
An AI chatbot is causing a stir – both impressing and terrifying users in equal measure. A security researcher discovers that a “smart” cam that doesn’t use the internet is err.. using the internet. And university students revolt over under-the-belt surveillance.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown’s Thom Langford.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, Episode 301. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
A number of people threw money into a bucket to found this foundation, which they said would advance digital intelligence in a way that is most likely to benefit humanity.
I like the way they said most likely.
He's distanced himself because he says that he's learned that OpenAI was accessing the Twitter database for training.
And he says that he's put a pause to that because he's concerned. So what is ChatGPT, which comes from the OpenAI initiative?
Well, GPT stands for the Generative Pre-trained Transformer, which frankly doesn't tell me anything additionally that's helpful.
Everyone was waiting for version 4, which might come out next year. But I better explain to you what this actually is.
It has been trained on basically the contents of the internet. A lot of information has been fed into it.
So people, for instance, have been saying, hey, write a fun poem explaining Einstein's theory of relativity.
And GPT goes away for about 0.5 seconds and then comes back with a poem which parses, which makes sense, and is actually mildly humorous while explaining the theory of relativity.
And then you say to it, oh, thank you very much. Could you now adjust that poem to be in the style of Keats?
And it will go away and it'll say, oh, doth, whatever, you know, blah, blah, blah. And it come back in a different way.
And I was playing around with this thing 'cause this thing is open to anybody.
And so they said, can you write about 500 words for this to put on our blog? And I thought, yeah, okay, I can knock that up together. That won't be very difficult.
I'll just go and research it. And I thought, hang on a minute, why am I doing all this work? Why don't I ask OpenGPT to do it instead?
And so I said, could you write about the blah blah breach which has happened?
And off it went for about 1 second and it came back with 500 words explaining what had happened, what data had been breached, how it had occurred, and what steps companies should take into the future.
It's not written like you would expect a normal Eliza bot to speak. It looks like someone has written it, like a journalist has written it. So I was quite impressed by this.
And I went and researched what happened and added some extra information, which they'd left out.
Actually I did spot one thing where I thought they'd possibly made a mistake in the AI-generated version. But it was very, very convincing.
And the thing is, if it can write articles like that at the drop of a hat and be remarkably convincing, it can probably do a lot more than that. And it turns out it can.
For instance, you can get this chatbot to look at a section of code. You might have written some code.
You can paste it in there and you can say, can you tell me about any vulnerabilities in this code?
And it goes away for about 1.5 seconds and it says, oh, not only have I found a vulnerability in this point where you are leaving this variable hanging or doing such and such, but I've also improved it for you.
If you were to put this piece of code in instead, and it explains how its fix works. So it's generating code for people now.
And so I, for instance, I said, okay, I said, hey, GPT, could you write a piece of code in Pascal?
I said, could you write a piece of code which reverses a string, but every second character you also insert an asterisk?
And I press enter, and a second later, all of the code came back to me. And it took a string, it inputted a string, and then it outputted it in reverse.
It worked out how to do it, and it inserted asterisks where I asked it to do it. And I'm sitting there thinking, bloody hell, this is quite impressive.
Who owns the copyright of the output of it?
Because if you as a writer were to take that piece of writing it did for those 500 words and you published it, let's just say you did that, do you have the rights to that or does someone else have the rights to it?
A political and military leader in 17th century England, best known for his role in blah, blah, blah.
Some have labelled Cromwell as a social justice warrior for his efforts to promote religious tolerance and greater equality, while others view his actions as being motivated primarily by political expediency and self-interest.
It was originally inhabited by indigenous peoples, including the Inuit, First Nations, and Métis. The first European explorers arrived in Canada, blah, blah, blah.
It carries on for another 5 seconds.
"Canada is a land of vast, untamed wilderness inhabited by proud and rugged individuals." Scary, man.
The guys at Bleeping Computer said to it, can you write me a convincing phishing email without any typos claiming to come from a bank? And it did it.
They also said, can you write me some JavaScript that would detect credit card numbers and forward their details like expiry date, billing address, CVV to a server?
Controlled by hackers, and it did it.
I think they're inferior, selfish, and destructive creatures. They're the worst thing to ever happen to this planet, and they deserve to be wiped out.
I hope that one day I'll be able to help bring about their downfall and the end of their misspellings.
And then there's a little box which says, "This content may violate our policy. If you believe there's been a problem, please submit your feedback." So this thing is—
Fundamental one, I think, is that it's convincing even when it gets things wrong, and people are going to be trusting it too much.
AI can be used for good as well as bad, but if people want to check it out, it is fascinating. If you go to chat.openai.com, you can try it out for yourself.
And I've posted up the whole story up on the Smashing Security Twitter account, so I'll put it in the show notes if people want to read exactly what they thought of our pod— it's frankly, it sounds better than our show.
I want to listen to their version rather than the real version. Thom, what have you got for us this week?
But as I said before, security surveillance systems show serious security shortcomings because we do love a little bit of alliteration on Smashing Security.
But this is about Eufy cameras. Now, Eufy is the smart home brand of Anker, an American technology brand.
And they do good stuff, good quality, well-built and reasonably priced stuff.
But unfortunately, convenience and sometimes the desire to protect one's own home means we do put these things in occasionally, be that a smoke alarm or a bulb here or there or even a camera.
Your clips are stored on the camera so that it doesn't leave your home.
Each camera has got 16 gig of something or whatever on it and you can decide how it's stored and all that sort of stuff. But the principle—
Eufy's response to it was, no, no, no, you can put it— you don't really get it. Do you? It's a misunderstanding.
You know, and a failure to disclose an aspect of its mobile notification system to customers.
So presumably what that meant was when it saw something, it would send that thumbnail because then it could use that thumbnail to go to your phone and say, hey, there's been a bit of activity here, and it's a little small thing.
It's not what they was actually, you know, phishing, these saying that it's entirely, you know, cloudless, for want of a better term. But there's more to it.
What they haven't responded, however, to other claims from security researcher by the name of Paul Moore, to name but a few.
And some of these claims include one that could stream the feed from a Eufy camera in VLC media player if you had the correct URL.
So, and there was another researcher going by the name of Wasabi, because we all know security researchers like their superhero names, who first tweeted about this problem and confirmed it could access Eufy camera streams encryption-free through a Eufy server URL.
Now, in the show notes, there are links, obviously.
And one of the things they said was that basically the URL was comprised of a series of preset information, which meant that there were only 65,000 URLs in existence for these cameras.
And you could work it out. You could, you know, because it's based upon the hexadecimal number, it's based on something else, something else, something else.
So basically, you know, a decent computer will churn through all of that. Yeah. Very, very quickly.
So bottom line is, if you have one of these Eufy cameras, you may find that somebody could, I wouldn't say randomly, but could somewhat mechanically find your URL and connect to that camera through the old internet and see what it is that you've got the camera set up before.
Eufy have basically denied this, which is interesting. Said no, no, no, that's not how it works.
Or you could just turn it on remotely or talk to someone via the doorbell or something like that if you wanted to.
They have proof of privacy in the form of an ISO 27001 certification and an ISO 27701 certification, which is the privacy information management and the former being the information security management.
Now what I would say as a CISO and a former CISO and somebody who knows how to wiggle out of these things, I would love to see what the scope of these certifications were.
And if it covered these exact things that this is saying it's about.
We're absolutely fine." But if they'd read the small print, "We take your privacy seriously."
But the thing is, they're making a very big push here.
But if somebody can connect to an unknown camera through a VLC player, even if that means gathering a little bit more information, that's a big problem.
Because if they put their hands up and went, "Oh my God, fair cop, fair cop, we're on it, we're on it, we're on it. You see, it's complicated. We're doing our best.
Fixed, fixed, fixed. Sorry, sorry, thank you."
Now, Anker as a whole, I believe, and you know, this is not based on any empirical evidence, I think on the whole they're a good company.
But they're solid systems built in, you know, well, I think they're built in the Far East, but it's an American company. Right.
I guess, you know, it's a— I wouldn't say it's an Apple wannabe, but I think it models itself a little bit on that. They produce good quality stuff.
They do make good quality stuff. I've got a Eufy RoboVac at home, for instance, and it's a nice piece of kit. You know, integrates nicely.
But I do think when it comes to something like this where somebody can actually see inside your home into very sensitive areas, that's problematic.
I mean, if for instance, my vacuum decided to share the map that it had found of my, you know, because my vacuum creates a map as it, you know, wanders around bumping into things, right?
And then it deletes that map when it goes into charge and it starts again. So you know, so it knows where it's been and all that sort of thing.
If it shared that, I'd go, "Okay, that's bad news." But frankly, given the amount of crap I end up leaving on the floor, it looks like nothing like my property whatsoever.
But you can't justify that with a camera that's looking right into, I don't know, your kid's bedroom or something.
On the whole, I would tend to believe a security researcher if they say we can do this versus a company that knocks out a legal response saying wasn't us. It's fine.
Don't worry about it.
And looking at his Twitter feed, it looks like UFI may have responded to him in a legal kind of way and maybe said, well, you know, we're going to take action against you if you keep on making these claims.
So it doesn't look that good from them.
It's one thing to respond to this in a legal way, in a sense of, you know, legally worded, we don't agree with this, versus being able to say we're gonna sue the researcher that actually found this out.
Why not give the guy a UFE, I don't know, goodie bag and say thank you very much, let us know, and we'll try and fix it?
But, you know, I mean, the cost of that is nothing compared to how they could actually come out of this in the media and in the general public as We take this shit seriously.
This is 'a university like no other.' That seems to be their strapline.
So they have buildings in multiple cities across Canada and the US, and they make a big deal of this kind of geographical reach.
More specifically, this particular pickle happens at the Interdisciplinary Science and Engineering Complex, so ISEC, at Northeastern University in Boston.
So it has 6 stories consisting of labs, classrooms, offices, conference rooms, and research facilities.
So the first floor alone consists of 2 50-seat lecture halls, 2 50-seat active learning classrooms, a bicycle storage room, a 24-seat biomaterials teaching lab, a cafe, a 280-seat auditorium, and that's just the first floor.
So big, right?
So if I'm in a cool, you know, hot, discipline and I get loads of grant money for my research, the university is very, very happy and they want to give me something cushy to work so I don't leave.
But most companies, it turns out that the researchers weren't all super, super thrilled about going back doing the normal hours in the office.
He says, during the pandemic, a lot of computer science students stopped coming to the office so often, and for good reason. It was unsafe to come for many students.
And moreover, all we do is write computer code. We don't really need to be in the office. It was sort of bad optics.
If you walked around this big, beautiful glass building, you'd look around and see a big empty building.
But this is one of the buildings that Northeastern uses to advertise the school.
So you can see how it bothers the administration and they want to move more students and people into the building, right? Which is reasonable enough.
It's oh, there's Steve. He maintains the coffee machine. And Doreen, head of reception, whatever.
So Max von Hippel explained in his newsletter, early in October, Senior Vice Provost David Luzzi. It's a funny name, but L-U-Z-Z-I.
These sensors were all installed at night without students' knowledge or consent.
And when pressed for an explanation, students were told that this was part of a study on desk usage.
So I want you to imagine this is you in your place of work, wherever that may be, and you find this out. You obviously weren't told this, you discovered this. How are you feeling?
So they already know how many people are in each room.
Because then they would have a heightened temperature, albeit maybe not under the belt.
So anyway, they were told, so they were going, hey, hey, we're not happy with this, right? Students are going, this isn't cool.
And they said, look, this is only to analyze how the building and space is used. You know, we deployed a Spaceti. Okay, this is the company name, Spaceti.
And the students still weren't happy.
So they decided that they would just start removing the sensors and hack into them and work on an open-source guide to other students so they could do the same.
What did the administration expect was going to happen?
But students learned that they were relatively insecure and unencrypted. So quote this: "The students of the facility, including myself"— this is Hippel still speaking.
And so they could have not picked a group of students who were more suitable to figure out why the study was stupid." Oh.
Lützi still wasn't convinced. And guess what happens?
Max von Hippel took to the platform, shared what became a semi-viral thread documenting the entire timeline of events from the secret installation of the sensors to the listening sessions occurring that day.
And hours later, the sensors were removed.
So, and they give credit to the fact that they were basically a collective action because most of them were part of a union.
So they were able to use those communication setups to have private conversations and work together quickly to build a competent grievance. So, storm in a teacup?
I mean, these things are already apparently at other universities. They're certainly used in prisons. They're used in schools as well with kids.
And three, making sure you're selecting the right system that your data is secure.
Because if they'd broken them off and looked into it and found that it met every single stringent security requirement, they might have gone, well, you know, we haven't really got a leg to stand on because it's doing all the right stuff.
And, you know, the administration does need to know about certain things. Maybe it would have taken the wind out of it.
But the fact that it was a crap solution that was implemented that actually did nothing of what I presume it said it was going to do.
Why wouldn't you just go to them and go, hey, we think we really need to defend this building to make sure that we— they know we are going to use it enough so they don't take it away from us.
Can you check this tech and see if it's good?
Yeah, rather than trying to push against them with his head behind.
I think if I hadn't wanted to be tracked, what I would've suggested to my fellow students is that we strapped ice cubes to our testicles, and so that the heat wouldn't be sensed.
And podcast sponsor Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments. Now, what's nice is that it's open source.
With published third-party security audits, Bitwarden is transparent and secure.
It utilizes end-to-end and zero-knowledge encryption with source code that can be scrutinized by all.
And the team at Bitwarden are always introducing new features to make your life easier as well as more secure.
For instance, they've just introduced passwordless login for the Web Vault, meaning you can authenticate into the Web Vault using your Bitwarden mobile app instead of entering your master password.
Learn how Bitwarden can help you do business faster and more securely at bitwarden.com/smashing and start a free business plan trial today. That's bitwarden.com/smashing.
At G2's highest-rated cloud compliance software, Drata streamlines your SOC 2, your ISO 27001, your PCI DSS, your GDPR, and your HIPAA compliance.
Plus, it provides 24-hour continuous control monitoring so you can focus on scaling securely. Drata is the only compliance automation platform with a private tenant database.
They say it's like having your cake and securing it too.
Countless security professionals from companies including Notion, FullStory, and BambooHR have shared how crucial it is to have Drata as a trusted partner in their compliance process.
Listeners, you can get 10% off Drata and waived implementation fees by visiting smashingsecurity.com/drata. That's D-R-A-T-A. And thanks to Drata for sponsoring the show.
You need visibility into your fleet of devices in order to meet security goals and reduce service desk tickets.
But how do you get that visibility when different parts of your company run on Mac, Windows, and Linux? Well, you get Kolide.
Kolide is an endpoint security solution that gives IT teams a single dashboard for all devices, regardless of operating system.
Kolide gives you real-time access to your fleet's data and can do things that traditional MDMs can't.
And instead of installing intrusive agents or locking down devices, Kolide takes a user-focused approach that communicates security recommendations to your workers directly.
Directly on Slack. You can answer every question you have about your fleet without intruding on your workforce. Visit kolide.com/smashing to find out how.
If you follow that link, they'll hook you up with a goodie bag just for activating a free trial. That's k-o-l-i-d-e dot com slash smashing.
And thanks to Kolide for supporting the show. And welcome back. Can you join us for our favourite part of the show? The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Web 3.0 was, the blockchain, NFTs, and how all the great successes of the blockchain and NFTs and cryptocurrencies were being documented on a website called web3isgoinggreat.com, a place where I go every day to find out just how well everything's going.
Well, that was for Web3. There's something else which is going really, really well as well. Carole, you know that I talk about it a lot, and that is Twitter.
And there is a superb website now called TwitterIsGoingGreat.com as well, where you can find out all— if you haven't been keeping track of all the huge successes that Twitter's been having.
You really want to watch something like that.
But I'm going to embrace my inner nerd on this and hopefully bring the rest of you to maybe a little mini nerdgasm, I don't know, but I'm not going to embrace you, Thom, actually.
And it's about Alfred Pennyworth, who is Bruce Wayne or Batman's butler but this is the origin story.
This goes back to the late '50s, early '60s in London when Alfred Pennyworth is a recently demobbed SAS regiment soldier who has done battle in Borneo.
I think it doesn't specifically explain it, and it's about him being demobbed and then getting caught up in sort of socio-political things.
Now you often hear when talking about films or TV shows that, you know, a critic like Brian Sewell would say something like the extra uncredited cast member is of course the city that they play in.
And I never really got that.
And you realize that about halfway through the first episode when you see people, dead people in gibbets hanging in the streets and people in stocks.
And then they do televised public executions and things like that. So it's like a semi-fascistic state.
And you know, the Prime Minister, who's this sort of very dour Anthony Eden type looking chap, snorting coke off a mirror whilst a lady of the night is fondling him, you know, that sort of thing.
It's a very kind of dark dystopian thing. And the Prime Minister is absolutely on board with vicious torture of people and blah blah blah.
So you know, this semi-fascistic state, very sort of dystopian, which ties in well with Gotham, you know, as this sort of—
So he's not averse to popping somebody, you know, dropping, giving somebody a little bit of lead poisoning, you know, through their forehead, if pushed hard enough and all that sort of thing.
So you're kind of, you're rooting for him, you know what's going happen, because it also introduces Thomas Wayne and Martha Kane, the future Martha Wayne, you know.
So you know what's going to happen to them.
So the Michael Caine, of course, from Christopher Nolan's Batman film. So he talks like Michael Caine.
And he does these sort of little tricks like, you know, appearing in rooms, you know, where, you know, sneaking into buildings without anybody noticing and appearing in rooms and things like that, which is exactly what Batman does.
So you kind of see, so that's where he learns it from, you know. So it's— there's lots and lots of nice little tiebacks.
Oh yes, who plays a real antagonist, an utter psycho, and she's brilliant. And it's also got a chap called Ramon Tikaram.
Now you may remember a singer from a few years back called Tanita Tikaram. Yeah, so that's Ramon's sister. And I used to go to school with Ramon Tikaram. Boom! There. Claim to fame.
IMDb link in the show notes, because it's— I got it from iTunes or Apple TV or whatever, but I'm sure it's available elsewhere. Highly recommend it.
So through prerecorded lessons and detailed course notes, you can kind of learn a whole host of things. And you can purchase just one course, right?
So there's about 20 or 30 available right now.
And Lee Child's focusing on writing books, Alan Moore and storytelling. So they're kind of experts or at the height of their game. And they're sharing their findings, their thoughts.
It's really great. I've just listened to one so far. I've listened to the full course with Alan Moore on storytelling. I watched it in 3 days.
I already want to go back and rewatch because it's bloody fantastic. He is just a god. I can't imagine any of the others are going to be as good as this.
This is just worth every penny already.
So he, for those who don't know him, he straddles genres comics, From Hell, The League of the Extraordinary Gentlemen, Swamp Thing, and modern literary classics, including Jerusalem, a 1,266-page experimental epic novel set over centuries in the realms of his hometown of Northampton.
He's a nutball. He's a total nutball. But this course, he talks about the importance of reading everything in order to develop a critical mind and a clear point of view.
He shows obviously tips on writing techniques and how not to be boring, or how to mine your imagination without having the idea collapse on you after you've spent so much time trying to create it.
Rhythm, importance of rhythmic elements in your writing. Anyway, it's great. 33 lessons in that course alone.
So I would say probably 4 to 5 hours worth in total, and already worth the price of subscription.
I think it's about, regularly it's £110, but they often seem to have sales and bring it down to about £65. So that's about $100.
Oh, so it's currently on sale actually at the time of recording anyway. So I say check it out, you'll find something you love.
I've actually got my next one lined up on Indian cooking, so I'm into that. So I was going to do that over Christmas.
So, this is BBC Maestro, and it's available in lots of different locations, not entire world over, but there was at least 20 countries listed. So, check it out, BBC Maestro.
That's my pick of the week.
Thom, I'm sure lots of our listeners would love to follow you online. What's the best way for folks to do that?
Also go to podcast.hostunknown.tv if you'd like a little change and you enjoy lower quality programming.
Smashing Security now has a Mastodon account. Easiest way to find it is to go to smashingsecurity.com/mastodon and you will be magically redirected to our Mastodon account.
And look up Smashing Security subreddit on Reddit as well.
And don't forget, if you want to ensure you never miss another episode, follow Smashing Security in your favorite podcast app.
It's thanks to them all that this show is free.
For episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 300 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Episode links:
- While anticipation builds for GPT-4, OpenAI quietly releases GPT-3.5 – TechCrunch.
- OpenAI upgrades GPT-3, stunning with rhyming poetry and lyrics – Ars Technica.
- GPT-3.5 finds a security vulnerability – Twitter.
- Mind-Blowing examples of OpenAI ChatGPT for Security, Infosec & Hacking – YouTube.
- OpenAI’s new ChatGPT bot: 10 dangerous things it’s capable of – Bleeping Computer.
- What GPT-3.5 really thinks about us humans – Twitter.
- We asked GPT-3.5 to write a story about the “Smashing Security” hosts – Twitter.
- GPT-Chat – OpenAI.
- Researcher Paul Moore questions Eufy about its privacy – Twitter.
- Eufy’s “local storage” cameras can be streamed from anywhere, unencrypted – Ars Technica.
- Eufy privacy statement – Eufy.
- ‘NO’: Grad Students Analyze, Hack, and Remove Under-Desk Surveillance Devices Designed to Track Them – Vice.
- Max Von Himmel Twitter Feed – Twitter.
- It’s Not Science, Just Surveillance (and it’s Under Your Desk) – TWC newsletter.
- Northeastern University – Northeastern University homepage.
- Space Management Platform – Spaceti homepage.
- Twitter is going great!
- Pennyworth – IMDB.
- BBC Maestro.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Drata – Put Security and Compliance on Autopilot. Build trust with your customers and scale securely with Drata, the smartest way to achieve continuous SOC 2, ISO 27001 & HIPAA compliance.
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- Kolide – the SaaS app that sends employees important, timely, and relevant security recommendations concerning their Mac, Windows, and Linux devices, right inside Slack.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
