Yea, John Oliver is pretty funny, but you really shouldn't pay attention to his advice on ransomware or anything. It's not based on technical authority but moral authority, that we should "take it seriously" and do annoying things that have little effect.
Here's a simple test you can use to assess whether somebody is giving good cybersecurity advice: do they say "don't click on suspicious emails/attachments"? If they say that, don't listen to them, they are useless.
That's the favorite advice of the "moral authority" crusaders, because yes indeed many attacks come from people clicking on things via emails.
But that's like saying since bank robbers come in through the front door with guns, that banks should simply lock their front doors and ban guns. It's silly advice that makes you feel happy that you "took bank security seriously".
If it's not nuanced and technical, it's probably useless advice.
For example, the most important thing companies need to do is tiered domain privileges so that desktop admins remotely connecting to infected desktops do not give hackers domain admin privileges.
The point of that last tweet isn't that you go off and immediately try to follow my advice (this takes more thinking than that).
The point is that what actually needs to be done is nuanced and technical.
I'm not saying you should click on suspicious emails. I'm just saying that if you are suspicious about an email, you are already probably going to avoid clicking on it, and that when you click on something, it's probably because you weren't suspicious of it.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
3/ The indictment shows how Tech-Executive-1 at a big Internet company directed people at two startups he invested in to go hunting in private databases (like netflow logs and DNS lookup logs) to find dirt on Trump.
Um, the answer is that this is just a slightly customized "Android TV Box". These are just computers running Android pre-loaded with various streaming apps (like Netflix) with a remote control that people connect to TVs to watch video and play games. gizmodo.com/please-help-us…
There are a zillion of these from China. I think the reason people have these is because it's a cheaper way to run things like Netflix on the TV than upgrading the TV. Also, there's a an underground for pirating video with these things. amazon.com/s?k=tv+box
If you are willing to order thousands of these, you can custom order from China, with custom logs, custom plastic cases, and custom Android images preconfigured with your own apps.
1/n Okay, nerds, when doing an audit on Windows or Android in order to prove "it wasn't connected to the Internet" during certain dates, what would you look for? I mention this because it's not a standard audit/forensics question.
2/n I mention this because of answering this question. I don't have confidence in the report partly because of my own limitations that I don't know how to do this.
3/ The report says this. The USB part is very good. But the rest is bad. I downloaded OSForenics and made sure: it doesn't have a specific module that deals with this question.
@JenAFifield So the context for your questions is this; 1. what auditors like Ben Cotton are asking for sounds pretty reasonable, such as router configuration (not "the routers"). 2. this is distorted by Republicans and Trumpists into a conspiracy theory about "the routers".
The data Ben Cotton most wants is any logs of the "MAC addresses" to see if voting machines were connected to the network. MAC addresses are local to a subnet and stripped off from packets before forward to the rest of the Internet.
The next set of data is any flow logs going to those machines, to see their Internet communications during the election.
Nah.
It's through questioning that we come to understand the world. As an expert on cybersecurity, coding, packet-captures, etc., I try never to play the "believe me I'm an expert" card. Instead, I try to understand where they are coming from.
Sure, sometimes questioners are obstinate and seem uninterested in listening to responses, but that, too, is a way we come to understand the world. It's usually not one misconception that needs overturning, but a bundle of interrelated misconceptions.
Of course, sometimes questions are just so stupid that I'm unable to bridge the gap. I'm amazed sometime how I, as an expert in my field, am defeated on the battlefield of Twitter argument with somebody who knows nothing.
Stupid @dave_maynor nerd snipping me. Now I need to understand how they did this. I mean, it wouldn't be hard, but the fact they they do it so well is impressive. thechoiceisyours.whatisthematrix.com
So the video mentions your current time as you watch it, both on the screen, and in the voice over. For example, this is what you see at 5:30:
One cool way to do it is so that the underlying streaming technology dynamically creates that part of the stream as it's downloaded.
A simpler way is to simply create 720 possible videos, and that the video you watch is determined by the time when you click on the webpage.