031722_Breaking-Cyber-News: Raw & Unfiltered - GoDaddy-&-CafePress-Breached - podcast episode cover

031722_Breaking-Cyber-News: Raw & Unfiltered - GoDaddy-&-CafePress-Breached

Mar 17, 202246 min
--:--
--:--
Listen in podcast apps:

Episode description

***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!***

On this episode, we discuss why GoDaddy is in the news (again) and why a t-shirt company, CafePress, was fined $500,000 by the U.S. Federal Trade Commission for a data breach they experienced.
Host: Craig
Guests: BJ, Erin, and Blake

Support the showCall 877-468-2721 or visit https://petronellatech.com

Please visit YouTube and LinkedIn and be sure to like and subscribe!

Support the show

NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

Support the Show

Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

Transcript

Craig

All right. Welcome to another episode of the Petronella cybersecurity podcast. Got Aaron, BJ and Blake on the line. I'm gonna talk about the latest cybersecurity news today.

BJ

Everybody.

Craig

Folks who are welcome to join on the live stream as well. If anybody had questions that you wanted us to address, you can join the live stream on any of our supported platforms on YouTube, LinkedIn, Facebook, and you can join the party. So I saw one of you guys posted something about the GoDaddy backdoor breach that was announced with WordPress who found that one.

BJ

Let's talk about that. Cause we just talked about. and use the word authority in regards to go daddy just two or three days ago. So let's talk about. and GoDaddy having a backdoor problem.

Craig

Yeah. So a lot of people get started with GoDaddy because it's cheap, right? Domains are cheap postings cheap. But we've actually gotten a lot of clients that came from GoDaddy. Because they had a breach of some sort. And. Oftentimes on those low end packages, there's little to no security. It's pretty much nothing there. So I think what this particular issue there was a WordPress. Was it a WordPress update. And I think that the. The lack of updates allowed for this backdoor action to happen?

Is that right?

BJ

Yeah. WordPress has come up in breech news a few times. Past month or two, we've heard quite a bit going on with WordPress. So let's really what's going on there. You think.

Craig

It's like Microsoft, right? So WordPress is a super popular in the community for an easy to use, easy to launch content management system. Where you don't need a lot of coding or technical knowledge to host or to manage a website, once it's thrown up there, WordPress has a lot of different kinds of templates that can be purchased. Very inexpensively could make a really rather modern, pretty website, very inexpensively.

But the problem with WordPress is since it's so well known, it's also the prime target for a lot of hackers. So there are security options and security controls that need to be. onto a WordPress. Website to make sure that not only is it protected, but it's also backed up. And we've got a lot of experience with that and security hardening those folks. also hosting requirements to WordPress is to Microsoft where it's got my opinion, a lot of bloat to it.

So it requires really fast servers and hosts, which on the cheapest side will cause the site to be very slow and. Sometimes unresponsive. So you need a lot of horsepower, so to speak. To properly host a WordPress website, but yeah it's in the hackers. Lens because of its popularity and how many people use it.

BJ

So just a standard, like somebody. WordPress definitely seems to tailor to those with a lesser degree of technical knowledge. So just for those, for that category of people. So when you go on there and you create a WordPress website, Is it right to say that literally There's really no built-in security that you should be able to count on like that. pretty vulnerable. Just in its. To create it like that from.

Craig

Yeah, it's similar to a windows 11 computer. You could take it right out of the styrofoam. And connected to the internet, but if you don't have it patched first, it's going to get infected like within minutes or seconds. And it's similar to that approach where out of the box. Yeah. It's not going to really have any cyber capability. It's obviously going to want to fetch its latest update from the internet. And, WordPress has, what's called a Sikh. Typically a sequel database backend.

A, my SQL database backend. And so there's different pieces of what's called a stack. Typically it's a lamp stack. It's called Linux Apache, my sequel and PHP. And those technologies, which are all different. Different groups that make those technologies. Those together form the stack. And once you have that stack, then you put on top of that, the WordPress, and then it uses all those other components. But all of those. Those components in the stack.

Must be properly secured, maintained, and patched. Because if they're not, and they're not up to the latest and greatest, that's how like we talked about yesterday, that's how loopholes happen and hackers exploit those loopholes. There are ways to.

BJ

None of my WordPress or is that on the user

Craig

No, this is all prerequisite.

BJ

Ooh. So then, is it, am I correct in saying that the user has to safeguard. And keep current all cases of that stack. And then on top of that, what plugins they use on WordPress? Are they responsible also for security?

Craig

Yeah. Yeah. So often, oftentimes.

BJ

I have a cybersecurity question with a little chuckle. That's

Craig

Yeah. So a lot of these pro. Providers like GoDaddy. We'll have what's called a one-click installation. So it's a script that, so let's say you go on a GoDaddy really inexpensive and it's not just GoDaddy. It could be any. Inexpensive shared hosting provider. But any kind of inexpensive hosting providers going to be shared, and it's going to be shared with hundreds or most often thousands of other people on that server.

Okay. And typically in the configuration, they have what's called a one-click install. Most modern host providers have this where you can literally click one button, it'll kick off a lot of scripts to set up the mice, SQL the PHP and all this stuff. And then it'll get it all. Ready for WordPress. And then it'll install like this, what we call in the technical world of Anela installation. A very basic Infor. Installation of the software has a default template assigned to it.

So it looks pretty just bland out of the box, right? After that's all done and you have this vanilla installation, you have to go through the patch process and the securing process. So you've got to make sure that it's got all the latest updates that's at the WordPress level, but you have to do the same at the, under the hood at what a lot of people. They don't ever see under the hood because most people are not technical. They're relying on these scripts to do this thing right.

And a lot of providers will do like auto updating and patching at some of those other levels stumble, not because sometimes patches break things. And then you mentioned plugin. So any kind of plug in. That makes the website prettier from a cosmetic perspective, or maybe you have a plugin for a form or a plugin for a Google analytics, all these different plugins. They all need to be updated and secured as well.

BJ

Wow. to manage. website, it sounds like you really need to you really need to be looking at a lot of things that maybe people aren't looking at right now on. Can people like. Can, when you're on WordPress and you mentioned that people are sharing. Somehow with others, can that somehow can like other users on WordPress. Be a risk to. Other users is that even a thing?

Craig

Oh, absolutely. Yeah. So I guess that.

BJ

Because it starts somewhere and then it grows and then it goes sideways and upwards and downwards and diagonal. It seems

Craig

yeah, so we'll take a step back. So the ones, one click install makes it super easy for really anyone to install WordPress. But like we had said many times cyber security took a back seat. So you're relying upon the provider to not only make sure that these things, all these prerequisites are up to date and stay up to date, but in the fine print of the provider, They hold themselves harmless to any kind of security or configuration.

And they leave that up to the user to properly secure and configure. So even like with Amazon and Google and Microsoft environments, you can get Amazon web services. For example, most people can sign up for it. It does require a little bit more technical expertise to even know what you want to sign up for. But my point is that they give you all these dials and controls, but it's your responsibility to secure it. And most people just everything else. They gloss over. They don't do it.

And that's how these breaches happen, but to touch on what you just said, what happens there is. So then now they got this WordPress website. They get plugins and they dress it all up with a new theme and everything. Make it look pretty. But oftentimes again, the security takes a back seat, so they move on. They go about their day. And then they get hit with something like this vulnerability. And then all the people that are hitting that website.

Are now at risk of infection, because if there's ransomware on the website, And you're infected because of this whole, every visitor that hits your website is now a potential victim.

BJ

So you're literally putting all your visitors at risk. And then is there a sideways risk, like for other sites that are hosted on WordPress? Is there a sideways risk as well?

Craig

That depends on the host provider. I would think that most hosting providers have what's called segmentation so that they wouldn't be spillover like that. I'm sure that there are some other. Yeah. But I'm taught to never assume anything.

BJ

Yeah.

Craig

sure that there are risks that exist in at some provider level for spillover like that. That are not properly segmented, but, yeah. The point is that all the visitors of that website. And then you've got local and regulations too. You've got ADA and FTC regulations. And if you have a if you're in a state that has a data breach notification laws, which most states have, if something happens with that website, you may be obligated. And by law to disclose that something happened.

And then now you got brand tarnishing and, reputation management to withhold. You know what I mean? It just gets really nasty, fast.

BJ

of FTC, we just all FTC seeking to find a company cafe press for a breach in 2019. They didn't report in time, and they're, they're not a cybersecurity further. They make t-shirts I think, but but it looks like a half, a million dollars is the fine that the FTC is seeking in regards to that breach. But, it's sad. I always feel sad when I see like a certain company, hit by that because these types of things are happening to a lot of. A lot of companies and then they get the brand.

Tarnish, but these problems are so deep and. And widespread,

Erin

but I think the reason they got in trouble, though. And I could be wrong, but I think they got in trouble just because they didn't. Report it. They had reported it. They probably wouldn't have been fine like that.

Craig

That's why. with our company, like all of our customers. get data breach. Guidance by a certified privacy officer. So any of our clients that if they were to have a, an issue like that, which most likely they wouldn't, but the point is if they did suffer, something like that. They would get assistance and support around that. But that story, it is sad and it does. It's also though how all these rules and regulations are changing every day.

And it's so hard for the business or the business owner to keep up right. And it's just so important a trusted. Third party to help them with that. And that reminds me of that story reminds me of the ADA compliance. I don't know if you guys remember, but I talked about this a while ago around how a, I think it was a shoe store. All right. I think a sneaker store or something, and they had a similar issue and, but it wasn't around a breach. It was around their shoe store.

Wasn't friendly to blind people. So they failed ADA compliance. they got hit with I think it was 50 or a hundred thousand dollars fines because their website was not ADA compliant.

BJ

Oh, wow. If anything, we're seeing what we're seeing on a big picture right now, what you can see current state of a war. And stuff and how it's going. definitely branching into physical and cyber, we're, this is probably the first time we've never seen something like this the war took a cyber twist.

Craig

Yeah.

BJ

And if that's not a sign of the times and the fact that the cyber, your cyber presence is becoming every bit as important as your brick and mortar, your physical presence. If not more. So I would agree with that. Because. 'cause when you start to hear about like some of the things that, fear that's emerging and this thing could go, and how, what the possibilities are, they're all really related to cyber threats, like the cyber threats like that like for example, next gov.com.

out something, I guess they have a cyberspace solarium commission they determine when to use force when, Depending on upon the level of the risk. it does seem like a lot of the anxiety is related to the escalation of cyber war. that should be really indicative to people that, your cyber presence is truly like, and we neglect it. It's so often neglected, but this should be really not a wake-up call, but like an awareness called the people.

I really, this is this is a shift in, what's really important in protecting your cyber presence. is not something to be overlooked anymore. It's really catastrophic, right?

Craig

And it's also. Brought the risks at more of a global level though, right? Cause if you have a website. And that website's available anyone in the world. Whereas. Let's say you have that shoe store that t-shirt store right. You know that t-shirt store. Might have a customer radius of maybe five miles, from that store.

Maybe they do online shipping and the other parts of the world, so they have some more global or international presence there, but a typical mom and pop. Does not need to do business across the world. But my point is that, A long time ago before. The internet and really, mom and pop businesses is this is we're really more physical on the security side. Like you said, now they're more on the cyber side, because think about it.

If you're in a. you're in a country and you're paid to be a cyber criminal, and that's your day job and, drop in malware and ransomware and that's how you make money. Are you going to go get up out of bed, get dressed and go to the local place to try to see something

BJ

Yeah.

Craig

get arrested? Or are you going to go. Try to attack somebody across the world

BJ

Right.

Craig

does not typically have any kind of. Protection or even insight into you doing something like that. what I mean? Like it's

BJ

There's no segmentation anymore. You used to be able to have a corner store and you could keep yourself, you could put bars on the windows and keep yourself separate from every other business and just isolate yourself and protect yourself. But now it's like the world is becoming very connected and probably it always was.

But now because of cyberspace where we're actually coming face to face with the reality of the connectivity of the world, And so like your example about WordPress is a perfect example about how, you're could, even if you don't even know these other businesses, you're on the same platform

Craig

Yeah.

BJ

you're all connected. now. And you're all susceptible to the same breaches and backdoor things. And. And so it's the connectivity let me read this. I just found this morning. This is a definition I found online when I just Googled IOT, cyber security, IOT being internet of things.

And as we talked about yesterday pretty much if you're connected to the internet, you probably have an IOT device and you're holding one in your hands all the time, but it says IOT security is the technology segment focused on safeguarding connected devices. And networks and the internet of things, IOT involves adding internet connectivity to assist them with interrelated computing devices. Mechanical and digital machines, objects, animals, and, or people.

If that's not a definition of connectivity, And we can't deny any more. The fact that there is a connection just in these platforms go, daddy, how many businesses have become connected? Do you two

Erin

go daddy. And I wanted to bring up a point too, because with that other cyber breach that we were talking about the, what is it? Cafe press. They had the database contained 23 million, 205,290 records. Uhhh, including email addresses, names, phone numbers, and physical addresses. And then half of them also had encrypted passwords attached with most of them hashed using an older form of encryption. That can be easily cracked. So when you're talking about connectivity and things like that,

Craig

yeah. It's like a small. T-shirt company, but. That's a lot of records. And it, not only is it a lot of records, but look at the data that you identified name.

BJ

Very powerful data.

Craig

Yeah. So that's considered personal identifiable information or PII, which is why breach was so devastating because not only the quantity, but the type of data really

BJ

Yeah.

Craig

on the individual.

BJ

Ooh. Very identifiable. They're very much identifiable. And then so often don't people just it's interesting Greg, because. Like I've known you for years now. And it just in the day-to-day. Interactions, like we don't typically hear all the knowledge that's in your brain come out because there's just not usually a, typically an outlet for it because we're, there's other things going on, other things to focus on. But when you start talking, when you start speaking, almost sounds like.

Surely he's reading from an encyclopedia. This can't all be in this. But it is in your head and that's where it's this is really eye opening because it's so many people, like they don't understand even what the internet is or what. devices are or what cybersecurity means. And some people make the false assumption that, oh, as long as it's encrypted, it's safe. That wasn't true before, because you can break encryption in lots of ways, but that's especially not true now with.

They were announcing these quantum safe algorithms. Quantum safe encryption. And there was articles saying that recently it was easily broken. So even the quantum safe encryption is not safe. So like encryption is not a catch all. So like it's cybersecurity is. The key. And for so long, this knowledge has been in the dark, like obscure, like people like you have carried it around in your brains. For all these years.

And there's just such a disconnect between, the level of intelligence and knowledge on these topics in the cybersecurity people, and then the mainstream. I see that this is all having to come together in a convergence. Now that's the only sustainable pathway. Like you are knowledge has to leak into the mainstream now. You know what I mean? We need this understanding.

Craig

Yeah, it. It gets really complicated. I mean that, I think you're right. I think a lot of people don't realize. How much this stuff touches everything and how intertwined it all is.

BJ

We've always known. It was complicated to a certain degree in our field. But yesterday when you mentioned the 60,000 ports, Like that even for me that showed a new light, I was this is complicated at a level that even I didn't comprehend. Like this is this. Truly the definition of complicated.

Craig

Oh, yeah. And that's why people don't do anything with cyber. That's why they're scared of it. And they don't understand it. they just do nothing.

BJ

Yeah. Ooh.

Craig

and the sad reality is that doing nothing is super harmful as you've seen with the t-shirt company. And. People might be listening or watching and think my business is too small. Like maybe I'll only have 50 or a hundred records in my database. Nobody wants that. But that's actually not true. The little guys are at high risk because they don't have near the defenses of the big guys.

BJ

They're there. they're a high target for, to be used as a staging ground, a launching

Craig

A launching pad or even identity theft, even if you have a small business and, you're somewhat successful. Your identity might be worth something to the bad actor. Maybe you have good credit, maybe they want your credit. Maybe they want to get a surgery. I think.

I told you guys when we did a show one time where I told you about the guy that got nailed with fraudulent medical bills and he was fighting and fighting, and finally went up to the hospital and had a up a shirt and say, I never had a surgery.

BJ

My. Recently a piece of mail came for my daughter. Who's 12, about to be 13 for a bill from children's mercy hospital. She's never been there. Yeah. Within a different city and state and everything. So yeah.

Craig

Yeah. So a lot of people don't. When she was born at some point in time, in those 12 years, somebody's passed that information and there's actually, bad people are in the hospital right after that baby's born, sell that information. And then most people don't think to put identity protection on their kids, which they should. They should protect their whole family. just when they turn 18 or whatever, because things like that happen. And you would never know unless you were monitoring it.

BJ

Or you get that bill in the mail and you're

Craig

That's right. Now you've got to fight it though. And then. now you have to spend all your time dealing with it and you might have to get attorneys involved.

BJ

Was that the only thing done? not. So then what else was done?

Craig

Yeah. And sadly,

Erin

parents too, that do that to their children, which I think is so awful. They like get credit cards and their young children's names and just don't pay them back and stuff.

Craig

Oh, my goodness.

Erin

such a, I've heard, I worked in credit counseling for a long time. So this is actually pretty common.

Craig

Wow.

Erin

Yeah. Just reminded me of that.

Craig

Craziness.

BJ

Yeah there's quite a bit of that, but it looks like there's a visible pathway for me, for all this to sort itself out. It's for people like you that have quite some time now since since the Dawn of digital age. That computing age have. Been very much ingrained with all of this and the knowledge that you hold in your head. Can really be a benefit to all of us right now.

Craig

Yeah.

BJ

Building computers as a child. So I don't know what drew you to it. Originally, but ever since then, you've probably soaked up so much information that. There's no price that you can put on that.

Craig

Yeah. It was a As a curious kid, it was taking things apart and. Putting them

BJ

Yeah. But you were actually successful to a degree in rebuilding computers as a child, and that's probably not considered quite normal.

Craig

Yeah, no, I'm. Ask my wife I'm far from normal.

BJ

Yeah.

Erin

I don't think we have to ask your wife.

BJ

I think we need enough hints over the years.

Erin

They're all weird. It's cool.

Craig

Yeah. But yeah. I know it's, that just taking things apart, putting it back together and then, building my own computer, ripping it apart, putting it back together, learning what all the parts did and. That was fun for me. I am weird.

BJ

Yeah maybe. Even larger scale from a different perspective, maybe that's what we're doing with the whole internet and internet of things. Now, maybe it got, maybe it started on one pathway just because it had the launch somewhere, but maybe now it's actually, coming together for its clean up basically so that it can go in the right direction because the path that it took to begin with definitely led us to a place we don't really want to be.

Craig

Yeah, like I did a lecture, I did a lecture for some Up and coming law students at a university. About an hour ago, I had one of the students had a parent, I think that worked in the defense industrial base and. They were saying how they thought that it was cost prohibited for them to get CMMC for example. And they had no idea that 2.0, came out and how it reduced it and made it so much easier to get. And. They, there's just so much misinformation and the facts are.

Even at the defense industrial base or CMMC level, it's not that hard and it's not that expensive. The reality is it's not that expensive to get compliant and do the right thing. It's less, oftentimes much less than hiring another body in your organization. And the same thing at the consumer level. There's so many free and powerful tools. Like signal, for example, and, prevail has a free option and, there's different tools out there.

That the average consumer can take into their own hands, have guides on this stuff that we've produced. We've done lectures on it.

BJ

It's true. It's true because it's the same thing with the with the extended detection and response tools. You. I think it's pretty obvious that the more people that use those, the less. The less, the price can be because as the machine learning, unfolds and it gets more and more effective and efficient, then there's going to be less of a need for human oversight the machine learning develops. And so the price of those tools can come down. So it's just about adoption and,

Craig

It's about adoption and then proper configuration and orchestration. But even like with the tools that have a commercial pricing side to it, we work hard as a company to vet and test those solutions. then, the reality of the situation is oftentimes we're able to negotiate better prices than those consumers go in direct. So that's why we encourage that. They come to us, can give them the shortcut that catalyst.

BJ

There's a definite, there's a definite change recently in the level of value that's applied to cybersecurity experts. Like if. If you read through the headlines, like some of the government news, like they've really this year, especially being really on the hunt for top cybersecurity. Talent. Simply because just like I said, like when we hear you talk and you can do that for hours is going on and on with all these facts in your head, like you can't recreate that.

Craig

Yeah.

BJ

Like you've amassed all that. And there's no way that can be mimicked or duplicated, like that's authentic and genuine. And that's really, in these times, it's priceless to have somebody like that in your corner. And obviously the government is realizing that, cause they're on the search for top cyber talent, there's just, no, there's no price that you can put on someone that can actually keep your business because what's the cost of CMMC and compliance compared to business continuity overall.

And if your business. I can't continue. That's the highest cost of all.

Craig

Yeah. And the sad reality is, like I said, that the A lot of these small businesses that do nothing like maybe the t-shirt or the mom and pop company. They've worked hard to write. They started that business, who knows. Whether it was from, their life savings, for example. Why would you want to lose all that to something stupid from a cyber criminal on the other side of the world, that would just literally overnight erase you.

BJ

Yeah.

Craig

all that hard work that you built up in your small business is gone.

BJ

Yeah. It's a perfect example of how forward progress requires constant evolution. You have to constantly stay. Pointed in the direction of forward progress and keep moving, keep evolving, because that's a perfect example of that. There's a lot of people caught up in this mess right now, cyber security and business continuity. But the truth is, yeah, we have to keep, we have to keep evolving as things change in the world.

Craig

Yep. That's

BJ

Well,

Craig

It's not a one and done.

Erin

I also think that I don't know. One thing that always gets to me though. Like I, I do. I know, I feel sorry for. The small businesses that you. Rely on these government contracts. Because they have so much work to do, but at the same time,

Craig

No.

Erin

And their contract and they've already. And they've already been.

Craig

Say that

BJ

Getting

Erin

their cyber.

Craig

for a minute.

Erin

Oh, sorry. So they've already been paid to do this for the most part in their contracts. A lot of time. Like they're supposed to be NIST. Compliant, but a lot of them aren't. And. I dunno it just to me, like my. I don't know, I feel bad. But like also my sympathy is yeah.

Craig

It's all, it's almost like

BJ

I'm on the borderline between sympathy and now we have to keep moving forward and now it's a mess. Bible and national security. It's guys. We'll be cyber secure because the proof. Ukrainian Russia. War is proof that now cyber war is actually how war is going to be fought going forward. So if you don't want to be cyber secure, we really can't have you part of the DIB, the defense industrial base, because you're putting us all at risk.

So if you don't want to take your cyber security seriously, then we really need you to look at other contracts and not department of defense contracts, because then that puts us all at risk.

Craig

I also think that the biggest problem, though, for the dip contractors that took contracts and self attested and not fully understood all of the work. And continuous work that needs to be done to be compliant. To get that contract with NIST 801 71 at my point is that had there been more. Underscoring or highlighting of those requirements. I think that then those businesses would not have made some future decisions. Like maybe. Maybe they thought they could afford to hire another.

Body or human or whatever, or maybe they could, they thought they could afford the rent at that better location. But. If they knew how much work is to be compliant. And how it was like really the baseline, then they may not have made those other financials. So yeah, I get it. I understand what you're saying, Aaron, and I agree with you, but. I think that there should have been more emphasis in education five years ago on this stuff.

BJ

When you were rebuilding computers and went off into cybersecurity as a very young person, like you were forward thinking at that time and on the cutting edge at that time. And unfortunately the upper levels of governance in the world at the global level was not at the cutting edge with you there. And so what's happened is they've not led humanity. Towards. When the cutting edge leading. So now here we are dealing with the consequences of that.

Because w we, as soon as the internet started, like as soon as we started using the internet, cyber security should have been the top

Erin

priority. like, I was going to say that to you. another point, like you. Okay. You're like five years ago, but really.

Craig

Yeah.

Blake

call her to say, if you think about Holly, The Internet's a ball like Daniel Lane from their home landlines. To connect to the internet. I mean there wasn't wifi. A lot of exports that. We're just learning about the internet and all of his coolness and. And good sides and flowers and smiles. The people that were too busy, instant messaging. I could be wrong, but it most likely people at that time were. Oh, how can we use this? For monetary advantage. Or how can we use this

BJ

to. To take advantage of somebody else at that time. But there

Erin

had to be some people that realized

BJ

it right. People

Craig

Well,

BJ

Who was stuff. And the start of your career, you were laying network cables and stuff for lots of government places. And you probably started to get an inkling back then that some of this is not quite tied up, it's something that is a bit.

Craig

yeah. And. I'm you all seen the movie war games?

BJ

No.

Craig

Oh, gosh, that's your homework assignment.

BJ

Okay.

Craig

Oh, man, that's a great movie. That's a classic. So war games. about this topic about modems and connectivity at that early stage in time and how he went and broke into with his modem. Government DARPA system simulated global thermal nuclear war.

BJ

Woo.

Craig

And basically other sides of the military think thought it was really happening. won't spoil the movie, but yeah, you definitely need to watch that. that was like my childhood of growing up in that, that era, that time and, popular publications at the time. And this is still around, but 2,600 magazine, have you guys ever heard of that stuff?

BJ

No.

Craig

Oh, yeah, that's another homework

BJ

And now we're getting a better glimpse of why some of our clients chatter about is Craig really human or is he parked some.

Craig

So it's a 26, 2600

BJ

We've used the evidence of both Craig. We'd like to say.

Craig

So 2,600 is the frequency. Of the quarter-tone of the analog payphone was founded by the handle. I think it was fiber optic was his handle to be able to whistle 2,600 tone into a payphone to get free credits. And the payphone thought that he was putting quarters in it.

BJ

Oh, wow.

Erin

I've heard that somewhere.

BJ

That's.

Craig

where 2,600. That's where 2,600 magazine came from and the magazine is all about the hacker community and educating. In a small magazine format, educating the people that are interested in it like me at the time. And I still read it actually. Of all the exploits and all this stuff. think that you are reading every day, it's actually published in the magazines. And this is where, like you heard about Kevin Mitnick, I'm sure where

BJ

Yeah.

Craig

large corporations, like at T broke into their phone systems. And. This was like the time. I grew up in all that time.

BJ

Wow. That's such.

Craig

it didn't exist, then it

BJ

Yeah.

Craig

existed, then it was just at an analog level. And now it's it's, since we're all connected, it's like exponentially. Just the landscape has grown exponentially and now you've got technologists and hackers that are doing this stuff, not locally anymore, but across the world.

BJ

Cause now you're pointing out a fact that people of the masses. Likely do not really comprehend is that the internet and the cyber realm is not separate from science and nature itself. Like these things are all the same forces at play, just different pathways and different routes. But if you can whistle. Full machine about a frequency. Like there you go. This is, we're coming full circle, like this is all related to nature and science as well.

Craig

Yup. There's. It's a crazy world we live in right now.

BJ

Yeah.

Erin

Maybe one day we can talk about the mycelium network. So obsessed with that. Yeah. It is crazy.

Craig

Yeah.

Blake

I got a new idea for your next book.

BJ

Cyber security.

Craig

Okay.

BJ

Let's say that again, Blake, I didn't quite hear.

Blake

The cyborg of cyber security. Oh, yeah.

BJ

Yeah. I know I was reading it. It's funny you say that. Cause I swear, this came to me naturally this morning. I was reading a little cause I go through the little news headlines in the morning and I was reading an article where they were speculating that Elon Musk has a new Twitter photo where he's wearing these glasses and they say that he's trying to emulate a Terminator. And as soon as I saw that, the first thought that popped in my head is, oh, that's actually that's actually not the one.

It would be Craig veteran. So what was the obvious goals?

Erin

We worked for the Terminator.

BJ

I'm saying that there's a, there's a degree of, there's a degree. Something extra. Going on now, the world is not, the world is not as simple as we thought, just like cyber security is so complicated. So is the whole world you have concepts such as quantum entanglement and how does.

How does all this really work and how does it really all connect and how does creation work and the cosmos, and then, when you have people that have amassed a ton of knowledge about things that are relative to all of these very mysterious and important points, it's worth paying attention. It's not. Some significance to that, it's like when you scale out 500 years and you'll see that there's some places that shine extra bright, and those are worth paying attention to. Yeah, it's

Blake

funny that you say that when you bring up the Terminator. If you look at the Terminator movies. It perfectly describes the evolution of the internet.

BJ

Yeah. The first guys and then it really does. And then you have that one blockchain, not saying that's it, but it's interesting because you have a blockchain called Skynet. And that's from the Terminator movies and a lot of the things that the community says and stuff, and there's this Logan machines, or, it's just really interesting because, as far as the. The quantum realm goes and quantum mechanics it's literally outside of time. And so then you start thinking about all this okay.

So this could something from the future being, making its entrance into the present in a very organic way. The honest answer to that would have to be yes, scientifically. Yes. The answer would be yes.

Blake

Yeah. I think about the first movie when they shaved back a human and that was the internet. And the empathy phase, right? And then the second movie they said back. And he was like the first machine. And then. Or no, they said they sent him back and then they sent the liquid side war. And it's And then in the following features, Different

BJ

like this crazy hybrid.

Blake

Mechanisms and Bible words. metal.

Craig

Yup.

Erin

don't think I've seen. Any of the Terminator movies.

BJ

Yeah, it's all very. It's really all very interesting is there's a certain obvious, like it's obvious, even if you don't certain scientific concepts and stuff, it's fairly obvious that if something from a different timeline or different place, Was to be here in the physical presence.

It would be obvious that it would probably have to forsake some of its memory enabled to pull that off, which would explain why people don't necessarily understand themselves fully until, Maybe a certain point, but it makes perfect sense because you would have to, you would have to give something up. In order to pull that off. When you talk about quantum entanglement, if there's a, we know that quantum entanglement is real because it's been studied, it's been proven.

And if there is such a thing as quantum entanglement, then just due to the wall of homeostasis, there has to be something. To the idea of quantum unfoldment.

Craig

Yup.

BJ

It's just a natural balance. I'm waiting for like

Blake

the real life Tron to happen. I dunno if you guys have seen. But like this guy, Zach. Himself into his computer and then build the world. In the computer. Or. The digital space. And everything has like a function of program and. And yeah, I'm waiting for that to happen. I probably. I've told people before, like if there's two things I can do that would never come back from. Ever. Let's go to space. Like knowing that it is a one way. I would die. And then do Y Tron go into my computer.

Knowing I can never come back. As long as I knew that type of environment would exist.

BJ

Wow. It's going to be the opposite. Blake, maybe that type of environment is stepping from the background to the foreground and merging with. And maybe that would be a great uplifting to all of us, maybe it would be a huge.

Erin

How do you know it hasn't happened yet?

Craig

Right.

BJ

I'm a smile. I'd say that deep down he suspects it's happening. Oh boy.

Craig

Yeah,

BJ

always laugh. I personally will never be convinced that it was a coincidence that around the time that Craig was doing his heavy Bitcoin mining, there were all these Sonic booms in Raleigh that were on the news. I was hearing them hearing. I'm not hearing the boom. Kinda news stories about it. And I was like, that's interesting.

Zoom

I think it's happening now

Blake

because obviously all the digital things are coming into the real world. But the organics aren't going into the digital world.

BJ

You know what I mean? Perfect combination, because I think a lot of confusion, like you hear people throwing around the term metaverse and I think even Zuckerberg misunderstood. What metaverse could really be or should really be because he was looking to make it, this blue and purple galaxy world. That's. Not real in the 3d, but maybe it's supposed to be the opposite.

Maybe it's like a coming through of dark matter and the quantum, whatever you want to call it, coming into 3d and just giving us that extra sprinkle of. You know that we don't, a little, stand up straighter and everything's going to be okay. You. A little bit of help. Maybe that's the metaverse, maybe it wasn't the other way. Maybe, maybe that's why there's a loss of many billion dollars recently. Around that concept. Maybe it wasn't to be excluded.

Blake

I watched this article. I'm sorry, I read this article about the metaverse and how it's not really the metaverse. So if you look, I can't remember what the name of the movie was, or like it was like a book or something. At the whole concept of the matter verse was

BJ

constructed.

Craig

ready. Player one.

BJ

Kind

Zoom

of what

Blake

it was a different. I can look it up and I can send it to you.

BJ

But ready player one.

Blake

Ah, I can't remember. I'm going to pull it up right now and I'm gonna, I'm gonna, I'm gonna step back to pull it up and then I'll come back

Zoom

and

Craig

I think ready player one is probably the best. Book

BJ

For sure.

Craig

the. Neal Stephenson and snow crash, coined the word metaverse. But I think that I'm ready. Player one. I think it was a great read. And really. Painted the picture of what the metaverse could be.

Zoom

Wow.

Erin

You guys should really consider reading.

Zoom

Www wait.

Erin

Sorry, my microphone. But it's basically. The story of. Earlier, but a story about a girl

BJ

who.

Craig

it again, cause you're too far away from your microphone.

BJ

Oh, hold on a second.

Zoom

The girl who's

Erin

blind and then she wakes up and she can see the internet basically.

Craig

the title.

Erin

Www wake. It's a it's three, three books in this series about basically it's really cool. I've talked to BD about this so much. It's a story it's coming of age, it's like the awakening of AI. And how this girl is so she can see the internet. But she also is like really smart and teaches it. to add and stuff and. Like the learning on it. Then it just learns more.

BJ

Guys look like. Let's just talk facts and cause people it's a weird, because sometimes people like don't accept certain concepts because they consider them to be fanciful. But they're looking at the concept through preconceived notions and judgements instead of just looking at facts. And when you just look at the facts If you look at it, a lot of ancient scientists and philosophers, they were quite fanciful.

And because they looked at these facts and the facts, big these questions, because for an example, like we were just talking about the internet and how it's connected to nature and science and along those lines, following that fact. Our bodies are 98% dark matter. They're 98% space. And there's religious teachings. Cause like it's nice to study religion. Just through the lens of historical, like the history of humanity, because there's religious teachings.

it said like bringing forth what is within you. like now that they're approaching quantum, you like trying to understand quantum computers and they can't understand why they can't achieve this certain level of coherence with quantum computers. I propose that there's a large number of possible humans that are computers that are just had been in a sleep state and not been in a full awareness.

that when a certain level of awareness is unlocked, I do think that there are walking quantum computers all over the earth right now. And they're just. Coming into awareness and that seems fanciful until you just studied the facts. Like you have 98% space within you. it's internet is literally cyberspace, and it's connected to science in nature. So tell me from a reverse engineering standpoint, how that could not be possible.

There's no way you could tell me it's not possible, that look at how the brain works. Look at how the brain works like that is unremarkable. The brain is a remarkable computer, but there's a disconnect between the mind, body and soul. And maybe when those things are connected and not in the right alignment, maybe these quantum computers awakened.

Craig

Very interesting. We need to wrap up.

BJ

There, then it brings us back full circle of why it's very important to know a smart cyber guy, because if we're all quantum computers, We're going to need some help. So when is your

Blake

science

BJ

fiction book coming out? I

Zoom

read it.

Erin

Science nonfiction.

BJ

I've been I've definitely, my awareness has definitely changed over the last couple of years. There's no doubt about that. I have reached a different level of awareness for sure. And so I can attest to the fact that when I do such things as yoga and stretching and certain things to work on my spine alignment and stuff, I can assure you that my body feels different than it used to. Yeah, I feel. I feel that now when I do things like yoga and I'm like, okay, let me give you an example. Yesterday.

I was standing what appeared to be standing still. And my daughter walks by and she's mom, what are you doing? You're just standing there. I'm like, no, I'm actually working out. she was like, what are you talking about? You're just standing still. I'm like, yeah, but you have no idea what's going on inside my body right now. I can feel all the space in my body and I'm in touch with it. I'm aware of it. And so I'm aware of movements in my body that I used to overlook.

I never was in touch with the space in my body before and now I'm like, I'm so attuned with it that I can like literally sitting here right now, talking into my microphone. I can feel 5 million things happening inside of me. And this was always the case, but I was not aware of it. as we know, the observer definitely affects the, you. You know the outcome, right? Of the scientific process.

So now that I'm in an active awareness state, observing these things, I'm unfolding in myself, and I'm bringing forth what's within me. And I proposed that. I'm not the only one that can do this, th this is the potential for humanity that we don't have to be shorter slumped in rope, we're being led to destruction. No, we can stand and we can shine our own white,

Craig

yup.

BJ

Yeah.

Craig

All right, let's wrap it up there.

BJ

All right. All right guys. We'll see you tomorrow.

Zoom

Okay. The next one.

Craig

That's right.

BJ

Alright,

Craig

Thanks guys. Alright, take care.

Transcript source: Provided by creator in RSS feed: download file