GRAHAM CLULEY
Hey, Graham. Hi, Crow.
CAROLE THERIAULT
Have you ever been to the darkweb?
GRAHAM CLULEY
Crow, what kind of question is that? If I've ever been to the darkweb, it's because I wanted to keep things on the QT, on the quiet, right?
I certainly wouldn't want to share that kind of information with you, would I? Let's be honest.
CAROLE THERIAULT
Sheesh. Well, how does someone like me find out about the darkweb then?
GRAHAM CLULEY
Oh, well, if you want to know what's going on out there, you need a firm like Recorded Future.
They are scouring both the regular web and the darkweb using sophisticated technology, finding out all about emerging threats.
And you can sign up to their daily newsletter and get the latest insights at recordedfuture.com/intel.
CAROLE THERIAULT
Sounds great. Thanks.
Unknown
Smashing Security, Episode 15: Bad Vibrations with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to another episode of Smashing Security, episode 15 for the 6th of April 2017. And as always, I'm joined by my buddy Carole Theriault. Hello, Carole.
CAROLE THERIAULT
Hello, Graham.
GRAHAM CLULEY
And we're also joined this week by a special guest, John Hawes. Hello, John. Hello. Now, John, for those who don't know you, you used to be very high up in Virus Bulletin, didn't you?
And now I believe you represent the Anti-Malware Testing Standards Organization, AMTSO.
GRAHAM CLULEY
That's right. It's quite a mouthful. Anti-Malware Testing Standards Organization. What on earth does AMTSO do?
JOHN HAWES
Well, we basically bring together the people who test anti-malware products and the people who make anti-malware products and other people that are interested in that kind of thing.
And we talk about testing and we try to come up with better, more reliable, more accurate ways of testing things.
And we're currently in the process of putting together the first set of official standards for anti-malware testing.
CAROLE THERIAULT
You mean there's no standards yet in antivirus and anti-malware?
JOHN HAWES
As of 2016, there are no standards.
GRAHAM CLULEY
It's 2017, John.
CAROLE THERIAULT
Oh, that was my bad.
GRAHAM CLULEY
That was my bad.
CAROLE THERIAULT
Don't worry, it's only been 4 months.
GRAHAM CLULEY
Well, John, if you're working there, maybe you can sort this out because we need some standards for testing. Anti-malware products, I think.
How long have anti-malware products been around? Almost 30 years or so, isn't it?
JOHN HAWES
Oh, I expect so, at least, yes.
GRAHAM CLULEY
There have been plenty of bad reviews during that time, haven't there, which have been sort of incompetently done, and people have got poor results and not pointed in the right direction as a result.
JOHN HAWES
Exactly.
That's the problem, is that if a test isn't done well and the results from it are not useful to anybody, you know, they're misleading the consumers and they're also misleading the people that are making products.
They're not going to be able to fix problems that they don't have any information about.
CAROLE THERIAULT
Of course.
GRAHAM CLULEY
Right.
Well, what we try to do is we look back over the last week in computer security and some of the stories which have tickled us, some of the ones which have caught our interest, we have a little chat about those.
So I've got a rather interesting one to begin with. Oh God.
CAROLE THERIAULT
Oh God. I know that voice.
GRAHAM CLULEY
Do you? Yeah, or should I say dill-do-you? Because is that how you pronounce it?
CAROLE THERIAULT
Are you talking about dildos?
GRAHAM CLULEY
Wait, you were the first one to mention them. I wasn't going to discuss teledildonics quite so brazenly, but now, okay, let's talk about the elephant in the room.
We are talking about — is that a trunk? John, John, John, Carole, please, both of you behave because this is a serious topic.
And for some years, some of the world's leading boffins and scientists have been working on the area of teledildonics.
And what they are interested in doing is connecting sex toys to each other via the internet or to their, I don't know, to participate in parties, I imagine.
And you can probably tell where this is heading because the danger is, of course, that people will be connecting sex toys to the internet which are vulnerable and have flaws and exploits which hackers could exploit.
And there is a group of penetration testers called Pentest Partners, a guy called Ken Monroe—
CAROLE THERIAULT
You see, everything sounds like a euphemism now.
GRAHAM CLULEY
Oh, what, pentest? Well, they have looked at a device from, can you believe it, Scandinavia? It must be those cold winters. A device called the Siime. I think it's from Finland.
The Siime Eye. S-I-I-M-E Eye, as in eye in your head. You sure it's not See Me? Oh, See Me.
JOHN HAWES
It does look a lot like slime.
GRAHAM CLULEY
It does look like slime, doesn't it, in some fonts? I think you're right, John. It's probably the See Me. So it's See, rather like the Nintendo Wii. And then me. Oh yeah. So see me.
CAROLE THERIAULT
The name makes a bit more sense, doesn't it?
GRAHAM CLULEY
And it does from what I was saying. And it comes from a company called SVAKOM and SVAKOM are selling a — this device is a $250. How can I put this discreetly? Yes, quite exactly.
That brings tears to your eyes, doesn't it? $250 vibrator that for some reason or another comes with a camera.
JOHN HAWES
That's just weird.
CAROLE THERIAULT
Like camera on the vibrator or like connected to?
GRAHAM CLULEY
Oh, Carole, how innocent you are. The camera is on, let's put it as the business end of the vibrator.
JOHN HAWES
Does it have a torch? Does it have some kind of lighting?
GRAHAM CLULEY
You know, I was wondering the same.
CAROLE THERIAULT
I was thinking you want to check for teeth or something, right?
GRAHAM CLULEY
Is it infrared or something? You know, I mean, it does seem — I mean, what would you be able to see? I have no idea. You wouldn't be able to see anything, would you?
I don't think so. If you were able to see something, that would suggest some kind of medical emergency, I would imagine. If there was light in there, I don't know.
JOHN HAWES
Luminous interior.
GRAHAM CLULEY
Now, it doesn't just stop there because it doesn't just have a camera. And by the way, this is a video camera. It's not just for taking snaps. It's also a Wi-Fi access point.
CAROLE THERIAULT
It sounds like a medical device right now to me.
GRAHAM CLULEY
It sounds like an endoscopy. Is that what they — endoscope, is that right? Which you use to investigate places.
JOHN HAWES
Well, they definitely have a light on.
GRAHAM CLULEY
Right. John, I'm so glad you're here. You've clearly got expertise in this.
Now, these devices come with a standard access point SSID, which is SeeMeEye, and they have a default password, of course, all the 8s.
Just type in lots of 8s, and you can access it via the associated Android or iOS app. And once you've done that, you can view the live stream.
I don't know if you can actually send it straight to Facebook or whatever. I know it sounds quite tantalizing, doesn't it?
But you have to ask yourself, you know, why would you want one of these?
And what's more, as well as the camera itself, as well as it being a Wi-Fi access point, why would you also want that vibrator to contain hidden functionality to connect itself to Skype?
CAROLE THERIAULT
Oh my gosh.
GRAHAM CLULEY
Or to automate sending videos.
CAROLE THERIAULT
You know what, okay, no, no, no, I know, okay, I have definitely heard of people who, you know, are couples or whatever, they live far away from each other and they want to get their rocks off while they're in different places.
So I just don't understand— I still don't understand why there's a camera at the end of the device.
And maybe I don't understand this properly, though that just sounds like a medical—
GRAHAM CLULEY
Yeah, you might want to get your rocks off. But I mean, there are rocks and there are rocks, aren't there? I mean, it's—
CAROLE THERIAULT
What, do you think phone sex is safer? What are you advising? What are you advising for people?
GRAHAM CLULEY
I don't, I don't know. I don't know what your partner's like, right? But would they be able to tell the difference really between the— oh no, I don't know.
Why are we even discussing this?
Anyway, look, the point is that the Internet of Things has had yet another massive fail where people are putting devices on the internet which are insecure, which can be remotely hacked.
In fact, Pentest Partners, who looked at this particular device, by the way, they must have the most fun job in the world.
They're looking up the perviest gear which is internet-enabled and working out how they can— Fun job?
CAROLE THERIAULT
That's like the worst job.
GRAHAM CLULEY
Can you imagine? They are loving it.
Believe me, they are loving it because they were even working out that because the access point name is static, you know, basically if you look on your phone and you see SeeMeEye in your vicinity, you know somebody's up to— Right?
You know that that's going on. And if you via a war driving site, you may even be able to work out where they actually are and technically geolocate other users of this device.
But, you know, what's happening is this: plenty of devices are being made, they're internet-enabled, the security is a joke, and privacy is being put at risk.
People can spy upon you. Now, whether this is something which would alarm you if you're using such a device or not, I don't know. But frankly, what is happening to the world?
And can I get off? It's horrendous. And when do we need some kind of legislation? Do we need a testing standards organization to test internet? John, forget anti-malware.
Maybe you should be looking at IoT and particular devices.
JOHN HAWES
I don't know. I think we might get there fairly soon. Definitely something that needs doing, isn't it?
GRAHAM CLULEY
Come again, John. Okay.
CAROLE THERIAULT
God, innuendo central.
GRAHAM CLULEY
Maybe we should move on. But anyway, I think to the listeners of Smashing Security, we would say beware, beware. Yeah.
CAROLE THERIAULT
Keep your legs crossed.
GRAHAM CLULEY
Yeah. John, what have you seen this week?
JOHN HAWES
Well, I'm kind of very much in the same region in the internet of things. Maybe a slightly cleaner spin on it.
You mentioned actually in your bit there, you said you can connect using your iOS or Android app.
Everybody knows that those are the two options really when it comes to smartphones, at least. You're either Apple or you're Google.
JOHN HAWES
In terms of the operating system that they're running on, but in terms of the hardware, for most people it's either Apple or it's Samsung.
CAROLE THERIAULT
Yeah, right.
JOHN HAWES
And there's a bit of a disconnect there. Samsung, they want to be like Apple. They want to be the world-straddling giant.
JOHN HAWES
But they're reliant on Google for their operating system.
GRAHAM CLULEY
And that must gall them a lot, mustn't it?
JOHN HAWES
I'm sure it does. And for quite a long time, they've been working on an alternative operating system called Tizen.
Which not a huge number of people know about, but it's been in development for five or six years at least.
JOHN HAWES
And it's kind of evolved from some previous projects. It's kind of like Android.
It's based on Linux and it's part of this big long project that's part of the Linux Foundation, but it's backed by various companies that are involved in—
CAROLE THERIAULT
So it's a big deal.
JOHN HAWES
The mobile phone world, but especially Samsung.
It's a huge deal for Samsung because I think they're basically betting on it being their future and replacing their reliance on Android.
CAROLE THERIAULT
So I'm guessing it's really, really good.
JOHN HAWES
Well, that's the thing.
CAROLE THERIAULT
Oh no, I didn't mean to lead you in there.
JOHN HAWES
There's an Israeli — this is why it was in the news this week, was that an Israeli researcher called Amihai Neiderman. He had a look at it and he found it was pretty terrible.
He called it a hacker's dream.
JOHN HAWES
He said it was maybe the worst code I've ever seen.
JOHN HAWES
He found 40 separate zero-day vulnerabilities. A lot of them were buffer overflows.
One of them was in the Tizen Store app, which is their app store, which basically gives you complete control over the entire device.
JOHN HAWES
And also found various incidents of sloppy encryption implementation.
So some of the data that was being sent from devices was not encrypted properly and some of it was, some of it wasn't. It was just a bit of a mess really.
GRAHAM CLULEY
What you're suggesting, John, is actually they could probably replace Android with this and hardly anybody would notice.
JOHN HAWES
Well, yes, that's maybe true. But I think the part of the issue here is that, so the idea of this is not just that it's just going to be a smartphone device.
JOHN HAWES
It's intended for all kinds of different devices. So they said on the project website, it's for wearables and consumer electronics, cars, appliances.
CAROLE THERIAULT
Hey, maybe dildos will get it as well.
GRAHAM CLULEY
Oh, please.
JOHN HAWES
Potentially. Yeah. So it's already in use in, so Samsung uses it in most of their Gear watches, their TVs.
JOHN HAWES
Apparently there's 30 million TVs are running it. It's got some use on phones. So there's mainly in India and Asia, Africa countries.
JOHN HAWES
There's a few kind of budget smartphones that are running it, but we can expect to see it on a lot more. And yeah, it's basically not very good.
GRAHAM CLULEY
Lots of consumers are already using Tizen and are probably completely unaware that they're using this operating system, aren't they?
JOHN HAWES
Yeah, well, that's a big part of the problem. I think that a lot of these things that are connected to the Internet of Things, they don't really say how they've gone about doing it.
I think there's obviously a lot of — I mean, it's a, to me, it seems like a good idea to have a dedicated operating system like this that all lots of different people can use.
Cause you know, it's good to have a bit of convergence, but you need a bit of diversity too.
I think at the moment, the situation is that somebody who makes dishwashers or microwaves suddenly decides, oh, we need to be part of the Internet of Things.
So we'll just slap some stuff in there and make it online. And that's not really their area of expertise.
So it would be good to have somebody that was making something that these people could use.
GRAHAM CLULEY
Absolutely. I mean, that would be terrific, wouldn't it? Because lots of people are trying to write their own with no experience of security whatsoever.
So if they get something off the shelf from, for instance, Samsung, then that sounds sensible.
But of course, if you converge to all use the same code, it better be bloody good code, which is secure.
GRAHAM CLULEY
And this isn't—
CAROLE THERIAULT
And it's shocking though, because if they've been building this, if they've been building it during the era that cybersecurity has been a pretty big deal when it comes to, you know, online stuff.
So how they've missed, you know.
JOHN HAWES
Yeah.
Well, that's another part of it actually, that I think a lot of people when this story came out that he'd found this huge long list of issues, I think people were assuming that a lot of it was the older stuff that had been inherited from these earlier projects.
JOHN HAWES
But apparently most of it is in stuff that's been written in the last two years.
CAROLE THERIAULT
Geez, that's so embarrassing.
JOHN HAWES
Probably people at Samsung.
CAROLE THERIAULT
So one last question is, is it all Samsung branded equipment or are they kind of selling the code? They selling the operating system?
JOHN HAWES
Well, it's Samsung. Samsung is kind of the main driver behind the project, but there's lots of other companies that are involved in it. So presumably they're using it too.
JOHN HAWES
But again, as Graham was saying, there's very little information on, you know, when you go and buy a device, it doesn't say on it, this runs Tizen or this runs embedded Android or whatever.
GRAHAM CLULEY
And maybe it would be nice if devices did have— do you remember you used to get those? I mean, we still do. We get those stickers which said Intel inside.
It's like, woohoo, you know, that's—
CAROLE THERIAULT
There's also things called readmes though, that you might be able to get a bit more information.
GRAHAM CLULEY
Yes. But I mean, but that's after you've bought it, isn't it? I mean, it might be nice when it's on the shelf to say, oh, that's an Android, that's Tizen, that's iOS.
CAROLE THERIAULT
So I guess that's the advice to our listeners is you could ask if it's Tizen. You can ask if it's running Tizen. Not that you'd necessarily trust the sales guy, but— oh yeah.
GRAHAM CLULEY
Oh, he's going to think you're talking about Tizen or something, isn't he? He's not going to know what you're talking about.
CAROLE THERIAULT
Oh, yeah, because they're all idiots, right, Graham?
GRAHAM CLULEY
No, they're not that they're all idiots. I'm not saying they're all idiots. All I'm saying is that, I mean, I'd never heard about Tizen until a couple of weeks ago, you know.
Have you?
CAROLE THERIAULT
No, I hadn't heard about it till two days ago. So I'm—
JOHN HAWES
Well, I'd heard about it a few years ago, but very much in the same kind of context, in the kind of, oh, there's some big security holes here that they need to fix before they start using it.
But obviously that's not really been picked up yet.
CAROLE THERIAULT
Cool story though.
GRAHAM CLULEY
Well, well done to that researcher for revealing these problems.
I hope Samsung will fix these problems quickly, and I hope that they'll get some decent penetration testing done and vulnerability researchers looking at the code to make sure that it's— if they're really going to push forward with it, that they make it much more secure in the future.
CAROLE THERIAULT
Do you know that if he— does he put any limits on like, has he disclosed how he's done it or has he kind of put a deadline as to how long Samsung has to fix these before he releases them?
JOHN HAWES
I seem— I read somewhere that he had tried to get in touch with Samsung and they'd pretty much blanked him.
CAROLE THERIAULT
And so that's the worst.
JOHN HAWES
But then eventually kind of when they realized that he was going public with all this stuff, they turned around and did the standard, you know, we treat security very seriously kind of thing.
GRAHAM CLULEY
You know, I would suggest to researchers, if you're not getting any joy from the security department, and I think most security departments and most companies are pretty good at responding to these things, but if you're not getting any success, contact their public relations department, contact their PR team and say, "Hello, I'm going to be writing about this soon, and I'm going to be telling security bloggers about this soon, so could you perhaps maybe ask your security team to get back to me?" And maybe just apply a little bit of pressure like that.
CAROLE THERIAULT
And wouldn't it be nice if websites and companies actually had a place on their website where people could report security concerns to them directly?
You know, like you'd have a specialized, you know, just an address, just a form, but we know it's going to the right place and going under the right eyes.
Because I assume that's what's happening, right? The person who's actually opening that email doesn't really understand it and just lets it drop.
JOHN HAWES
Maybe.
Well, this is another argument for having this kind of centralized ubiquitous platforms that people can use is that if you are, if you're a maker of toasters, you probably don't have a bug bounty program.
CAROLE THERIAULT
Yeah. Yeah, good point.
GRAHAM CLULEY
Thank you, John.
JOHN HAWES
You're welcome.
GRAHAM CLULEY
Oh, Carole, what have you got for us this week?
CAROLE THERIAULT
More rise of the machine stuff here. So, okay, let's cast our minds back.
We all worked together at a time, long time ago, and you guys will remember that we had cards that we had to swipe to get in and out of the building, to buy lunches, to attend events, that sort of stuff.
And do you remember when you'd forget your card or you'd put it through the laundry or you dropped it in your car and you couldn't find it?
And then it was a big deal because you'd have to try and get a temporary card, but there was never enough temporary cards, so then HR would have to run around and make you a new card, or you wouldn't have a card at all and wear this big kind of thing around your neck to say you're an idiot.
And I know what, I've— some companies even charge you now for losing your card, so that's also a big pain. Thank God I'm not having to wear those.
Anyway, so this is all big pain in the butt, but was it painful enough, gents?
CAROLE THERIAULT
For you to consider implanting a corporate microchip into your body?
CAROLE THERIAULT
Yes, yes.
GRAHAM CLULEY
Into what part of my body?
CAROLE THERIAULT
Well, right now it's in your hand. Let me tell you, there's a company in Sweden called Epicenter.
Now they offer to implant its stuff with NFC, so that's near-field communication microchips, right? It's the same kind of things you have in your credit card.
And it basically is there to transfer small amounts of data between it and other chips, okay?
So this is gonna be sharing information you wanna purchase your lunch or you wanna get in and out of the building or into a certain area of the building.
Now, the chips are about the size of a ping pong— no, I'm kidding. I'm kidding, I'm kidding.
They're the size of a grain of rice, and they are injected with a syringe into the fleshy part of your hand right next to your thumb. I bet you it does feel like a ping pong.
Seriously, it's a grain of rice.
GRAHAM CLULEY
This is a bit tagging your dog or your cat or something.
CAROLE THERIAULT
Exactly, exactly.
JOHN HAWES
Same thing, yeah.
GRAHAM CLULEY
They never complain about it, do they, actually? Let's be honest.
CAROLE THERIAULT
I think they're put asleep to do that.
CAROLE THERIAULT
So they wouldn't, yeah, I don't think these staff are. Now, okay, there's 2,000 people roughly that work at Epicenter, and 7.5%, 150 workers have said yes to this.
Okay, and Epicenter hold monthly events where attendees can receive the implant.
JOHN HAWES
So what's the alternative, that they just keep carrying a card?
CAROLE THERIAULT
Now I can, I imagine just, okay, let's just think about this for a second, right? Let's just think about this. Let's just think about the privacy aspect of this.
So what is the chip collecting? My location, what I buy, where I go, when does it turn off? How big is the field of monitoring? Think of, you know, what about after hours?
What about security? You know, it's of course it's gonna be completely unhackable and no one will ever hack NFC and that's never happened before. And what about unfair dismissal?
All the information is on this, and all of us have it, you know, some kind of grayer bits, you know, where we may have left work early one day and not got clearance or one of these things.
And now this could be used by companies to kind of go, oh, look, you left early on Wednesday and we have no record of you getting—
GRAHAM CLULEY
But you could do that with a card as well. They could tell with a card if you left early. That doesn't make any difference from that.
JOHN HAWES
Or if you had 3 lunches.
GRAHAM CLULEY
And if you did leave the organization, presumably what they do is they simply mark on their database that Chip number 23 is no longer an employee. Yeah, but it's not—
CAROLE THERIAULT
Yeah, but you remember I used to take your card when I didn't want to actually pay for coffee?
GRAHAM CLULEY
Yes, I do remember. You regularly stole from me. Yes, you stole. You stole money. Thank you for now admitting that.
CAROLE THERIAULT
Yes, you did. So now I'd have to grab your hand and put it past the checkpoint.
GRAHAM CLULEY
That's right.
JOHN HAWES
That's much more secure.
GRAHAM CLULEY
But what would happen if— I mean, what would happen if you had one, so you worked at Epicenter and then you went to go and work for, I don't know, OppiCenter or some other company, which all said, oh, well, we've got a chip as well.
Do you end up with lots of chips in your hand? Yeah, do they reprogram the chip?
I just think it's, why don't they just put barcodes on our foreheads with our number, our citizen number, and just scan us on the way in?
Why don't they just do that rather than putting chips in us?
CAROLE THERIAULT
I know, it's really, I find it, and apparently what's interesting is this was from the LA Times and they asked a few employees why they had agreed to do this and the response seems to be because I want to be part of the future.
Well, hello, you are part of the future. As long as you don't die right now, you're going to be there. You don't need to do this. I just think this is a bit insane.
GRAHAM CLULEY
People are dingbats, aren't they? Yeah.
CAROLE THERIAULT
And who's creating this? Like, think about John's story. We don't even know who's the actual creator of this little grain of rice microchip. And how do we know how safe it is anyway?
JOHN HAWES
Well, hopefully it's been tested on animals.
CAROLE THERIAULT
Well, good. You know what, it's real. I'm really glad that we're starting to try that and the precedent's being set so that soon it will be mandatory for all office workers.
It's a real nice Pandora's box.
JOHN HAWES
Well, the thing is, it's not just for offices, is it?
You know, we have cards that we use to get in and out of offices and to buy things in office canteens, but we also have cards that we get money out of machines with or pay for things in shops with.
So I would imagine in future these people probably want us to have a little grain of rice that identifies us whatever we were doing.
And we could use to do our shopping or to activate our phone or whatever, which is the future.
GRAHAM CLULEY
I'm thinking about the three topics which we've discussed so far on this podcast. We're real curmudgeons, aren't we? We sort of hate the future.
There we are saying, why do you need a vibrator with a camera on it, which is wireless as well?
Why does Samsung need to create this alternative operating system, which is full of vulnerabilities and why are they injecting chips into people?
Why can't we go back to the old days and all this?
CAROLE THERIAULT
Do you know what? If we don't complain about these things, how do we expect people to make it better?
GRAHAM CLULEY
You know what, Carole? You are right. I completely agree. You convinced me. There's too much of this nonsense going on.
It seems that I would worry actually if I was working at Epicenter that there'd begin to be a little bit of peer pressure.
Oh yes, we have a monthly meeting where we try and convince more of our employees to have this. It's like, bugger off.
JOHN HAWES
That sounds a bit weird.
CAROLE THERIAULT
Yep. And the other thing you guys, someone brought up earlier, the card idea that's the same as a card.
Well, you can leave your card at home and if you're trying to do something where you don't want to be monitored by your business, you can actually just leave the card behind.
JOHN HAWES
But that's the problem with using it as your identity is that it's detached from you. So someone can steal your card and pretend to be you or buy coffee and pretend to be you.
Whereas if it's embedded in you, it's part of your identity and no one can steal that from you.
CAROLE THERIAULT
Well, let us know when you get yours implanted, John, and let us know how it feels.
GRAHAM CLULEY
Hey, if it stops Carole buying coffee on my card, then I think that for people, or indeed herself, then that's definitely a positive thing.
JOHN HAWES
She would just gouge it out of your hand, you know.
GRAHAM CLULEY
I think you're right. Well, look guys, I think that just about wraps it up for today. Just a reminder to everybody, we're on iTunes.
Please subscribe to the podcast there, and then you won't miss any future episodes which come out.
And you can also subscribe on Google Play Music and Overcast and Stitcher and TuneIn and iHeartRadio, all kinds of other places too.
CAROLE THERIAULT
And big thank you to Recorded Future. Remember, you can sign up to their cyber daily newsletter at recordedfuture.com/intel.
GRAHAM CLULEY
And that just about wraps it up. Thank you very much, John Hawes, for joining us. We appreciate it.
JOHN HAWES
Thanks for having me.
GRAHAM CLULEY
Thank you, Carole Theriault, and thanks to you at home for listening in. If you like the show, tell your friends, maybe follow us on Twitter.
We're @SmashingSecurity, that's smashing without a G security. And until next time, bye-bye. Oh, you're just not going to say bye-bye.
JOHN HAWES
Bye! Cheerio then.
CAROLE THERIAULT
I don't think— I hate that on, you know, on University Challenge and everyone's like, bye-bye.
GRAHAM CLULEY
Bye-bye. See ya.
http://www.easylife.org/fufme/faq.html
Wow, seems I leave a sheltered life.
If the camera had a light on it you could see something!