
Endangering your friends online, the fibs told by VPN vendors, developments from the world of cryptomining, and Carole shares an animated GIF with Mikko and Graham.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, who are joined this week by Mikko Hyppönen from F-Secure.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
It's rarely what is best for you in terms of privacy and security.
I don't know as much as they do." You know, when Facebook came out, you were probably thinking, "Hey, they've got our best intentions.
They want to look after their users because we are their bread and butter." Okay, you give the analogy of walking into a doctor's office.
Hello, hello, and welcome to Smashing Security, Episode 71. My name is Graham Cluley.
I've been volunteering at the Internet Archive for two years now, collecting the malware museum and stuff like that.
But what's happening here now is that there's a real physical museum in the city of Tampere, which is the second largest city in Finland.
And the city museum has a separate permanent game museum, which is actually fairly large and fairly worth visiting.
And they renewed their exhibition and they added my game from 1987 into it.
It's a series of 7 adventure games called Pajayutu.
And I actually don't think they realized this when they archived it into the museum because you only see the bloody parts a little bit later on in the game.
And it's so bizarre that we both ended up in the world of antivirus.
LastPass Enterprise simplifies password management for companies of every size with the right tools to secure your business with centralized control of employee passwords and applications.
But LastPass isn't just for enterprises. It's an equally great solution for business teams, families, and single users.
Go to smashingsecurity.com/lastpass to see why LastPass is the trusted enterprise password manager of over 33,000 businesses.
And the end result was that people's information without their knowledge or explicit permission ended up in other people's hands.
So if you haven't heard the episode, just to quickly summarize what would happen, if you were, for instance, a woman on Facebook, I don't know, name like Stormy Daniels, and you decided to run a third-party app, which didn't mind grabbing your friends' particulars, some of your friends might be fine with that, but your buddy David Dennison might be quite angry to find himself entangled within it all.
But before too long, it begins to happen. So what I want to talk about today ties in with this current Facebook and Cambridge Analytica debacle.
A user called Matt Johnson tweeted, oh wow, I've just deleted my Facebook account and I downloaded a zip of all my data.
Contains info on every single phone, cell phone call, and text. Totally not creepy at all is the implication. And so lots of other people began to write about this.
Oh, you know, Facebook on Android has been scooping up all of this information without people's knowledge.
And the truth was rather different because Facebook did actually tell you it was going to do this.
Rightly or wrongly, it was pushing people towards uploading continuously information about their contacts.
And of course, you know, the big blue button is on turn on and, you know, the subdued option is to not now or to skip this or whatever, but many people were doing this.
So it wasn't completely true that people had got themselves into this mess without thinking necessarily, but the implications were quite significant.
And what concerns me about this, is over and over again, we are seeing people making decisions about other people's privacy.
Imagine, Carole, that my phone number is on your phone, right? Because I'm one of your biggest buddies.
They all defaults you to sending your contacts there forever.
And I've always been really angry about this default setting, because that means a very big part of normal users will end up doing exactly that.
It's not what is necessarily best for you. It's rarely what is best for you in terms of privacy as well.
And so the majority of people will just go, yeah, yeah, yeah, click, click, click, click, click.
I don't know as much as they do. I'm gonna trust them. And I think people have that mentality with technology companies.
You know, when Facebook came out, you were probably thinking, hey, they've got our best intentions. They wanna look after their users 'cause we are their bread and butter.
And then say, where would you like me to sit? Where would be the best place? Oh, over here.
I've sold my soul to the devil and think, I will abuse thousands.
So that means they can constantly harass you and hopefully one day you'll just click the wrong button and boom, they've got it.
And, you know, your friends are miffed as a result.
However, there's one thing about this recording of phone calls and text messages that I'd like to emphasize as well, which was that if you were running a mobile app of Facebook on your phone, it would do this, but it would only be able to do it on Android, on iOS, even if you wanted to do it, I'm sure they wanted to do it on iOS as well.
They were not able to do it. And that's a good example.
But nevertheless, the point I'm trying to make here is that the business model of Google and business model of Apple might look similar, but they're actually completely different.
This is one of the examples.
You're going to love it or whatever. And then it's going to be hard to get away. But you know, that's how they're going to monetize.
Whereas Google is much more free and easy and open. It's like, hey, come on guys. And you think at first, oh, this is some hippie nirvana, but no, no, no, it's not.
While you're dancing around naked, enjoying the age of Aquarius, someone is, you know, got their graffiti and they're smearing you with advertising and all this.
I mean, you can replace some of the services with other services like Search and Maps, but you know, exactly the point of YouTube, like someone sent you a YouTube link.
What are you gonna do? You pretty much just have to go and watch it. There's no other option. It's just impossible.
And there's another point to make about people exposing their friends' privacy, which is the habit of tagging people on photos. One of my pet peeves. Yes, me too.
Don't tag other people in your photos unless you know they want to be tagged.
Yeah, and I don't think people realize that, you know, they're doing it to be nice, but in fact it can be, you know, some people like me just really, really don't like that.
They're already beginning to use some of their deep learning and their machine learning.
So, you know, you can kind of load up a facial expression, it tags it onto an emoji, then you can send it to your friends and you look like a monkey that's surprised or whatever.
If we keep those ones private, maybe those are the ones which we can use for the really important accounts to unlock them.
And I don't want to speak about ransomware at all because we all know how that problem works and what it's all about. But there's other stuff happening.
For example, the fact that we are seeing more traditional hacks and traditional phishing moving from the old targets of banks and PayPal and online stores into targeting cryptocurrency exchanges and crypto users.
And this makes perfect sense from the point of view of the attackers.
I mean, you look at the typical cryptocurrency exchange, these are new companies, they are startups, they have of 20 people, then what?
But with the current sky-high valuations of all these cryptocurrencies, that startup of 20 guys might be sitting on top of billions of pounds or billions of dollars.
That's a very good target. These guys don't have dedicated security teams and they have these massive amounts of money.
And this is one of the reasons why we see all these Twitter phishing accounts mimicking Elon Musk and cryptocurrency investors and trying to get people to send Ethereum out.
This is the reason why we're seeing more and more cryptocurrency exchanges getting hacked.
And then there's the third trend on how cryptocurrencies are shaping InfoSec landscape, which is rogue mining.
And this is fascinating because the first botnet that I saw, which was doing mining for cryptocurrencies was already in the end of 2011. So Bitcoin was two years old.
Nobody really had heard about it yet. And we already had the first botnets which were trying to mine for bitcoins on CPUs of infected PCs, which today would be impossible.
But at the time it was sort of doable.
There's something in this idea that I can't exactly put my finger on, but there's something we will see, some interesting developments coming out of this space.
Users volunteering their CPUs to be monetized for services. And it wouldn't have to be mining for cryptocurrencies, it could be something completely different.
But the idea that with these new powerful JavaScript compilers that browsers like Chrome have, you can actually outsource computing and storage to your users.
So it's an interesting idea. But right now when we look at what we are seeing in our labs at F-Secure, well, we're seeing tons of cryptojacking.
10 years ago, if somebody would hack a mainstream website, what they would do would be a defacement. They would delete the front page and replace it with—
And today they wouldn't do that either because nobody runs Flash and Java anymore.
Today they would add a cryptojacking JavaScript extension, which then would start monetizing your CPU by mining for, typically, Monero.
It's being done from the site because they got hacked.
I'm finding it more painful experience going into it. But that seems to be the greed of the crypto miners themselves is sometimes they go for it too much, don't they?
They're too greedy.
My machine would just be whirring away and they're like, I'm the big cash cow, 'cause they're connected the entire time.
And if the mining script is done right, it doesn't actually have to take 99% of your CPU. It can actually just take 10% and they would maybe still be able to make money.
And this has become a bigger and bigger problem. At least 10 different competing crypto checkers. I guess Coinhive, BroMiner, and JSCoin are the biggest, but there's tons of others.
DeepMiner, CoinAim, Project POI, others that we're seeing, especially GSCoin is interesting because they are not mining for Monero, which is what most of the others are mining.
They actually have their own token, they have their own coin, which you can only mine with JavaScript. There's no other way of mining this except with JavaScript.
You know, it is possible for websites to make this as a business decision and say, look, in order to fund our website, this is what we're going to do.
And so I'm wondering, how are antivirus products like yours handling this?
Are you now beginning to detect these miners themselves and say, look, this is potentially unwanted code on this web page.
You have to decide if you want to allow it to run or not, just as you would with a traditional application.
And I'm not actually that happy about this because it seems like we're throwing away the baby with the bathwater because as we just discussed, there could be beneficial good uses where people actually would prefer to volunteer their CPU time instead of paying with money or paying with ads or paying with profiling.
But right now that's what we are doing. And there's a great article published by Brian Krebs about how I suppose the largest operation in this space works right now. That's CoinHive.
So he has a great article about who exactly are the people behind the CoinHive operation. Link to show notes for Brian's article.
Hey, wouldn't it be cool though, if we could somehow get an MP3 to mine for coins while people listen? So just listen.
I'm sure Mikko would agree that the use of VPNs is a good idea.
And loads of people use VPNs for video streaming outside their authorized region, right?
So they might use it to maintain extra privacy when they're on an unprotected Wi-Fi network, just to keep prying eyes at bay.
They only let you stream news and stuff if you're in Finland, and I'm quite often not in Finland. So I enable a VPN and I watch news from my local TV station over a VPN.
So right now, in light of the Facebook snafus, you know, we're not only just tweaking settings and deleting apps, but a lot of us are considering, hey, maybe, you know, if I'm not using VPN, I maybe should.
And according to the Next Web, it's a booming business. They say by 2019, worldwide demand is going to hit approximately $70 billion, up from $45 billion in 2014.
That's nice growth in 5 years. So it's no surprise to us that work in the cybersecurity industry, however, that not all VPNs are created equal. Would you agree, Mikko?
If you look at our business with VPNs in F-Secure, we've been having a mobile VPN for around 5 years and it is our best-selling mobile product on both iOS and Android.
And the critical point is that when you are using a VPN, for example, on your phone or on your tablet, everything you do on that device gets rerouted through that VPN provider.
So in theory, that provider sees everything you do on that device. So you really have to trust your VPN provider.
A recent article from thebestvpn.com, which claims to provide honest, in-depth, and transparent VPN reviews from real users, has published the results of a rather interesting case study.
So they looked at 115 VPNs available on the market today, and the author John Mason says that 26 of these collect log files from their paid users. Check out these stats.
So of these 26 VPNs they found to actually collect logged information, they say about 1 in 3 record personal details, 1 in 4 record IP address, more than half timestamp the connection and collate bandwidth info.
Half record what device type you're using at the time, and a whopping 9 out of 10 collect payment information.
There's a fair amount of information there being collected, isn't there?
But this says it's about collecting log files from the paid users, which is just outrageous.
I mean, to me, that's the point of a VPN. I mean, this is what you're trying to do when you install a VPN and it's quite disturbing it's not the case.
Did further digging into their privacy policies in terms of service page to find discrepancies and pointed them out.
But when you actually read that thing, which nobody reads, the terms and conditions, the privacy policy, then you say, we do actually keep logs.
So some of the problem I think has to do with sneaky wording to the uninitiated of, you know, in this world of, you know, agreements, terms of services and all this.
So when they say, for example, they do not log or record content, that doesn't necessarily mean that they're not connecting all the other stuff that Facebook's in hot water for, like your name or phone number, IP address, device type, timestamps, and all that metadata.
So even if they don't know that you're going to Pornhub, for instance, they can determine that you connected from a particular IP address at a particular time, maybe.
And that might be enough information for law enforcement, for instance, or whoever, to determine there's a good chance that this was the user that we're interested in.
There's— I think there's a kind of a belief in most computer users that that's the only reason why you would use one. And I don't think that's very fair.
All the unencrypted stuff from your computer is visible to anyone else connected to the same Wi-Fi hotspot.
So I would say, Look for recommended vendors. There's a lot of noise out there, and this is a hot market. So I say expect to see a lot of new vendors show up.
Some are gonna be great, but some are gonna also have ulterior motives. Read your terms and conditions carefully.
And I say make friends with a legal eagle, right?
Honestly, some smart tech entrepreneur out there could create a legal privacy bot that could comb through these kind of documents and highlight areas of concern. I'd be in heaven.
However, there is one great service I can plug here, which is called TL;DR Legal. Too Long, Did Not Read Legal. So TL;DR Legal.
They actually take terms and conditions of popular services and translate them into English. It's great.
For example, you look at YouTube terms and conditions, on TL;DR Legal, it's basically five sentences.
You know, you still own your video even though it's on our site, stuff like that. So highly recommend it.
But be careful, basically. Not everything is the same out there. Just because it says VPN doesn't mean this is good for me.
We saw Guccifer 2.0, maybe identified as a Russian agent. And I think there was a member of the LulzSec gang as well, who was caught because he hadn't had his—
And the fact that bad people can use security technology doesn't mean that we shouldn't allow good people to use it as well.
If we make any restrictions on using secure technology, if you make it illegal to use security, then only criminals will be able to use security.
It's equally a great solution for business teams, families, and single users. Learn more at smashingsecurity.com/lastpass. And welcome back.
Pick of the Week is the part of the show where everyone chooses something they like.
Could be a funny story, a book that they've read, a TV show, a movie, a record, an app, a website, a podcast, whatever you like. Doesn't have to be security related.
Should never be, necessarily. So my Pick of the Week this week is quite good.
Actually, we've got Mikko here because he works with these chaps at the Internet Archive and I volunteer with them.
They're not the new Nintendo Switch. They had really crude graphics, simple gameplay. They just have one game on them, right? Really simple.
We used to have to get up out of our shoebox in the middle of the night and lick the road clean with our tongues in order to play computer games. Do you hear the violins?
And even if you don't want to show your kids, even if they're completely uninterested in this, you may get some nostalgia out of this.
You can now show your ungrateful kids just what you had to put up with because the Internet Archive has put a whole load of these games up for online play via an emulator.
You can play BurgerTime. Did you ever play Super Double Dragon or something that? Carole, do you remember stroking your Tamagotchi and making sure it was—
I think they're an important part of our history, and that is why it is my pick of the week.
It actually is a physical place which actually looks like a museum. I was there myself earlier this month visiting Jason Scott, who's one of the people working there.
It's actually a fairly big place. They actually have quite a few employees.
They have the actual data center partially in the building, which stores all this stuff, including all the archived games, archived websites, things like that.
So I would never have thought it actually had a physical—
So GetLamp, fantastic. Small world. I know, it's all coming together today. It's all coming together on the show. Mikko, what's your pick of the week?
This is the security resource maintained by EUCERT, the Computer Emergency Response Team of the European Union.
And this is a website which just lists the latest news items from hundreds of different sources. This is the CERT-EU News Monitor.
Well, and as you would expect for a project from the European Union, the URL is easy to remember. It's cert.europa.eu/cert/edition/en/latest. We will put a link to show notes.
However, it is a good way of seeing exactly what's happening today. Like, is there some big news item?
You just wake up and you want to see if something like the Facebook scandal has happened overnight. It would be the top news item on the cert.eu.news.
There aren't— I mean, there's a lot of sites which aggregate the latest computer security news, but the way in which they're presenting this is pretty cool, I have to say.
I know you're just about to leave EU, so you can't use this in UK.
Now, before I show you this video, I want you guys to imagine that you had to get up the side of a building really effing quickly. Maybe you were trying to get away from something.
Maybe you're an authority on the chase, chasing a perp. So how would you go about it? What would be your first thought if you had to do it really quickly?
I'm just thinking of that thing Mario does where he sort of bounces off walls to go up, you know, the two walls close to each other. I'm not sure I could do that.
So you're going to tell the listeners what you're seeing as you see it. Okay, super. So here is the link, and then time yourselves in.
Oh my goodness. Okay, there is a man walking up Batman, walking up the side of the wall using this. How cool is that?
These guys actually go up the wall with nothing special—they just have a long stick and a couple of guys.
They've got a great big stick. I mean, it doesn't look a stick which they normally have in the back of the van—it looks they've just picked it up from somewhere. Improvised.
Mikko, thank you very much for joining us once again—it's always a pleasure to have you with us.
We're on Facebook, of course, there's a Smashing Security Facebook group for those 3 people who still have Facebook accounts.
And we have a Smashing Security store where you can buy stickers and mugs and things that.
It really does help new listeners discover the show and you can find out past episodes on smashingsecurity.com. Until next time, cheerio, bye-bye. Pew pew. Thank you.
Because I went looking and we don't have any reviews from Finland.
And I thought, Lick My Acne? Yeah. And that was from the UK. And we thought, could that be you? It's 5 stars. So we're very grateful.
Drives me nuts too. Keep up the good work.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mikko Hyppönen – @mikko
Show notes:
- Mikko's adventure game "Paha Juttu" at the Finnish Game Museum
- Download the Paha Juttu Commodore 64 floppy image file (d64)
- Commodore 64 online emulator (load a d64 file into this)
- Mat Johnson's tweet about Facebook logging his phone calls and texts
- Fact Check: Your Call and SMS History
- Who and What Is Coinhive?
- 100+ VPNs & Their Logging Policy (What Logs Are Kept by Who?)
- Which VPN Services Keep You Anonymous in 2018?
- ‘Lone DNC Hacker’ Guccifer 2.0 Slipped Up and Revealed He Was a Russian Intelligence Officer
- HideMyAss defends role in LulzSec hack arrest
- TLDRLegal – Software Licenses Explained in Plain English
- Some Very Entertaining Plastic, Emulated at the Archive
- Handheld History
- This is what the Internet Archive's building looks like
- CERT-EU News Monitor
- You've never seen anyone climb a wall like this before…
- Smashing Security on Facebook
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to smashingsecurity.com/lastpass to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

