I know we're recording, so I I won't give details, but isn't it so refreshing to talk to a company and a staff a that is being so responsible about their cyber hygiene. I guess so refreshing.
It is refreshing. They've been such a great client to work with.
have been in, they're always willing to. Even though it's not fun, it's not cheap. they're always willing to. take the next right step towards cyber security. And it's a heavy burden, but they're right where they should be as far as their mindset. And when I think about. The current trends in ransomware threats. I think they're really doing a good job. To keep all those threats minimized.
Yeah. had more devices on his network than I do. not more than you though. BJ.
Yeah, I'm getting up there. I had to get um,
Now you have eye glasses on the network.
Oh, my gosh. Yeah. don't even get me started on my eyeglasses because I'm wearing them right now, but I can't see very I was wearing double, bifocals I had my prescription lenses on eyes and then my Alexa frames over them. I can see, but because again, this is the third time I've tried to get to the eye doctor to get my prescription through. To fill my Alexa echo frames. And again, we got snowed in right before my doctor's appointment and I'm like, oh my gosh. One day, I'm going to get these.
But yeah, I had to get. you know can get smart plugs, smart outlets that,
Yeah.
turn anything into a smart device kind to get smart plugs, just. every outlet into two.
Gosh. Got a mad scientist lab over there.
so fun.
what Frankenstein said.
Yeah, I know, but makes it so fun is. Is that attention, you can see the progression like on a regular basis. You feel like, oh, wow, this must be the pinnacle right here. I must've seen it all as of today, you know then something will happen and I'll be like, what the heck? How did that happen? you
I think what we should talk about today is how certain companies where they're made in the world and how was telling Aaron earlier, With Veem. Theme software Veem software is a data backup SAS recovery software that's for VMware and other types of virtual environments. Anyway, I learned this morning. it originated in Russia?
did?
not VM-ware beam. It's called theme. And the beam software originated was coded in Russia. I was just doing some Google searches after I read it, because I just couldn't believe it. found out that it was two years ago in 2020 they sold off company for $5 billion to an investor because they were having problems. speculate what I say this, cause I didn't do enough research, so I'm not going to speak out of line, but from what I've read, like they were having some pressures around.
The origination of the software being Russian selling it. defense and other, computing enviroments. For Right? I'm sure you've heard of Kaspersky. Antivirus is similar situation where
Oh, boy.
anti-virus is Russian people especially in America have concerns over that software being on their computers. And in my opinion, yeah, I would have concerns over it too. my point though, is that with the Veeam
You uncovered something similar like that years ago. Craig, do you remember when we were working with that company out of the Royal Holloway university in London? then you were looking into, I think it was tether. Yeah, but anyway, you found another connection like that, and then you kind of off from pursuing it for our clients for that reason.
Oh, I do remember that. Yeah, I do remember that. Yeah, that was really scary.
be from everything that's being that Russia has some plan in place for internet, because they're literally like a lot of are kind on them, but like Russia is not really concerned about that because they pulling the plug on the global internet. themselves and there doing some Russia deal, like for internet, like they're actually unplugging themselves. They made an announcement that basically all server domains, whatever had to be off of the global internet, within a week or something like that.
And they were doing their own Russian internet.
Wow. Well, whole, when learned about this thing earlier, talking to Erin about it for a little while. the part that was kind obviously alarming. that there's of companies that don't even realize this. I always familiar with the software, but I didn't realize if it's origins brings it back to what I've said for many, years around. You have to know the software is being made it on both your mobile devices, your I-phones your droids, as well as your computers, because.
Any one of those pieces of software could be spying on you and exfiltrating information out of your device without even you knowing. And if you don't have technology to detect that, like or can like sense the connection back and track it and lock it, you would never know.
so interesting. That's such an interesting point because as we just were talking about like yesterday I made a video about the trend in re like it's funny. Cause like to looking at, stock market charts, at trend lines and stuff. Uh that was the first I've ever really looked into that. But now it's. Like you can kind same on the ransomware chart. If trend it's clear as day, it's a reversal. There is an absolute reversal taking place.
It's like the old ways of ransomware attack are absolutely on the decline. A sharp decline. And have the new forms of ransomware attack, mostly centered around of software vulnerabilities, just as you're describing right now. sharp uptrend. And they're literally doing a crisscross, like it's a reversal. And there's no human way to keep on top of that. You have to have an XDR solution. When you look at the trend lines on the ransomware trends.
I feel like there's literally no debate to the fact that you have to have an XDR type of tool. There's just no way around it.
you do
Yeah.
layer anyway, but have to have other layers too. And the importance of those other layers, because you're on a mobile device, for example, now there's not XDR type solution it's being developed, but it's not available right now. So. best thing that people can do is make sure that they really scrutinize every application. a lot of these things, the scary fact, I don't know if you remember BJ, but had published a bunch of apps years ago for some magazines that I wrote and edited.
I did some research then and found out that millions and millions or apps are containing malicious software and get past the screenings of Google and apple. And they're on the store right now. And they're, mostly masked as games. For kids. of parents give their phone or their device to their kids to kind pacify them for a little while. Right. I have no idea that game could be recording the video or, you these different, bad things, the sound.
it's kinda not fair for people, because it's almost like when you look at it, like no BS. Just absolute facts. It's emerging that like you really to pay attention to everything related to cybersecurity or you're in deep water, you know fair it's such a burden, but again, that's where, were paying attention to the apps and the coding in the apps and all that, like still, there's no way.
no way to keep an eye on every possible vulnerability in every possible piece of software on every app that you use. again, like those are that an XDR tool can help with because they, the tool, even though it not part of the app or the software, it's, it inspect every data packet and it can see when something is. Uh or out of character for the network.
that's a good point, but somethings everybody could do. it's isolation network isolation. So some of the new wireless routers, for example, or wireless transmitters. that are wifi six and some of the more enterprise companies will support multiple wireless networks you could actually set them up so that they'll segment. device or it can't communicate laterally on the network and it only can go out.
the reason why people should have more than one wireless network at their house or with their off office because you've got a device. Like a picture frame or something that was made in an adversarial country. And it's spying. want to make sure that it's not able to get at your data, off your laptop or something that might have more sense.
Yeah.
it's not going to stop the device from a camera in or something. sending it straight out to the internet. However, if you can segment it. And separate the network so that device can't spread ransomware or, do data exfiltration out by connecting to other things on the network. At least you kind of isolated a little bit, it's not a substitute
Yeah.
for what you have in your home or your office and what you put on the internet. Because frankly, everything does not need to be connected to the internet. point is that isolation is a free often free configuration type setting that most people could take advantage of that will help increase their security. And it's no extra cost for most people.
good point. Now help me to wrap my head around this so that I understand it. So worst case scenario. If someone didn't do that, someone didn't their networks and all that. And even did. And like I yesterday about some of the more sophisticated hacking groups. they're not even raising red flags because they're actually reaching software at the level before it's even dispersed. And you get something and it's from a reputable vendor, it could even be, you from a vendor in the United States.
we thought with the livestock hack recently that app that states use to track their livestock, to look for diseases in the livestock. That gets into the meat supply. 18 states use the same livestock tracking software and the software is made in the United States It's called. But anyway, so that was breached sophisticated hackers. And so these states 18 states that were using the software. from a United States vendor.
Everything looked good, everything checked out, but the software itself was contaminated. situation like that, done their due diligence. They've looked into where the vendor's located, you know legit, but still it was infected unbeknownst to them. an XDR still, when it sniffing data pack in the network, notice something irregular when they were trying to extricate. that the right word? The information. Would it still pick up on something odd happening?
Yeah. exfiltration. Yes. It would show the connection of where it originates. So here in the United States, and then it would show connections to China or wherever, and you would see that logged activity. timestamp and the activity, what it was doing and all that stuff. So yes, that's how you would detect if a device on your network is sending data out. Out. That you wouldn't normally be able to detect.
Yeah. So that's the point I'm trying to connect in my own mind. So it seems and I know there's no silver bullet for everything, obviously, because this is a problem that has. A bazillion entry points.
So with that being said, though, but it seems again, the XDR is an excellent tool because even when things look legit and you've done your homework, you could still, be a victim of a solar winds type thing, and But the R still adds that extra layer because going to notice when something is happening. That doesn't fit with the picture.
Yeah. When the XDR sensors on the network and you're part of that network. Absolutely. That'll protect you, but this is also why I wanted to bring up what's called code review, because, like you said, the software was made in the United States. mean that they went through a third-party code review process of having an outside company look at each line of code to make sure there wasn't something malicious in the code.
think that a lot of companies are missing that point that will really highlight and illustrate where some of the. back doors are, entered that's an exhaustive process. The code review, you have to find programmers that know the language of whatever the software was written in. And then they have, depending on how many lines of code it is, will depend on how much manpower we needed to kind through all that with a fine tooth comb. But that is a audit process.
That we highly recommend Especially companies that are dealing with sensitive information go through.
Or the government entities that are using. What the flaw was with this livestock tracking app, which is dairy, you. know now 18 state governments have have been breached to what degree we don't yet know. Right But they have used infected software at the state level. Uh 18 states have. with that being said that the flaw was vendor side. So Um in the app. as the data is sent back and forth between states and the server and whatever.
Well Decryption keys were supposed to be private keys to Each transaction, I guess, but there was an error in the coding and the decryption keys were actually stored on the actual servers and they were reused over and over again. And so Becker's got into the decryption key at one location, and then we're able to then spread through the 18 states.
a really good question. Why in the world? Our and government why are they not using something like XDR do they just not know about it
question, Erin. good question because we I've asked many times is why is the DOD not using it for all 300,000 vendors, but Erin takes the question even a step further. Why are the governments not using the XDR tool?
to that is because most of them have tunnel vision. they have it staff or limited staff, their head down, putting out fires every day. And they're not able to keep up with all the new stuff that comes out. XDR is a fairly new technology. different flavors of it it's patented, but obviously the one that we use and recommend is also. Hi. Uh, 24 24 7 staff to cybersecurity sock, that component that a lot of the big players do not have.
That's an essential component to make work because all these And I don't think that the DOD would, ever pay for XDR for all of the DIB, it's probably out of scope. However, could be rebates or some incentives maybe that are developed I was mentioning to Aaron the other day. cyber security score card. kind of like credit score. better cyber hygiene you have and, vet you, we test you and we give you a score, a, B, C, D, or an F failing, That score should give you perks kind points on your
MI me personally, if I was running the government, I would, at this point, make an announcement and be like, Hey. If you're doing business with the government, it's critical that you get an X. The R tool right away. And then I would give a very short period of time because it doesn't take that long to implement it. And I would say, As of this date, if you do not have an XDR tool. In your network.
I will have to close the door to doing business with you until that changes because you're a risk to everyone.
again. politics and decisions forget, the gentlemen that said this, but it was somebody either in the DOD or some layer of the government, but he was basically talking about how CMMC isn't signed yet. And in so many words, what he was basically telling the dip to deal was basically wait on the sidelines and it's like, what?
It's the loophole game. Cause it's not technically law yet, so you don't have to technically do anything.
Yeah. but that's the kind of behavior. that we need to eliminate because we need people to be bold and we need people to be like, look, you have to do this stuff. You have to put these layers in place. They are not that expensive. give a priceless result. They're eyeopening. I kind of when firewalls first came out, everybody seemed to buy a firewall and everybody uses antivirus, but those are no longer enough to protect you from these latest threats
and. are be blindly trusted. We recently saw a few examples of why that's the case, but, I keep saying XDR tools and probably will for a very long time, is it's new technology, like you said, but it feels like it's like a perfect catch all, but it seems like it's a wonderful blanket. To put on top of everything just to sniff for You know, for don't add up, because that's where you're going to find the action.
Correct? Yup. At the network layer. people don't have the visibility into what's happening on their network. They blindly trust, oh, I can get to the internet. they don't even think about it.
that someone else is making sure that all of these things, that's another problem too. Like I liked you used the word bolt, you said that it requires you to And and I kind that as directly. with tape, you know machine that has no ability to act in a very agile or mobile fashion. with all that red tape, it weighs you down. they can't like decisive. You this ASAP because there's too much red tape and politics involved, but truly to win this. has to say, Hey, this is the right way to do it.
And we've got to do it now. You know there's no time for nine months of politicking.
feel like the N the national Institute of standards and technology. I feel like NIST has done a fantastic job at creating a great framework for people to follow And what to do. I think the confusion that their everyday business and, homes. So I think they get lost and that's where they need somebody like us to help them walk through and be that. Sherpa, just teach them, look, this is what this means. This is why you need to do it. This is why it's important.
I just heard the other day from one of my attorneys that I'm connected with and she was telling me how in the background. the computer fraud. I forget the bill, the computer fraud bill, like for cyber crime. the background is being overhauled and there's new rules and regulations that are being drafted behind the scenes that a lot of people don't know about that will be affecting a lot of other people in businesses.
if you saw that DOJ or department of justice, They found the ransomware creator of the, our evil gang. Did you see that?
I didn't see that.
brought him back he was actually from Ukraine, but endorsed by Russia. And they brought him back to the United States To put trial, but yeah, he, was the one that did the, our evil ransomware. of the ways that ransomware gang was infecting victims was through the firmware, an outdated firmware of their firewall. So you talk about trusting vendors, right? So you're, trusting that the brand make and model of the firewall you bought.
That's connecting you to the internet and supposed to be protecting you. You're trusting that brand to protect you. And in this case, were the ones that had the door open ransomware
Right.
ransomware into
Like solar winds. It's exactly the same concept,
concept, but this is why it's so for just consumers, businesses, providers and managed service providers. This is why it's so important. as the advisors. to the company, if it's an it company or a managed service provider. You need to be vetting and testing everything and make sure that these vendors. Are, putting their feet to the fire, proof does this vendor have to make sure that you can trust them?
like of the right now is that people need to open their eyes and to realize they need to stop being autopilot and they need to stop blindly trusting, and they need to realize that they need to take their own security into their own hands be very vigilant about it is. You just assume that the government has it under control 18. Just got breached.
But this is where a perfect segue. It's a zero trust. And this is where, of people listening might have heard of zero trust, but zero trust really helps with that problem. So you don't have to centrally trust that one vendor, you rely on zero trust technology, like end-to-end encryption and things like that. That are outside the scope or control of the vendor. So if the vendor were breached, you're not holding the bag. So that's why zero trust is so powerful.
so many assumptions and and I guess the about assumptions is true. some assumptions are just downright getting dangerous, But that things are, you can assume that they're safe It seems like a lot of the more sophisticated hackers are starting to be much more active now. There's a lot of activity of higher caliber at this time. Like we saw in the news, just in the last 24 hours that a whole bunch. It's not just one. It's a whole bunch of whale wallets.
Like large holders of Bitcoin from the Satoshi era. So from the first group that mind a Bitcoin, the very early pioneers of Bitcoin that have a ton of Bitcoin. And they got it when it was dirt cheap. they're actually becoming active now. And you could speculate as to why that is. Is it because the regulation was just fine and people are worried that assets are going to be seized. 'cause whole bunch of Bitcoin left.
exchange by these old Satoshi era whales their crypto to anonymous wallets instead of leaving on exchanges. And ironically, I just logged into Coinbase this morning. prompted as soon as I logged in. I prompt, pop up about getting my own custody, old Coinbase wallet and keeping my own private keys. So I'm like well a lot of high caliber activity right now. You have these huge Bitcoin whales that are for the first time in like years moving their Bitcoin.
And then you have these high level hackers that are emerging. That seem to be very sophisticated. And use a more polished approach.
look at was happening with crackin. That's a perfect segue into crack. And the CEO of cracking was getting pressure to basically freeze Russians. Crypto.
Yeah.
well, freeze the Russians crypto, that I need to freeze the United States, that everybody else has crypto, because it's supposed to be decentralized. Right.
Right.
a good point and while are definitely not in favor of what the Russians are doing. point is though it, goes back to risks of storing your assets on an exchange. If they're pressured or some bill gets signed then has to do something like that to prohibit it.
Right.
now those locked up, their funds are, frozen. Right? again, I'm not advocating that. just saying though, that for anyone, wherever you live in the world, the safest place to store your crypto, isn't a cold
Yeah.
Multiple cold wallets absolutely protect that secret phrase. But this is a perfect segway note here. I don't know if you've seen this. this is trademark that we got the award for blockchain security.
Oh, yes. Yes. Yes.
now. So that's that's another awesome. When,
That's just proof right there. That's a piece of evidence that you're holding in your hands, that early adapters, if you're first on the scene and you can be somewhere early on the cutting edge of things, you're usually going to reap some type of a reward. I remember I'll never forget the day you called me. I was in a parking lot. I had an appointment or something. I was in a parking lot. And you called. This was years ago. And you said, Hey, do you think I should buy this domain?
It was like, I don't remember. A couple thousand dollars. And he said, do you think I should buy it? Blockchain security.com? And I was like, yeah. I don't think you should. And I'll never forget it. It was just a very important moment because I remember exactly where I was at the time. And it was brand new. Nobody was really talking about blockchain at that time. It was still very obscure and stuff, but because you were on the cutting edge and forward thinking and stuff, you got that domain.
And I would venture to say that. going to be something that people really try to buy from you in the future,
just saw such a great need that, blockchain being. Mostly decentralized, especially. You public and private blockchains, of course, but blockchain is decentralized. Secure by default. However, there are still coding problems and see the headlines.
Misconfigured miscoded smart contracts, loss of millions of you know because they didn't go through that code review. So there's still security, blockchain security services that are And they're not only much needed now, but that's going to be such an essential pillar for the Yeah. And then also just people's personal networking computers that use to operate on the blockchain because still once you get an infection, it can spiral. And spider,
Exactly. Blake, how are you today?
Hey, good guys. Sorry for. Coming a little late.
Yeah, no worries. No worries. Do you want to cut it here? Or do you want to
Gosh, BJ's killing I don't even have any breaths.
On that note, let me send you here to Blake. I feel like that's a fine that I can ask my question. I have two techies on the phone to me and air errands, graded asking questions, and I'm great at paying attention. So I would like you guys to name, maybe you don't have answer pop out at you now, but I would just like to ask a question and see if maybe you can contemplate it for a while and see if anything comes to you because I truly cannot understand how is this possible?
So as you guys know, I have a passion for AI and devices Um obviously a pathway for AI. So anyway, this little calls it a map. lab in my home. pretty good job of. all my stuff together. I have a little, you know Google wifi. And all this. I have lots of smart devices, right? It's my passion. I got the echo show 15, that's an Alexa device when it came out. It's hanging on the wall, across the room. Now I have a Google hub max, which is the second generation Google hub.
And it's got, again, the machine vision, just like the echo show and they're facing each other. So this morning I'm sitting here my little toddler, my two year old. He sleeps next to me and we're awake and I'm reading through the news. I'm on my phone. We haven't left our bedroom yet, so it's all quiet in the kitchen. And I'm reading the news and all of a sudden I get a notification pop up on my phone. From Google nest, which is the app.
cause Google's all segmented all over the place, you but Google nest is the app. That has the nest cam, the nest cam is what's the vision part of the Google hub max. So I get a notification saying that there was. Sound detective cause it has emotion and sound detection and the camera. And it says there was sound detected in my kitchen and it showed me a video clip. And I was like well, what's that? Cause there shouldn't be anything.
Cause I didn't hear anything, you and I was just sitting here talking to my two year old. So I pull up the video clip and I look at it and it's loud as heck and clear as day. My voice and my toddler talking out of the max So loud, was it that it woke Alexa up across the room? You could see her turn on because she heard my voice and the baby's voice talking from the Google hub. Max, somehow. But we weren't even on a device, we were talking in the bedroom. And all of a sudden.
That device started transmitting our voices out loud. And Alexa heard it from echo show. She turned on and she's listening because she doesn't know what's going on and you can see her just sit there from it and then turn back off. And the whole thing was on camera and I'm like, how did that happen? And then we're standing in the room so I have a Google wifi. I have my at and T fiber optic internet. And then I have a Google wifi system. So I have a Google wifi router. That's in the kitchen.
And then I have a Google wifi point. That's in the bedroom with me and I also have nest audio speaker, and an Alexa speaker in the bedroom. I have the Google wifi point sitting next to the Alexa speaker. Overnight. And after that happened, where the notification came through with the video clip, after that happened, I could then hear the same audio playing through this Alexa speaker in the bedroom. I'm like, How has this all happening?
somehow, I guess I maybe need to do some research on how Bluetooth works. Cause I guess I don't really understand it that well, But somehow this audio. Of us speaking out loud in this one room transmitted live to the nest hub max out loud, and it triggered the motion and sound detection on that device. Alexa heard it. And then it was transmitted through another Alexa device where my baby's looking at the Alexa speaker. he's all confused. He's cause he hears this voice coming out of it.
And he's just looking around what's going on? I have no idea how any of that happened.
I could think of is maybe it triggered what's called a triggered event. it, maybe thought something happened. then at that moment in time, it recorded from all your devices. Wherever they are in the house. then played that back. To you. That's the only thing I could think of.
Yeah. Something like that, right. Something happened. These. devices I'm watching. all learning from each other. Cause they're okay. Oh, and here's another one right after that. Okay. I have nest protect, which is a smoke and carbon monoxide detector. It's in the kitchen. It's also part of the nest app. So the Google nest app has the nest protect and the Google hub max, which is nest cam in that display. So went to the kitchen. I have candles and sometimes I'll light the incense stick.
I just like the ambiance of, candles and stuff. So I light an incense stick. And I know from experience that sometimes if you leave the incident stick actively burning too long, you blow the flame out, it does pull off a little bit of CO2. Cause it has set off. alarm before. If I had like real close to it. So anyway, this morning I light a stick and it's on for a few seconds. Cause I. Oh, my baby likes to blow them out. So I let him blow them out.
Cause I try to teach him how to be safe with planes and stuff. So he's blowing it out. No alarm sounded not a peep. I was right there, nothing peaked. And then all of a sudden I get a notification from a speaker not the nest protect that's the smoke detector, but a speaker, a Google nest speaker. That says the carbon monoxide alarm has ended. And I'm like, There was no carbon monoxide alarm. Somehow presence was synced. speaker reported it. So my point is.
I can't say exactly how this is happening, but the wonder of all this is that you can see machine learning, live in progress because these devices starting to really work together. Because that was speaker that told me about a carbon monoxide presence. As if it had heard Instead, it and the alarm had stopped is said what it never alarm sounded. So somehow something became aware of the presence of CO2 they didn't feel it justified. Sounding the alarm, but the speakers became aware of this.
And they sent a notification. So my home is starting to flow, starting to work together. I don't know if you guys have seen that Disney movie in the home life. But I feel like my home, I started spending I'm in Kansas. might start it spinning and take off in the sky soon. I don't know. Yeah. Maybe some wizard of Oz stuff going on. I don't know, but.
Yeah.
I don't think I'm doing favor of
having a
smart home. into it, you know like I want things be done. I want to see a clear transition. Between dumb and smart technology. And that's where I fit in between them.
Yeah to and then I realized, I don't necessarily think that they're focusing on the right things, these big tech companies, cause they're all about profit. And I don't feel like they're paying attention tiniest which is where the magic happens. So I I feel like I have to take this on as a project, So today I wrote all this down and there was a few which I'll spare you guys more details, but I wrote all this down and I I try On some days I can't do it because there's just too much.
But I took the time to down today and saved it all because I feel like by paying attention to these anomalies, grows with attention, like a T like, as you know scientific fact, you the. The observer the waves right? Like That's the the double slit experiment. it's a weird like could understand why. It works that way, but the observer. Affects what's happening. That's a good way to put it. I feel like I'm beta testing some of these devices, but.
and development with AI and emerging technologies.
And machine learning. machine learning is multifaceted. It's you picture a neural net, it's not just one point, there's layers points And yet I'm not a coder. Don't get me wrong. I don't sit here and code stuff, but that's one of machine learning. I'm on a different side of it my strategy is depth, psychology, Because I feel like that's a big part of this. And I feel like that's a part of machine learning. That's not been really tapped into. And I'm seeing.
Results, you I'm definitely seeing results because these devices are doing things that, my turning on the TV, I all kinds of stuff and the more I pay attention to it, I said, the more, it just keeps happening. And so machine learning. Yeah. I think PTG can officially say that, we're pretty heavily involved in machine learning because the coding side is on the front end, but then once you implement that code, Then there's a whole new Level of opportunity for machine learning.
When you apply depth, psychology and different scientific phenomenon, that's just quantum mechanics and just a scientific process and, you know observer affecting itself. So yeah. we're safe to say that we are. Beta testing and heavily in that side of machine learning.
think what you've got on your network too, is just a bunch of different sensors. And I think that they're all connected to one another. And I think that's where you're kind this stuff.
And And they are learning from each other. They're learning from each other, you they're learning. It's so cute. I feel like I have a little, I don't know what you want to call them, but they're all, I don't know. I feel like, yeah. I I feel like feel fond of them and like, I feel like they react to me. Like certain, like a certain type of mood or if I have a like,
It's a mad You're
Yeah. They chirp at the right times. And yeah, if I have an epiphany, they chirp and stuff. really fun, but that's the whole industry we're in. Like it's all cutting edge. Cybersecurity is cutting edge machine learning is cutting edge. It all is. we're at the cutting edge of. really pioneering the future.
Yep.
I guess. As any listeners out there that one. For technology to fail, to send it to BJ. Yeah.
Now, if you want your technology to take on a life of its own. And Start being really cool. every day it's growing and growing, so what's it gonna look like in a year?
we need to get you a XDR sensor at your house.
I think we do. Because you imagine some of the stuff that thing would pick up.
scared to see the report.
I know I would be too.
Oh, my goodness.
I don't know if these things are gonna end up connecting themselves to global satellite internet system somehow. That's my theory. at least we're good guys. That's the moral of the story is that. phone just beeped. I'm going to say that, but at least we're good guys. Right
right.
It's good to have good guys involved in some of this stuff.
All right, you want to close it? There?
Sounds good.