
We head to Hong Kong to look at how technology has helped anti-government protesters (and how China has tried to disrupt it), Samsung is skittish over whether to tell TV owners to virus-scan their devices, and you won’t believe whose website is not GDPR-compliant.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by James Thomson.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
What is the point? Smashing Security, episode 133: Cookie Ransomware mockups, Hong Kong protests, and smart TV virus scans with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Smashing Security episode 133. My name is Graham Cluley.
No, it was more of a kind of BMX track style bunny hop, which they helpfully inserted on what was otherwise a flat cycle track in some woodland.
So I couldn't see it very clearly and I hit it at quite a high speed and my bike kangarooed off the road and I bounced off in the other direction.
Now, this week, Graham goes after a cookie cock-up whilst James heads to Hong Kong. And I ask a very important question: are IoT TVs all that smart?
All this and noodles more coming up on this episode of Smashing Security.
A cookie is a small text file downloaded onto your computer or smartphone when you access a website, and it lets the website recognize your device and store information about your preferences or past activity on the site.
And to be honest, they're pretty darn useful. It's hard to build a website which is flexible and able to do the cool things it needs to do without sometimes using some cookies.
But as I think you've probably heard, they're not always a good thing because they can be abused and they can be used to track people's behavior online and where they may have gone to and maybe provide adverts which may be customized depending on your past website viewing.
Although most people now seem to be aware that cookies do that, don't you think?
Not I seem to remember there's some— No, no, no.
But I have heard of cookies, but if you ask me to explain exactly what they do, I'd be a bit hazy. Right.
For instance, and this is something which I'm sure most people have seen, they go to a website and a little banner pops up, doesn't it?
And it says, "Oh, you know, this website uses cookies and you have to agree to this." And you go, "Yeah, yeah, whatever, whatever, agree, agree." Sometimes you might have an option to customize how it's using cookies, but many people will just simply hit that button.
So you're right, it is a bit of a minefield.
The problem is often they won't actually read the small print, they just click through it.
And according to the ICO, which is the UK's data regulation body, the Information Commissioner's Office, you must tell people if you set cookies and clearly explain what the cookies do and why, and you must get consent and consent must be actively and clearly given, right?
That's one of the things, I've got that straight from their website.
And they also say you need to be confident that your users have taken a clear and deliberate action to give consent.
This must be more than simply continuing to use the website, and the consent has to be freely given.
Okay, so it's all fairly straightforward, but there's a problem with these pop-up cookie banners, as I've already described.
They're really, really fracking irritating, and often users will feel that they've got no choice but just to click past them in order to access the website.
It's, whatever, I've got stuff to do, I'm just going to click, click, click, go past.
'Cause we've all got better things to do, haven't we, Carole? So what are the ways in which you can stop these cookies actually tracking you and your online behavior?
Well, there is a setting in some of the browsers out there called Do Not Track. And that sends a request to websites asking them very politely to not track you.
But most websites don't change their behavior whatsoever, even if you've enabled that. It's purely up to them whether they actually honor do not track. In short—
And they go, yeah, no, we'll just put you on.
And she'd been to a website where she'd looked at these shoes. And then weeks later, she was on other websites and these ads kept on popping up.
And her argument was that she quite liked this because it reminded her of the shoes that she'd previously shown an interest in.
I mean, I can see what the benefit is from the company's point of view. They want to be able to see what you're doing on the internet to decide whether you might buy stuff.
If you had the choice between getting a completely random advert or one which is actually designed for you and is about things which you might be interested in, many people would—
For instance, Apple has now removed the Do Not Track option from the Safari browser, as it didn't actually really do anything.
And they said that it was in order to prevent potential use as a fingerprinting variable.
In other words, actually having Do Not Track enabled might make it easier for you to be tracked and for it to identify your computer rather than somebody else's.
And in its place, Apple are introducing some new technology called Intelligent Tracking Prevention, which they believe will be better.
And Firefox— yeah, yeah, Firefox is similarly keen to adopt a similar smarter way to reduce this sort of cross-site tracking. So that's all, that's all good news.
Google, meanwhile, they're not really emphasizing all this anti-tracking quite as much. Now, why would that be, Graham? I don't know.
It's a mystery to me why the world's biggest advertising company—
Websites around the world have been petrified and scared into implementing them by the introduction of GDPR and dire warnings from the likes of the Information Commissioner's Office.
Just last year, the Washington Post, they were told off by the ICO because they failed to meet the required standards when it came to their cookie pop-up.
A recent inspection of 10 major EU institutions and public bodies found that 7 had data protection issues and were either non-compliant with the ePrivacy Directive or failed to follow guidelines.
So many firms have been uncertain about the proper way to implement these cookie pop-ups without breaking the rules.
And many consultants, as a result, have said to firms, well, why don't you do what the ICO does on its own website and copy them? Right?
Because if you copy the guys who are laying down the law, then you're going to be compliant, right? What could possibly go wrong with that?
But yeah, helmet, knee pads, because it has been revealed that the ICO itself has been in breach of its very own cookie privacy guidelines.
Data protection organizations basically cocking up on a massive scale.
A chap called Adam Rose, he is a lawyer at Mishcon de Reya law firm, and he discovered that users of mobile phones visiting the ICO's website did not give explicit informed consent for cookies to be planted on their mobile devices.
Instead, the ICO website used implied consent. It just assumed you were happy with it.
And according to Rose, the ICO website has probably been failing to reach the required standards since 2011.
But I imagine it's created quite a lot of confusion for people who check on these facts on Wikipedia.
It's one of those — somebody's obviously decided to take the piss and it's got into people's heads in the same way that Avril Lavigne and Alanis Morissette have somehow become confused in Carole's mind.
Now I know China a little bit, but not very well, but I know Hong Kong a little bit better.
I've been there a lot of times and more particularly this last semester, this term just finished, I was teaching an undergraduate exchange student from Hong Kong.
And I was interested that she wasn't very politically engaged, at least compared to some of the other students.
But the one thing she did know was that she did not want to live under Chinese rules. Now Hong Kong is part of China. I'll go on and explain this a bit later.
But on June 4th, a couple of weeks ago, she actually came up to me and reminded me that it was the 30th anniversary of the Tiananmen Square massacre, even though that was an event that occurred before she was born.
She's a 21-year-old, I guess, undergraduate. And Hong Kong is the only place in China where events of '89 in Tiananmen Square can even be mentioned, let alone commemorated.
And my student knows this because she lives just a few minutes from the border with so-called mainland China.
In fact, a lot of Hong Kong is part of the mainland, but there's a border between the two with a passport check. So you need a visa to cross if you're not from Hong Kong or China.
Now, over the border, most people her age are barely aware that hundreds or possibly thousands— there's never been a proper investigation of these Chinese pro-democracy campaigners in '89 were killed by their own government.
And the Chinese Communist Party has since suppressed all mention of the '89 massacre.
Now the interesting thing is that technology, and China is now, as you might know, a very wired place, allows them to do that even more effectively than they could under the old school censorship that was employed before the internet and apps and smartphones came along.
And it's at a terrific cost.
I mean, the communist system is believed to employ tens, possibly hundreds of thousands of internet censors, but it's achieved near total control over what can be written and posted online, at least within China.
And the recent experience of a BBC employee gives a glimpse of how it works from the tech point of view.
It's a blog I saw read by Stephen McDonnell, who works for the BBC in China, and he uses an app called WeChat, which I'm sure you've heard of.
It's the kind of Chinese version of Facebook. I mean, as with Google, Facebook, Twitter, most of these things aren't allowed in China.
We can talk about that a little bit later, about how people get around that or try to in China, but in general they're not allowed you can't use them in China.
And so there are equivalents. And in fact, WeChat in many respects is superior to Facebook, at least from the way it's described in this post.
I've never used it myself, but I know people who have and they say it's kind of, it's all-embracing.
He describes it as Twitter, Facebook, Google Maps, Tinder, and Apple Pay all rolled into one.
So this guy Stephen McDonald went down to Hong Kong for the 30th anniversary commemoration in the beginning of June, and he posted some photos from the ceremonies that were held there.
There were about 180,000 people took part in a kind of candlelit ceremony in Hong Kong, and he posted them on WeChat back in China, but he didn't caption them.
He didn't describe where they were. He just put pictures up. And he says that several people in China messaged him to say, "Oh, where were you?
What was this?" Because you could see clearly the scale of the commemoration and also roughly where it was.
And he says that kind of illustrates to him how few people in China know what June 4th represents. But very quickly, his WeChat account got shut down.
And at this point, he entered this kind of Orwellian wormhole, if I can mix my metaphors, in his attempts to get back onto WeChat.
And the first message that he got said, "Your login has been declined due to account exceptions.
Try to log in again and proceed as instructed," which sounds very much like the kind of chatbot language that you get.
As he said, it seems posting photos of an actual event taking place without commentary amounts to, quote, "spreading malicious rumors" in China.
So he says that he was given time to try and log in again the next day, and he said that he was told that he had to agree and unblock under the stated reason of spread malicious rumors.
So he basically had to admit that he'd spread malicious rumors in order to get his account unblocked.
And then came a stage he wasn't prepared for, and it said, "Face print is required for security purposes." Oh boy.
And at that point, he had to hold his phone up, face directly in front of it, so that it could—
So it's actually capturing— So you can't just— I mean, what I would have thought instantly was print out a picture of Piers Morgan and hold it in front of the camera.
But having to actually do that—
So even though WeChat caters mainly for the Chinese market, they are pushing this abroad a bit.
And so all of these warnings are written in English saying tapping the button means you authorize Tencent, which is the company that owns WeChat, to collect, store, use, and transfer the information you've submitted.
So that's your face scan, your voice recording, presumably.
And McDonald says, "No doubt I've now joined some list of suspicious individuals in the hands of goodness knows which Chinese government agencies." But then he says, a lot of people said to him, "Why do you go through this?
Why did you agree to do all this?" And he says, "Well, everyone has WeChat in China." He says, "I don't know a single person without it.
When you meet somebody in a work context, they don't give you a name card anymore. They share their WeChat. If you play for a football team, training details are on WeChat.
Children's school arrangements, WeChat. Tinder-style dates, WeChat. Movie tickets, WeChat. News stream, WeChat."
And even though it's regarded as being pretty insecure from a technical point of view, at least he says so, because all of the data under Chinese law can be sent directly to the Chinese government, everybody uses it.
And if you want to have a normal life in China, then you have to use it too.
Hong Kong's still got the same legal, financial, and political protections or political freedoms from the days when it was a British colony before '97.
And this is the sort of so-called one country, two systems arrangement that was part of the handover agreement.
But a lot of people in Hong Kong, and we saw at the weekend around 2 million people came out to demonstrate against a new law on extradition to China, which the government there were trying to introduce, they really worry that they are in danger of losing these freedoms.
And that wasn't helped by the fact that during the protests last week, there were violent protests after the police started tear gassing people.
The Chinese government appeared to have attempted to take down Telegram, which is a messaging app that the organizers were using to coordinate movement.
I mean, it was a pretty impressive achievement to coordinate the movement of half a million people in a fast-moving demonstration.
But afterwards Telegram came out and said, "We had a huge denial of service attack on our servers and most of the IP addresses for that attack were Chinese." I don't know if you saw, I actually loved how they described how the attack happened.
And they said the server is busy telling the Whopper lemmings that they've come to the wrong place, but there are so many of them that the server can't see you to try and take your order.
And that's how they described a denial of service attack.
How do you launch anyway a denial of service attack on a messaging app?
And wouldn't Telegram have recognized that if they had a huge number of requests from China, they would be bogus because there can't be that many people in China who have access to Telegram?
So I'm sure they did respond to it and managed to divert it.
Telegram, like any of these online services, will have infrastructure online which has been bombarded with requests, or maybe requests which it's trying to process and which clog it up and thus make the service difficult.
And this denial of service, it affected users around the world, didn't it? There were many people who couldn't access Telegram systems while it was going on.
I was also very interested to see that the protesters in Hong Kong weren't just using Telegram, they were using another app called FireChat.
And FireChat's very interesting because you can use it even if you don't have internet access or even a cell phone connection. Because—
So it's helpful if you've got a lot of people in the same kind of place to communicate with each other.
Hospitals in Hong Kong and accessing the database of people who had entered with the feeling that if people had been hurt in the trouble, then that is how they would be able to identify people who were in the protest area.
Awful. And they had apparently a backdoor into this database, which the hospitals only found out about when the police were using it.
They identified some of the people involved in organizing the protest. And picked one or two of those guys up.
And basically, once you're inside someone's phone, if you can get into their phone, then you can access the groups that they're messaging to.
It's not like WhatsApp, which has been limited after it was misused.
Just finally, if you want a real life Orwellian fright about where this absurd conclusion reaches, there was a report that's also on the BBC website by John Sudworth there, one of their China correspondents, about Xinjiang province in western China where he managed to get into one of these— well, the Chinese call them reeducation centers.
Everyone else calls them concentration camps, which they think might hold a million people in this region in western China at the moment.
And he gets to talk to some of the people there, but obviously surrounded by minders the whole time.
But the quotes from that report, which you can find on the BBC website, are kind of mind-blowing.
Chinese officials saying, "Well, we can now tell whether someone's going to commit a crime in advance and so we put them in a reeducation center in order to deter this from happening." It's basically, it is literally 1984.
It's basically, yeah, they've worked out that people commit thought crimes and if they can intercept them first, then that's a good reason to lock them up.
And that's precisely what people in Hong Kong in the long run are afraid about.
Have you thought about that?
We've talked about smart alarms that fell over due to server issues, episode 100. And we've even mentioned smart baby monitors and smart thermostats.
Often there's no way even to update the firmware or even the software on these IoT gizmos.
Say, for example, after reading all the research that says it's perhaps not the cleverest idea, you decide to buy a smart fridge.
You might find out after a while that you can't update it anymore. Maybe it's not, you know, maybe it's out of date, or maybe they want you to buy a new one.
So you either, you either try and sell the fridge just to pass on the future vulnerabilities to someone else, neighborly style.
Or you decide to keep the fridge, which is connected to your Amazon Pantry or whatever, and then it gets hacked and you only find out when the Amazon delivery guy hands you 100 pounds of bleeding tofu burgers.
And we're going to talk about smart TVs, specifically Samsung smart TVs, because something a little weird happened on Monday this week. And I thought we could noodle on it.
And according to a Gizmodo article, it said, quote, please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of voice recognition.
So let me translate: Basically, whatever you say, we can record and we'll share with any other company or entity we like.
And the documents included a scary Samsung TV attack called Weeping Angel.
Now, I'm guessing the CIA had to create this smart TV spyware because Samsung two years ago was probably forced to take the wording out of their privacy agreement that anyone could get any recording they wanted.
They were basically already microphones back then. You're not with me. Have I lost everyone? Is James there?
Totally. So yeesh, that is what I call being in the soup, right?
And at the time, especially in 2017, basically this was like the nail in the coffin, many people thought, for Samsung from a security standpoint, because there had been all these snafus in the press.
And no surprise, after a shitstorm like this, Samsung needed to pull its finger out if it didn't want to hemorrhage customer loyalty or lose business and all that.
So it started— this is back in 2017— running social and marketing campaigns to design, basically to reassure the customer that the company Samsung was taking security very, very seriously.
For example, in one of the articles from 2017, it said Samsung is now offering smart TVs not one but two antivirus engines to detect and contain malware for its platform.
So Samsung has what is called the anti-malware vaccine engine, basically a McAfee product that they worked with. So they've been dealing with security for quite a long time.
Now fast forward to this past Monday, Samsung Support tweets out this tweet, right? Right.
Prevent malicious software attacks on your TV by scanning for viruses on your TV every few weeks. Here's how. And there's a link to a video, right, on the issue.
Right now the press are going a little bit nuts over this tweet, and the reason is because the tweet was deleted. Dum dum dum. So my issue with it is a little bit different.
Okay, like, is this 1994? What is with the weekly manual scans of a TV system?
I mean, for the love of everything, I didn't understand.
If they listen to it while you're using the TV, all they get is some sort of bad version of Gogglebox, some unedited version of Gogglebox. I mean, how boring would that be?
It feels like the TV manufacturers and the boy, oh boy, they've made some huge goofs in the past, not just Samsung, but LG, for instance, and others.
Others have spied upon what people are watching and doing things like that.
It feels like they're making their TVs smart in order to sell them more easily, but I'm not certain that needs to be integrated into the TV because you can get these little sticks, can't you?
Which plug into the back, which give you Netflix and Amazon Prime and, you know, look—
And one guy I saw on Reddit was suggesting that if people wanted to try and get a dumb TV and were having trouble getting one, one of the ways to do it is to look for hospitality TVs, TVs that are in hospitals or in waiting rooms.
But they tend to be a little bit more expensive than the smart TV, if you can imagine it. Now, why did Samsung delete the tweet?
So that tweet went out and then suddenly it disappeared and the media went a bit nuts going, isn't this outrageous?
And so when I dug into it, I'm thinking, they've been talking about this pretty openly since 2017 when shit hit the proverbial fan. So why the big deal?
And I wanted to see if you had any ideas.
And it's we didn't really need to do this. We could have just left it as a knowledge base article.
So you're thinking that there's a problem with Samsung TVs and they are desperate for people to scan them, and so they tweeted about how to scan them, and then they decided, well, to get even more attention about the need to scan them, we will remove the message telling people to scan them.
Is that what you're saying? I just want to be absolutely clear about this.
Cluley, I think we used that exact tactic a number of times in our PR days where you dribble a little thing out to the press and make it look like a mistake and pull it back so that they get all their attention.
They think they're on to a big winner.
I will maintain that I much prefer the idea of adding internet connectivity by plugging something into the back because you can just unplug it if it's got a problem, whereas it's much harder to disable if it's built into the TV.
I think you need to manually scan for viruses every few weeks. Maybe my recommendation is to stick to dumb TVs.
And until then, they're telling us to—
Crazy. Anyway, crazy.
Teaches you and your staff all about the risks of phishing and other threats which may impact them inside business.
You can grab it all and save yourself a ton of cash because you're a Smashing Security listener. Go to smashingsecurity.com/metacompliance.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
It's political because you may remember a couple of months ago that our good friend, Mr. Mueller, released his report into the meddling by Russian hackers into the US elections.
And have you read the report, Carole?
But I discovered today a video which is about 28 minutes long by the wonderful people at PBS, the American Public Broadcasting System.
And they have basically condensed the report down to its key findings. It's less than half an hour, as I say.
So if you've been— if you're fed up with all the grandstanding by the left and by the right as to what it said and what it didn't say and blah, blah, blah, blah, blah, blah, blah, blah, I'd recommend going and watching this video.
I thought it was a good way to spend half an hour, and you can be clued up as to what the main points are and the truth as to what was said and what was not said in that report.
Is it possible to kind of selectively reference the text in a PDF? I guess it must be, because there's one bit where he famously says—
You have to know where it is and find it on the page. But other text is searchable. So I don't know whether those guys at the FBI are extremely careful.
It was something that had to be sort of rescanned in and the Washington Post and whoever else had to use OCR technology to try and make it searchable.
James, what's your pick of the week?
I don't know if you've ever seen those on YouTube. I mean, it's an acquired taste, but it is truly—
Well, check out the action, I was going to say, on the pavements or sidewalks, because I know some of your listeners are in America, because that is equally hair-raising.
For about 10 years now, there's a group of young people calling themselves Stop Ham, and ham means something like asshole in Russian. And they've been literally—
Have been literally laying themselves on the line to combat arrogant drivers and inconsiderate parking on public pavements.
Now, in most places around the world, this wouldn't be considered massively controversial, but in Russia, this is enough to start a small war.
I mean, and really, these guys— I won't go into the politics of this. I mean, the politics of cars in Russia is very complicated.
And these guys apparently started off from a pro-Kremlin youth movement called Nashi, which have got a very bad reputation.
But that aside, the stuff they do in these videos, which is basically trying to get people not to use pavements as motorways, is— well, you wouldn't think that that was controversial, but in Russia it is, it turns out.
And the tactics they use, I won't go into it now, but you'll get the idea when you watch a couple of these videos, but they're very smart.
Nonviolent, but it requires enormous cojones. So they get abused by irate drivers in every episode. There are billions of episodes.
Or if you want to go and park outside your block, rather than driving around the block, you just drive straight across the garden through it.
And then of course there's an altercation, and these people get very irate about the fact that they've been stopped from just driving down the pavement.
And a couple of times these guys have had people pull guns on them, but there's none of that, none of the kind of people getting or anything on this.
No one was paying attention to the laws, the traffic lights, or anything, and the city hired mime artists to basically poke fun at anyone who broke any of the standardized laws.
And apparently it worked a treat.
But then there's a bunch of others of them filming it.
And then if they really refuse to back down or they try to drive through, they put one of those stickers, a huge sticker on the windscreen, one of those ones that's impossible to get off.
That basically says, "I'm an asshole." And then these guys have to then drive around, either spend an hour trying to remove the sticker or drive around town with this enormous sticker on their windscreen saying—
It's like one of those, you know, when you get a sticker on a book and sometimes they come off nicely and sometimes, and these stickers don't come off easily, do they?
And they paper the whole vehicle. And so basically you see these guys driving, I mean, but they do it on the window so they don't damage the car.
That's the kind of the cute thing about it. Anyway, as I say, it's a YouTube rabbit hole, and once you start watching these, you'll end up watching more.
There's a list of categories and there's quite a lot of content, about 3,000 documentaries, lots of topics from physics, environment, design, art history, history.
So this morning I was watching one and this guy was talking about how if you want to get over anxiety, if you have anxiety over something you're going to do, say next time you have to do a talk, Graham, right?
And you're all nervous, right? Because you've only been doing them for 30 years, right? But you still get a little knee knocking, I'm sure. Okay, a way to get around that.
That was awesome." And apparently, it tricks your brain into thinking that now it's okay, not scary anymore, and you perform much better.
You can go in and get something for about 3 minutes, or you get something for an hour and a half, more long form. Anyone who likes to learn, I'm sure will enjoy it. Check it out.
IHaveNoTV.com. That's my pick of the week.
What's the best way they can get in contact with you or find out what you're up to or anything really? Are there any ways to do that?
Go and find us in the Smashing Security subreddit and you can discuss the show there with your fellow listeners.
We wouldn't have anyone to listen to us if you didn't exist.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
James Thomson
Show notes:
- Information about Cookies — ICO.
- All About Do Not Track.
- Apple is removing the Do Not Track toggle from Safari, but for a good reason — Macworld.
- Google Chrome privacy extension hasn't been updated for years — Graham Cluley.
- Tweet by Adam Rose — Twitter.
- Cookie Control plugin — Civic.
- China social media: WeChat and the Surveillance State — Stephen McDonell, BBC News.
- DDoS attack that knocked Telegram secure messaging service offline — Tripwire.
- Inside China's 'thought transformation' camps — BBC News.
- Scan your TV to prevent malware — Samsung.
- Samsung Deletes Frightening Tweet Warning That Its Smart TVs Can Get Viruses — Gizmodo.
- Samsung: Here's how we're securing your smart TV — ZDNet.
- Is the CIA's Weeping Angel spying on TV viewers? — Graham Cluley.
- Samsung's Android Replacement Is a Hacker's Dream — Motherboard.
- All of the Mueller report’s major findings in less than 30 minutes — PBS NewsHour, YouTube.
- СтопХам – Урок географии — YouTube.
- Where Mimes Patrolled the Streets and the Mayor Was Superman — New York Times.
- Documentaries – watch free online documentaries — IHaveNoTV.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Edgewise is the industry’s first zero-trust segmentation platform. It’s simple to use interface lets you stops data breaches by allowing only verified software to communicate within your cloud or data centre. Edgewise’s data-centric approach makes micro-segmentation simpler and more secure.
Learn more and get a free trial at edgewise.net.
People are the key to minimizing your Cyber Security risk posture. MetaCompliance makes this easier by providing a single platform for Phishing, Cybersecurity training, Policy, Privacy and Incident management.
Listeners can get a 10% discount off the high-quality CyberSecurity eLearning catalog by quoting the code SMASHING. Visit smashingsecurity.com/metacompliance now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

