as worrisome as this

29:47

main one. They said based on

29:50

our assessment, triggering those

29:52

vulnerabilities appears more

29:54

challenging than 6246, you know, the primary

29:59

problem. Additionally, they said exploiting them

30:01

effectively is likely to be more complex. As

30:04

for the last of the four

30:07

vulnerabilities, a memory corruption issue was

30:09

found in the GNU C libraries

30:12

Q sort function caused by a

30:14

missing bounds check. This

30:16

vulnerability could be triggered when

30:19

Q sort is used with

30:21

a non-transitive comparison just

30:23

such as a simple comparison of A and

30:26

B which returns A minus

30:29

B and

30:31

using a large number of elements

30:33

controlled by an attacker potentially

30:35

leading to a memory allocation failure.

30:39

Okay, so what

30:42

are the implications? Qualis writes,

30:44

the discovery of vulnerabilities in the

30:47

GNU C libraries syslog and Q

30:49

sort functions raises major security concerns

30:51

and these are sort of hypothetical

30:56

concerns but still worth noting.

30:59

They said the syslog vulnerability,

31:01

a heap-based buffer overflow, can

31:03

allow local users to gain

31:06

full root access impacting major

31:08

Linux distributions. Similarly, the Q

31:10

sort vulnerability stemming from a

31:13

missing bounds check can lead

31:15

to memory corruption and

31:17

get this, has affected all

31:20

G libc versions since

31:23

1992. Yeah,

31:28

in other words all G

31:30

libc versions effectively. Yeah, Linux

31:32

is only, yeah, definitely that's all of

31:35

them. They

31:37

said these flaws highlight the

31:39

critical need for strict security

31:41

measures in software

31:45

development especially for core

31:47

libraries widely used across

31:49

many systems and applications.

31:53

So yeah, no kidding. Now,

31:56

what happens or the way this is

31:58

managed behind the scenes is all always

32:00

interesting. So here's a quick

32:03

blow-by-blow timeline from the discovery

32:05

through the coordinated release one

32:07

week ago today. So

32:11

this began in on

32:13

early November, November 7th of last

32:16

year, 2023. So the

32:18

end of last year, November 7th, they said

32:20

we sent a preliminary draft

32:22

of our advisory, that is,

32:24

you know, a disclosure of

32:26

their discovery, to Red Hat

32:28

Product Security. Eight

32:32

days later on the 15th, Red

32:34

Hat Product Security acknowledged receipt

32:36

of their email. The

32:38

following day on the 16th of

32:41

November, Red Hat Product Security asked

32:43

us if we could share our

32:45

exploit with them. The following

32:47

day on the 17th, they sent the

32:50

exploit to Red Hat Product Security. Four

32:54

days later on the 21st, Red

32:57

Hat Product Security, they said,

32:59

confirmed that our exploit worked

33:02

and assigned CVE 2023 6246 to this heap-based buffer

33:08

overflow in vSYS log

33:10

internal. Okay,

33:12

so that is November 21st.

33:15

Now we go to December, we're

33:17

on December, the next month on

33:19

the 5th, Red Hat

33:21

Product Security sent us a patch for

33:25

this vulnerability 6246 written

33:28

by the G-LIB-C

33:30

developers and

33:32

asked us for our feedback. Two

33:35

days later, December 7th, they said

33:37

while reviewing this patch, we

33:39

discovered two more minor

33:42

vulnerabilities in the same function.

33:44

That's where that off-by-one buffer

33:46

overflow and the other integer

33:49

overflow surfaced. They

33:51

said we immediately sent an analysis,

33:54

proof of concept, and patch proposal

33:56

back to Red Hat Product Security

33:59

and suggested that we directly

34:01

involve the G-LIB-C security team. That

34:03

was on December 7th. The next

34:05

day on the 8th, Red Hat

34:07

Product Security acknowledged receipt of our

34:09

email and agreed that we should

34:11

directly involve the G-LIB-C security team.

34:14

We contacted them on the same

34:16

day and they immediately replied with

34:18

very constructive comments. Of course, they

34:20

were already looped into this because

34:22

Red Hat had previously forwarded this

34:24

to them and then received the

34:26

the patch back from them which

34:28

then they sent back to QALIS. Three

34:33

days later, December 11th, the

34:35

G-LIB-C security team suggested that

34:38

we postpone the coordinated disclosure

34:40

of all three vulnerabilities until

34:42

January 2024. Okay, so

34:44

we were at December 11th at

34:46

this point. They said because of

34:49

the upcoming holiday season, meaning

34:52

people on vacation, people not

34:54

around, people less available to

34:57

respond immediately as this

35:00

would require to the public,

35:03

you know, coordinated disclosure of this. So

35:05

they said, yep, good, let's let the

35:08

holidays pass and we'll deal

35:10

with this immediately afterwards. So,

35:13

December 13th, still last year

35:15

before Christmas, Red Hat Product

35:17

Security assigned the

35:19

two additional CVEs to the other two

35:21

things that have been found. On

35:24

January 4th, this year, they

35:27

said we suggested either January 23rd

35:30

or January 30th for

35:32

the coordinated release. G-LIB-C

35:35

developers agreed on January

35:37

30th. That was last

35:39

Tuesday. So, now we're

35:41

at January

35:44

12th, the G-LIB-C developers

35:47

sent us an updated version of the patches for these

35:50

vulnerabilities. The next day, we reviewed these patches

35:52

and sent our feedback to the G-LIB-C developers.

35:56

Two days later, on the 15th, the G-LIB-C

35:58

developers sent us a report. the final

36:00

version of the patches for these

36:03

vulnerabilities. The following day, Qalas says,

36:06

we sent these patches and a

36:08

draft of our advisory to the

36:10

Linux distros at open

36:12

wall list. They immediately acknowledged

36:15

receipt of our email and

36:18

on the 30th, last

36:20

Tuesday, coordinated release

36:22

of this occurred. So,

36:24

you know, that's how this actually, you

36:27

know, like that there's

36:29

an example of, of

36:31

everybody being responsible, everybody responding to

36:33

email. No one's sitting on this

36:35

for, you know, months, the way

36:37

we've seen Microsoft do so often,

36:39

you know, this is the way

36:41

it's supposed to happen. Problem is

36:43

found if the

36:46

right people are looped in, it's

36:48

reviewed, it's verified, patches are created,

36:50

patches are verified, some more tweaks

36:52

are made, everybody agrees about like,

36:54

looks at the calendar, when would

36:56

be a good time to let

36:59

everybody know. And that's

37:01

what the way it happens. So, you know, a

37:04

great look at how this happened. And,

37:06

you know, all the distros have been

37:08

updated. Now, everybody who's in a situation

37:11

where you that where this, it might

37:13

be a problem if a

37:15

Linux system from the last two

37:17

years has, you

37:20

know, is relying upon its protected

37:23

root privilege. Well, it's not as protected

37:25

as we were hoping. But at least

37:27

somebody, you want an attacker needs to

37:29

be physically on your system. Yes, thank

37:31

you. That's a relief. Goodness. Yeah. By

37:33

the way, goodness, I bet you you

37:35

could look at a quick, any quick

37:37

sort and immediately know if there's a

37:39

buffer overflow. This is not a hard

37:41

thing to write. Everybody wrote it

37:43

and, you know, comp

37:46

sci 101. I

37:49

could see how you'd get a buffer overflow, but that seems like a

37:52

pretty bone. Well, so Q, you're

37:55

able to pass a function to

37:57

Q. So, oh, Yeah,

38:00

because that's the function that determines

38:02

what's lesser or greater, right? Yes,

38:04

exactly. So it's the sorting determiner

38:06

function which is where the problem

38:08

actually is. That might be a

38:10

little harder to trace, I guess.

38:13

Yeah. I mean, usually

38:15

you just pass it less than or greater than,

38:17

but okay. If you did

38:19

something really elaborate, maybe you get something weird. Interesting.

38:23

Okay, so speaking of libraries,

38:26

OpenSSL has lost

38:28

another big user. The

38:31

CDN Fastly, you know, one

38:33

of the biggies, announced that

38:35

they've decided to switch from

38:38

OpenSSL, which they've been using to

38:40

date, to the

38:42

name you just got to love, because this is what

38:45

you want from your SSL, boring

38:47

SSL. You

38:49

know, you want a boring SSL

38:51

library. In their announcement,

38:54

they explained, they said OpenSSL

38:56

has a long history of

38:58

high severity vulnerabilities, including the

39:00

notorious heart bleed bug. In

39:03

addition to the risk of

39:05

exploitation, there is a significant

39:07

operational cost incurred to rapidly

39:09

test and deploy patches. And,

39:11

you know, we're talking about,

39:14

so I

39:16

don't think they say this anywhere, but this

39:18

is on all of their edge system

39:21

instances. So all of their

39:24

edge routing, edge proxies, where

39:26

the CDN's network is

39:29

interacting with

39:31

the internet, this is where this goes.

39:34

So, yeah, if some

39:37

high severity vulnerability is

39:39

found in OpenSSL, they,

39:41

like every one of those

39:43

instances needs to be fixed

39:46

immediately, and that's a big

39:48

pain in the butt. So

39:50

they said, there's a significant operational

39:52

cost incurred to rapidly test

39:54

and deploy patches whenever a

39:56

new vulnerability is announced. Our

39:59

primary goal in

40:01

replacing OpenSSL with

40:03

BoringSSL was to

40:06

reduce the frequency and

40:08

impact of CVEs and

40:10

improve the security of our

40:12

TLS termination system for our

40:15

customers. BoringSSL

40:17

is a fork of OpenSSL

40:19

that was created and maintained

40:21

by Google. It is

40:24

widely considered to be

40:26

fundamentally more secure than

40:28

OpenSSL because it is

40:30

less complex. OpenSSL

40:32

remains the Swiss Army knife

40:34

of SSL libraries and a

40:36

bunch of great work has

40:38

been done over the years

40:40

to improve it but we

40:43

are convinced the BoringSSL provides

40:45

better protection for our customers.

40:48

They added our work began about

40:50

a year ago with the

40:52

ambitious idea of replacing

40:54

OpenSSL on our edge

40:57

for all incoming connections.

40:59

We considered a few alternatives

41:02

but stuck with our original

41:04

vision of migrating to BoringSSL

41:06

to gain the following benefits.

41:10

Smaller, more modern code base.

41:13

A safer API. BoringSSL

41:16

is an OpenSSL derivative

41:19

and is mostly source

41:21

compatible making our

41:23

migration less challenging. Extensive

41:27

fuzzing used

41:29

by big players and

41:31

maintained by Google and

41:34

similar performance to OpenSSL.

41:36

They said in summary the

41:38

consensus was that BoringSSL offers

41:41

a more focused code base one

41:44

without OpenSSL's myriad of

41:46

legacy code which makes

41:48

it intrinsically more secure. I didn't

41:53

have it here just because it would take up a

41:55

lot of space but they showed

41:57

that the breakdown of code for

42:00

an open SSL and

42:02

boring SSL, the

42:05

boring SSL code source

42:08

code base is less than

42:10

half the size of open SSL.

42:13

So you know it just makes sense as

42:15

a technology is maturing

42:18

that it's also going to be getting a

42:20

bit old and creaky along the way. In

42:23

the case of open SSL it

42:25

spans decades. Having started in 1998

42:30

so that makes it 26

42:32

years old and as we

42:35

know SSL has evolved itself

42:37

as a protocol dramatically during

42:39

those 26 years. So

42:42

Google created boring SSL and we

42:44

know for example that Amazon's AWS

42:47

service is running on their own

42:49

very small homegrown

42:52

TLS stack. I'm

42:54

sure that open SSL will remain the bedrock

42:58

that it always has been

43:00

for experimentation and testing. Now

43:03

that's always where you know

43:05

new protocol stuff is worked

43:07

out you know and for

43:09

being as fastly said the

43:11

Swiss Army knife of SSL

43:14

libraries but its deployment in

43:16

critical new applications has probably

43:18

seen its day. And

43:21

you know as I was reading this and

43:24

thinking about it we've

43:27

been using GitLab to

43:30

like manage all of the

43:32

issues during the ending phase

43:34

of spin rights development. We

43:38

were just using you know news

43:40

group threads initially but one

43:43

of our participants well

43:46

known to all of the people in our

43:48

news groups Colby he

43:51

was suggesting GitLab and I

43:54

looked at it and I thought okay let's you know

43:56

I'll give it a try. So I brought it up

43:58

on its own server And

44:01

it's very nice. The

44:03

problem is it has way

44:07

more features than we are

44:09

using, just as OpenSSL has

44:11

way more features

44:14

than Fastly is using.

44:18

And they won't leave it alone.

44:21

And it's so big and complex,

44:23

it's constantly having bugs and problems

44:25

that are critical. So the analogy

44:28

is perfect. And as

44:30

a consequence, I am seriously

44:32

considering moving to a

44:35

much more modest, better

44:38

fit for us like

44:41

issue tracking system. There's something called

44:43

Red Mine, which looks like it

44:46

is exactly what I want, mostly

44:48

because they haven't touched it in

44:50

a long time. And

44:53

I don't want to spend all my

44:55

time maintaining a tool which

44:58

is supposed to be helping us to

45:00

manage a project. I just want it to

45:02

manage the project and not require its own

45:05

maintenance staff. So I

45:08

could fully understand the

45:10

trade-off that Fastly is

45:13

looking to make and has made. And

45:15

Leo, I think we should

45:17

tell our listeners about a trade-off they won't have

45:19

to make. Oh

45:22

no, this is not a trade-off. This

45:24

is choosing the perfect product

45:27

for your particular

45:29

use. In this case, if you want to become

45:31

an IT professional or you

45:34

want your team to be more

45:37

adept at securing your business, at

45:40

keeping you safe, at doing the job they

45:42

do, you need to know about it. Our

45:44

friends at ITProTV, you almost certainly know about

45:47

them, but maybe you forgot that they

45:49

are now ACI learning. That's

45:51

the main point. Now ITProTV is ACI

45:54

learning. You already know ITProTV. They have

45:56

been with us really

45:58

since inception. They started

46:00

advertising on security now. Well, as

46:03

a part of ACI learning now, ITPro has

46:05

expanded the things it can do, providing

46:07

so much more for you as

46:10

an individual, as an IT

46:12

learner, but also for IT teams. For

46:15

your team, ACI learning covers all you

46:17

need with audit, with cybersecurity, and

46:19

with IT training. I mean, it does it

46:21

all. You

46:24

get a personal account manager, so you

46:26

make sure you're not doing redundant

46:28

training, you're not wasting people's time. People

46:31

hate it when they were asked to

46:33

learn something they already know, for one thing. But

46:35

also, maybe you don't need training

46:38

in a certain area. In

46:40

that case, they'll help you tune your training

46:42

to be exactly what you need. Your

46:45

team only focuses on the skills that

46:47

make a difference in your organization, and you

46:50

can leave unnecessary training behind. Of

46:52

course, ACI learning has kept all the fun,

46:54

all the personality, all the informativeness of ITPro

46:56

TV. They're famous for it. While

46:58

amplifying their robust solutions for all your training

47:01

needs. Let your team be

47:03

entertained while they train, and

47:05

they love it too, with short form content, over

47:08

7,200 hours to choose from. You

47:11

might say, oh, it's got to be old. No, that's

47:13

brand new, up to date, because

47:15

they're always recording in their eight studios every

47:17

day of the week, so you're getting the

47:19

most up to date training. Visit

47:22

go.acillearning.com/twit for teams

47:26

that fill out the form. You get a free

47:28

trial and up to 65% off

47:30

an ITPro Enterprise Solution plan. Fill

47:33

out that form and find out how much you're going to save

47:35

at go.acillearning.com

47:39

slash twit. We love these guys. They've

47:42

been such a great sponsor for more than a decade,

47:45

I think. It seems like they started in 2013. I

47:48

think they did. So, just keep up

47:50

the good work, and thank you, ACI

47:52

Learning. Now, back to Steve

47:54

Gibson, who is going to show us how to write a

47:56

proper quick sort. No, he's

47:59

not. going to do? No.

48:01

Although I would take that class Steve,

48:03

I would. I'd

48:06

sanitize your inputs. So

48:10

recall that last December 1st

48:13

Russia put a new

48:16

communications law into effect which

48:18

required all hosting providers of

48:21

Russian websites to

48:24

register with none other

48:26

than Ross

48:28

Komnansor. This

48:32

law requires all cloud and

48:35

web hosting providers to register with

48:37

the Ross Komnansor agency which is

48:39

of course Russia's

48:42

telecommunications watchdog. So

48:45

far 266

48:48

web hosting providers have

48:50

registered with Ross Komnansor

48:53

and all our local

48:55

companies. Not a

48:58

single external provider has

49:00

registered. And those providers

49:03

are responsible, those providers,

49:05

the external providers, I'm sorry,

49:07

the external providers are responsible

49:10

for about one third of

49:13

all Russian websites. Now

49:16

I don't know what's up but this does

49:18

seem a little suspicious that not

49:20

a single external

49:23

provider has registered. So

49:26

it makes me wonder whether this is

49:28

actually like a

49:31

backhanded Russian way of forcing

49:34

the remaining one third of

49:37

Russian sites which are

49:39

currently being hosted

49:42

by external providers, none

49:45

of which suspiciously have registered and

49:47

all of which, and here's the

49:50

point, are subject to being cut

49:52

off at some point in

49:54

the future. If this is in

49:56

some way of forcing all the Russian

49:58

sites into mother

50:01

Russia's hosted services rather

50:03

than continuing to use you

50:06

know those non-russian territorial

50:08

providers. We'll see how

50:11

this goes but if Ross Komnonsor

50:13

has made it clear that at

50:15

some point non-registered

50:18

providers will be cut off

50:20

from access to Russian

50:22

territory. So again

50:27

don't know what that means but we'll see. Also

50:31

last Tuesday Google's security

50:34

blog announced a very

50:36

nice sounding new feature

50:38

for Android's password manager.

50:42

The blog's title is effortlessly

50:44

upgrade to pass keys

50:47

on pixel phones with

50:49

Google's password manager. Okay

50:52

so turns out this is less Google

50:55

specific than they're making it sound. Well

50:57

I'll explain that in a second. Here's

50:59

what Google said. They said Google is

51:01

working to accelerate passkey

51:04

adoption. That's good for everybody.

51:07

They said we've launched support for pass

51:09

keys on Google platforms such as Android

51:11

and Chrome and recently

51:13

we announced that we're making pass keys

51:15

a default option across

51:18

personal Google accounts. We're

51:21

also working with our partners across the industry

51:23

to make pass keys available on

51:25

more websites and apps which

51:27

as we know is what's required

51:29

for this to make any sense at all. Recently

51:32

they said we took things a step further. As

51:35

part of last December's pixel

51:37

feature drop we introduced

51:40

a new feature to Google password

51:42

manager passkey upgrades.

51:45

With this new feature Google password

51:47

manager will let you discover which

51:50

of your accounts

51:53

support pass keys and

51:55

help you upgrade with just a few

51:57

taps. key

52:00

upgrade experience is now available on

52:02

pixel phones starting with a pixel

52:05

5a as well as

52:07

pixel tablet. Google password manager

52:09

will incorporate these updates for other platforms

52:11

in the future. Best

52:14

of all they wrote today we're

52:16

happy to announce that we've teamed

52:18

up with Adobe Best

52:20

Buy DocuSign eBay

52:22

kayak money forward

52:24

Nintendo PayPal uber

52:26

Yahoo Japan and

52:29

soon TikTok to

52:31

help you bring to help

52:33

bring you this easy

52:35

passkey upgrade experience and

52:37

usher you into the

52:40

passwordless future. They said

52:42

if you have an account with one

52:44

of these early launch partners Google

52:46

password manager on pixel will

52:49

helpfully guide you to the

52:51

exact location on the

52:53

partners website or app where

52:56

you can upgrade to a passkey.

52:58

There's no need to manually hunt for

53:01

the option in account settings and

53:03

because the technology that makes this

53:06

possible is open and otherwise yes

53:08

it's actually not Google's any

53:11

website or app as well as

53:13

any other password manager can

53:16

leverage it to help their

53:18

users upgrade to passkeys for

53:20

supported accounts. It's all

53:22

part of Google's commitment they said to help

53:25

making signing in easier and safer.

53:28

Okay so

53:32

they're saying that at launch this

53:34

initially works with Adobe Best Buy and

53:36

so forth but why them

53:38

and not everyone? You

53:41

know it's just that

53:43

this group is first to adopt

53:45

a new standard. We've

53:48

all seen how our password managers

53:50

are able to perform a security

53:53

checkup right like to notify

53:55

us when we may

53:58

have reused a password some somewhere

54:00

where we're using the same password for

54:02

two different accounts. So

54:05

this is our password

54:08

managers being proactive about

54:10

our security. Well, it

54:12

turns out that there's an

54:14

open standard means by

54:17

which any website that supports

54:20

pass keys is able

54:22

to advertise the fact

54:25

that it supports pass keys

54:27

in a way that any

54:29

password manager is able

54:31

to check for and similarly

54:34

advise. I

54:36

did a bit of digging and I

54:38

found the page where Google describes this.

54:41

It's titled Promote Pass

54:44

Key Upgrades in Google

54:46

Password Manager. Of course, this

54:49

actually applies to any password

54:51

manager that does this. There's

54:53

nothing Google password manager specific

54:56

about this. Anyway,

55:00

they wrote there,

55:02

this is

55:05

aimed at web

55:08

app and website developers. So

55:11

that's the portion of the site where this

55:13

was found. So talking to

55:15

website developers, they said integrating

55:18

pass keys into your app

55:20

or website is just the

55:22

beginning of your pass key journey. After

55:25

your initial deployment, one of the

55:27

challenges you will likely encounter is

55:29

making sure your users understand

55:31

what pass keys are and how

55:33

to create them. You

55:36

should suggest creating a pass

55:38

key immediately after the

55:40

user signs in using

55:42

their password and verifying with

55:44

a second factor. Remembering

55:47

passwords and entering one-time passwords

55:49

while switching between different apps

55:51

and tools can be frustrating

55:53

for users. Recommending the

55:55

creation of a pass key at this

55:57

moment is an opportune time.

56:00

time, as users are likely

56:02

feeling this frustration. In

56:05

addition to the self-managed

56:07

promotions, Google Password Manager

56:09

can now suggest creating a

56:11

new passkey on behalf of

56:13

your website or app. Okay,

56:16

so under

56:18

the user's experience, they say on Pixel

56:22

devices, Google Password

56:24

Manager discovers that

56:27

your website or app

56:29

supports passkeys, suggests

56:32

users to create a new passkey

56:34

and directs them to your passkey

56:36

creation page. Okay, so leaving

56:40

Google out of this, what

56:42

this is about is

56:44

a very welcome, standardized,

56:47

and uniform way for

56:49

any passkey-supporting site to

56:51

declare its support in

56:54

a machine-readable way. So

56:57

this is, as I said, more broadly than just

56:59

Google. This

57:02

means that any password manager

57:05

on any platform, are

57:08

you listening, Bitwarden? And

57:11

examine the entire inventory

57:14

of its users' saved

57:16

passwords, and use

57:19

this standardized protocol to

57:21

proactively check the web

57:23

domain of each password

57:26

for its support of

57:29

passkeys. And

57:31

if an available passkey had not

57:33

yet been configured on that account,

57:36

the password manager could

57:38

take the user directly to that

57:40

site's passkey setup page. The

57:44

standard used is, we've talked about

57:46

before, it's the forward

57:48

slash dot well hyphen

57:51

known web directory,

57:53

which is located at the root

57:55

of a domain. And

57:58

there's a passkey-supporting page. hyphen

58:01

endpoints, JSON formatted

58:03

file there under

58:06

that well-known directory that

58:08

contains two URLs, one

58:11

to enroll a new passkey and

58:13

another to manage existing passkeys. So

58:16

again, any passkey

58:19

supporting site should

58:21

take every opportunity to enroll its

58:23

users the next time they're logging

58:25

into the site and

58:28

that the site sees that

58:30

they're using a password-supporting client,

58:32

a passkey-supporting client. That's

58:35

the primary way we can expect

58:37

passkeys to become adopted. But

58:39

it will also be cool for

58:41

them to be able to come

58:43

at this from the direction of

58:46

the passkey-enabled password manager to have

58:48

them reveal the sites to which

58:50

we could enroll and switch over

58:53

to passkey logon M authentication. I

58:55

agree. So very cool. Now

58:58

that Bitwarden supports passkeys, I find myself

59:01

much more likely to use it because

59:03

it's cross-platform because I work

59:05

on all platforms. So yeah, Apple, I

59:07

have my passkeys for some

59:09

things in my iPhone, but if it's not

59:11

everywhere, it's not useful. So I

59:13

really like it that Bitwarden supports it. And I've used it

59:15

a number of times now to log into Google and stuff,

59:17

and it's like, wow, that was easy.

59:21

That is good. I wish we'd done squirrel,

59:23

but hey, next best thing. We got what?

59:25

Well, if we just were fishes or something.

59:28

So okay. And

59:30

just a quick note that Mozilla has

59:32

added support for Mozilla

59:35

for post-quantum cryptography

59:38

to its developer Firefox

59:41

Nightly builds. So

59:43

we'll all be seeing it once the release

59:45

build is published on the main channel. It

59:48

can be enabled as Soon

59:50

as it's available by

59:52

going to About Colon

59:55

Config and then looking

59:57

for security.tls.enable underscore Kyber.

1:00:00

Hey why be are As the good

1:00:02

news is that for Firefox a search

1:00:04

A in that about configure Been rember

1:00:07

How long that bao bao configures? I

1:00:09

mean it's ridiculous This the scroll bar

1:00:11

just disappears on screen. There's so many

1:00:14

things that you you can tune and

1:00:16

tweak. So you're able to do a

1:00:18

sub string search so you be so

1:00:20

he you could just put in T

1:00:23

y B r and a would immediately

1:00:25

bring you to to that interests I

1:00:27

know I just built a nice it

1:00:29

forward move. For Firefox of and

1:00:32

I got some feedback to

1:00:34

share before we. Get

1:00:37

to the main goody here, just Zealand

1:00:39

he said Steve I've been a listener

1:00:41

to security now for quite some time

1:00:43

and I've really enjoyed and gotten a

1:00:46

lot out of your Christ what he

1:00:48

calls the Correspondence School the weekend Doctor

1:00:50

every argument he said. I wanted to

1:00:52

let you know there is a way

1:00:55

to get your T O T P

1:00:57

tokens. Out of Last

1:00:59

Pass. Oh it's a little

1:01:01

Python script that rebuild the

1:01:03

Qr codes for you. It

1:01:06

also allows you to print them

1:01:08

off in case you didn't know

1:01:10

about the quote Steve Gibson all

1:01:12

slide back up and storage technique

1:01:14

which of course. Is. Bill.

1:01:17

Printing all if err. I have

1:01:19

printed out every Qr code for

1:01:21

every one of my one time

1:01:23

passwords and stable them together in

1:01:25

a suit and of and Air

1:01:27

in a drawer. And

1:01:29

it's come in handy a couple times.

1:01:31

your no I didn't have an what

1:01:33

what I what would I do your

1:01:35

due to to bring up a new

1:01:37

device. So anyway just wrote later to

1:01:39

say I didn't write this. I didn't

1:01:41

mean to say that I wrote this

1:01:43

anyway I got a link to it.

1:01:45

It is is is if you just

1:01:47

it's own did hub if you search

1:01:49

for last pass authenticator exports. You'll.

1:01:52

Find it. Ah, I checked it out

1:01:54

and it looks nifty. is

1:01:58

a does his own allows you to regenerate

1:02:01

your original QR codes

1:02:03

which you may have

1:02:05

fed to LastPass and

1:02:07

if so display

1:02:09

them, capture them by

1:02:11

a device that may be starved for them

1:02:14

or print them out. So anyway just a

1:02:16

cool note I wanted to make sure that

1:02:18

our listeners knew that was available. Thank you

1:02:20

Jeff. Brentie

1:02:23

said, RE, oddly

1:02:26

inflated app data. He

1:02:28

said if you look in

1:02:30

iPad or our iOS settings

1:02:33

general iPhone, iPad storage, wait

1:02:36

for the list to load and then select an

1:02:38

app you'll see that the

1:02:40

size of the app itself is

1:02:42

listed separately from its documents and

1:02:44

data. He said, and this

1:02:47

is referring to a question that came

1:02:49

up last week, he said when trying

1:02:51

to free up some storage space previously

1:02:53

I found a few apps whose documents

1:02:55

and data appeared to be

1:02:58

way more than seemed reasonable. Remember

1:03:00

it was that some

1:03:03

credit, credit karma was occupying

1:03:05

a gig of

1:03:08

space in some guy's phone and he's

1:03:10

like, what? So Brentie says

1:03:12

that he deleted

1:03:17

the app, reinstalled it

1:03:19

and it was and it was now at

1:03:22

one tenth of the size it had been

1:03:24

previously. And you know he

1:03:26

said so my theory is that

1:03:28

some maybe many, maybe

1:03:30

most have logging, caching and likely

1:03:33

other unnecessary stale data that builds

1:03:35

up over time which they simply

1:03:37

don't bother to clean up on

1:03:40

their own. So yes deleting

1:03:42

and reinstalling you know

1:03:45

will likely save you a lot of space. Of

1:03:47

course I've always found the same is true with

1:03:49

setting up a new version of Windows. He's like,

1:03:51

oh well let's just start over again. Someone

1:03:55

whose handle is mental

1:03:57

calm today, he says The.

1:04:00

Greeting. Steve long time Sn

1:04:02

students. Put. Club member spinner

1:04:05

I use or yes he says

1:04:07

so excited that you have Six

1:04:09

Point one ready for prime time.

1:04:11

I'm reaching out to say thanks

1:04:13

for your mention of Learn D

1:04:15

Mark yesterday so he was tweeting

1:04:17

on Wednesday he said is really

1:04:19

helpful. Ari. A confusing

1:04:22

protocol s so I'm a decision

1:04:24

to serves as a reminder to

1:04:26

me to mention sped Learn D

1:04:28

Mark website that we mentioned: A

1:04:30

Nest L E A R N

1:04:32

D M A R C. Dot

1:04:34

Com. We. Measured and

1:04:37

took a look at last week,

1:04:39

it was a huge hit among

1:04:41

our listeners. From all the feedback

1:04:43

that I've seen, one person says

1:04:45

that the site was off line

1:04:47

and suggested maybe that it was

1:04:49

because we mentioned it. Well, That's.

1:04:51

Would be flattering accepted the nature

1:04:54

of a podcast is it these

1:04:56

the listening as well distributed in

1:04:58

time so it's not like a

1:05:00

to ago a purely live event

1:05:02

work. in all we bring website

1:05:04

down by talking about it but

1:05:07

it all of. And

1:05:09

I guess what if you if we used

1:05:11

to do that on a bad back in

1:05:13

the tech air date on he has a

1:05:15

hold of/starting a site as is his last.

1:05:17

Right Right, Right. Right. Hour. Hour and a

1:05:19

while. Since. We've done that in

1:05:21

red Eye, more robots and frankly

1:05:23

having downloads distributed as a good

1:05:25

thing because his job is is

1:05:27

better for everybody. Ron tweeted hi

1:05:29

Steve this is in regards to

1:05:31

sink I message them after your

1:05:33

item on security now us and

1:05:35

this is what I received. He.

1:05:38

Said be and then he quoted

1:05:40

me what sink responded saying hi

1:05:42

there Rod Old Bailey from Sink

1:05:44

here. Thanks. for reaching

1:05:46

out there was a bug identified

1:05:48

with in the sink mobile app

1:05:51

regarding the i was files app

1:05:53

integration which prevented folks from navigating

1:05:55

within the sink folders files and

1:05:57

vault via the app the files

1:05:59

app Users were still able

1:06:01

to navigate within the Sync mobile app.

1:06:04

This files app integration bug has now

1:06:06

been resolved. There's a link to it.

1:06:08

Let us know if you have any

1:06:10

suggestions, any further suggestions.

1:06:12

Thanks again, writes Bailey from Sync. So

1:06:15

anyway, just a follow up to

1:06:18

that previous listener who

1:06:21

was feeling a little despondent because

1:06:23

the reply he got from Sync

1:06:25

suggested that, well, yeah, so

1:06:29

don't do that. You know, we'll

1:06:31

get around to it someday. You

1:06:34

know, that put us all off of Sync a

1:06:36

little bit. It was like, what? But apparently that

1:06:38

was a red herring. Sync

1:06:41

did get on it quickly and fixed it

1:06:43

and it's back up and running. So thank

1:06:45

you, everybody. Jonathan

1:06:48

Rouse said, hello, Mr.

1:06:50

Gibson, exclamation point. Firstly,

1:06:53

you have been a role model for me all

1:06:56

throughout high school, college, and now

1:06:58

as I redirect my career into

1:07:00

education. Nice. Thank you for the

1:07:02

hours of laughs and education, as

1:07:05

well as Leo and the rest

1:07:07

of the twit team. I

1:07:09

figured you might want to see the response

1:07:12

Windows Defender gave, and then

1:07:14

he cites the version of

1:07:16

Windows Defender, when downloading the

1:07:19

Spinrite 6.1 prerelease. After

1:07:22

manually allowing the program, it went along

1:07:24

perfectly in creating a USB

1:07:26

boot drive, but regardless, I wanted

1:07:29

to show you what I encountered.

1:07:31

I'm hoping the new and improved

1:07:33

ISO created will work with Ventoy

1:07:35

bootable drives as well, and I

1:07:38

can't wait to try it out. Thanks

1:07:40

again for all the years of dedication, and

1:07:42

I hope to be half the teacher you

1:07:44

seem to be in your sleep. So

1:07:47

first of all, Jonathan. You're not sleeping. I want to

1:07:49

point out. I can only say, and I

1:07:52

know that you, Leo, feel similarly, that

1:07:54

I am so pleased that this podcast

1:07:57

and twit have been so useful to

1:07:59

you. You bet. You bet. Yeah. The

1:08:02

good news is that since you're just starting

1:08:04

out, you have a lifetime

1:08:06

of teaching ahead of you. So

1:08:09

I do wish you all the best as you

1:08:11

launch into your career. As

1:08:13

for Windows Defender's reactions to Spinrite,

1:08:16

yes, it continues to be an

1:08:18

annoyance, but I

1:08:20

noted that he sent his tweet last

1:08:22

Tuesday and things may have become better

1:08:24

since. Most recent

1:08:27

experimentation suggests that Windows Defender

1:08:29

is happier. And as

1:08:31

for Ventoy, you will likely

1:08:33

have discovered that Spinrite 6.1 and

1:08:36

Ventoy are not getting along currently, but

1:08:38

that will be resolved shortly. I'll have

1:08:40

more to say about Ventoy in a

1:08:42

minute when I update everybody about Spinrite.

1:08:44

Yeah, huge fan of Ventoy. I really

1:08:46

like that. I use it all the

1:08:48

time. Thank you. Good. Good. Very

1:08:50

nice. Yeah.

1:08:53

Another Thomas is his

1:08:55

handle. He said at

1:08:58

SGGRC about cryptosigning

1:09:00

camera. He said, it

1:09:02

can work if the private

1:09:04

key is in a removable

1:09:06

HSM assigned to the photographer.

1:09:10

He slash, or she slash he

1:09:12

will then be able to prove

1:09:14

that she slash he is the

1:09:16

author. Now, okay,

1:09:19

that is some nice thinking outside the

1:09:21

box, or in this case, outside the

1:09:23

camera. If

1:09:26

this were done, it would

1:09:28

make the private key about

1:09:31

the owner of

1:09:33

the key not about

1:09:35

the camera. Right. And

1:09:37

the key is presumably more easily

1:09:39

protected by them than having the

1:09:41

key locked inside the camera. You

1:09:44

know, you still have to protect the

1:09:46

key, but owners would have the incentive

1:09:48

to do that since their photographic reputation

1:09:50

is on the line. So

1:09:53

Anyway, I haven't heard anyone talk about

1:09:55

that. I Think that's a very neat

1:09:57

idea. It's not the problem that they're

1:09:59

trying to solve. the other trying to

1:10:01

solve the problem of are sent to

1:10:03

abby of the as the photo. Andrew

1:10:06

and I just I ever been

1:10:08

playing with his. Contents.

1:10:11

That. You call it what is it was name for

1:10:13

it. Can. Try said at the

1:10:15

content production. Yeah stuff. Yeah and I

1:10:18

have a turned on on my camera

1:10:20

right now. And

1:10:22

eight associates the serial number I guess

1:10:24

with the name i don't you know

1:10:27

it. Now you can remove it. You

1:10:29

absolutely can remove it because you can

1:10:31

remove any excess information. In

1:10:33

a photo. By

1:10:35

just j pegging it and you know same. Don't

1:10:37

save the Ecb. There's lots of ways to strip

1:10:40

off excess, but I guess the point is. That.

1:10:43

This is gonna be used by news organizations

1:10:45

where they though they can. They. Aren't

1:10:47

going remove it and they can provable probably

1:10:49

say this is created by the Scott Camera.

1:10:52

At this time and that can't be

1:10:54

can be modified sir. right? I

1:10:57

you know if I had my ideas that this is

1:10:59

this photo is not a fake. Is

1:11:01

if you know. and here's a chain of

1:11:03

custody. it even shows. And this information. you

1:11:05

know how I edited it. And

1:11:07

and so forth. Know what? What? Program

1:11:09

was used as I think it shows that. Somewhere

1:11:11

maybe not on this. One, But it does

1:11:13

that. I know that the I know that

1:11:16

the as if you're using Adobe's tools yeah

1:11:18

of which are the only ones that are

1:11:20

authorized do This guy does absolutely. Ah

1:11:22

you know create basically as a

1:11:25

as a chain of custody throughout

1:11:27

he editing yes yes and and

1:11:29

and you make really good point

1:11:31

because it's. If.

1:11:34

It's not trying to authenticate

1:11:36

the reputation. Of the

1:11:39

not as not tried to

1:11:41

authenticate the reputation of the

1:11:43

person who took the picture.

1:11:45

Your is it The reputation

1:11:47

is assumed like you know

1:11:49

it as a job, as

1:11:51

a as an accredited. Oh.

1:11:54

Well, no news agency. Which brings

1:11:56

us to the next question. The

1:11:58

Dell Anderson Nasty. The Grateful:

1:12:00

you're going past Nine Nine Nine

1:12:03

can't help but ask a basic

1:12:05

question about digital camera authentication. What

1:12:07

would prevent a very low tech

1:12:10

work around? Where. The digital

1:12:12

camera light the nikon

1:12:14

like, etc takes a

1:12:16

perfectly authenticated photograph. Of.

1:12:18

A digitally manipulated him.

1:12:21

it. Ah. The. Excellent

1:12:24

point and analog look at all. Yep,

1:12:27

How would this fancy Nikon camera

1:12:29

know what it was photographing a

1:12:31

high resolution to d image or

1:12:33

rather than reality? Yup, And

1:12:36

so I replied to Dell that I

1:12:38

had the same thought as I imagine

1:12:41

many of us have. The problem is

1:12:43

that the authentication. And

1:12:45

I have that in quotes

1:12:47

does not and cannot it

1:12:49

stand out to the actual

1:12:52

landscape or subject that's being

1:12:54

photographed. Designing. Technologies

1:12:56

intended to prevent the

1:12:59

manipulation of it images

1:13:01

Digital recording after. It's.

1:13:03

Been captured optically. But.

1:13:06

This. Bill. But doesn't this

1:13:08

big? the question? What's to prevent

1:13:10

someone from presenting a fake seen

1:13:12

to the camera to capture and

1:13:14

then sign? The. Now I

1:13:16

understand that this is a

1:13:19

different problem. This is not

1:13:21

the problem this camera was

1:13:24

designed to prevent. This camera

1:13:26

was designed to prevent undetected

1:13:28

post image capture manipulation. And

1:13:31

what it was designed to prevent is

1:13:33

a significant problem. Know so

1:13:35

it away. I think that you

1:13:38

know. What we

1:13:40

have to keep in mind is the

1:13:42

threat model. And. What

1:13:44

it is we're trying to say

1:13:46

we're. Are. The able to say

1:13:48

it all Leo's you instantly got.

1:13:51

Were. Unable to say. That. what

1:13:53

they hope that the seen that the camera

1:13:55

took a picture of was authentic what we

1:13:58

are able to say is to the best

1:14:00

of our ability after the

1:14:02

camera took the picture, we know

1:14:04

exactly what was done to

1:14:08

it in a verifiable fashion. So

1:14:10

again, and what's

1:14:12

cool about this is we talk about

1:14:14

threat models and what we can and

1:14:16

cannot assert in

1:14:19

the realm of security. So here's a

1:14:22

perfect example of what we can and

1:14:24

cannot assert and what we can and

1:14:26

cannot protect. Which

1:14:29

by the way, and I want to thank you,

1:14:31

gave me an excuse to buy a new camera.

1:14:33

So I appreciate that, Steve. Oh Leo, for that

1:14:35

research, you had to have that. I had to

1:14:37

do it. Absolutely. Exactly. And

1:14:40

if the IRS ever audits you and

1:14:42

says, I'll give them this, give

1:14:44

them, give you exactly if you don't,

1:14:46

absolutely important that you were able to

1:14:49

demonstrate that. Slardy

1:14:52

Bartfest. I love the name. You

1:14:54

know where that's from. We know where it came

1:14:56

from. Yeah, yeah, yeah. Right. I

1:14:59

wonder if Google needs native iOS engine

1:15:01

to make the new

1:15:03

ad auction stuff work. And

1:15:06

the answer is absolutely and

1:15:08

without question. The

1:15:11

entire Privacy Sandbox API

1:15:13

is a collection of new

1:15:16

web browser features intrinsic

1:15:18

to the web

1:15:20

browser that requires a bunch of

1:15:23

data storage locally. I'm

1:15:25

sure this is why

1:15:27

they've been working on

1:15:29

a native implementation for

1:15:31

iOS even though it isn't

1:15:33

clear to the outside world how they might

1:15:35

get it into iOS. There

1:15:39

is so much that we don't know yet about

1:15:42

how we're going to get to where we

1:15:44

are today. Google

1:15:49

wants to move the entire world

1:15:51

and moving the world is no

1:15:53

exaggeration. Given that

1:15:55

advertising supports the Internet, the

1:15:58

required size of this change

1:16:00

would be difficult to understate.

1:16:03

Like everything needs to

1:16:05

change. Google already has

1:16:07

control of nearly all desktops and

1:16:09

Android which are the majority of

1:16:12

smartphones. So I guess my questions

1:16:14

are, what are

1:16:16

Mozilla and Apple thinking about

1:16:18

this? You know, what conversations

1:16:21

may be going on among

1:16:23

them because this is

1:16:26

big stuff and actually this is the,

1:16:29

this is what we're gonna be talking about here as we

1:16:32

end today's podcast. Eon

1:16:35

tweeted and I know what his

1:16:37

first name is, it's not actually

1:16:39

Eon, he said, Steven, I'm

1:16:42

personally inviting you to

1:16:45

the gathering of the Stevens.

1:16:49

Note how it's written. I love it.

1:16:51

Yes. It's PHV.

1:16:53

He said next year in 2025 we're going to set a

1:16:55

Guinness World Record for the

1:17:05

most people named Steven in

1:17:08

one area. First

1:17:10

goal, gather the Stevens in this

1:17:13

discord and he provided a link.

1:17:15

Next goal, conquer the world.

1:17:18

He said, you

1:17:20

down? You down.

1:17:23

I thanked Eon, whose first name

1:17:25

is presumably Steven, for

1:17:27

thinking of me, but I explained

1:17:29

that I was pretty sure that

1:17:31

traveling to a massive meeting of

1:17:34

meeting of people with

1:17:36

whom I phonetically share a first

1:17:38

name for the sake of contributing

1:17:41

with my presence to the setting of

1:17:43

a Guinness Book Record is not

1:17:45

something that when the time was approaching I

1:17:48

would be glad I was taking the time to do.

1:17:50

But I told him

1:17:52

that I looked forward to hearing

1:17:54

more about how it goes even

1:17:57

in absentia. So thank you, Steven.

1:18:00

We're having fun creating the

1:18:03

regular expression for Steven with

1:18:05

a pH or of the

1:18:07

discord. I think

1:18:09

we got it actually. Curly

1:18:12

braces and then a couple brackets

1:18:14

and an or. Okay,

1:18:21

so we've all seen video segments of

1:18:24

complex manufacturing facilities where

1:18:26

thousands, if not hundreds

1:18:28

of thousands of cans

1:18:31

or something, bottles or boxes

1:18:34

or whatever, are moving

1:18:36

through a complex system that's

1:18:38

sorting and spinning and stamping

1:18:40

and printing or counting or

1:18:43

whatever it's doing. Like

1:18:45

these crazy looking manufacturing facilities,

1:18:51

treadmills and gates

1:18:53

opening and closing, routing stuff. I love that

1:18:55

stuff. It's one of the things I love

1:18:58

on TikTok is there's a bunch of TikTok

1:19:00

videos of how stuff's made. It's

1:19:02

always fascinating. Oh, very cool. Yeah. So

1:19:07

just as some of

1:19:09

those pre-electronics early

1:19:11

computers used banks

1:19:14

of mechanical relays, back

1:19:17

before the advent of computers, process

1:19:19

control engineers, as they're

1:19:22

called, would design insanely

1:19:24

complex control systems built

1:19:27

up from individual mechanical

1:19:29

relays. We would

1:19:31

call such a system discrete

1:19:34

as opposed to integrated. Then

1:19:37

blessedly, integrated electronic

1:19:40

solutions became cost effective

1:19:43

and these large process

1:19:45

control solutions were replaced

1:19:47

by PLC systems, Programmable

1:19:50

Logic Controllers. These

1:19:52

PLCs were not very smart because they

1:19:54

didn't need to be. Basically, they were

1:19:56

replacing a bunch of relays. They

1:19:59

were essentially if A then

1:20:01

B wait until

1:20:03

C then do D

1:20:06

and once E go back to the

1:20:08

start but being

1:20:11

solid state they were at

1:20:13

least more reliable. Now

1:20:16

remember that we have the term of

1:20:19

a hardware or software bug

1:20:22

because back in 1947 a dead moth you know

1:20:26

a bug was found to

1:20:29

be the underlying cause of

1:20:31

Harvard's mark 2 relay

1:20:33

computer not working correctly.

1:20:36

Anyway you know relays are

1:20:39

not as reliable as solid state

1:20:41

because you know they can actually

1:20:43

have bugs. Anyway we

1:20:45

talked about these PLCs on

1:20:49

this podcast multiple times because attaching

1:20:51

them to the internet has turned

1:20:53

out to be a generally

1:20:56

really bad idea. They

1:20:58

were never designed for that and it

1:21:00

hasn't been turning out well. I'm

1:21:03

bringing all this up today because

1:21:05

I received a long insightful and

1:21:08

interesting direct message from

1:21:10

a listener whose thoughts about the problems

1:21:13

with PLCs are worth sharing. Here's

1:21:15

what Dylan wrote. He

1:21:18

said good day. I'm

1:21:20

an engineer and occasionally work

1:21:23

with programmable logic controllers and

1:21:25

I have some thoughts on why

1:21:28

these sadly make the news in

1:21:30

a bad way sometimes. I

1:21:32

believe most of the problems boil

1:21:34

down to two root causes. Number

1:21:37

one increased demand

1:21:40

for real-time data.

1:21:44

Just like the CAN bus

1:21:46

protocol in the automotive industry

1:21:49

PLCs were invented and took

1:21:51

hold in manufacturing when security

1:21:53

was not a concern. As

1:21:56

time went on protocols were

1:21:58

developed to have PLCs talk

1:22:00

to each other and to

1:22:02

advanced peripherals like motor controllers,

1:22:05

touch screens, printers, or even

1:22:07

SCADA, Supervisory Control

1:22:09

and Data Acquisition Computers. I

1:22:12

believe the demand for telemetry

1:22:15

and data aggregation is the

1:22:18

real reason most PLCs

1:22:20

get exposed not

1:22:22

because remote WAN side

1:22:24

control is needed or

1:22:27

used. I have experienced

1:22:29

this. Management

1:22:32

wants to know how many

1:22:34

widgets were produced, how

1:22:36

fast they were produced, how

1:22:39

many past QC, was

1:22:41

there downtime, was it planned,

1:22:44

are there idle shift hours, is

1:22:46

one shift of operators more efficient

1:22:48

than another, and on and on

1:22:50

and on. He

1:22:52

says, I don't need or want

1:22:55

to remotely access a PLC in

1:22:57

a machine to change

1:22:59

anything about it. It

1:23:01

has done the same job over

1:23:04

and over and over correctly

1:23:06

for a decade. But

1:23:08

the data the PLC can store

1:23:11

and transmit is the reason it's

1:23:13

connected to a network and pulled

1:23:15

every 15 minutes for new

1:23:17

numbers. To satisfy

1:23:20

this need, PLC manufacturers

1:23:22

are building in web

1:23:24

servers, SQL light

1:23:26

databases, TCP IP

1:23:29

stacks, and a lot of

1:23:31

things that have no business

1:23:33

being attached to a device

1:23:35

based on 1960s technology that

1:23:38

has no provision for

1:23:40

security. Again, going

1:23:43

back to the automotive comparison,

1:23:45

the inventors of CAN bus

1:23:48

at Robert Bosch Company

1:23:50

could not have imagined cars

1:23:53

would be driving down the

1:23:55

road with IP addresses connected

1:23:57

to a global network all

1:23:59

the time. time and would

1:24:01

have security flaws that let

1:24:04

anyone observe and change can

1:24:06

bus communications inside the vehicle.

1:24:11

And then he says number two, security

1:24:14

conscious staff are

1:24:16

not involved with PLCs. Even

1:24:19

though many consider PLCs to be outdated,

1:24:22

at the end of

1:24:24

the day they are exactly like

1:24:26

an Arduino or similar microcontroller. They

1:24:29

store a program that is executed in

1:24:31

a loop at high speed

1:24:33

and the code is evaluated

1:24:35

every scan through the ladder

1:24:37

logic. And just a

1:24:40

quick plug, they do

1:24:42

this for decades in terrible

1:24:44

environments with noisy electrical signals

1:24:47

and with fantastic circuit protections.

1:24:50

Reverse the polarity on your Arduino

1:24:52

and you're going to Amazon to

1:24:55

shop for another one. Reverse

1:24:58

the polarity on a PLC, not

1:25:00

a darn thing happens. You'll realize

1:25:02

you made a stupid mistake, flip

1:25:04

the polarity back and everything works.

1:25:07

Anyway, he says, the people

1:25:09

who program these are aging

1:25:11

out and I

1:25:14

suspect globally fewer people know

1:25:16

how to program ladder logic

1:25:18

than did twenty years

1:25:20

ago. I'm thirty-six and

1:25:22

I learned to program them fifteen

1:25:24

years ago, but it seems

1:25:27

I'm in the minority in my age

1:25:29

group amongst peers in my industry. My

1:25:32

observation is this, IT

1:25:34

people don't understand or

1:25:36

want to understand PLCs

1:25:39

and PLC programmers have no

1:25:42

incentive or instruction to make

1:25:44

the devices secure. IT

1:25:47

staff doesn't consult with the programmers

1:25:49

to tell them what security practices

1:25:51

they should follow or review the

1:25:54

final configuration of the PLC. Conversely,

1:25:57

the programmer just needs the

1:25:59

machine. to work. And they're

1:26:02

probably fighting numerous mechanical, electrical,

1:26:04

and pneumatic problems while

1:26:06

completing the programming and ... Those pneumatic

1:26:08

problems, yeah. Yeah, we had a pneumatic

1:26:10

problem. That's why I didn't get the

1:26:13

code. Do not underestimate those. They can

1:26:15

be a nightmare. You

1:26:17

do not want a problem with your air pressure.

1:26:21

No. Any extra changes could break

1:26:23

the house of cards they've been

1:26:26

building. Everything seems

1:26:28

to be working, but all that

1:26:30

remains is a communication problem. Some

1:26:33

PLCs have manuals 700 to 1,000 pages

1:26:36

long, and various communication features are scattered

1:26:42

throughout the PDF. No

1:26:44

organization there. An

1:26:46

inexperienced programmer engineer who's under

1:26:49

pressure to compete

1:26:52

the already late project

1:26:54

might just start turning

1:26:56

everything on, even if

1:26:58

they don't know what it is or what

1:27:00

the risks are. Require

1:27:03

authentication? Nah. Uncheck

1:27:06

that box. That could

1:27:08

be the problem. Max

1:27:10

number of connections equal one? Well,

1:27:12

I don't know what counts and

1:27:15

what doesn't, so let's just set it to 10. Set

1:27:19

admin password? Better make

1:27:21

sure that's blank or default. Don't

1:27:25

want to keep something from connecting. Oh,

1:27:27

and don't change the port number. That

1:27:29

other device over there might be assuming

1:27:31

the default port is used, and we

1:27:33

don't want to break something that works

1:27:35

now and lose ground. He

1:27:38

says, honestly, I don't

1:27:40

even think we ever are going

1:27:42

to fix this. Either industries

1:27:44

will eventually move to more

1:27:47

advanced systems, which is already

1:27:49

happening in some cases, like

1:27:51

PC-based control with National Instruments

1:27:54

LabView or their competitors, or

1:27:57

existing older PLCs just need to

1:27:59

be caged. kept in a DMZ

1:28:01

or well guarded network segment.

1:28:04

The trouble is, when things aren't

1:28:06

broke, they don't get fixed. So

1:28:09

already exposed or at risk PLCs

1:28:11

are just going to be sitting

1:28:13

there, connected to networks to harvest

1:28:15

data, waiting to be leveraged for

1:28:18

a tax. And these

1:28:20

are the things that keep massive swaths

1:28:22

of our public utilities functioning. So

1:28:26

Dylan, I think you got all

1:28:28

of that exactly right. And

1:28:31

I've said it before, I'm sure this won't

1:28:33

be the last time I say it, this

1:28:35

podcast has amazing listeners. No kidding. So thank

1:28:37

you Dylan. There's something cool about PLCs. Is

1:28:41

it kind of writing in assembly language to write

1:28:43

to one? Yeah, it's

1:28:45

a very low level tree logic.

1:28:49

So it's literally if A then

1:28:51

B, if not or

1:28:53

wait this long then trigger this.

1:28:55

I mean it is the thing

1:28:57

that moves the arms back and

1:29:00

forth in those assembly

1:29:02

lines. I'm sure there are high level

1:29:04

interfaces though to see or you

1:29:06

know, fourth was originally designed to do that,

1:29:09

to program those things. Well

1:29:11

fourth was designed to aim a radio

1:29:14

telescope. That's right. Yeah.

1:29:17

And I imagine the aiming mechanism

1:29:19

was something like a PLC. It

1:29:21

was definitely turn motor on, wait

1:29:23

till star moves to center, turn

1:29:26

motor off. Yeah, Charles Moore. Yeah.

1:29:29

Yep. I love this stuff. There's

1:29:31

something cool about putting your code in

1:29:34

a hardware device. Well

1:29:36

Leo, it's a robot. Robots

1:29:38

are cool. Very cool. So

1:29:40

it's cool about, I mean like

1:29:43

the way to motivate grade schoolers

1:29:45

is... Robots. Remember,

1:29:47

logo was the original... Yeah, little

1:29:50

turtle logic. Yeah. Exactly.

1:29:54

Yeah. And of course start is a great

1:29:56

way for high school students to get into robotics, the

1:29:58

start competition. Yeah, you're right. That's

1:30:01

cool. I think the idea and and

1:30:03

I think also that's where What

1:30:06

is that? World that you

1:30:08

create a Lego block thing. Yeah,

1:30:10

Roblox. Yeah Roblox They're absolutely learning

1:30:12

that kind of logic in Roblox.

1:30:14

Yeah, exactly what they're learning. Yeah

1:30:17

Man, I wish I you know, I would wish

1:30:20

I had another 50 or 60 years. I'd like to really

1:30:22

get into some of this stuff Very

1:30:24

cool. Okay. Well lastly just quickly

1:30:27

on the spin right front Last

1:30:29

week. I Rerote GRC's

1:30:31

code signing system my

1:30:34

original. I just rewrote it in a

1:30:36

week. No bigs Well, I knew

1:30:39

how it worked by then it took me a month

1:30:41

to get it working the first time But yeah, I

1:30:43

did rewrite it because it the

1:30:46

way I had done it which was To

1:30:49

build the code signing into GRC's

1:30:51

server code had not proven to

1:30:53

be 100% reliable and It

1:30:57

needs to be it turned out that when

1:30:59

I was restarting the server The

1:31:02

code signing system did not like that

1:31:04

restart. So that was a problem anyway

1:31:06

So I redesigned the system under

1:31:09

a client server model where we

1:31:11

now have code signing as a

1:31:13

service The code signing

1:31:15

service runs in the background with the

1:31:18

web server being the services client sending

1:31:20

it files to be signed So

1:31:23

and so far I'm feeling really good about

1:31:26

it. It came up It

1:31:28

worked the first time and it has

1:31:30

been flawless ever since it has never

1:31:32

stumbled or had a problem So this

1:31:34

feels like exactly the right solution Oh

1:31:36

and in the process I was able

1:31:38

to switch the signing from using an

1:31:40

sha1 over to sha256 So

1:31:44

that feels better too now Spin

1:31:47

rights paint continues to dry nicely

1:31:50

One popular tool Which

1:31:53

I think is the right way to put it

1:31:55

popular tool for for carrying

1:31:57

around and booting ISO in image

1:32:00

files is something called

1:32:02

Ventoy, which Leo you obviously are

1:32:04

a fan of. When

1:32:07

I initially heard someone report that Spinrite

1:32:10

6's ISO Spinrite 6.0's ISO files worked

1:32:16

fine with Ventoy, but

1:32:18

the various pre-releases of

1:32:20

Spinrite 6.1 did not,

1:32:23

I planned to eventually get around to looking into

1:32:25

what was going on with that. That's

1:32:27

the sort of thing one does while the

1:32:30

paint is drying. So once

1:32:32

I got the signing system redesigned

1:32:35

and apparently finally working perfectly, I

1:32:37

took a look at Ventoy, which

1:32:39

I've never used since I don't

1:32:41

do a lot of portable ISO

1:32:43

image booting. Yeah, it's widely used

1:32:45

for things like having 20 Linux

1:32:47

distros on a single USB key.

1:32:50

Which you are welcome to. Well,

1:32:54

here's a good example. I would love

1:32:56

that Spinrite plus the Windows installer on

1:32:59

a single USB key and be able

1:33:01

to switch between the two, right? So

1:33:03

I brought myself up to speed

1:33:06

on Sunday. It is a

1:33:08

very slick open source project and

1:33:10

tool. It's installed

1:33:12

onto a USB thumb drive,

1:33:14

then you simply drop ISO

1:33:16

files into its directory. When

1:33:19

that drive is then booted, it presents

1:33:21

a list of the ISO files it

1:33:23

found and allows its user to select

1:33:25

any of them to be booted. So

1:33:29

I certainly understand its appeal for

1:33:31

anyone who wants to carry a

1:33:34

toolkit around on a thumb drive. Okay,

1:33:37

anyway, it turns out that

1:33:40

the DOS environment Ventoy

1:33:42

creates does not have

1:33:45

or the PC machine environment

1:33:49

that DOS boots into

1:33:53

doesn't have the HMA. That's

1:33:56

the high memory area. Now,

1:33:59

okay. The high memory area is

1:34:02

one of the cleverest hacks ever invented.

1:34:05

Underscore hack, however. It

1:34:07

is a hack. It

1:34:10

is a 64K memory

1:34:12

segment that starts at

1:34:16

FFFF, the

1:34:18

last 16-byte paragraph

1:34:21

of the machine's first 1

1:34:23

megabyte of RAM. Its

1:34:27

memory in a segmented memory

1:34:29

model is referenced by a

1:34:31

positive offset from the start

1:34:33

of a segment. Starting

1:34:36

a segment at FFFF

1:34:39

allows for accessing 64K

1:34:44

minus 16 bytes past

1:34:47

the 1 megabyte point. In

1:34:50

other words, this allowed PCs

1:34:53

still running in real mode to

1:34:55

access an additional 64K of RAM.

1:35:00

When they were only supposed to

1:35:02

be able to access a megabyte,

1:35:04

it's actually a megabyte plus 64K

1:35:06

minus 16 bytes. Anyway,

1:35:09

it is a neat hack that the

1:35:11

PC industry came up with and adopted

1:35:13

in the later years of DOS and

1:35:15

all recent DOS's have been able to

1:35:18

load themselves and their buffers into

1:35:20

that region in order to

1:35:22

leave more conventional memory available for their programs

1:35:24

to run. Since

1:35:27

the DOS execution environment created

1:35:29

by Ventoy does not provide

1:35:31

that, it forces

1:35:33

DOS to load low. It

1:35:36

turns out that there is just

1:35:39

barely insufficient RAM

1:35:41

left over for

1:35:44

Spinrite 6.1 to run. I

1:35:49

mean just barely. It

1:35:51

turns out that the slightly

1:35:53

smaller size of an unsigned

1:35:56

version of Spinrite, which is

1:35:58

a few Ks. smaller

1:36:01

does run. You know as

1:36:04

easily does the much smaller

1:36:06

DOS only Spinrite executable. So

1:36:09

after today's podcast I'm

1:36:12

going to tweak the Windows component

1:36:14

of Spinrite which is why we

1:36:16

let paint dry just

1:36:18

a bit so that

1:36:20

the bootable ISO image it

1:36:23

builds will contain

1:36:25

Spinrite's 81K DOS executable rather

1:36:30

than the full 250K

1:36:33

hybrid DOS and Windows

1:36:36

executable. That smaller Spinrite

1:36:38

for DOS should then run without

1:36:40

any trouble under Ventoy and a

1:36:43

bootable ISO has no need for

1:36:45

the full larger Windows version anyway.

1:36:47

In the meantime

1:36:51

nothing new not one new

1:36:54

bug has appeared in the last

1:36:56

several weeks despite the fact that

1:36:58

more than a thousand people now

1:37:00

have downloaded and have been using

1:37:02

the pre-release this release candidate 6

1:37:06

of 6.1. So I'm going to

1:37:08

continue to let us paint dry

1:37:10

while I work to get this

1:37:12

new Spinrite documented online then on

1:37:14

bringing up GRC's email system and

1:37:17

at that point we'll start letting

1:37:19

everyone know that it

1:37:21

is ready for prime time. Very good.

1:37:23

How exciting. That is

1:37:25

very exciting and

1:37:28

Leo let's tell our listeners about the

1:37:30

advertiser they're excited to hear about. I

1:37:32

will. Then we're

1:37:35

going to do

1:37:38

something exciting and fun. Look at something

1:37:41

very disturbing. Oh well

1:37:44

you want something disturbing I got a real

1:37:46

story just came in 3 million malware

1:37:49

infected smart toothbrushes have

1:37:53

been using Swiss D-Dos

1:37:55

attacks. These toothbrushes I

1:37:57

have one at home have brand

1:37:59

new. They have a

1:38:02

processor and apparently they're

1:38:04

hackable and have been enslaved.

1:38:06

That's a little bit of an inappropriate

1:38:10

word, into botnets, inscripted.

1:38:12

How about that? Into botnets and

1:38:15

used in DDoS attacks. Can

1:38:18

you believe that? This

1:38:20

is from Tom's Hardware. Thank you,

1:38:22

Tom's Hardware, for that dystopian vision.

1:38:24

You might want to secure your toothbrush. I

1:38:27

don't know how you would do that. You

1:38:31

can't think... I guess they're online. They're

1:38:33

online. I don't know what you can do to... You

1:38:36

know? And

1:38:38

I also want to plug, before we get into the ad,

1:38:40

I want to mention ClubTwit. One

1:38:43

of your correspondents there mentioned that he was a

1:38:46

club member. I'm hoping people are saying, well, what is

1:38:48

that? Well, it is how we

1:38:50

are supporting this effort going forward. Steve says we're

1:38:52

going past $9.99. We're

1:38:55

maybe a little less buoyant

1:38:58

about the prospect. We've

1:39:01

decided that in order to really keep this thing

1:39:03

going, and we really, really want to keep it

1:39:05

going, we need to get you

1:39:07

involved, our listeners. I always had that as the

1:39:09

vision. I always really wanted this

1:39:11

to be ad... not

1:39:14

ad supported, but listener supported. And

1:39:18

the nice thing about having ad support was we can

1:39:20

make it available for free, and we will. We

1:39:22

will continue to do so. Most of the people can't afford it.

1:39:24

But if you can, $7 a month

1:39:27

gets you ad-free versions of all of our shows.

1:39:30

It gets you access to special shows

1:39:32

we don't put out anywhere else,

1:39:34

like Scott Wilkinson's home

1:39:37

theater geeks. iOS Today

1:39:39

is now inside the club. The

1:39:43

Untitled Linux show, hands on Mac, hands on Windows.

1:39:46

A lot of great content. Plus,

1:39:49

you also get access to one of the

1:39:51

best communities ever, which is our ClubTwit Discord.

1:39:53

Everybody who's there paid at least $7 a month

1:39:55

to be there. You'd be amazed

1:39:58

at how that improves the... level of

1:40:01

discourse, you know, eliminates trolling.

1:40:04

People are great, they're nice, they're smart,

1:40:06

we have wonderful conversations. If

1:40:08

you're interested and you'd like to keep this show going

1:40:11

and all of our shows going, we would love you

1:40:13

to be part of the club. All

1:40:16

you have to, in fact, if we just get, if

1:40:18

today we're at 10,922 paid members, all we need is 78 more members

1:40:20

right now. If we can cross that

1:40:26

11,000 mark right now, that

1:40:28

would make me feel pretty darn

1:40:30

good. Visit twit.tv slash club twit

1:40:33

and join the fun. And

1:40:35

we thank you in advance for your support. I

1:40:37

should mention, of course, our sponsors are very much

1:40:40

a part of what we do still. We love

1:40:42

them. And our sponsor for this

1:40:44

segment of security now is Vanta. From

1:40:47

dozens of spreadsheets, yeah, people still

1:40:49

use spreadsheets, to

1:40:51

fragmented tools, to manual

1:40:54

security reviews. Managing

1:40:56

the requirements for modern compliance and

1:40:59

security programs is increasingly challenging. Are

1:41:01

you using a spreadsheet to keep

1:41:03

track? Oh, please. You

1:41:05

need Vanta, the leading trust

1:41:07

management platform. Vanta helps

1:41:10

you centralize your efforts to

1:41:12

establish trust and grow across

1:41:14

your organization. G2 says

1:41:16

Vanta is the best. They love Vanta. Year

1:41:19

after year they've loved Vanta. Here's

1:41:21

a example, just one of many

1:41:23

from G2, from a chief technology

1:41:25

officer. Quote, there is no doubt

1:41:27

about Vanta's effect on building trust

1:41:29

with our customers. As we

1:41:31

work more with Vanta, we

1:41:34

can provide more information to our current

1:41:36

and potential customers about how committed we

1:41:39

are to information security. And Vanta is

1:41:41

at the heart of it. Customers care.

1:41:43

They want to know that you're protecting

1:41:46

their data. Automated

1:41:48

data. That's a 90% of compliance. Strengthen

1:41:51

your security posture. Streamline

1:41:54

security reviews. And reduce third-party risk.

1:41:57

You don't want to say, hey, you see, You

1:42:00

see, we're very, you don't want to do that. You

1:42:02

need Vanta. Speaking of risk, oh,

1:42:05

here's one. SecurityNow listeners,

1:42:07

Vanta is offering you a free

1:42:09

risk assessment. All you have to

1:42:12

do is go to vanta.com/security now.

1:42:15

Generate a gap assessment of your

1:42:17

security and compliance posture, discover shadow

1:42:19

IT, and understand

1:42:21

the key action to de-risk

1:42:24

your organization. It's

1:42:26

all at vanta.com/security now. Get

1:42:28

that free risk assessment. You

1:42:31

need this, you want this, and you'll find out more

1:42:33

about Vanta too. vanta.com/security

1:42:36

now. And I

1:42:39

love their slogan, compliance

1:42:41

that doesn't sock too much. Vanta.

1:42:46

We thank them so much for their support. On

1:42:49

we go with the show and the scary

1:42:51

part is now. Okay. This is

1:42:54

for grownups, this part. Yes. So,

1:42:56

yeah. Everybody

1:42:59

knows how bullish

1:43:01

and excited I am about

1:43:03

Google's privacy sandbox. Yes. We

1:43:06

all know I'm a bit of a

1:43:08

fanboy for technology. And

1:43:10

this is a bunch of very

1:43:12

interesting new technology that solves some

1:43:14

very old problems. Google

1:43:17

clearly understands that their economic

1:43:19

model is endangered due

1:43:22

to the fundamental tension that exists

1:43:24

between advertisers, primarily themselves, who demand

1:43:26

to know everything possible about the

1:43:29

viewers of their ads and

1:43:31

those viewers, along with their governments,

1:43:34

who are becoming increasingly concerned about

1:43:36

privacy and anonymity. The

1:43:39

emergence of global privacy control

1:43:42

and the return of DNT,

1:43:44

do not track, has not

1:43:46

gone unnoticed by anyone whose

1:43:48

cash flow depends upon knowing

1:43:50

something about the visitors to

1:43:52

their websites. As

1:43:55

we've been covering this through the

1:43:57

years, we've watched Google iterate on

1:43:59

a Solution to this very

1:44:01

saw knee problem and I

1:44:03

believe though the final solution

1:44:05

was to transfer the entire

1:44:07

problem into the user's browser.

1:44:10

That. They found a solution that really

1:44:12

can work. And.

1:44:15

This is a huge but that

1:44:17

informs today's title topic. It.

1:44:19

Appears that the rest of the

1:44:21

world. Does not plan to

1:44:23

go down without a fight. Not.

1:44:26

Everyone is convinced. Apparently not everyone

1:44:28

believes that they're going to need

1:44:30

to follow Google and it turns

1:44:33

out that there is a workaround

1:44:35

that is not good. So.

1:44:38

A recent Financial Times headline

1:44:40

read. Amazon.

1:44:42

Strikes Add did data

1:44:45

deal with reach as

1:44:47

Google kills off cookies.

1:44:50

Which. Was followed by the sub head. Media.

1:44:52

Sector scrambles to deal with

1:44:55

fallout from Sees Out. Of

1:44:58

Cross website trackers. So.

1:45:01

A little bit of editing for as

1:45:03

the content for a listeners The Financial

1:45:05

Times writes. Tech giant

1:45:07

Amazon has struck a deal

1:45:09

with the U K's largest

1:45:11

publisher Reach to obtain a

1:45:14

customer data. To. Target

1:45:16

online advertising as the media

1:45:18

industry scrambles to respond to

1:45:20

Googles move to axe cookies.

1:45:24

And one of the first such

1:45:26

agreements in Europe, Amazon and Reach

1:45:28

unveiled a partnership on Monday designed

1:45:30

to compensate for the loss of

1:45:32

third party cookies that help gather

1:45:34

information about users by tracking their

1:45:36

activity across web sites to help

1:45:39

target advertising. Google said this month

1:45:41

that it has started to remove

1:45:43

cookies on it's Chrome browser, following

1:45:45

a similar move by Apple the

1:45:47

block them over Safari aiming to

1:45:49

switch off all third party cookies

1:45:51

by the end of the year.

1:45:54

Reach said it will

1:45:56

partner with Amazon on

1:45:58

sharing contextual. first party

1:46:01

data, for example, allowing advertisers

1:46:03

to know what articles people

1:46:05

are looking at with

1:46:07

the US tech group using the

1:46:09

information to sell more targeted advertising

1:46:12

on the UK publisher's sites. The

1:46:15

company said the deal comes,

1:46:17

quote, as the advertising world

1:46:19

tackles deprecation of third party

1:46:21

cookies, a long anticipated

1:46:23

industry milestone that Google

1:46:25

kick-started in early January,

1:46:28

unquote. Financial details for

1:46:30

the arrangement were not revealed. The

1:46:32

partnership involves the contextual

1:46:35

advertising of Mantis, originally

1:46:37

a brand safety tool that

1:46:39

could ensure that brands were

1:46:42

not being presented next to

1:46:44

potentially harmful or inappropriate content.

1:46:47

The tool is also now used to

1:46:49

place ads next to content users

1:46:51

may want to see, helping to

1:46:53

better target specific audiences with relevant

1:46:56

advertising. Other publishers also use

1:46:58

Mantis. Amazon's

1:47:01

ad director of EU

1:47:04

ad tech says Fraser

1:47:06

Locke said that,

1:47:08

quote, as the industry shifts towards

1:47:10

an environment where cookies are not

1:47:12

available, first party contextual signals are

1:47:15

critical in helping us develop actionable

1:47:17

insights that enable our advertisers to

1:47:19

reach relevant audiences without sacrificing reach,

1:47:22

relevancy or ad performance, I'd quote.

1:47:25

The loss of cookies means that

1:47:27

almost all internet users will

1:47:30

become close to

1:47:32

unidentifiable for advertisers.

1:47:34

The risk for advertisers is that

1:47:37

their advertising offer becomes

1:47:39

much less valuable at a time

1:47:41

when they're already losing ad

1:47:43

revenues, which has led to thousands

1:47:45

of job cuts in the past

1:47:47

year. Reach last

1:47:50

year announced 450 roles

1:47:52

would be axed. Other

1:47:55

media groups are also looking at deals

1:47:57

involving their customer data, according to. industry

1:48:00

executives. Some publishers

1:48:02

are experimenting more with

1:48:05

registration pages or

1:48:07

paywalls that mean people

1:48:10

first give first-party information

1:48:12

that they can use,

1:48:14

such as email addresses

1:48:16

and logins, reaches

1:48:18

already seeking to harvest more such

1:48:20

data from readers. John

1:48:22

Steinberg, chief executive of Future,

1:48:25

said that the quote, elimination

1:48:27

of third-party cookies is one

1:48:29

of the biggest changes to

1:48:31

the advertising market in the

1:48:33

digital age. He

1:48:36

added that quote, advertisers

1:48:38

and agencies will be

1:48:40

looking to publishers that

1:48:42

have high-quality editorial scale

1:48:45

and rich first-party data

1:48:48

and predicted that quote, advertisers,

1:48:50

agencies and quality publishers will

1:48:53

work even more closely together

1:48:56

to reach audiences that drive

1:48:58

outcomes for brands, unquote.

1:49:00

Sir Martin Sorrell, chief

1:49:02

executive of advertising firm

1:49:05

S4 Capital, said that

1:49:07

some clients that did not have

1:49:09

access to first-party data on their

1:49:11

customers were panicking.

1:49:14

He said that there would be more

1:49:16

focus on getting customers

1:49:19

to sign up to websites

1:49:22

with their information as

1:49:25

companies attempted to boost their

1:49:27

stores of consented

1:49:29

data, unquote. Okay,

1:49:34

so let's think about this for a minute. This

1:49:37

notion of requiring

1:49:39

more user signups is

1:49:42

interesting and it's not

1:49:44

something that had occurred to me

1:49:46

before. This article makes it clear

1:49:49

that the advertising industry is not

1:49:51

going to let go and go

1:49:54

down without a fight. They don't

1:49:56

want to change. They don't want

1:49:58

to adopt Google's strong a nationally

1:50:00

anonymous interest-based solution.

1:50:04

No, they want to continue

1:50:06

to know everything they possibly

1:50:08

can about everyone, which is

1:50:10

something Google's dominant Chrome browser

1:50:13

will begin actively working to

1:50:15

prevent, at least

1:50:18

using the traditional tracking

1:50:20

methodology. So what

1:50:22

are they going to do? And what's

1:50:25

up with this signing into

1:50:27

sites business? It

1:50:29

occurred to me that one

1:50:31

way of thinking about the traditional presence

1:50:34

of third-party tracking cookies

1:50:37

is that because they

1:50:40

effectively identify who is going

1:50:42

from site to site on

1:50:45

the Internet, there's no

1:50:47

need for us

1:50:50

to explicitly sign up when

1:50:52

we arrive somewhere for

1:50:54

the purpose of identifying ourselves

1:50:57

to the site and its

1:50:59

advertisers. Cookies

1:51:01

do that for us silently and

1:51:03

unseen on our behalf.

1:51:07

Who we are when we

1:51:10

visit a website is already known

1:51:12

from all of the cookies

1:51:15

our browsers transmit in response

1:51:17

to all of the transparent

1:51:19

pixels and beacons and scripts

1:51:22

and ads that laden today's

1:51:24

typical website. But

1:51:26

soon, all of

1:51:29

that traditional silent,

1:51:31

continuous background identification

1:51:33

tracking is going to

1:51:35

be prevented, and the

1:51:37

advertising industry is finally waking up

1:51:39

to that reality. What

1:51:43

this means for a website itself is

1:51:46

significant, perhaps even

1:51:48

drastic, a

1:51:50

reduction in advertising revenue,

1:51:53

since, as we know, advertisers

1:51:56

will pay much more for

1:51:58

an advertisement that shown

1:52:00

to someone whose interests and

1:52:02

history they know. That

1:52:06

allows them to choose the

1:52:08

most relevant ads from their

1:52:10

inventory, which makes the presentation

1:52:12

of the ad that the

1:52:14

viewer sees more valuable and

1:52:17

thus generates more revenue for the

1:52:19

website that's hosting the ad. And

1:52:22

that's, of course, been the whole point

1:52:24

of all this tracking. That's

1:52:27

why websites themselves have never

1:52:29

been anti-tracking and it's the

1:52:32

reason so many websites cause

1:52:34

their visitors' browsers to contact

1:52:36

so many third-party domains. It's

1:52:39

good for business from

1:52:41

the website's perspective and it

1:52:43

increases the site's revenue. And

1:52:46

besides, visitors don't

1:52:48

see any of that

1:52:51

happening. So

1:52:54

tomorrow, when visitors swing

1:52:56

by a website with Chrome, which

1:52:58

no longer allows tracking, and

1:53:01

those visitors are therefore anonymous and

1:53:04

far less valuable to that site's

1:53:06

advertisers, how does

1:53:08

a website itself

1:53:12

de-anonymize its visitors

1:53:15

to know who they are

1:53:17

for the purpose of identifying

1:53:19

them to its

1:53:22

advertisers so that

1:53:24

those advertisers will pay that site

1:53:27

as much money as possible? The

1:53:30

answer is horrible and

1:53:33

is apparently on the horizon. The

1:53:36

website will require

1:53:38

its visitors to register

1:53:40

and sign up before its

1:53:43

content and its ads

1:53:46

can be viewed. At

1:53:48

the end of that Financial Times

1:53:50

piece, they quoted Sir Martin Sorrell,

1:53:52

the chief executive of advertising at

1:53:55

S4 Capital, saying, quote, some

1:53:57

clients that did not have access to

1:53:59

first party data on their customers

1:54:02

were panicking, and

1:54:04

that there would be more

1:54:06

focus on getting customers to

1:54:09

sign up to websites with

1:54:11

their information as companies

1:54:13

attempt to boost their stores of

1:54:15

consented data. Now

1:54:18

these websites won't be charging any money

1:54:21

for this sign-up, it's

1:54:23

not money from their visitors

1:54:25

they want, it's

1:54:27

the identities of those

1:54:30

visitors that for the first time

1:54:32

they need to

1:54:34

obtain from that first

1:54:36

party relationship in

1:54:39

order to share that information

1:54:41

with their advertisers so

1:54:43

that they can be paid top

1:54:45

dollar for the ads displayed on

1:54:47

their websites. And

1:54:50

you can be 100%

1:54:52

certain that the fine

1:54:54

print of every such

1:54:56

site's publicly posted policy,

1:54:58

privacy policy, will state

1:55:00

that any information they

1:55:02

obtain may be

1:55:04

shared with their business

1:55:07

partners and affiliates, meaning

1:55:09

the advertisers on their sites.

1:55:13

We thought those cookie permission pop-ups were

1:55:15

bad, but things might soon be getting

1:55:18

much worse, and those

1:55:20

sign-up to create an account forms

1:55:22

may also attempt to obtain as

1:55:25

much demographic information as possible

1:55:27

about their visitors. You

1:55:29

know, oh, while you're here creating

1:55:31

an account, please tell us a

1:55:33

bit more about yourself by filling

1:55:35

out the form below so that

1:55:38

we can better tailor our content

1:55:40

to your needs and interests. Uh-huh,

1:55:43

right. Each form fill

1:55:45

will likely be a one-time

1:55:48

event per browser since

1:55:51

a persistent first party log-on cookie

1:55:53

will then be given to our

1:55:55

browser to hold and return to

1:55:57

the site. a

1:56:00

brief hassle once, but

1:56:03

the result of filling out a

1:56:05

form to create an account

1:56:07

at every site which

1:56:09

might begin to require one will

1:56:12

be that our visits to that

1:56:14

site will no longer even have

1:56:17

the pretense of anonymity.

1:56:20

We will be known to that site, and

1:56:23

thus we will in turn be known

1:56:25

to every one of that site's advertisers.

1:56:29

We may forget that we have an account

1:56:31

there. We may find

1:56:33

our name shown in the upper right-hand

1:56:35

corner of the screen with a menu

1:56:37

allowing us to log out, change our

1:56:40

email address, our password, etc. Password

1:56:43

managers are likely going to become

1:56:45

even more important because typical Internet

1:56:47

users will be juggling many more

1:56:49

Internet login accounts than they've ever

1:56:52

needed before. Historically, we

1:56:54

only ever needed to log on

1:56:56

to a site when we

1:56:58

had some need to create an

1:57:02

enduring relationship with that site.

1:57:06

That is what promises to change. Sites

1:57:10

with which we have no interest or need

1:57:12

to be known will begin

1:57:14

insisting that we tell them

1:57:16

who we are in exchange

1:57:18

for access to their content even

1:57:21

though it will be free, and

1:57:23

the reason for their insistence will be

1:57:25

that we become a much

1:57:27

more valuable visitor once

1:57:30

they're able in turn to tell

1:57:32

their advertisers exactly who we are.

1:57:36

And it's all perfectly legal

1:57:38

because no tracking is happening.

1:57:42

We sign up and implicitly

1:57:44

grant our permission for our

1:57:46

real-world identities to be shared

1:57:48

with any and all of

1:57:50

that site's business associates. Most

1:57:53

people will have no idea what's going on. Maybe

1:57:56

it won't actually be that big a deal. It

1:57:59

won't be obvious why. sites they've been visiting

1:58:01

for years are suddenly asking them to

1:58:03

create an account. They already

1:58:05

have lots of other accounts everywhere else

1:58:07

and the site won't be asking for

1:58:09

money just for their

1:58:11

identities, which most people are

1:58:14

not concerned about divulging. One

1:58:17

thing we can be certain of is that

1:58:19

a trend of forced

1:58:22

identification before the

1:58:24

content of an advertising supported

1:58:26

website can be viewed will

1:58:29

cause the EFF to have

1:58:31

a conniption. Nothing

1:58:34

could ever be more antithetical

1:58:36

to their principles. The

1:58:39

EFF wants nothing short of

1:58:41

absolute and complete anonymity for

1:58:44

all users of the Internet,

1:58:47

so this represents a massive step

1:58:49

directly away from that goal. The

1:58:53

EFF would be well-served,

1:58:55

in fact, to get

1:58:57

behind Google's initiative, which

1:58:59

is far more privacy-preserving

1:59:01

than this end-around that

1:59:03

appears to be looming. It

1:59:06

almost makes third-party cookie tracking look

1:59:08

attractive by comparison. I

1:59:11

don't want to be forced to create

1:59:13

accounts for every low-value website I might

1:59:15

visit briefly. If this

1:59:17

happens, it's going to change the

1:59:19

way the Internet feels. It's

1:59:21

going to be interesting to see how all this shakes

1:59:24

out. And yes, I

1:59:26

am more glad than ever to be going

1:59:28

past episode 999 since it's going to be

1:59:30

very interesting

1:59:32

to be observing and sharing

1:59:35

what comes next. We agree. Our

1:59:38

mission has really just begun. For

1:59:40

a long time, the last

1:59:42

five years I thought, well, we've kind of done it

1:59:44

all. How

1:59:46

much fun is there in the newest iPhone

1:59:48

or whatever? No, I

1:59:51

think times are getting very interesting, actually.

1:59:53

Speaking of interesting, It

1:59:56

turns out we have 11,000. He

2:00:01

remembers didn't happen during the show have unless

2:00:03

I can trust gets much as part it's

2:00:06

is a little bit behind a bill. that

2:00:08

all right let's go to twelve thousand. What

2:00:10

do you say We love to have you

2:00:12

in the club or and thank you to

2:00:14

all of you as you know what's great

2:00:17

is I do see a lot of new.

2:00:19

Faces in the discord. Not everybody who joined

2:00:22

the club ends up in the discord lot.

2:00:24

People aren't discord users, but I see a

2:00:26

lot of wonderful. New

2:00:29

people in there and I welcome y'all It's really fun

2:00:31

to be in there. And

2:00:33

talk to you and talk to our

2:00:35

house will get will get stiff in.

2:00:37

there is something he sought solace. To

2:00:41

had Steve year the best! I really

2:00:43

appreciate the work you do it really.

2:00:46

Ah, he is clearly.

2:00:49

The. Most deep. Technical. Shall we

2:00:51

do on the network And that people really value

2:00:53

it's a thank you. For. That

2:00:55

we really appreciate it and. I.

2:00:58

Encouraged everybody to check out

2:01:00

Steve Side R C.com. Or

2:01:03

that's where spinner I live. Six point one. But.

2:01:05

The new Vento a compatible six or six

2:01:07

point know but an event like of animals.

2:01:10

six point one coming soon. You're you're going

2:01:12

to be able to do that right? Your

2:01:14

me be a regular guy I say I

2:01:16

got ya How I'll have a later today.

2:01:18

Oh well. Ask and ye

2:01:21

shall receive assess home. So wizardry that

2:01:23

assembly code? ah Grc That com has

2:01:25

lots of great stuff that's free as

2:01:27

well. Ah insect I would check out

2:01:29

the eyes of hour drive the thing

2:01:32

that is. So what a great tool

2:01:34

you made for checking to see if

2:01:36

the U S P T you bought

2:01:38

actually has the capacity it's supposed to

2:01:40

have so you to return of If

2:01:42

it doesn't that's free and there's a

2:01:45

lot other stuff shields ups. Been there

2:01:47

forever and as a wonderful tool for

2:01:49

me. No checking the security of your router.

2:01:52

When. You there you can also get a copy

2:01:54

the show Steve has to unique versions of

2:01:56

the show vs. we don't have a sixteen

2:01:58

kilobit audio version that. The band

2:02:00

with impaired and. In. Fact:

2:02:03

A reason the sixteen K version was

2:02:05

created. Elaine Ferriss incredible transcript. She was

2:02:07

she said ferrier, she does or shoeing

2:02:10

and out at the Farm in them.

2:02:12

Lot of bandwidth so Steve made a

2:02:14

smaller version for her seats. Types of

2:02:17

those transcripts? beep not included apparently. Ah,

2:02:19

it's for everybody that will be. There

2:02:21

are and of course the Sixty Four

2:02:24

kill bit audio. We have the Sixty

2:02:26

Four killed but audio at our site.

2:02:29

Ah, Trip that he be slashed

2:02:31

s and for security. now. There's also a

2:02:33

youtube channel dedicated to security. Now that's actually

2:02:35

a great thing to know about if he

2:02:37

hears of the evil. I gotta send the

2:02:39

boss this clip or have a friend is

2:02:41

that like want them to know about this

2:02:43

thing. You know, your friends

2:02:45

bugging you about the. About tab

2:02:47

you know third party cookies. who are ya

2:02:49

to hear what was up to? Now on

2:02:51

it's of he skill with Clint. buses you

2:02:53

tube and share it with them. That's good

2:02:55

if you do that. It helps as it

2:02:57

brings awareness to the works these doing here

2:02:59

and course the best thing you do. For.

2:03:02

Yourself and for us to subscribe. and

2:03:04

your favorite podcast clients. You'll. Get automatically the

2:03:06

minutes available and then we make sure you get

2:03:08

to listen and risk. Save

2:03:11

have a wonderful week! And

2:03:14

a ladder and will dry out

2:03:16

down here in Southern California. You

2:03:18

are okay right? Didn't have a

2:03:20

sprinkler hitting your high voltage analysis

2:03:22

and now have set up a

2:03:24

such are seen as we see

2:03:26

on the thirty. A

2:03:31

there's got Wilkinson year. In case

2:03:33

you hadn't heard, Home Theater gets

2:03:35

his back Each week I bring

2:03:37

you the latest audio, video, news

2:03:39

tips and tricks to get the

2:03:41

most out of your A Be

2:03:43

system, product reviews and more. You

2:03:45

can enjoy Home Theater Geeks Only

2:03:47

if you're a member of Club

2:03:49

Twin which costs seven bucks a

2:03:51

month or you can subscribe to

2:03:53

Home Theater Geeks by Itself for

2:03:55

only two ninety nine a month.

2:03:57

I hope you'll join me for

2:03:59

of. Qui dose of home theater

2:04:01

d have.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features