Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:00
packers viruses mall
0:02
where there must be more than
0:04
fifty ways to lose your crypto but
0:07
one of the ways is when you voluntarily
0:09
handed over to criminals who are demanding
0:11
a ransom this can be the
0:13
result of ran somewhere what
0:16
is this insidious method of extracting
0:18
money from people how did it come to be
0:21
and how are you and your data at
0:23
risk today we're joined by trent
0:25
fowler an expert in the area of ransom
0:27
where you'll want know what it is and
0:30
how you can protect yourself it's
0:32
little dark but as usual we try
0:34
to keep it light an episode number six
0:36
hundred and eighteen
0:37
the
0:40
bed crypto podcast prior
1:05
the email or meaning little release
1:08
the pictures we have travis
1:11
rights
1:14
funny so , i got my
1:17
my phone sim has backed
1:19
out and seventy and eleven really early episodes
1:22
episodes i'm trying to frighten me and like
1:24
oh we're going to release these naked pictures
1:27
of these hot women you have on your our
1:29
own our why
1:31
would you to forgive me now
1:33
i'm in town as within hey within atlanta
1:40
they are are both ,
1:42
travelers welcome
1:46
friends to the bad could go podcast know
1:48
you know how out on a trip those not bad
1:50
but we are this we
1:53
are show for the crypto curious the
1:55
crypto serious and those who prefer
1:58
their block chain and crypto in though
2:00
with little bit of levity were
2:02
coming up on five years
2:04
were just a few weeks out from our fifth anniversary
2:08
so if you want bake actually we are two
2:10
and half weeks out pretty much a
2:12
month yeah didn't july
2:14
sixteenth and with the twenty seventh today
2:16
that like less than three weeks my gosh
2:19
i need make appointments need to scylla limitations
2:22
the to get manicure pedicure
2:26
for me like i never use like
2:28
i'm an errand got a gal who comes here
2:31
and she does pedicures to
2:33
an nc like spends lot time
2:35
massaging and i'm like this
2:37
is basically power iraq
2:43
there my billie hydrocodone we
2:45
will not let let's just yeah let's
2:48
keep inside and not let it outside
2:50
our you find out until
2:52
you do your comedy bet that
2:54
features i know you're working on a new routine
2:56
right now that's gonna be very funny the
2:59
be funny i'm outsider some fire
3:01
gov the i'd be up on stage and cracking
3:03
jokes guys make his eyes makes makes me
3:06
feel good make people laugh yeah that
3:08
figures you know and some time and twenty twenty three
3:10
going around certain cities the
3:12
comedy you know the interesting as well
3:14
as like which one of our audience members
3:17
wouldn't would come and see me how do
3:19
comedy if i was in their cities and
3:21
so maybe that can actually help me determine
3:23
which cities go oh,
3:24
oh yeah so send us us an email, bad
3:27
cripple podcast at gmail.com and invite
3:29
travis we we would like a formal
3:32
letter written inviting him to
3:35
attend a comedy stand
3:37
up up microphone place in your your city
3:39
that
3:40
would would be be great, but
3:48
i called resident, and actually
3:51
keep track how many days that
3:53
you've been in or on the island
3:55
and suffer for tax purposes or whatnot
3:57
so mean to porto rico for eighty three days
4:00
the bar which is almost it into joseph
4:02
can be about half of year i've been here
4:05
a beer united states forty one day was
4:07
means you can only be in there for what
4:09
three months or some and the i'd say
4:11
three months tops six my my
4:13
was on the island so just see you know
4:15
i would about one hundred and fifty days on the island
4:17
so i'm almost there
4:19
you're almost there are as
4:21
i've added some time in mexico as i got
4:23
i got times where look at me i got six
4:25
months last night's gonna be here for three more months
4:27
so that's pretty good but see you can't be and
4:29
united states more than three months so i might
4:32
be able to go and do some comedy this
4:34
year little bit some time and time again that
4:36
by how many days i have on the island thinking
4:39
about this i'm actually working on a comedy routine
4:41
in spanish the give
4:43
em an hour and comedy place
4:45
here and six with think it's gonna be
4:47
horrible but will be funny
4:49
for me to go up and try to do comedy
4:52
in spanish like the to me that's like like
4:54
an additional level or talent though
4:58
we have an interview
5:00
you discuss this is usually the banter
5:02
we save for after the interview both good banter
5:04
and i am and think gov i would
5:06
come and see you give that spanish
5:09
i would know what you're saying but just
5:11
to lack of air dodges is gonna be simple
5:13
terms panics yeah here's something
5:15
that's not funny ransom were super
5:17
not funny and ah but this interview
5:19
at trent followers very interesting you're
5:21
gonna want to listen to every last little
5:24
morsel of it so you know what to watch
5:26
out for and here we go
5:31
malware know with not
5:33
what you get at the mall that
5:36
you can wear it malware is
5:38
something far more insidious than
5:40
that which you might pick up at heart
5:43
the topic it is
5:45
bad stuff on your computer and
5:47
mahler's more marlowe very
5:49
bad very bad as the course
5:51
it's sort forks malicious but
5:54
also works in french toast
5:56
mas is bad in
5:59
french something twenty nine year old
6:01
air missile jolo oh he goes back to
6:03
latin if we really wanted to get nerdy about it feeling of santa
6:05
tracker and eleven speaking of nerds at other voice
6:07
that you here right now would be our guest for
6:09
today his name is trent fowler
6:11
he's an author data scientists block chain
6:14
endless business strategist and
6:16
co-host of the future rowdy podcast
6:19
he's here today to talk all about
6:21
a kind of mall where that's even
6:23
more mall it's called
6:25
ransom where trent
6:28
welcome to the bed crypto podcast it
6:31
is an honor and privilege to join
6:33
you to fine upstanding gentleman on the back
6:35
of i guess it is both those things
6:37
but i must comment that we are neither find
6:39
or upstanding we are bad
6:42
sir lawrence argyle
6:44
but ah i'm so far as
6:49
, may i'm good with it's i saw
6:51
you know i suppose little bit about your
6:54
your background but maybe tell us little
6:56
bit more of your history
6:58
and why you are so passionate
7:01
about dubbed the scott topic of ran
7:03
somewhere
7:04
absolutely i always begin the answer that
7:06
question i'm asking how far you go back so
7:08
you you want college do want past three years
7:11
want was interesting however
7:13
not all the way back to the whoop prince
7:16
wealth it's it's it's was interesting ought to start to
7:18
days i woke up nothing prior to
7:20
my parents the spot as as an issue my lights
7:22
this is your high watermark right here without
7:24
about it's all downhill we have a
7:26
good way to say your home on lot that
7:29
a blanket of brick wall then
7:31
a tapestry on your wall
7:33
their that looks like revolt the
7:36
will not as bad an actual brick wall
7:38
that has been painted to look as though it's
7:40
a painting of a brick wall so it's it's a
7:42
tricky you twice oh man so
7:44
many
7:45
yeah yeah it's great for full
7:47
for you once shame
7:49
on you ,
7:52
me twice shame we won't have
7:55
as arrogant that's so i
7:57
guess what's interesting guess they
8:00
went to korea in two thousand and eleven because
8:02
i graduated a few months prior to
8:04
that no no jobs in colorado sort the
8:06
three for two years of study english and i
8:08
learned three and but that ultimately didn't give
8:10
to skip that i was hoping to get was very
8:12
interesting features topics so
8:14
came back to states in two thousand and thirteen i
8:17
was a professional writer and editor
8:19
doing as the a separate predominately
8:21
for about five years and during that time
8:23
at thomas frogs marcos with each
8:25
i podcasts and we started
8:27
putting events together a just building little
8:29
features community here in colorado
8:32
two thousand and eighteen my
8:34
my daughter had been born my dad
8:36
was kind of getting sick with cancer
8:38
and so just needed to make some changes my life's
8:40
and went to the galvanize data science program
8:43
in denver colorado and retracts and
8:45
she murdered engineer and data scientists
8:47
and in the three three and half or years
8:49
since i've been data scientist at
8:51
a couple of different startups too difficult to assets
8:53
startups and in
8:55
that time has fallen in love with the
8:57
block chain and it's and
8:59
it's and peril so it's true that
9:01
route i became aware of ran somewhere a topic
9:05
we discussed with cyber security professionals and
9:07
is it come on the art as before but
9:09
yeah it is a fascinating subjects and
9:11
it's one that care that lot about and has ramifications
9:13
for for crypto for cyber security number
9:15
i'd even geopolitics national security
9:18
as as we seen in recent months the soviets it's
9:20
really time wrote an article on before
9:22
so a lot you will probably don't know what
9:24
rants wary of i do i was the
9:26
global digital strategist
9:28
at symantec for the norton antivirus brands
9:31
i'm very familiar with the pets
9:33
keenest that is ransomware
9:35
but maybe i will look at me i'm
9:37
travis right? i know i'm
9:40
certainly not for
9:43
a
9:45
few years you know these things ahead
9:53
and you ask him travis even though i know what it
9:55
we go ahead and give your definition
9:57
of us to print fowler around ran
9:59
somewhere why is it so not the goods
10:02
right absolutely so obvious that only to inform you
10:04
travis far as industry veteran what this
10:06
is the for the blasts i'll explain itself
10:09
as as joelle alluded to in the
10:11
introduction mall where is essentially
10:13
just any nasty thing that person manages to
10:15
sneak onto your computer and it's a broader
10:17
term than ransom i read somewhere that kind
10:19
of malware and the named
10:21
as good job of communicating it's purpose ransom
10:24
where is used insect assistance
10:26
in order to encrypt or x will treat data
10:28
on that system in an attempt to extort
10:30
ransom out of out of person so
10:33
you it encrypt data
10:35
pictures of your grandkids whatever on your computer
10:37
and in charge a person x amount of x
10:39
number of dollars or bitcoins in order to
10:41
get that back and in some cases
10:44
these ransom or groups will actually
10:46
do double extortion where they will pull
10:48
the data off in a force you to pay for
10:50
it twice wants to unencrypted data and once for
10:52
them to delete their copy of it because in some
10:54
cases they will actually take the ransom
10:56
and in release the data anyway because it turns
10:58
out cybercriminals just not good
11:00
people general and so
11:02
true you know i've heard multiple
11:05
places like it was recently
11:07
was law firm that i had heard where they had
11:09
somebody was like look we got all your
11:12
data they had it on the clouds
11:14
somehow or and the google drive but they had locked
11:16
it they couldn't get through it any more they deleted
11:18
it off of there and we have all
11:20
your files for all your cases
11:22
you gotta give us some ridiculous ten
11:24
bitcoin and thirty bitcoin some stupid
11:27
and then the
11:28
thing is is that are these
11:30
guys are scamming you so
11:32
even if you decide okay it's worth
11:34
it for me to give them is twenty five bitcoin
11:37
whatever it says no guarantee there's going everyone
11:39
unlock the data in the first place right
11:41
inside like it's almost like you're damned
11:43
if you do damned if you don't want this guy
11:46
absolutely in there's the general question of whether or not you're
11:48
incentivizing them to continue guess you have to
11:50
do that calculation for yourself whether not the
11:52
data sensitive enough to warrant paying the ransom
11:54
but over time read somewhere groups
11:56
who the are made up pretty technically savvy people
11:59
realize that some the walking data wouldn't
12:01
do the job because people realize that they
12:03
to back up their data and restore and
12:05
infected computer by wiping it just rinse
12:07
and seeing all the data so now they x will trade
12:09
it more often they'll actually take off the computer
12:11
hosted somewhere that they control and only give it
12:13
back if you pay the ransom and
12:15
sometimes nine and that so when
12:17
it's writing as it its
12:19
not just businesses and individuals i found
12:21
this article just from last week on
12:23
not hardware dot com give
12:25
me your lunch money last beware bullies
12:28
took three point five six billion
12:30
from schools in twenty
12:32
twenty one that's me
12:34
as a absolutely ah
12:37
a while it's worth pointing out that one the key dynamics
12:40
in the development of ran somewhere since it
12:42
first began in nineteen eighty nine
12:44
is that they're going after progressively larger
12:46
targets so in ninety ninety
12:48
one it more likely that they would go after a dentist
12:50
or small business owner just some random person
12:53
a person they suspected had money and secrets
12:55
and if they could use the secrets to separate them from their
12:57
minds over time and especially
12:59
since two thousand and eighteen they've engaged
13:01
the strategy this called big game hunting where
13:04
they are less likely to attack random targets
13:06
and more likely to craft an attack specifically
13:09
for an enterprise of some kind schools
13:11
hospitals major infrastructure projects
13:14
governments corporations
13:16
like
13:17
a wells fargo's something they suspect
13:19
have quite lot
13:21
of money to be taken and they'll
13:23
extort them for some that are more like ten million
13:25
dollars or fifty million dollars so you've seen this really steep
13:28
uptick both the size of the ransom that are being
13:30
extorted and being the size of the targets they're going
13:32
after
13:33
so this this news just came out this week
13:35
around kanti c o n t i
13:38
kanti enterprise
13:39
apparently the ransom were gang that is
13:41
published data belong in hundred and fifty
13:44
different
13:45
companies and they're just mail on these
13:47
different people contrary fly with you guys
13:50
the
13:50
poorest county is one of most virulent professionalized
13:53
ransom were operators on earth and there's
13:56
one their bigger targets to date is actually
13:58
the costa rican governments and i
14:00
haven't seen anything publish recently
14:03
about this of my information probably to have weeks
14:05
old but last looked into account
14:07
he was explicitly trying to overthrow
14:09
the government of newly elected president
14:12
of costa rica so as far as
14:14
i know that's the first time a group like
14:16
a cyber criminal group has tried do something like
14:18
this it's he concedes the trajectory
14:20
and how israeli so
14:23
it is follow up to that i don't know if
14:25
but if county is a thing anymore
14:28
because this article from three days
14:30
ago says ransom were group conti abruptly
14:32
dispense right
14:35
so this is another thing that you see quite a lot is these
14:37
groups break apart and reform
14:39
pretty dramatically and on a pretty routine basis
14:42
so cause he's one of the bigger groups
14:44
into my knowledge it's one of biggest groups
14:46
to have done this but the
14:48
dark side black men had done similar sorts
14:50
things were are evil were shut down by
14:52
the russian government has as a few years back so
14:54
really not that uncommon for them to innovate this is one the
14:56
things that makes him such as a dangerous and wary
14:59
so is the fact that they adapt and this way
15:01
both terms of tweaking their software's
15:03
the dip get differences were strange
15:05
but also in in as much as they will
15:07
break apart as organizations and different
15:09
clusters will go off and form new notes
15:12
that spin up their own versions of ran somewhere
15:14
and start targeting people
15:16
a fresh so it's they're really slippery so
15:19
let's talk about the crypto audience
15:21
then you know how vulnerable
15:23
are people that are holding crypto
15:25
currency and oh
15:27
what can they do to protect themselves
15:30
yeah absolutely so for the most part
15:33
the intersection of crypto currency and ran
15:35
somewhere is in the extortion part it so they're
15:37
asking to be paid in crypto because
15:40
they seem to have believe that this would
15:42
make them harder to track with did then
15:44
would be if they just got cash on house
15:46
which has wound up kind of not being the case we get
15:48
into that a little bits in in so far
15:50
as person wants defend themselves from
15:52
ran somewhere and holding crypto i would
15:54
say that following basic
15:56
crypto best practices like storing things
15:58
a cold wallets ought to immunize
16:01
you from ran somewhere attacks
16:03
at least as far as crypto as it
16:05
as as an attack vector goes and
16:08
and more generally you've just gotta back
16:10
your system's change your passwords do all the
16:12
basic cyber security best practices
16:14
that that the protect
16:16
you from hackers in general
16:19
so i had another there's necessarily special
16:22
that of of precautions for do folks
16:24
need to take other than you're getting enough exchanges
16:27
and putting it cold storage and adding things you
16:29
should be doing anyway ah but there's
16:31
lot be said about the intersection
16:33
the crypto ecosystem and ran somewhere
16:35
if you might discuss that
16:39
it it it is fascinating that i'm just gonna go
16:41
back groups or researchers about the
16:44
contrary armada
16:46
attack armada aren't as crazy
16:49
as are calling it's but
16:51
in two three twenty twenty the how
16:54
many different companies they literally
16:56
attack hundred and sixteen
16:58
sixty seven one hundred and seventy one hundred
17:00
and forty seven seventy a queue
17:02
for twenty twenty one hundred and eighty
17:04
eight happening
17:06
q one hundred and
17:08
tears and then who knows how much as
17:10
other que tu as we're ending due
17:12
to and i hear they are are disbanding
17:15
and going into other things is kind
17:17
of while to take a look at that
17:19
now is is that
17:21
hardly are they normally
17:23
are the eggs or they sort of bob going
17:26
out there and in trying to extort people
17:28
from bitcoin a using crypto as
17:30
their payment method though
17:32
that you know some people down summer use and
17:34
i will try to use cash beyond
17:36
that you know other places payers money whatever
17:40
the meeting crypto
17:41
is quicker solution for them
17:43
but damn is there are what's
17:45
going on with that
17:47
right so i don't exactly know when the
17:49
first instance of ransom her group
17:51
requesting crypto occurred but
17:53
it has become popular payment mechanism for
17:55
them because it's it's digital is
17:57
ostensibly rather secure and if you
17:59
are careful enough and it's pretty hard for people
18:01
to pinot to use bus
18:04
yes crypto currencies have become popular
18:06
for random or groups that are trying to extort
18:08
money from their victims and
18:12
overtime ransom or groups have become
18:14
wise to the fact that the distributed
18:16
public ledger distributed public an immutable
18:18
and that record has been has boon
18:20
for law enforcement agencies are trying to track down
18:23
who's doing what on blockchain adam and eve rid
18:25
of same stories all the time of for example
18:27
that the bits and accept that occurred that
18:29
couple of years ago where are these two
18:31
people extorted alien the dollars
18:34
and crypto from this next much that been
18:36
recovered now because it it became
18:38
possible for people to track down those dresses find
18:40
where it was was hidden and
18:42
recover a lot of that so i think
18:44
that over time these ransom or groups as
18:46
they professionalized become more savvy and and
18:48
has come understand the
18:52
that falls and using crypto currencies commit crime
18:54
they become savvier and i suspect
18:56
overtime number one that trend will continue
18:59
so that they'll get even better at using services like
19:01
coin joins mixers or tumblers
19:03
hide their tracks on chain but
19:05
i have sort of tentative prediction which
19:07
i'm not a harvest and competent but i think
19:09
that over time they may begin to use
19:12
alternative crypto currencies like narrower see
19:14
cash which have much stronger
19:16
default privacy guarantees built in
19:18
and which use technologies like zero knowledge
19:20
proofs are hum morphic encryption to
19:22
make much much harder to determine not just who's
19:24
involved in a transaction but even the size a transaction
19:27
where it's going what's going on so i i
19:29
suspect that they're going get just even better at this
19:31
as time goes on so how does this whole
19:33
ransom things ransom where things
19:35
start right
19:37
so you can find
19:40
can find ran somewhere asked sorts
19:42
of exploits going back quite long way but
19:44
basically everybody
19:46
charge the beginning of ran somewhere as a separate
19:48
phenomenon to nineteen eighty nine and
19:50
as evolutionary biologists by the name
19:52
of joseph pops sent out twenty
19:54
thousand ransom were infected floppy disks
19:57
to attendees of the international aid
19:59
conference in stock and the time he
20:01
was asking for one hundred and eighty nine dollars
20:03
to be sent to appeal boston panama's
20:06
in in exchange for unlocking files
20:08
on on people's computer systems and he arrested two
20:10
weeks later so don't know how much money made that i'm guessing not
20:13
a whole lot and for next twenty
20:15
years or so ransom were really didn't change
20:17
all that much in two thousand and seven
20:20
you saw the rise of what recall the
20:22
locker variants in locker
20:24
variants are ones which ran
20:26
somewhere will actually it's more less
20:28
shut down the functionality
20:30
of a computer wholesale and you won't even be able to use
20:32
the keyboard or the mouse in
20:34
order to do anything and they
20:36
would ask three hundred dollars to unlocks
20:38
the functionality your system in
20:41
two thousand and thirteen they level
20:43
up again and they started using rudimentary
20:45
cryptography to make it even harder
20:48
to intervene in the process of extorting
20:50
money from dick and so they would use public private keepers
20:52
and their encryption when encrypted your files and so
20:55
if you had jump to more hoops and it was
20:57
much more secure for them to take money from
20:59
you in that way two
21:01
thousand thousand march something of turning
21:03
point for to currencies it was when
21:05
crypt of times or at night and child
21:09
two thousand and eighteen marks something a turning point
21:11
point for ransom were groups because we started
21:13
to pursue strategy that i alluded to earlier called
21:15
big game hunting where instead of going
21:18
to jail com and saying or jolt we're gonna
21:20
interests are either you pay
21:22
as a thousand dollars we're going to send your wife
21:24
your if the search history on a computer screen
21:26
instead of doing something like that they're more likely to go after
21:29
pricewaterhousecoopers and try to get you
21:31
know ten million dollars twenty million dollars rather
21:33
than trying to build up little over top
21:35
overtime
21:36
and if you're going to going after bigger
21:38
game there game there be a concomitant
21:41
increase in seriousness with which you treat
21:43
your work see you can hunt rabbit
21:45
with of an era of it's better on bear with with
21:47
a bow and arrow if gonna go after something bigger and more dangerous
21:50
you gotta get more serious about that and
21:52
so that has heralded
21:55
what's now calls the professionalization
21:57
a ransom were sometimes called the rise
21:59
of
22:00
ransom op's or ran somewhere as a
22:02
service and ransom
22:04
whereas service isn't obvious analogy to
22:06
something like sofres a service or platforms the service
22:08
and service and anybody who doesn't they're not travis obviously
22:10
but for anybody who doesn't know software is
22:12
a service occurs when you code
22:14
up an application and you make that
22:16
software available to people who don't want to build themselves
22:19
and it is want pay a subscription fee
22:21
or one time licensing fee in order to use
22:23
your software you can story the date on your servers
22:26
or what have randomized service
22:28
marks are really staggering increase in
22:30
the professionalization of of these operations
22:32
because really really into waste first
22:35
all the operations themselves are
22:37
much more are structured much more like
22:40
businesses and they comport themselves like entrepreneur
22:43
enterprises that are actually trying to improve so
22:45
if you are in intelligence
22:49
eastern european or who doesn't have
22:51
much in the way economic prospects but you're good with computers
22:54
you can go on dark net pay five
22:56
hundred or a thousand dollars to get access to the newest
22:58
conti variants you can buy
23:00
a instead of leeds which are
23:02
people whose security systems have been compromised
23:05
but which have not been themselves targeted and you can just start
23:07
working down the line working down list
23:09
and going after these groups are these businesses
23:11
and whenever you successfully extort
23:13
money from them whenever you get ransom payment
23:15
you kick fraction of that backups
23:17
the progenitors it's it's just an affiliate model or
23:19
franchising oh you can operate ransom
23:21
wearing the same way that you might operate a burger king franchise
23:24
or starbucks franchise and so
23:27
we started see them operating more like
23:29
companies and there has also been rise
23:31
in larry services
23:33
provided by a broader ransom or ecosystem
23:35
so when the same way that there
23:37
are companies who specialize managing
23:40
microsoft licenses for small and medium enterprises
23:43
or and cloud computing services
23:45
for businesses that too small to have a budget
23:47
for cloud engineers you see the same sort of phenomenon
23:49
in this dark economy around ransom where you've
23:51
got groups that specialize
23:54
help helping people set of ransom were infrastructure
23:56
or doing secure hosting of email
23:58
off of off main server isn't
24:00
it is harder for it at the ice due to a
24:02
pack and and figure out what you're doing so
24:04
these two things marks or have
24:06
a really a sea change in how
24:09
people ever proves ransom were both terms of
24:11
way to businesses operate and also the emergence
24:14
of broader economy around and support
24:17
so its almost like theyre and and
24:20
blazing and empowering
24:22
these are these ransom were guys
24:25
in a lot of ways and will use
24:27
it right now i just saw from
24:30
our from earlier on of years because
24:32
he group had said that they
24:34
were backing moscow vs
24:36
ukraine in anyone that organizes
24:40
against them is going to get
24:42
all their get fleas sources fried
24:44
bags have been critical infrastructure five
24:47
it seems to me the world war three years
24:49
this economic sort of cyber
24:52
warfare right cyber
24:54
infrastructure warfare plus
24:56
economic warfare seems like we're
24:58
in we're in we're in midst of like of
25:01
global war been as unspoken
25:03
they did something new happening here
25:06
the
25:07
russian invasion of ukraine is already being called first
25:09
crypto worse because on
25:11
one hand you got possibility of
25:13
these russian oligarchs laundering money
25:15
out do crypto currencies for various reasons suspect
25:17
it's actually happening that much but
25:19
people kind of seized on that as positive and i'm sure it's
25:21
happening some and will probably have more future conflicts
25:24
and also because ukrainian government has
25:26
received hundreds millions dollars in donations
25:28
of ease and bitcoin
25:30
and think poker as well through addresses
25:32
of they publicly aren't without him i actually read
25:34
only way to get the i froze in ukraine
25:36
and rossi already get money to them the
25:40
is through crypto in
25:41
other do is are using finance as
25:43
a wallet and then it off boarding
25:45
from there into into
25:48
vr into the ruble ah
25:50
that's of russians are dylan and if you will
25:52
you still have you can still sense ukraine
25:54
through like you know very different money transfer
25:57
platforms but the the made
25:59
a precarious will
26:00
show off all russia's you know
26:02
of system to the financial
26:05
global financial system the only
26:07
thing available besides i was crypto so
26:09
by hello course thirty script
26:11
absolutely so you see people if you have his
26:13
heart warming stories of people escaping
26:16
the war zone with twelve words in
26:18
their heads that allow them to tap into most
26:20
of their networks and a wind up nice
26:22
losing as much in war as otherwise would
26:24
ask and i think that's wild
26:27
critters the role that
26:29
crypto has played in russia ukraine conflict
26:31
is probably little exaggerated i do think
26:33
it parkinson's a new sort dynamic
26:35
to warfare going for it and and picking up your comment
26:37
about county it's i think that's this
26:40
is really the high watermark
26:42
for the
26:45
boldness of these groups in going after
26:47
their enemies it is the first time to my knowledge
26:49
cybercrime group has said if
26:52
you target russia
26:54
with sanctions if there's any reprisals we
26:56
will come after you and spoke on half
26:58
of us have sovereign power as sort
27:00
of their cyber muscle and i don't
27:02
know that has ever happened before i did not minor
27:04
maybe there's north korean descent something like
27:06
that is one of first credible threats and
27:08
we see again as far as i know for
27:10
the first time a truly
27:13
global geopolitical dimension to
27:15
ransom were activities so in nineteen
27:17
eighty nine it was joseph partaking one hundred
27:19
ninety dollars from people now it's
27:21
resume group saying we are russia's
27:23
muscle and will come after you or attacking
27:25
costa rican trying overthrow the local government
27:28
i think that we've only begun
27:30
to see how ransom
27:32
where it will play out geopolitically
27:34
i think this as software east
27:36
world it becomes more attractive attack
27:38
vector and it becomes a more attractive fear
27:40
of war you're probably mr see more of that encrypted
27:42
will play a role in as
27:44
a as futurist and
27:46
looking at topics like quantum computing
27:49
and such what happens next
27:51
like what is the next evolution of
27:53
cyber crime asked
27:55
around somewhere absolutely
27:58
so i think there's a kind
28:00
of arms race dynamic at
28:02
play so in the same way that you
28:04
are hostile foreign powers who are in this tit
28:06
for tat developing it's defense systems
28:09
and weapons that can penetrate those defense systems
28:11
and on and on and just as you have the same
28:13
thing biologically were organisms
28:15
will evolve responses to parasites to
28:17
will have all response to the sponsors and
28:19
on and on i think gonna see the same thing and ran
28:21
somewhere looking
28:23
back but looking zooming out little bit i'm looking
28:25
at broader culture you can see that
28:27
people have become more
28:30
aware of how social
28:32
media and technology have improve
28:34
their lives but also made them more vulnerable in certain
28:36
ways and you see this broader reticence
28:38
to post pictures of your kids on
28:40
twitter for example or to just give away dated
28:43
a facebook because you hear stories
28:45
of like the cambridge analytic a scandal or your
28:47
stories about people who are murdered by their stalkers
28:49
because they were checking in and making their their
28:51
location in publicly available my
28:53
hope is that this war coalesce
28:55
into a broader audience
28:57
into more seriousness about cyber
29:00
security where where people to take password
29:02
management more seriously companies take their
29:04
own security more seriously and that will make
29:06
it harder for ransom her groups to attack i
29:09
suspect that that
29:11
will take a while to manifest and so
29:13
for the time being ransom were groups are going
29:15
to be pulling pulling
29:17
amounts of money for some time the hope is
29:19
that eventually we we can obviously advantages
29:21
they have with better security measures i
29:24
mentioned earlier some of things that think will happen
29:26
in crypto currency and i'll just briefly adam
29:28
rate here again i think that's these
29:31
groups are gonna continue to become more sophisticated
29:33
with respect to how they handle bitcoin
29:35
transactions that they're gonna get better and better at hiding
29:37
what they're doing i suspect although
29:39
i wouldn't say it's a hard predictions more of soft
29:41
reductions that they will begin to use alternative
29:43
crypto currencies that have
29:45
stronger privacy guarantees built
29:47
in and i
29:49
really worry if we don't take cyber
29:51
security sears and will not solve some of these
29:53
outstanding problems that the scale
29:56
at which these groups are operating will only become
29:59
bigger and steaks will only only get greater
30:01
so there was famously an attack
30:03
an an iranian nuclear facility i
30:06
, exactly when was think was two thousand around
30:08
there before nuclear
30:12
driver i believe that out
30:14
happen and and they were even spin up the
30:17
changed the rate the rate the things were
30:19
spinning and cause to melt enemies wound
30:21
up not being just as a huge disaster but
30:23
it kind of was is is opening
30:25
shot as to how big these sorts things
30:27
could be south in what would be like if
30:29
taunting were able to down
30:32
bunch of satellites and and chicken
30:34
entire country also the internet or folks will take
30:36
some structure in low earth orbit and
30:39
push it out lower orbit or another
30:41
they were get that iran nuclear plant
30:43
nuclear plants that was offline it
30:46
wasn't there was no internet connected to that
30:48
thing at all goodbye
30:51
later us be that was infected into
30:53
it took over the whole system right
30:56
right and i think either you're gonna see more that
30:58
unfortunately it's probably going to get worse before it gets better
31:00
and the ways you
31:02
defend yourself are pretty much the ways you
31:04
defend yourself against cyber security more generally
31:06
the batter files up there's
31:08
a good password manager shield
31:11
your activity online backup
31:13
self custody your crypto in cold wallets
31:16
the question is just is are you are
31:18
the state's gonna be high enough for the
31:20
average person to do that and i don't know that that
31:22
they will d but hopefully we can start building
31:24
better security guarantees into operating
31:26
systems into the browser's we use that there
31:28
are alternatives to to chrome
31:31
that that have the the score better
31:33
on those dimensions and soy sauce google
31:35
sucks like screw
31:37
screw everything google does i'm trying very
31:40
hard to a you go
31:42
out of their whole now that proton
31:44
has a calendar
31:47
mail and i'm docs
31:49
a drive you can actually porch stuff
31:51
over i've done it i just haven't turned
31:53
off google yet you know there's it
31:56
it's it's because it's big move they
31:59
have to make what you shut down alec
32:01
has so many other people still use it
32:03
soaks it's lot more gradual
32:05
than than i'd like to be what
32:07
it which browsers do you like
32:11
i'm on chrome right now i assess assess
32:13
assess the highest i've heard good things
32:15
about braise i've heard good things
32:17
about as weight you've always heard
32:19
good things but review high heaven as he tried
32:21
break i think
32:23
i have tried brave i didn't make the switch over
32:26
i didn't write you the i
32:28
wait is great in it's an easy switch
32:30
and that's what i use i don't use chrome
32:32
except when absolutely necessary
32:35
ah my keeper aside install
32:37
but don't have it as default because there's just
32:40
few things that don't work i'm brave
32:42
it's rare it does
32:44
happen it it's yours
32:46
is your security choice oh
32:48
boy well braves just better because it's not google
32:51
right and they're they're not tracking me unless
32:53
i give permission to show at
32:56
i'm actually using won the calder it's
32:58
a vast in other of the so
33:00
of the cyber security company they have their own
33:03
secure browser based based on
33:05
chromium and
33:06
so it's pretty much exactly chrome but locks
33:08
down a lot of the the stuff that we're google's
33:10
try allegedly because
33:13
you don't really know by the fact
33:16
i was always always always and a reason
33:18
for i worked in security space at my
33:20
at my uncle i had conversation about you
33:22
know they're probably they
33:24
probably got this this this back
33:26
room where the creating all these viruses
33:29
they can sell us at you
33:31
know ahead sorry virus software on ago
33:33
was one the original since fears is
33:35
back in day i think in the early nascent
33:37
stages of
33:39
malware seem like the edu largest
33:41
viruses in general seem
33:43
like that was the case now there
33:45
are some very militias groups
33:48
of people out there trying to do
33:50
as much economic damage as possible
33:52
so what can we really do the
33:55
protect ourselves true i mean what's
33:57
the you know or is madame masque
33:59
secure you know
34:01
i will i made well as well
34:03
as seems like
34:05
there virtually met a mass
34:07
was gonna get knocked on it seems like
34:09
because everything else is gonna you know they're trying
34:11
to go after it was like what
34:13
do need to do to keep saying
34:15
well the good news is with the
34:18
rise of strategy that i discussed
34:20
earlier big game hunting it's it's becoming less
34:22
less likely that you will have anything
34:24
to fear from this the what they think
34:26
you're big crypto well what's i'm not as i
34:28
always the end up selling whoa and
34:30
buying hi
34:32
i lost all mine and in a tragic boating
34:34
accidents are no will either don't bother cfl
34:37
almighty as i'm aware this see praises
34:39
velma both
34:41
the this episode of the bad
34:43
commiserate podcast
34:45
arrested by travis right in front follow
34:47
younger my car that blew up you
34:49
know my my , blew up
34:52
that didn't have keys either sucks
34:55
the string of of mysterious accidents
34:58
and is really troubling yeah so have
35:00
i think that's generally
35:02
you're gonna need to invest in
35:04
learning more about cyber security using alternative
35:07
browsers like braver the one that a vast
35:09
as put together that have alluded to in
35:11
this conversation taking greater
35:13
care of your cousin
35:15
your crypto custodianship answering
35:18
all that in cold wallets same protect your
35:20
ass at yes
35:22
break your ass that's coldly
35:24
with we call source
35:26
an intro to lose in boating accident if you can arrange
35:29
that but yeah i was
35:31
you know for pretty much the litany of standard
35:33
cyber security recommendations is great place
35:35
to start so using browsers are more secure
35:37
operating systems that are more secure changing your passwords
35:40
using strong password manager
35:42
like august last passive heard what
35:44
one passes is that of what town called
35:47
i are really good things about and actually
35:49
to this isn't something i've been thinking lot more about here
35:51
recently so am so am kind of degenerate
35:53
crypto earth i've got it off most my crypto
35:55
on an exchange i'm going to move all that off
35:57
look into the password managers try try to up my
35:59
secure the little bit because in researching this i've
36:02
become more worried about it like i said it's the
36:04
good news is it it's it's
36:06
kind of like being shot it's just it's it's
36:08
hard to defend against but any randomly
36:10
chosen person is unlikely to be the
36:12
target of of of such an attack so
36:14
it's just by virtue their being lots of other people
36:17
and lots of other potential targets many them
36:19
bigger than you you don't have that much to worry about but
36:21
if if really want to to get into it
36:23
i would i would investigate cyber security and starts
36:25
aching that seriously because most those recommendations
36:27
will also protect you from asthma all
36:30
righty well this has been very instructive
36:33
mr fowler how to people
36:35
find out more about you what you're
36:37
up to and updates in the ransom
36:39
were space
36:41
absolutely so you can check out if you trotted podcast
36:43
thomas fry and i put together an
36:46
episode every week talking about a i or quantum
36:48
computing or crypto or or have you a
36:50
if you trotted podcast dot com you can also find contact
36:53
page and there theres and about page with
36:55
bunch of information an me if you want to
36:57
investigate me particular and you can find an
36:59
twitter at trent underscore stem underscore
37:01
stem e m p you n k
37:03
so any of those would be great ways
37:07
have you sent your ten bitcoin yet
37:09
to the address on the record
37:13
that i have not because they seem
37:15
to have misplaced like
37:18
your you lost your bitcoin in dump somewhere
37:21
i'd want you to sell it for fell
37:23
in the tragic boat accident
37:25
that i had and then when my god save
37:27
from the boat my car exploded oh
37:29
the other sunken or exploded i
37:31
don't i was one have all my gosh and you put
37:33
your key is like you test to them on your next
37:36
with then you know the flames lift
37:38
the news right off your neck and so
37:41
are you know speaking of getting and stage
37:43
and being funny and all that you and
37:45
i had opportunity to speak at radio
37:47
city music hall the radio
37:49
city music hall in new york city for an f
37:51
t and y c and the we're
37:53
going be doing special episode that
37:55
is a recap n n
37:57
f t n y c on the nifty show
38:00
you're not subscribing to that podcast
38:02
yet and go over there hit the
38:04
subscribe to follow button on whatever platform
38:06
you're on says called the nifty show
38:09
and that we would love to have you listened
38:11
that way you get more of us
38:13
and you get bonus of my son zach
38:16
on episodes as well
38:18
yeah i , that
38:21
that was one of the my ah you
38:23
know going onstage with you do
38:25
that radio city music hall that was
38:27
like browser sweet life moments
38:29
and right ever spike lee gone
38:32
up there and cracking jokes and
38:35
the my game of you're gay
38:37
couples was like you know spike lee got
38:39
our spades by the audience kept
38:41
getting bigger like we
38:43
you know so we had more people in our
38:45
session and spike lee had think it
38:48
had to do with the ridiculous
38:50
in this of trying get people and
38:52
they were like oh i get to see your id and
38:54
your and your qr code and
38:56
your badge and a sperm
38:58
sample and then they final in a man and
39:01
a but , was amazing i
39:03
really enjoyed rock and the seeds upset with us
39:06
us make sure you subscribe to the nifty show
39:08
we're going do a whole episode talking about the
39:10
nfc n y c experience we
39:12
just had and we will catch you
39:14
hear a this very channel
39:17
or the next episode of the bad crypto
39:20
podcast until then
39:22
you guys know what to do i don't even need to tell
39:24
you but we always on the show this when
39:26
i got to say that
39:37
the bad crypto podcast
39:39
is a production of bad crypto llc
39:42
the content of the show the videos and
39:44
the website is provided for educational
39:46
informational and entertainment purposes only
39:48
it's not intended to be and does not
39:50
constitute financial investment
39:52
or trading advice of any kind you
39:55
shouldn't make any decisions as to finances
39:57
investing trading or anything else based
39:59
on this information without undertaking
40:01
independent due diligence in consultation
40:04
with professional financial advisor please
40:06
understand that trading of bitcoins and
40:08
alternative crypto currencies have
40:10
potential risks involved anyone
40:12
wishing to invest in any of currencies are
40:14
tokens mentioned on this podcast should
40:16
first seek their own independent professional
40:19
financial advisor
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More