
Login chaos for England’s contact tracing service, our drill-down on the Britain’s Huawei 5G ban, MGM’s blockbuster breach, and how to pronounce “Gigabyte.”
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.
Plus we have a bonus featured interview with Scott Petry, the co-founder of Authentic8, all about how you can browse the internet safely, securely, and anonymously when conducting research, collecting sensitive evidence, and analyzing data.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Today we showcase these 10 with our deep thanks: Yurik Taraday, Alexander Burris, Mark Kali, Daniel Tedman, Stuart Mann, David Matthews, Richard Hicks, Giselle Warwick, Neil Wilson, and Michael Crumb.
Thank you all. If you want to join the Smashing Security Patreon community, check us out at smashingsecurity.com/patreon. Now let's get this show on the road.
Hello, hello, and welcome to Smashing Security episode 187. My name's Graham Cluley.
Now, coming up on today's show, Graham is going to share the latest UK COVID tracing snafu. Maria asks, who are we when it comes to Huawei?
And I'll be showing how not to handle a ginormous data breach.
Plus, we have an amazing feature interview with the CEO of Authenticate, Scott Petry, where you can learn more about how they can provide resilient privacy to online work.
It's super cool. So stay tuned after Pick of the Week. And there's loads more coming up on this episode of Smashing Security.
France isn't Fantastic France. There's no Rather Super Russia, no Bloody Brilliant Belgium.
I mean, they tried to do an app, but it's had a few teething problems on the Isle of Wight, and they've admitted it's not actually very good.
Maybe they'll get back to it later in the year. Who knows? Who knows?
No, I actually mean that they've got people who are contacting people who've contracted COVID-19, working out where they've been, who they might have infected, trying to trace the infection.
That's obviously a good thing to do.
Can you tell me where you've been so I can contact some of those people and let them know that it's serious?" What we've been doing in the Commonwealth of Massachusetts, as a matter of fact.
Well, couldn't scammers phone up people, send text messages, and the government reassured us that, "You don't have to worry about that, because the genuine contact tracers—" Was there a cough there?
And so you don't have to worry about scammers. Now, who should be put in charge of this monumental challenge?
What great brain should organise this thing with the— Well, who they've ended up choosing is Dido Harding.
And Dido Harding is the ex-chief executive officer of TalkTalk, who were massively hacked by teenagers. Yeah, good communicator though.
Well, yes, she appeared on TV a lot talking about— What was it she was talking about? It was sequential attacks and ransomware.
It was her organisation which gave the go-ahead to the Cheltenham Horse Racing Festival, where oodles of people, over 250,000 people went, while most of the country was preparing for lockdown.
Oh. And then there was a flare-up of COVID-19 in Cheltenham.
She then broke the rules for her own course?
So before she got the job, a few weeks before, she had organised this thing where there was a flare-up of— So she's perfect.
I mean, to be honest, if you're going to trace lots of people who might have the infection, go down the list of people who went to the horse race, which she organised.
So she has access to the data. It makes a lot of sense to me. Anyway, it is what it is.
And in May, the UK government, Boris Johnson, stood up there and he said, we've got 25,000 contact tracers ready to go. He said, this is a world-beating test and tracing system.
We're going to train them up, and they're going to be starting to phone everybody up. So you may ask, now it's a couple of months later, how's it all going?
It'd be interesting to see what's happened since, because it was imminently about to be, you know—
Fabulous French again. So, yeah, it was going well until then, because this morning at 8 o'clock, the contact tracers tried to log into their online system from their homes.
As they do every day. But this day they were greeted with a message which said, "Your password has expired." You can't log in.
So everyone got the same email.
Now, do you have any guesses?
Similarly, this has happened to you as well, and you can't get through to the site because this is horrendous. Ah, okay.
So I would to remind everybody, I'm sure our listeners are very wise, but enforcing regular password changes just for the sake of it, every two months, not necessarily a good idea.
So only reset people's passwords if you've had a breach or something, or if you realize— Or it's weak. Yes, or if you realize you're reusing the same password.
Let's hope those 25,000 people, by the way, when they were registered, weren't all given the same password. Let's hope that wasn't the case, but who knows.
Exactly. Or number 2 or April. How do you know my password, Graham?
I mean, I think in this instance, fine, but I think a lot of companies out there still— and we used to recommend it, I used to work at a security firm where we recommend it.
In fact, internally, every 90 days the password was a forced change.
I'm not sure that the security experts at that particular company thought that was a good idea.
And this is a very good example as one of them. If everyone's password has to be changed on the same day, your site goes down.
Now, that does deal with that problem, but a better way to deal with that problem would be when someone leaves the company, reset any passwords which they had access to instead.
These are usually duct tape and bits of string, right? So, yeah, having a robust organization around that might be asking a lot.
So if we were talking about the company that we all used to work at when we used to do the hard password resets, I— there was another algorithm that was very common in the area where I worked, where someone I know, when she first started, her password was the top row of her keyboard, and the next reset it was the second row, and the third reset it was the third row.
And then by the time you got to, what, month 6 or 5, she could just go right back to the top again. So, brrr, across the top. Oh, wow. Yeah, that was her security. Yep.
Just keep going through. Yep. Yeah.
It sounded like a typical back and forth in the long battle between US and China and another little petty political point being scored by the United States against Huawei, which is the Chinese tech giant, right?
Yes. So you're probably very well aware that Huawei has been on the U.S.
quote entity list since May 2019, which means that in the United States you need to have government permission to sell Huawei's tech.
So this has trickled down to things like getting Google had to revoke Huawei's Android license. I think you guys have covered it a lot in previous episodes.
So basically bit by bit, the United States has been chipping away at Huawei's attempts to sort of infiltrate the United States market and the West in general, and trying to use different laws to force this telecom giant to stop working with the West and the United States under the guise of national and international security.
So the fear is that if the private sector in the United States, or heaven forbid the government, had any kind of Huawei kit, the Chinese government could spy and steal stuff.
So the new development in May of 2020, during this whole pandemic, which I think we're all aware of by now, is that the United States Commerce Department enacted a new regulation that made it super, super tough for Huawei to make their own semiconductor chips, which are, you know, the hardware brains that run smartphones and other important things.
The regulation said that as long as even the equipment used to make a semiconductor, for example, originates in the United States, the end product cannot be sold to Huawei.
So even if you're a Korean or Taiwanese semiconductor manufacturer, if you're using United States machines, you cannot sell chips to Huawei.
So even if you're in Korea selling to China, if your equipment's American, the United States government says your product is now under United States Commerce controls and you cannot sell.
TIL. Today I learned. Yep. So that happened in May. I know I was not paying attention, and this was we had other fish to fry.
This one totally slipped by me, and now we're seeing the repercussions of that.
So that move that the United States Commerce Department made effectively stopped the vast majority of chipmakers all over the world from doing business with Huawei.
So if you're a reputable chipmaker, and again, a lot of them are in Asia, no matter where you are, you can't do business with this huge tech giant.
So Huawei now has a super hard time making these brains of their products, these chips, and they have to find new sources to get them made, but they can't go to any of the reputable known folks in the supply chain all over the world.
So security analysts watching this on the sidelines were going, Huawei's probably going to have to either try to home source this, which is not going to be great, or try to find dodgier suppliers who really can't guarantee the security integrity of what they're making.
My dad was working for the United States. So, yeah, shame on you, Graham. Yeah, shame.
So I'm basking in that at the moment.
Okay, sorry. Anyway, so back to the extremely interesting semiconductor story. Yes, yes. So I just gotta say, this is sort of some interesting chess by the US Commerce Department.
Look at this interesting move. It does force the hand of pretty much everybody working with Huawei, no matter where you are.
So bringing me back to the whole reason I'm bringing this story up, as of today there are repercussions now for the United Kingdom.
So breaking news via the BBC this morning, there you go, UK's mobile providers are now being banned from buying new Huawei 5G equipment after 31st of December this year, and they must also remove all of Huawei's 5G kit from their networks by 2027.
So that's a freaking long time.
Well, a lot of the telecoms that they've been sort of working this out with said that if you try to do it sooner, that things will break, things will just break.
They can't do it much faster than this. So yeah, yeah, it is a long time.
Yeah, the UK government says that that stuff does not pose the same security risk because presumably it was made with the more trustworthy chips.
So the current thinking in pundit land is that the US's Commerce Department move in May against Huawei forced the UK's hand on this whole issue.
Oh yeah, because yeah, in response to the US sanction in May, Huawei tried to reassure the UK that they had this massive stockpile of trustworthy chips that they already had.
We got a deal for you guys. Yeah, we got a deal. They can pull from that stockpile to assure a safe 5G rollout across the UK.
But security analysts in the UK said that does not hold much water. So here we are. So this move is expected to delay the 5G rollout in the UK by about a year and cost £2 billion.
And, you know, I wonder if—
The chlorinated chicken.
This just seems like another escalation in this whole Cold War, if you want to call it that, because this is a serious amount of cash which China now isn't going to get, right?
As I said, if I was them, I would be pissed off. This is really something, and I'd be pissed off at both the UK and the US right now.
So there's no way this isn't gonna— there aren't going to be consequences to this. So I guess watch this space.
You're not going to have to send it in or replace any chips inside or anything like that.
It's just if you are in a country where you're able to buy Huawei devices, not the United States, their devices will probably get a lot harder to get your hands on and they may become unavailable.
And they're a lower cost alternative for smartphones, I believe. So this will have, at least on the consumer market, some consequences as well.
But thinking bigger picture in terms of US, China, UK, that whole triangulation, there's something's going to happen from this. I don't know what yet.
So we start way back in the beginning of the aftertimes. So February, right?
And this is when news of MGM Resorts, suffering a data leak, started making waves, not just because they left their data unsecured, but we were hearing that more than 10 million user accounts stolen from MGM Resorts were being basically auctioned on a hacking forum or published on a hacking forum.
And according to its analysis published in late February, the MGM data dump that was shared contained the personal details of 10 million former hotel guests, right?
We're not talking just regular guests like you or me or even the illustrious Maria.
We're talking like celebs like Justin Bieber and CEOs like Jack Dorsey and reporters and government officials and even employees at some of the world's largest tech companies.
Right, right. Anyway, so ZDNet had all these contact details and they thought, well, why don't we call some of these people up, right?
And say, hey, we're ZDNet verifying a huge dataset. Can you confirm this information is yours?
So they ended up chatting to loads of victims and the victims were, oh shit, yeah, that is my full name, my contact deets, yada, yada, yada.
And these folks also confirmed that they had stayed at the MGM Resort Hotel. So ZDNet were, we're onto something here. Okay, okay, so we're still in February now, right? Right.
So ZDNet now contact MGM Resorts going, hey guys, we found this data dump and we've kind of confirmed a few deets, and could it be you're the digital version of Typhoid Mary here, right?
Because basically they hadn't yet admitted publicly that something had gone on. Oh, I see, right. And ZDNet get this response within an hour from MGM Resorts security people, right?
And it says, quote, this is back in February.
So quote, last summer we discovered unauthorized access to a cloud server that contained a limited amount of information for certain previous guests of MGM Resorts.
We are confident that no financial payment card or password data was involved in this matter. Did you— did I say sorry? Did you hear the sorry there?
Now, I don't know what that means for the rest of the people that were in that data dump. You know, I'm sure they're not all US citizens.
There might have been Canadians, for instance, or maybe Europeans or Africans or Asians or anyone from all over. And how does that apply?
So when they contacted people, none of them had stayed at a hotel past 2017, and some of the phone numbers they had called were disconnected.
But of course many were still valid because how many people change house or change phone numbers, or I don't know, change their date of birth, right?
The size and the severity of this MGM Resorts security incidents pale in comparison to the massive data breach that impacted Marriott Hotels in 2017, when hundreds of millions of users were stolen by Chinese state-sponsored hackers.
Hackers. Sorry, who said that? This was at the end of the ZDNet article.
So, well, lo and behold, it seems that either MGM Resorts either played down the extensiveness of this hack, or despite having claimed they had two independent forensic teams analyze the situation way back in February, maybe they failed to notice that perhaps the problem was way bigger than was reported back in February.
This is a data leak monitoring service operated by Night Lion Security.
So ZDNet contact the founder of Night Lion Security, and Vinny Troia, in a phone call with ZDNet, said his company never owned a copy of the full MGM database, and the hackers are merely trying to ruin his company's reputation.
Who knows? Anywho, what does ZDNet do next?
They contact MGM Resorts for a quote saying, "Hey dudes, looks like maybe we missed a zero or something here because..." And they provided a quote which says, quote, MGM Resorts was aware of the scope of this previously reported incident from last summer and has already addressed the situation.
You know, not the important stuff like financial information, just your private personal information. So they still have not apologized.
There was a quote you read on— you saw something on Twitter just before we started recording, Graham. Do you remember what it said?
So the only way you can fight back is basically do not stay at MGM Resorts. That's what I would say. Shame on you, MGM Resorts.
So I, yeah, just shaking my head at them because they should know better. This is not an acceptable response. This story is a mess. Not your fault.
The facts of the story are an absolute mess.
Have I Silo for Research Toolbox from Authenticate is a secure and anonymous web browsing solution that enables threat intelligence, security, and public safety professionals to conduct research, collect evidence, and analyze data across the open, deep, and darkweb.
To learn how Silo for Research enables teams to timely and efficiently investigate while ensuring maximum security and oversight to ensure compliance, including GDPR, go to smashingsecurity.com/authenticate.
That's smashingsecurity.com/authenticate, and that is spelled authentic with a number 8 on the end. Use a password manager.
It's time that everybody uses a password manager, both at home and at work.
Now get this, LastPass from LogMeIn offer businesses a secure vault with centralized secure access, single sign-on, and simplifies remote management of all these accounts.
And guess what, you home users out there? You can get LastPass free. For more info, go to smashingsecurity.com/lastpass. That's smashingsecurity.com/lastpass.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Better not be. And my Pick of the Week this week is not security-related. Good. It is a website, a rather cute website.
And what it does is it says, let's face it, we're all stuck indoors. It's going to be a while till we travel again.
Wouldn't you like to look out through someone else's window somewhere else in the world?
And on the website windowswap.com, and there's a dash between window and swap, you can see movies through other people's windows all around the world.
And some of them are really rather relaxing. Oh, this is nice.
What they are is you get to submit to the makers of the site who are Sonali Ranjit and Vaishnav Balasubramanian.
You can submit a 10-minute video file, which obviously they vet and watch, and then they put it up on the site if they like it. So it's not a live stream. It's just 10 minutes.
But some of them are really charming and relaxing.
Once again, can we go back to this?
How do you pronounce the file format that ends with .gif? How do you pronounce that? GIF?
I should—
So if you're a company and you kind of want free resource on how to build a security policy in your company, NIST has a ton of up-to-date resources.
So just sorry, just doing a little ad for them, but it is good stuff.
And we should also be saying gigabyte.
Fauci going around telling people to wear masks, and we've been reliably told that maybe we shouldn't do that.
And maybe similarly, we shouldn't trust these people trying to tell us that gigabyte isn't pronounced gigabyte.
Because during a pandemic, if you're on the lookout for a partner, that's gonna suck. Yes. And I was thinking, oh, you know, I wonder what's going on.
And then I was scrolling through my pods and I found this pod that I subscribed to, I don't know, a few years ago, a year ago, and I'd never listened to it. And it's called No.
I think I probably read about it somewhere, subscribed to it, and there it was sitting my feet.
And this is where— this is not for kids, this is not for kids— but this is where the host Caitlin Prest explores her kind of sexual— Sorry, my mom's calling me.
So where the host Caitlin Prest explores her kind of sexual boundaries and how she may have managed or mismanaged some of the situations as she kind of, I don't know, slalom through boyfriends, friends with benefits, all the stuff.
But even cooler than that, so A, I recommend listening to it. I'm not saying you're gonna agree with it all. I'm not saying you will or won't. It's just worth listening to.
It's gonna stretch your mind a bit.
But even cooler is that a show that I have listened to for more than a decade, Radiolab, did this retrospective on this Caitlin No series that she did.
And so they kind of sum up her 4 episodes into 1 tiny episode, and then they kind of explore it from different points of view, what she kind of covered in her show.
It's fascinating. Check it out, or don't. All right. Or don't, you know.
Maria, I'm sure lots of our listeners would love to follow you online and tell you that you're wrong about how to pronounce gigabyte. Gigabyte.
And don't forget, if you want to be sure never to miss another episode, please subscribe in your favorite podcast app, such as Apple Podcasts, Spotify, or Pocket Casts.
Also, huge thank you to this week's Smashing Security sponsors, Authenticate and LastPass. Their support helps us give you this show for free.
And make sure to stay tuned for our exclusive feature interview with Scott Petry, co-founder and CEO of Authenticate.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
And that basically means that as users interact with web services, we provide an intermediary web environment that conducts all their actions for them and turns whatever they're doing online into a safe, secure, benign, policy-controlled, audited work stream.
So you can think about Authenticate as basically providing a platform that allows people to access the internet using browsers running on our platform rather than the browser on their own local device.
The proliferation of cloud applications, people moving all their personal activities, you know, banks and healthcare providers starting to provide web access portals for users.
People were using the regular browser that came with their computer, using the browser to store passwords, to download data, cache information, keep their local state in that environment.
At the same time, advertisers or bad actors are using the exact same channel of delivering web code to try to corrupt those systems.
And so when we started the company, we were thinking about pretty much a broad array of issues associated with the browser, and anonymity and privacy is absolutely one of those things.
But also integrity of the page code when you render a page, or the ability to manage credentials without those being stored in a place that's susceptible to exploit, or checking the integrity of a link to ensure it's not routing off to a rogue server somewhere before someone clicks it.
So we really looked at this holistically.
I mean, the web security world is defined by probably 12 different categories of product that live either at the endpoint, at the network, or at some sort of edge-based control mechanism.
And what we said was, why don't we take all of those capabilities and embed them in the application itself called the browser? And that's how we built this platform.
So you basically provide a browser that allows people to do work that, and it protects their identity and it kind of anonymizes them, not pseudo-anonymizes them, but anonymizes them.
Wow, better than GDPR.
But, you know, we used to refer to the platform as a cloud browser before the analyst community started to track this concept of virtual browser infrastructure or started become a category.
Because the idea is basically you run the browser as a service and it lives in our platform. You have a secure connection to it.
At that point, you're basically sort of using an intermediary or proxy— I don't want to say proxy for the technical reasons, but sort of metaphorical proxy to get out to the internet.
That platform becomes the sacrificial lamb, and it keeps everything you're doing at arm's length from anybody on the other side of the equation.
Is that you're letting someone browse the internet like they would normally, but they're kind of doing it inside a protected bubble.
And if anything bad happens in it, it's not gonna cause them any harm.
It's more than just display, it's audio, video, et cetera. It's binary files if authorized.
But then the important thing, Graham, also is that in addition to that bubble, a lot of our customers are operating in compliance-oriented organizations, or they have sensitive workflows like law enforcement investigations or financial activities.
We provide a full suite of administrative policies as well to control device access, data policies like upload and download, and then we have the ability for all activity to be logged centrally regardless of device, network, et cetera.
And that log data is all encrypted with customer-controlled keys. So the customer gets to control their data rather than us controlling their data.
Whereas if you're working inside that sort of environment you're describing, everything is sort of getting logged for you.
When IT gives a financial crimes investigator a set of tools, they are by definition doing things outside of corporate policy.
They're going to a website perhaps or interacting on an internet forum that a normal employee wouldn't be allowed to get to.
They're interacting with web code that could be damaging to the organization that a normal employee wouldn't be allowed to transit the gateway and come into the environment.
And so, they're giving the employee these tools that allow them to conduct their investigations anonymously and securely, as Carole, you know, as you said.
But it's also still inside of the realm of control, where IT has positive visibility over how the tool is being used and to prevent abuse, which is a critical part of the compliance equation as well.
The first company was an email security company that was also a pioneer in the cloud space, and it became a pretty well-known company.
And that was an awesome platform because we could sell the same thing to every customer.
And if I knew then what I know now, the cross to bear, or the challenge for our company is that we're not a single platform for a single customer.
It's not like you can just go to every organization and say replace your browser.
It's a little bit more difficult than that because of a variety of reasons, whether it's user preference issues or whether it's IT change management issues or whatever.
What we've been able to do though, and what our market differentiation is, is that our product can be configured very specifically for very specific use cases.
So yes, we have financial services firms using us for forms of financial fraud and money laundering investigations. Yes, we absolutely have law firms using us.
The use case there is slightly different though.
That might be an environment where the senior partners need to get access to social media sites or personal sites, but the legal IT doesn't want that information to be commingled with sensitive client data on the same device.
And so they can use our platform as a way to give a second window onto the internet where there's no data commingling, if you understand that.
We have— It's almost like a virtual safe room. 100%, 100%.
And with the recent change to the way everybody works, if this was a video conference, you'd see me in one of the bedrooms in my house. And this is my office now.
More and more people are working remotely, and so we've seen this idea of being able to take the browser and implement positive policy control and audit over the browser.
It allows IT to get back in control of what people are doing when they're working remote without having to give them a laptop and a VPN connection et cetera.
So we have a lot of organizations that are using this for regulated access to cloud applications, whether it's HR and payroll-related activity, call center, help desk-oriented activity.
Those employees are all working remotely now. When you send your employees home, how do you tell them, okay, be careful when you log into Freshdesk, right?
How does it work? Do they get to test it out or—
You don't need to put network kit, you don't need to have a guy come visit your home and configure your router or anything, right?
You basically can see— exactly, you sign up for the product. We certainly give evaluations, we give trials.
You can, like a web conferencing system, you can use the browser to access the platform or you can install a native client to access the platform.
We support the traditional compute platforms and iOS.
Then you basically run it like you would use a browser, whether it's inside a tab in Chrome or whether it's a window and a separate application.
It looks like, acts like, quacks like a regular browser environment.
Now the splitting of the use case though, you might have people who want to have two separate environments, but in a pre-COVID world, IT liked to be able to say if you're going to X, render it in the local browser.
If you're going to Y, that's when we'll use this web isolation platform.
And so needless to say, we have all the IT integrations that you would want for traditional network environments as well, including the ability to forward URLs or redirect URLs to our platform.
So you can say, my employee is going to be doing access to their behind-the-firewall web application from their local browser.
But if they go to Facebook, that kicks over into our platform and that would be all seamless to the user.
I apologize if it's obvious, but so I'm using this browser and I go to something like Facebook or a page where I need to authenticate my login instance, right?
So then how does that work? Do I just have to enter my password and it's Facebook knows that I'm the right person, but no one can trace it back to my particular IP address?
But an important point though, Carole, is once you give Facebook your identity, now they can track you through other things. Once you're logged in, they can drop a cookie.
And I won't get into how we handle cookies, but you can either choose to save cookies or you can choose to have them purged. And we offer some capabilities around that.
But if you're using the web anonymously, means you're not logging in regardless of the platform. As soon as you log in, server-side, they know who you are.
Non-attributed access when you're doing investigations.
One of the things that you have to tell people is it just doesn't work like, it should not work like a normal browser where you order your pizza in one tab and you investigate the bitcoin transaction in another tab because you're mixing your environments there and those are all certain tells that can tell your adversary that you're conducting this investigation.
So it just shows sort of how insidious this entire internet technology stack is when you have to think that carefully about what you're doing in this application on your computer to determine whether bad guys are tracking you or not.
I have to do research on lots of different things that are unseemly, technologically unsound, immoral, unethical.
And from my search results, it might look, I might be getting fed information from YouTube and the like that is completely unwarranted for my interests.
My second favorite story of customer acquisition was we have the ability to sign up on the web and we saw a name that was a name brand TV news anchor and signed up, took a 30-day trial, swiped his credit card and was using it.
And about 6 weeks later, we got contacted from the CISO of that media organization and did a deal with them.
So the idea of individual users using it as a way to maintain safety and anonymity online is certainly important, more so for media people.
You can keep yourself and your sources secure and basically untracked if you use our product in conjunction with some other pretty standard good messaging hygiene.
And so you can begin to collect data like that with both the toolbox and Lightbeam as well, which is one of your— is that an add-on for it?
You are free to do that, but if you read our privacy policy, we're extremely clear that we don't use this platform as a way for us to collect user data or statistics and use those in any marketing or analytics type of way.
And it sort of plays against us sometimes, Graham, because a lot of security companies like to tout dashboards that say how many exploits they've blocked or how— we just don't want to express anything surrounding how our customers are using our product.
And when they encrypt their logs, we don't have access— we wouldn't have access to that even if we were so motivated.
So we've really— we give you the tools to do that and collect the information, but we're not trying to aggregate that and create side business and monetize the data like so many awful companies are.
It's not the kind of data which you want lurking about on your drives or being collected either, because it's going to be abused by someone in marketing or they could have a data breach one day.
So yeah, who wants it, frankly? Exactly.
I see on your smashingsecurity.com/authenticate page you're offering a curated list of open-source intelligence research tools that you guys have. Tell me about that.
And so we've curated this list of different open-source tools that would help people conduct their investigations.
And we like it if they want to try using those tools inside of our product.
If they don't, use a virtual environment in their local computer so they don't taint their own environment.
But as they conduct their research, this is a handy list of tools that can be used for people to dig a little bit deeper and learn more about companies or properties or regions as they conduct their investigations.
I know a lot of people that will love this, and the best bit is you don't even have a gate on it, which is sometimes a beautiful, beautiful thing.
So on the behalf of the tech community, I thank you for that.
Give something to get something. Exactly.
I would just say that this idea of a web isolation platform and Silo as a browser running in a remote environment, it sounds very simple, but as you peel back and understand more about how the browser betrays you on a daily basis, whether you're using it for your own personal social connections and the cookies are being dropped and you're being tracked, or whether you want to do some actual research on the web, it just makes no sense to let all of that arbitrary third-party code come into your environment and execute.
And it's shocking to me that we have become so cavalier about it. And literally $100 billion plus is being spent on securing the environment after people have rendered a web page.
So the last thing I would say is, if you're listening to this and that makes sense, give it a try.
Hosts:
Graham Cluley:
Carole Theriault:
Guests:
Maria Varmazis:
Scott Petry – @imscottpetry
Show notes:
- Coronavirus: Contact tracers in England 'locked out of accounts' — Sky News.
- TalkTalk’s ex-CEO Dido Harding heads up the UK’s Coronavirus tracing app… — Graham Cluley.
- Apparently Coronavirus-tracing scammers won’t sound professional… (Yeah, right!) — Graham Cluley.
- Huawei 5G kit must be removed from UK by 2027 — BBC News.
- US sanctions make Huawei more of a security risk, says leaked UK report — The Verge.
- A different future for telecoms in the UK — NCSC.
- Commerce Addresses Huawei’s Efforts to Undermine Entity List, Restricts Products Designed and Produced with U.S. Technologies — U.S. Department of Commerce.
- A hacker is selling details of 142 million MGM hotel guests on the dark web — ZDNet.
- WindowSwap.
- How do you pronounce "Gigawatt"? — Waldo Jaquith on Twitter.
- Metric (SI) Prefixes — NIST.
- No podcast.
- In the No Part 1 — Radiolab.
- 21 OSINT Tools for Cyber Threat Intelligence — Authentic8.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Silo for Research (Toolbox) from Authentic8 is a secure and anonymous web browsing solution that enables threat intelligence, security, and public safety professionals to conduct research, collect evidence, and analyze data across the open, deep and dark web.
To learn how Silo for Research enables teams to timely and efficiently investigate, while ensuring maximum security and oversight to ensure compliance – including GDPR – go to smashingsecurity.com/authentic8 now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


I'm wondering where UK will be buying 5G equipment from?