
Ransom acts of kindness are top of our mind, as we also explore how bad bots are hogging more and more of the internet’s activity, and look at how deepfakes could be a good thing after all.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Ray [REDACTED].
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Would I be able to do that?
My name's Graham Cluley.
Hello, Ray. RAY [REDACTED]. Hello, hello. It is good to be back.
There's been all kinds of weird ransomware, unusual things which ransomware has done. I remember a piece of ransomware called Popcorn Time.
Sometimes I talk about it in presentations because it's quite unusual. It gives you an option when it asks you to pay the money. It says, look, you can pay us the old-fashioned way.
You can go and get yourself some bitcoin and you can transfer the bitcoin to us.
If you send this link to enough of your friends or family or work colleagues, God.
And you manage to trick them into infecting their own computers with the Popcorn Time ransomware, and they end up paying, then you will get your data back for free. Oh my God.
And what it did was it demanded you send 10 nude pictures of yourself as payment. Or if you're particularly keen to get the decryption key, maybe only send 5 nude pictures.
They might prefer that. I don't know. But yeah, a rather unusual piece of ransomware that. And there was Rensenware.
Rensenware was one which actually came with an embedded video arcade game, like an old-style arcade game.
And you had to reach a certain high score inside the game to decrypt your files.
So there's been all kinds of madness in the ransomware world, as well as the actual traditional infections demanding cryptocurrency.
And there's now another strange oddity in the world of ransomware. And it has been discovered by a security firm called CloudSec. And they have called it the Goodwill ransomware.
It encrypts your documents, your photographs, your videos, your databases, all of the data that you actually want.
It wants you to perform 3 acts of kindness and provide—
I made my coworker a sandwich for lunch. RAY [REDACTED]. Wow, that's actually very kind. That's a good one too. Right?
It's not that big a deal, really.
It says, "We're not hungry for money or wealth, but kindness.
We want to make every person on the planet to be kind and want to give them a hard lesson to always help poor and needy people." So Carole, I'm afraid your coworker emptying the dishwasher isn't good enough for them.
They want you to take a deep breath, look around for all of those who need help. So they give you some examples.
The first request they make is for you to donate new clothes and blankets to the homeless.
RAY [REDACTED]. Okay, okay.
I was following the instructions to the letter. I did not know that you got to bend the rules.
Not the T-back thongs that you're envisioning with the jewels.
So, once you've done that, and you've shared it online with the appropriate hashtags, and shared it with the criminal masterminds as well, we need to go on to the second act.
And what this involves is finding 5 poor children under the age of 13, and taking them to Domino's, Pizza Hut, or Kentucky Fried Chicken, and allow them to order any food that they wish.
What do we think of that?
Well, you know, it's really funny that you would say that because when the invasion in Ukraine happened, all those Conti ransomware group files leaked.
First of all, it turned out that their inner workings was a bad corporation.
I mean, they had layers of hierarchy of management and they were using tools like EDR, but a lot of the employees thought they were working for a marketing company, an ad company.
That's what they were told. So maybe it was for Pepsi, KFC or Domino's.
Screenshot the bill, send an email to us, they say, with the link to get your files back.
So, and the final one, the final one involves providing financial assistance to those who need urgent medical help. Who can't afford to pay for it themselves.
I imagine, by the way, that this is in America where I believe you have to pay to, if you get hit by a car or something, whereas most of the civilised world, if you're badly injured, you can just get treatment.
But anyway, they are saying visit a nearby hospital, look around the crowd, and you should be able to find some people who need money urgently for their treatment.
And you have to go up to them and talk to them and say, hey, look, I'd like to help.
Yeah, look after the homeless, help people that need it, all that, you know, feed the people that need it. Absolutely.
I worry about their tactics to force me to do it, on one, because it doesn't seem a very nice thing to put ransomware on my machine.
So it doesn't feel they're eating their own cereal, right? They're not eating their own Cheerios. RAY [REDACTED]. Are you a Good Samaritan if you have a gun pointed at your head?
And number two, it also feels they've offloaded a lot of the responsibility to me, because if they are typical ransomware users, they would just take my money and then they could do all that stuff themselves.
They probably want you to look at this list of things that you have to do and go, okay, never mind, here's 20 bitcoins, just go away. I don't hate you now.
You gave me, you gave me an opportunity.
You know, would I be able to do that? Or maybe Photoshop—
And then right when you're negotiating with him, he whips out a Screen Actors Guild card and says, "I need scale." Why isn't one of the things there, can you give to one of these 5 recognized charities?
I just don't agree with the ransomware in the first place.
To go online and say, "I have just very generously given $100." You're not saying I'm generous, you're saying I was forced by a ransomware gang.
Normally, I would never donate the money. But in this exceptional circumstance, I am prepared to. So I wonder if this might be the beginning of something. RAY [REDACTED].
Well, you'll know if you watch LinkedIn, because LinkedIn would become overrun with all these pictures and everyone would have 5 kids in their photo. Exactly 5.
He's an evil sort of trader or something.
You know, custard pie Bill Gates.
Let the record show I am warning that this kind of ransom kindness madness could get out of hand and could become a big problem. RAY [REDACTED]. But why KFC?
Cheese is this child horror show with animatronic puppets that sing to the children and they play arcade games.
And it definitely should be one of your stories one of these days because— Oh.
RAY [REDACTED]. Well, Graham, Carole, when you were children, were you taught that there were good bugs and bad bugs? Did anyone ever try to classify bugs for you?
So here in deep in the heart of Texas, we were taught that certain bugs were good bugs and certain bugs were bad bugs.
You didn't kill certain spiders because they would eat mosquitoes and you wouldn't kill certain snakes because they would do this or that.
Everything was classified as either a good bug or a bad bug.
And then it was only much later in life that you kind of realized that in an ecosystem, there's not really necessarily good and bad.
It's just that everything is kind of interreliant. So, well, I don't know if you've been following the news lately.
But there's this chap named Elon Musk that has been in the news with his takeover attempts of Twitter.
And one of the things that he said, among the less bizarre things that he has said, was that he believes that there are many more bots on Twitter—
How could you count those? How could you see those? I know there's a lot of tools out there that do that.
Well, it turns out there's a company on the internet that has been counting what they call bad bots and good bots for almost 10 years now.
They have bot catchers all over the world and they're counting up bad bot activity. Now, your first question's got to be, well, what makes a bot a bad bot, right?
We have bots from Google that crawl websites. We have bots that do things like price indexing for travel search engines, et cetera.
Well, they define bad bots as bots that are evasive, deceptive, or malicious. Okay.
And believe it or not, according to Imperva, about 42% of internet traffic in the last year wasn't human. And that's up from 40.8% in 2020.
And human activities decreased by 2.5% to 57.7%.
Now, the reason that that's extremely unusual is because of the fact that we still have a hybrid workplace COVID kind of quarantine situation, and internet traffic has generally been going up significantly year over year, primarily because of video.
So the bad bot traffic is outpacing the good human Netflix, Pornhub traffic, or whatever traffic that is.
Well, there may be bots playing that. There may be bots playing that at this point.
And they show you a bunch of pictures of feet or whatever. I don't know. Maybe I'm on different websites than you are.
But anyway, so OWASP, OWASP, who's kind of the authority when it comes to things like this, has defined 21 different bad bot use cases in their Automated Threat Handbook, which we will link in the notes.
But Imperva has got these great statistics over time. And we've seen certain trends that have happened specifically because more and more legitimate traffic is mobile.
And then when Apple put out their privacy changes a couple years ago that affected companies like Meta and a lot of the companies that were trying to do some malvertising or advertising on that side, there was a big movement of that.
And then of course, if you think about it, if there's a thing online where they do shoe drops, right, Kanye or somebody announces a new shoe, and the only way you can get it is to use a bot, right?
So all of that bot activity is out there and it's kind of swelling up and down, primarily used for things like DDoS attacks and often is a precursor to more sophisticated attacks.
So ticket scalping was the first killer app, right?
And then basically the scalpers would resell those. Well, they do that with shoes now too. Because Kanye will drop a shoe that's MSRP is maybe like $169 and they'll go for thousands.
So people can actually rent bots to try to get shoes, to try to get tickets, or they can just simply outsource that.
And so that's a difficult type of bot is for being able to defeat retail services. There's a lot of that with regards to travel.
And notice the market increase in the number of mobile devices.
And if you look on the internet and you type in "bot farm," you will see pictures of people in certain countries where they'll have 128 mobile phones bolted together, all running a single program that basically are impersonating users.
And it's just another indicator of the type of activity that is kind of out there.
Interestingly enough, just like happens all the time on internet research, there really wasn't anything in the Imperva reports or the OWASP report about social media bots, which is kind of when I got started interested in that side.
And so there's kind of a raging debate. Is 20% are 20% of Twitter users inauthentic? Is it 50%? Does it matter how often they're used?
We all know there's definitely a bot problem on social media, but for the folks at Imperva, they actually point out that there's a lot more serious problems related to bad bots, right?
Well, and certain social dating websites, it would be much, much higher than that.
Does it change our behavior in any way, do you think? RAY [REDACTED]. Well, I think that the folks from Imperva really talk about kind of the level of severity of types of things.
So obviously things that are data scraping or stealing credentials, that's a very serious issue that needs to not only be monitored but also mitigated.
And they make recommendations for certain types of mitigation, you know, around proxies and things like that. But also they just think that awareness will drive a lot more.
You know, awareness is sort of the very first kind of step for that side, and especially with regards to account takeovers.
And, you know, we talk a lot about multifactor authentication circumvention.
And a lot of these bots are now being designed specifically to look like they are the telecommunications company asking for those tokens.
And so just always remember, never give out your MFA token unsolicited. No company will ever ask you that without you requesting it first, right?
And then they also talk about the fact that when it comes to account takeovers, just like dwell time is extremely important in cyber breaches, detection of account takeovers is extremely important so you can shut it down.
I mean, the simplest way to do that is with things like CAPTCHAs, but of course CAPTCHAs are quite irritating for the humans and they're not—
Is the pole, does the pole count as the traffic light? I've always wondered that. Is it the actual light or is it the pole too?
Such that they will then ultimately be able to invade our cities.
It's really, really odd and weird.
And in it, they talk about innovation and tech and how they've paid loads of actors and people to create a database for researchers to work from in terms of finding out about deepfakes and detecting deepfakes.
And a quote from that is, since the field is moving quickly, we'll add to this dataset as deepfake technology evolves over time. And we'll work with partners.
We firmly believe in supporting a thriving research community, yada, yada, yada.
So it came as a surprise to some of us that Google recently quietly banned deepfake projects on its Collaboratory or Colab service, putting an end to the large-scale utilization of the platform's resources for this purpose.
Now, for those who don't know about Colab, it's basically an online computing resource that allows researchers to run Python code directly through the browser.
So they can use free computing resources, right? Including GPUs to power their projects.
And it's meant to be used by researchers who need power that costs several thousands of dollars to help them reach their scientific goals, right?
And they've added to that creating deepfakes. So it's not known if Google performed this policy due to new ethical concerns or rampant abuse of its free computing resources.
But says Bleeping Computer, there are reports that some users are exploiting the platform's free tier to create deepfake models at scale.
Now, of course, all of us know of the bad things that deepfake— it's known as synthetic media, right? We all know about the bad deepfakes out there.
But I thought we could switch it up and look at some of the positive things that I've seen listed and see what we think of them.
Imagine being able to talk in your own voice to loved ones or colleagues even after losing your ability to speak.
Why do you always feed me this stupid, disgusting stuff?
And his family, they had an audio recording of him being interviewed, but for the purposes of the movie, they wanted Gerry Anderson talking.
And they did a remarkable job through deepfake technology.
Whereas deepfakes could democratize the cost of this VFX tech. And to make it at a fraction of cost, which means that people can do cute deepfake videos.
That use case kind of reminds me of when BitTorrent took off and there was a group of people that screamed and yelled that it was really just being used for Linux distributions.
I'm sure that there is a few people that would use deepfakes for that, but my concern is the percentage of positive use is probably a little bit outweighed by the percentage of negative and malicious use.
Maybe that's quite bad news for actors, maybe not just for Stallone, but other actors as well.
So out of everything, that's another interesting question I had, is when they say we can't use these resources for these things, and these are GPUs, right?
These are big farms of GPUs. How can they tell the difference between password cracking and positive use of deepfakes?
Or I mean, how would Google be able to monitor and tell what that is?
Carole, we already have a mop and it has your name on it and your photo, and now all we need is recordings to go with the mop because, you know, the mop is a great dancing partner, doesn't— not very good at dinner, but that's our virtual Carole.
We just need the voiceovers for it.
And it's a world's first investigation using artificially manipulated footage.
And it's this 13-year-old footballer who was shot dead in 2003 while throwing snowballs at his friends in a car park near a Rotterdam metro station.
And at the time, they just thought, oh, wrong place, wrong time.
But now they think there was an organized criminal fraud gang hanging out there, and they're hoping the deepfake video recreation of the boy's image and everything will help solve this cold case.
RAY [REDACTED].
Goodness, prosecuting crimes on synthetic evidence sounds like a lawyer's nightmare for me because they're actually making things up that aren't real and showing that video and saying, does this— is this what happened, right?
Because as you say, Ray, deepfakes are maybe not inherently bad as a tech, but I agree that right now we seem to have a lot more yucky examples than good examples out there.
I mean, we know this tech has been used for revenge, for political gain, for disruption, to induce shame, obedience.
I mean, even the EU put out a report to authorities, advised them to get on the deepfake bus because it is ripe to become a stable tool in organized crime.
So how do you control this stuff?
Corporate policies saying you can't do this and voluntary action from people on reporting it or making people aware of it.
Education and training, what we do, if we can call this any of that.
Except now, without Google's Colab, anti-deepfake tech might take a hit. Oh. So I don't know. It also says something to me that Google kind of kept stepping out of this little mess.
Like, does it smell something that we don't smell? Like, why is it pulled out of this completely? Because surely this is a really exciting, innovative time.
And I understand it's very controversial, but we need to have anti-deepfake tech as well, don't we?
Now, do you think that Matt Damon, when he made that crypto.com Super Bowl commercial, do you think he could go back now and say, nope, that wasn't me, that was a deepfake?
You get plausible deniability around that?
Now, you all know that we are big fans of password managers at Smashing Security because it's an important tool for generating and saving secure credentials for every online account.
Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments.
Bitwarden is transparent and secure using end-to-end and zero-knowledge encryption with source code that can be scrutinized.
Now you can go to bitwarden.com/smashing and try it for free across devices as an individual user, or you can start a free trial of a Teams Enterprise plan.
And the thing I like about this, a good password manager is robust and cost-effective as it can radically improve your chances of staying safe online, all without requiring super high-tech expertise.
Go to bitwarden.com/smashing. Start your free password manager trial today.
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. Enter your email when prompted, and you will receive a free Kolide goodie bag.
After your trial activates. You can try Kolide with all of its features on an unlimited number of devices for free, no credit card required.
Try it out at smashingsecurity.com/kolide. That's smashingsecurity.com/kolide. And thanks to Kolide for supporting the show.
And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
And he was saying to me, "Dad, Dad, can you set up Discord for me? Discord's cool. I've heard about Discord. I've watched YouTube videos about Discord."
And I said, "Well, I could, but then I'd have to get the other kids to set up Discord." And speaking to their parents is a nightmare because I'm not that nerdy and they're even less nerdy.
And rather than setting up Discord or coordinating mobile phones with the parents and making a call, oh, it's just all a big pain in the neck.
I thought there has to be a simpler way for these kids to talk to each other, which ideally doesn't cost me any money and is zero effort.
And it's free. You can do audio and video chat. There's nothing to download. You don't have to sign up. There's no payments required. They don't have any ads.
They don't resell your information. At least they say they don't. They don't keep track of anything you're doing online. They say they encrypt everything possible.
And it's really easy.
And what's the best thing about it from my son's point of view is while you're waiting for other people to join your room, you get to play a little video game of a lunar lander kind of game where you have a spacecraft and go, "Pfft, pfft," applying thrust.
So while you're waiting for people, you can sort of move it around the screen and try and land it properly. And it's really easy to use and has so far worked for them.
So if you wanted to have maybe a corporate chat video thing, they would be able to roll you out one and all the rest of it. So I think that's the reason why they've done this.
But it worked very well. RAY [REDACTED].
It's always a good question whenever you come across a domain name that ends in .io and has kind of catchy name and declares that they don't advertise or keep any logs.
It's always one you always wonder, how do they monetize? Am I the product?
They also say that they welcome anyone reporting any bugs and you will receive a detailed response within 48 hours, which is quite refreshing to see that in a privacy policy.
And the kids are able to chat to each other while they're giving each other cornflowers or messing around with redstone or whatever it is that they do in Minecraft.
And so Talky.io is my pick of the week.
When you are— yes, at home alone, or maybe perhaps not alone, and you've got a nice glass of wine and some good music on—
So I'm not used to alcohol and things, but what's a piloerection, Ray, dare I ask? RAY [REDACTED].
So piloerection is actually a physiological and physical response that you probably know more by the term of goosebumps.
And humans often experience this as part of something that scientists call frisson, which is derived from the French term of a sudden feeling or sensation of excitement, emotion, or thrill.
Now, at Queen Mary University in London, a group of scientists set out— I'm going to try to say these names, but it was led by Rémy Deflorian and Marcus Pearce— and they set out to try to find what it is about certain types of music that give you that frisson or that piloerection.
And they found music from people like Johnny Cash, Metallica, Celine Dion, Mozart, and built out a list of songs that are likely to give you chills, like in certain parts of the song or some certain parts, you kind of always get goosebumps.
These are the songs that you typically turn up really loud in the car.
No, I don't know that we need to take a cheap shot at Michael Bublé at this point in time, but certainly I will publish the list.
But what these scientists were interested in is they were interested in what's the difference between two songs that are back to back on the same album, and one of them gives you this frisson or this chills.
And it's almost universal, by the way. These are not highly individualized.
So they looked at a little bit less than 1,000 songs, and they identified 715 that are likely to give you chills, and they published it to Spotify.
So it's a Spotify playlist that actually has these songs on them.
Well, it is actually called a skin orgasm. That is actually called a skin orgasm, but I left that part out because I felt it was a little bit too racy for this.
But it also includes parts of movie— if you think about speeches, I mean, the classic example for Americans is probably the Rocky theme, because you know that right when he starts to get up, that Rocky kind of, you kind of get behind it or whatever.
And if you look through this playlist, by the way, and someone was kind enough to convert it to Apple Music and other formats as well.
But if you look at this playlist, you're going to see a lot of songs you recognize and you'll know immediately, oh yes, I know that.
I even know the part of that song that gives everybody the piloerection, right?
Or so, Carole, they do look at tempo and they do look at cadence and they do look at— but one of the most interesting explanations is something that musicologist David Huron calls contrastive valence theory, in which your feelings are suddenly contrasted.
So you start off feeling really bad, and then you feel really good, and then you get stronger and stronger and stronger, and then there's really no peak to that, right?
There's a lot of that in Broadway show tunes, right? When they reach that type of these—
Is that your Auto-Tune plug-in there, or no?
But anyway, so yes, they have this very fascinating scientific article. It has a lot of observations about anger and emotions.
Like, it has this playlist of 715 songs that you can drop into your MP3 player and listen to.
Now, it is very heavy on classical music, but even the pop songs from the '50s and '60s, you know, you'll recognize most of them and be able to identify why they were songs of the song.
Ration yourself, folks. Carole, what's your pick of the week?
Have you watched a bit of it?
And a battle rap is basically a rap roast where you tear a new one out of your opponent with, you know, spicy rhymes and stuff like that. Yeah, it's cool.
And it's against this— I don't know, driving around London as viewed from the dash cam. Yeah. And you might think, oh wow, he's zooming through the town really fast.
But no, no, no, it's all chill. Zen. It's ASMR. RAY [REDACTED]. Wow.
It's, oh, watch out for that cyclist there. Oh, maybe the blue van in front of me could have moved, but maybe I'll give him a little friendly beep.
So every sight is absorbed, appreciated. I think he stops in a cul-de-sac to watch an Amazon delivery guy robots struggle with the high curb.
You slow to allow a pigeon cross the road. You congratulate yourself for noticing a pedestrian about to cross from behind a parked van.
And we celebrate this thing that actually has changed now my life.
So three is the most you can get as an honest, authentic wave from someone passing a road. So I've been trying it because I've been on foot a lot in Oxford.
So I've been trying to do the triple wave. It's not easy to do, but it's making me, and people seem to like it.
So, you know, just adding a bit of Zen to the roads in England would not be a bad thing. I loved it. You loved it, Graham?
And I think that is a random act of kindness that we should encourage on this podcast.
I think just from looking on the YouTube ones, and I was going through them quickly because I've already watched them on the BBC, there were certain things that were missing that were on the BBC one.
So I think the fuller experience— I'd watch both. I'm gonna watch the YouTube ones. I want to see, right? So I would say check it out. It is a really fun, wonderful experience.
And it's comedy in a really fresh form. Zen Motoring, you can find it on YouTube and on BBC. We have the links in the show notes. And that is my pick of the week. RAY [REDACTED].
Now, Carole, do you think that if this was extremely successful, there might be an American version where we just drive all over the place, cut people off and give them the finger?
RAY [REDACTED]. Oh, they can follow me at Ray [REDACTED].com. That's R-A-Y-R-E-D-A-C-T-E-D.com.
Don't forget to ensure you never miss another episode. You know how to do that. Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 276 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Ray [REDACTED] – @RayRedacted
Show notes:
- Popcorn Time ransomware invites you to get ‘nasty’ to recover your files — Graham Cluley.
- Rensenware — Wikipedia.
- GoodWill ransomware forces victims to donate to the poor and provides financial assistance to patients in need — CloudSEK.
- Bad Bot Report — Imperva.
- Bad Bot Traffic Report: Almost Half of All 2021 Internet Traffic Was Not Human — CPO Magazine.
- Automated Threats – web applications — OWASP.
- Home Stallone [Deepfake] — YouTube.
- The Emergence of Deepfake Technology: A Review — ResearchGate.
- Positive Use Cases of Synthetic Media (aka Deepfakes) | — Towards Data Science.
- Deepfake pornography could become an 'epidemic', expert warns — BBC News.
- Europol report finds deepfake technology could become staple tool for organised crime — Europol.
- Google quietly bans deepfake training projects on Colab — Bleeping Computer.
- Japanese man spends £12,500 on ultra-realistic dog costume so he can live like an animal — Daily Mail.
- Google Colab FAQ.
- Talky.
- The Relationship Between Valence and Chills in Music: A Corpus Analysis.
- Frisson: This playlist is scientifically verified to give you chills — Big Think.
- A Spotify playlist with 715 songs known to give people chills — Quartz.
- Songs to give you chills — Spotify playlist.
- Zen Motoring — BBC iPlayer.
- Ogmios School of Zen Motoring Ep 1 — YouTube.
- Zen School of Motoring: TV that will cleanse your spirit like meditation — The Guardian.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
A password manager is an important tool for generating and saving secure credentials for every online account. Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments. Open source with published 3rd party security audits, Bitwarden is transparent and secure, utilizing end-to-end and zero knowledge encryption with source code that can be scrutinized by all.
Learn how Bitwarden can help you do business faster and more securely at bitwarden.com/smashing and start a free business plan trial today.
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
