Welcome to another episode of the Petronella cybersecurity podcast. Got Erin, BJ and Blake on the line. I'm gonna talk about the latest cybersecurity news today. Folks are welcome to join on the live stream as well. If anybody had questions that you wanted us to address, you can join the live stream on any of our supported platforms on YouTube, LinkedIn, Facebook, and you can join the party.
I saw one of you guys posted something about the GoDaddy backdoor breach that was announced with WordPress
we just talked about. and use the word authority in regards to go daddy just two or three days ago. So let's talk about. GoDaddy having a backdoor problem.
Yeah. So a lot of people get started with GoDaddy because it's cheap, right? Domains are cheap postings cheap. But we've actually gotten a lot of clients that came from GoDaddy. Because they had a breach of some sort. And. Oftentimes on those low end packages, there's little no security. pretty much nothing there. So I think what this particular issue there was a WordPress. And I think that The lack of updates allowed for this backdoor action to happen? Is that right?
Yeah. WordPress has come up in breech news a few times. We've heard quite a bit going on with WordPress. So what's going on there. You think.
It's like Microsoft, right? So WordPress is a super popular in the community for an easy to use, easy to launch content management system. Where you don't need a lot of coding or technical knowledge to host or to manage a website, once it's thrown up there, WordPress has a lot of different kinds of templates that can be purchased. Very inexpensively could make a rather modern, pretty website, very inexpensively.
But the problem with WordPress is since it's so well known, it's also the prime target for a lot of hackers. So there are security options and security controls that need to be. onto a WordPress. Website to make sure that not only is it protected, but it's also backed up. And we've got a lot of experience with that and security hardening those folks. also hosting requirements to WordPress is to Microsoft where it's got my opinion, a lot of bloat to it.
So it requires really fast servers and hosts, which on the cheapest side will cause site to be very slow and. Sometimes unresponsive. So you need a lot of horsepower, so to speak. To properly host a WordPress website, but yeah in the hackers. Lens because of its popularity and how many people use it.
WordPress definitely seems to tailor to those with a lesser degree of technical knowledge. So when you go on there and you create a WordPress website, Is it right to say that literally There's really no built-in security that you should be able to count on pretty vulnerable.
Yeah, it's similar to a windows 11 computer. You could take it right out of the styrofoam. And connected to the internet, but if you don't have it patched first, it's going to get infected within minutes or seconds. And it's similar to that approach where out of the box. It's not going to really have any cyber capability. It's obviously going to want to fetch its latest update from the internet. And, WordPress has, what's called sequel database backend. A, my SQL database backend.
so there's different pieces of what's called a stack. Typically it's a lamp stack. It's called Linux Apache, my sequel and PHP. And those technologies, which are all different. Different groups that make those technologies. Those together form the stack. And once you have that stack, then you put on top of that, the WordPress, and then it uses all those other components. But all of those components in the stack. Must be properly secured, maintained, and patched.
Because if they're not, and they're not up to the latest and greatest, that's how loopholes happen and hackers exploit those loopholes.
None of my WordPress or is that on the user
No, this is all prerequisite.
Ooh. So then, am I correct in saying that the user has to safeguard. And keep current cases of that stack. And then on top of that, what plugins they use on WordPress? Are they responsible also for security?
So a lot of these pro. Providers like GoDaddy. We'll have what's called a one-click installation. So it's a script let's say you go on a GoDaddy really inexpensive and it's not just GoDaddy. It could be any. Inexpensive shared hosting provider. But any kind of inexpensive hosting providers going to be shared, and it's going to be shared with hundreds or most often thousands of other people on that server. Okay. And typically in the configuration, they have what's called a one-click install.
Most modern host providers have this where you can literally click one button, it'll kick off a lot of scripts to set up the mice, SQL the PHP and all this stuff. And then it'll get it all. Ready for WordPress. And then it'll install what we call in the technical world of Anela installation. A very basic installation of the software has a default template assigned to it. it looks pretty bland out of the box, right?
After that's all done and you have this vanilla installation, you have to go through the patch process and the securing process. So you've got to make sure that it's got all the latest updates that's at the WordPress level, but you have to do the same under the hood a lot of people. They don't ever see under the hood because most people are not technical. They're relying on these scripts to do this thing right.
And a lot of providers will do auto updating and patching at some of those other levels stumble, not because sometimes patches break things. And then you mentioned plugin. So any kind of plug in. That makes the website prettier from a cosmetic perspective, or maybe you have a plugin for a form or a plugin for a Google analytics, all these different plugins. They all need to be updated and secured as well.
Wow. to manage. website, it sounds like you really need to be looking at a lot of things that maybe people aren't looking at right now on. When you're on WordPress and you mentioned that people are sharing. Can other users on WordPress. Be a risk to. Other users is that even a thing? Because it starts somewhere and then it grows and then it goes sideways and upwards and downwards and diagonal.
yeah, we'll take a step back. So one click install makes it super easy for really anyone to install WordPress. But like we had said many times cyber security took a back seat. So you're relying upon the provider to not only make sure that all these prerequisites are up to date and stay up to date, but in the fine print of the provider, They hold themselves harmless to any kind of security or configuration. And they leave that up to the user to properly secure and configure.
So even with Amazon and Google and Microsoft environments, you can get Amazon web services. For example, most people can sign up for it. It does require a little bit more technical expertise to even know what you want to sign up for. But my point is that they give you all these dials and controls, but it's your responsibility to secure it. And most people just gloss over. They don't do it. And that's how these breaches happen, but to touch on what you just said, what happens there is.
now They got this WordPress website. They get plugins and they dress it all up with a new theme and everything. Make it look pretty. But oftentimes again, the security takes a back seat, so they move on. They go about their day. And then they get hit with something like this vulnerability. And then all the people that are hitting that website.
Are now at risk of infection, because if there's ransomware on the website, And you're infected because of this whole, every visitor that hits your website is now a potential victim.
So you're literally putting all your visitors at risk. And then is there a sideways risk, for other sites that are hosted on WordPress? Is there a sideways risk as well?
That depends on the host provider. I would think that most hosting providers have what's called segmentation so that they wouldn't be spillover like that. But I'm taught to never assume anything.
Yeah.
sure that there are risks that exist at some provider level for spillover like that. That are not properly segmented, yeah. And then you've got local and regulations too. You've got ADA and FTC regulations. And if you're in a state that has a data breach notification laws, which most states have, if something happens with that website, you may be obligated. And by law to disclose that something happened. And then now you got brand tarnishing and, reputation management to withhold.
You know what I mean? It just gets really nasty,
of FTC, we just all FTC seeking to find a company cafe press for a breach in 2019. They didn't report in time, and they're not a cybersecurity further. They make t-shirts I think, but it looks like a half, a million dollars is the fine that the FTC is seeking in regards to that breach. I always feel sad when I see a certain company, hit by that because these types of things are happening to a lot of. Companies and then they get the brand. Tarnish, but these problems are so deep and widespread,
but I think the reason they got in trouble, though. And I could be wrong, but I think they got in trouble just because they didn't. Report it.
That's why. All of our customers. get data breach. Guidance by a certified privacy officer. So any of our clients if they were to have an issue like that, which most likely they wouldn't, but the point is if they did suffer, something like that. They would get assistance and support around that. But that story, it is sad It's also though how all these rules and regulations are changing every day.
And it's so hard for the business or the business owner to keep up And it's just so important a trusted. Third party to help them with that. And that story reminds me of the ADA compliance. I don't know if you guys remember, but I talked about this a while ago around how a, I think it was a shoe store. I think a sneaker store or something, and they had a similar issue it wasn't around a breach. It was around their shoe store. Wasn't friendly to blind people. So they failed ADA compliance.
they got hit with I think it was 50 or a hundred thousand dollars fines because their website was not ADA compliant.
Oh, wow. What we're seeing on a big picture right now, what you can see current state of a war. And stuff and how it's going. definitely branching into physical and cyber, this is probably the first time we've never seen something like this the war took a cyber twist. And if that's not a sign of the times and the fact that your cyber presence is becoming every bit as important as your brick and mortar, your physical presence. If not more. So I would agree with that.
when you start to hear about fear that's emerging and this thing could go, and what the possibilities are, they're all really related to cyber threats, for example, next gov.com. out something, I guess they have a solarium commission they determine when to use force Depending upon the level of the risk. it does seem like a lot of the anxiety is related to the escalation of cyber war.
that should be really indicative to people that, your cyber presence is so often neglected, this should be not a wake-up call, but an awareness called this is a shift in, what's really important in protecting your cyber presence. is not something to be overlooked anymore. It's really catastrophic, right?
And it's also. Brought the risks at more of a global level though, right? Cause if you have a website. And that website's available anyone in the world. Let's say you have that shoe store that t-shirt store right. You know that t-shirt store. Might have a customer radius of maybe five miles, from that store.
Maybe they do online shipping and the other parts of the world, so they have some more global or international presence there, but a typical mom and pop. Does not need to do business across the world. But my point is that, A long time ago before. The internet and really, mom and pop businesses we're really more physical on the security side. Like you said, now they're more on the cyber side, because think about it.
you're in a country and you're paid to be a cyber criminal, and that's your day job and, drop in malware and ransomware and that's how you make money. Are you going to go get up out of bed, get dressed and go to the local place to try to see something
Yeah.
get arrested? Or are you going to go. Try to attack somebody across the world
Right.
does not typically have any kind of. Protection or even insight into you doing something like that.
There's no segmentation anymore. You used to be able to have a corner store and you could put bars on the windows and keep yourself separate from every other business and just isolate yourself and protect yourself. But now the world is becoming very connected and probably it always was.
But now because of cyberspace we're actually coming face to face with the reality of the connectivity of the world, example about WordPress is a perfect example about how, even if you don't even know these other businesses, you're on the same platform you're all connected. now. And you're all susceptible to the same breaches and backdoor things. Let me read this. This is a definition I found online when I just Googled IOT, cyber security, IOT being internet of things.
And as we talked about yesterday pretty much if you're connected to the internet, you probably have an IOT device and you're holding one in your hands all the time, but it says IOT security is the technology segment focused on safeguarding connected devices. And networks and the internet of things, IOT involves adding internet connectivity to assist them with interrelated computing devices. Mechanical and digital machines, objects, animals, and, or people.
If that's not a definition of connectivity, And we can't deny any more. The fact that is a connection just these platforms go, daddy, how many businesses have become connected? Do you two
go daddy. and I wanted to bring up a point too, because with that other cyber breach that we were talking about the, Cafe press. the database contained 23 million, 205,290 records. Uhhh, including email addresses, names, phone numbers, and physical addresses. And then half of them also had encrypted passwords attached with most of them hashed using an older form of encryption. That can be easily cracked. So when you're talking about connectivity and things like that, It's like a small.
T-shirt company, but. That's a of records.
not only is it a lot of records, but look at the data that you identified name.
Very powerful data.
Yeah. So that's considered personal identifiable information or PII, which is why breach was so devastating because not only the quantity, but the type of data really
Yeah.
on the individual.
Ooh. Very identifiable. They're very much identifiable. It's interesting Greg, because. I've known you for years now. And it just in the day-to-day. Interactions, we don't typically hear all the knowledge that's in your brain come out because there's just not typically an outlet for it because there's other things going on, other things to focus on. But when you start talking, when you start speaking, almost sounds like. Surely he's reading from an encyclopedia. This can't all be in this.
But it is in your head this is really eye opening so many people, don't understand even what the internet is or what. devices are or what cybersecurity means. And some people make the false assumption that, oh, as long as it's encrypted, it's safe. That wasn't true before, because you can break encryption in lots of ways, but that's especially not true now with. They were announcing these quantum safe algorithms. Quantum safe encryption.
And there was articles saying that recently it was easily broken. So even the quantum safe encryption is not safe. Encryption is not a catch all. So cybersecurity is. The key. And for so long, this knowledge has been in the dark, obscure, people like you have carried it around in your brains. For all these years. And there's just such a disconnect between, the level of intelligence and knowledge on these topics in the cybersecurity people, and then the mainstream.
I see that this is all having to come together in a convergence. Now that's the only sustainable pathway. You are knowledge has to leak into the mainstream we need this understanding.
Yeah, It gets really complicated. think you're right. I think a lot of people don't realize. How much this stuff touches everything and how intertwined it all is.
We've always known. It was complicated to a certain degree in our field. But yesterday when you mentioned the 60,000 ports, even for me that showed a new light, this is complicated at a level that even I didn't comprehend. this. Truly the definition of complicated.
Oh, yeah. And that's why people don't do anything with cyber. They're scared of it. And they don't understand it. they just do nothing.
Yeah.
and the sad reality is that doing nothing is super harmful as you've seen with t-shirt company. And. People might be listening or watching and think my business is too small. Maybe I'll only have 50 or a hundred records in my database. Nobody wants that. But that's actually not true. The little guys are at high risk because they don't have near the defenses of the big guys.
they're a high target to be used as a staging ground,
A launching pad or even identity theft, even if you have a small business and, you're somewhat successful. Your identity might be worth something to the bad actor. Maybe you have good credit, maybe they want your credit. Maybe they want to get a surgery. I think.
I told you guys when we did a show one time where I told you about guy that got nailed with fraudulent medical bills and he was fighting and fighting, and finally went up to the hospital and had a up a shirt and say, I never had a surgery.
Recently a piece of mail came for my daughter. Who's 12, about to be 13 for a bill from children's mercy hospital. She's never been there. Yeah. Within a different city and state and everything. So yeah.
When she was born at some point in time, in those 12 years, somebody's passed that information and there's actually, bad people that are in the hospital right after that baby's born, they'll sell that information. And then most people don't think to put identity protection on their kids, which they should. should protect their whole family. Not just when they turn 18 or whatever, because oftentimes things like that happen. And you would never know unless you were monitoring it.
Or you get that bill in the mail and you're
That's right. Now you've got to fight it though. And then. now you have to spend all your time dealing with it
was that the only thing done? not. So then what else was done?
Yeah.
parents too, that do that to their children, which I think is so awful. They get credit cards and their young children's names and just don't pay them back and stuff. I worked in credit counseling for a long time. is actually pretty common.
Wow.
Just reminded me of that.
Craziness.
Yeah there's quite a bit of that, but it looks like there's a visible pathway for me, for all this to sort itself out. It's for people like you that have quite some time now since the Dawn of digital age. That computing age have. very much ingrained with all of this and the knowledge that you hold in your head. Can really be a benefit to all of us right now. computers a child. So I don't know what drew you to it.
Originally, but ever since then, you've probably soaked up so much information There's no price that you can put on that.
Yeah. As a curious kid, it was taking things apart and. Putting them
Yeah. But you were actually successful to a degree in rebuilding computers as a child, and that's probably not considered quite normal.
Ask my wife I'm far from normal.
I don't think we have to ask your wife. They're all weird. It's cool.
Yeah. just taking things apart, putting it back together and then, building my own computer, ripping it apart, putting it back together, learning what all the parts did and. That was fun for me. I am weird.
Yeah maybe. Even larger scale from a different perspective, maybe that's what we're doing with the whole internet and internet of things. Now, maybe it started on one pathway just because it had the launch somewhere, but maybe now it's actually, coming together for its clean up basically so that it can go in the right direction because the path that it took to begin with definitely led us to a place we don't really want to be.
Yeah, I did a lecture for some Up and coming law students at a university. About an hour ago, I had one of the students had a parent, I think that worked in the defense industrial base and. They were saying how they thought that it was cost prohibited for them to get CMMC for example. And had no idea that 2.0, came out and how it reduced it and made it so much easier to get. There's just so much misinformation facts are.
Even at the defense industrial base or CMMC level, not that hard and it's not that expensive. The reality is it's not that expensive to get compliant and do the right thing. It's oftentimes much less than hiring another body in your organization. the same thing at the consumer level. There's so many free and powerful tools. Like signal, for example, and, prevail has a free option and, there's different tools out there.
That the average consumer can take into their own hands, have guides on this stuff that we've produced. We've done lectures on it.
It's true it's the same thing with the extended detection and response tools. I think it's pretty obvious that the more people that use those, less, the price can be because as the machine learning, unfolds and it gets more and more effective and efficient, then there's going to be less of a need for human oversight the machine learning develops. And so the price of those tools can come down. So it's just about adoption and,
It's about adoption and then proper configuration orchestration. But even with the tools that have a commercial pricing side to it, we work hard as a company to vet and test those solutions. then, the reality of the situation is oftentimes we're able to negotiate better prices than those consumers go in direct. So that's why we encourage that. They come to us, can give them the shortcut that catalyst.
There's a definite change recently in level of value that's applied to cybersecurity experts. If you read through the headlines, like some of the government news, this year, especially being really on the hunt for top cybersecurity. Talent. Simply because just like I said, when we hear you talk and you can do that for hours is going on and on with all these facts in your head you can't recreate that.
Yeah.
you've amassed all that. And there's no way that can be mimicked or duplicated, that's authentic and genuine. And that's really, in these times, it's priceless to have somebody like that in your corner. And obviously the government is realizing that, cause they're on the search for top cyber talent, there's no price that you can put on someone that can actually keep your business because what's the cost of CMMC and compliance compared to business continuity overall. And if your business.
I can't continue. That's the highest cost of all.
Yeah. And the sad reality is, A lot of these small businesses that do nothing like maybe the t-shirt or the mom and pop company. They've worked hard to write. They started that business, who knows. Whether it was from, their life savings, for example. Why would you want to lose all that to something stupid from a cyber criminal on the other side of the world, that would just literally overnight erase you. all that hard work that you built up in your small business is gone.
It's a perfect example of how forward progress requires constant evolution. You have to constantly stay. Pointed in the direction of forward progress and keep moving, keep evolving, because that's a perfect example of that. There's a lot of people caught up in this mess right now, cyber security and business continuity. But the truth is, yeah, we have to keep evolving as things change in the world.
Yep.
One thing that always gets to me though. I feel sorry for. The small businesses that Rely on these government contracts. Because they have so much work to do, they've already been paid to do this for the most part in their contracts. A lot of time. They're supposed to be NIST. Compliant, but a lot of them aren't. I feel bad.
I'm on the borderline between sympathy and now we have to keep moving forward and now it's a mess. Bible and national security. It's guys. We'll be cyber secure ukrainian Russia. War is proof that now cyber war is actually how war is going to be fought going forward. So if you don't want to be cyber secure, we really can't have you part of the DIB, the defense industrial base, because you're putting us all at risk.
So if you don't want to take your cyber security seriously, then we really need you to look at other contracts and not department of defense contracts, because then that puts us all at risk.
I also think that the biggest problem, though, for the dip contractors that took contracts and self attested and not fully understood all of the work. And continuous work that needs to be done to be compliant. To get that contract with NIST 801 71 at my point is that had there been more. Underscoring or highlighting of those requirements. I think that then those businesses would not have made some future decisions. Maybe they thought they could afford to hire another.
Body or human or whatever, or maybe they thought they could afford the rent at that better location. But. If they knew how much work is to be compliant. And how it was really the baseline, then they may not have made those other financials. So yeah, I get it. I understand what you're saying, Aaron, I agree with you, but. I think that there should have been more emphasis in education five years ago on this stuff.
When you were rebuilding computers went off into cybersecurity as a very young person, you were forward thinking at that time and on the cutting edge at that time. And unfortunately the upper levels of governance in the world at the global level was not at the cutting edge with you there. And so what's happened is they've not led humanity. Towards. When the cutting edge leading. So now here we are dealing with the consequences of that.
Because as soon as the internet started, as soon as we started using the internet, cyber security should have been the top priority.
If you think about Holly, The Internet's a ball Daniel Lane from their home landlines. To connect to the internet. There wasn't wifi. We're just learning about the internet and all of his coolness And good sides and flowers and smiles. The people that were too busy, instant messaging. I could be wrong, but most likely people at that time were. Oh, how can we use this? For monetary advantage. Or how can we use this To take advantage of somebody else at that time.
But there
had to be some people that realized
it right. People
Well,
Who was stuff. And the start of your career, you were laying network cables and stuff for lots of government places. And you probably started to get an inkling back then that some of this is not quite tied up.
Yeah. You all seen the movie war games?
No.
Oh, gosh, that's your homework assignment. that's a great movie. That's a classic. So war games. about this topic about modems and connectivity at that early stage in time and how he went with his modem. and broke into government DARPA system simulated global thermal nuclear war. And basically other sides of the military thought it was really happening. won't spoil the movie, but yeah, you definitely need to watch that.
that was my childhood of growing up in that, era, that time and, popular publications at the time. And this is still around, but 2,600 magazine, have you guys ever heard of that stuff?
No.
Oh, yeah, that's another homework so 2,600 is the frequency. Of the quarter-tone of the analog payphone was founded by the handle. I think it was fiber optic was his handle to be able to whistle 2,600 tone into a payphone to get free credits. And the payphone thought that he was putting quarters in it.
Oh, wow.
That's where 2,600 magazine came from and the magazine is all about the hacker community and educating. In a small magazine format, educating the people that are interested in it like me at the time. And I still read it actually. Of all the exploits and all this stuff. think that you are reading every day, it's actually published in the magazines. And this is where, you heard about Kevin Mitnick, I'm sure where
Yeah.
large corporations, like at T broke into their phone systems. I grew up in all that time.
That's such.
it didn't exist, then it
Yeah.
existed, then it was just at an analog level. And now since we're all connected, the landscape has grown exponentially and now you've got technologists and hackers that are doing this stuff, not locally anymore, but across the world.
Cause now you're pointing out a fact that people of masses. Likely do not really comprehend is that the internet and the cyber realm is not separate from science and nature itself. These things are all the same forces at play, just different pathways and different routes. But if you can whistle. Full machine about a frequency. There you go. We're coming full circle, this is all related to nature and science as well.
Yup. It's a crazy world we live in right now.
Yeah.
Maybe one day we can talk about the mycelium network. It is crazy.
Yeah.
I got a new idea for your next book.
Cyber security.
Okay.
Let's say that again, Blake, I didn't quite hear.
The cyborg of cyber security.
Yeah. I know I was reading it. It's funny you say that. Cause I swear, this came to me naturally this morning. I go through the little news headlines in the morning and I was reading an article where they were speculating that Elon Musk has a new Twitter photo where he's wearing these glasses and they say that he's trying to emulate a Terminator. And as soon as I saw that, the first thought that popped in my head is, oh, that's actually not the one. It would be Craig veteran.
The world is not as simple as we thought, cyber security is so complicated. So is the whole world you have concepts such as quantum entanglement how does all this really work and how does it really all connect and how does creation work and the cosmos, and then, when you have people that have a ton of knowledge about things that are relative to all of these very mysterious and important points, it's worth paying attention.
Some significance to that, when you scale out 500 years and you'll see that there's some places that shine extra bright, and those are worth paying attention to.
Yeah, it's funny that you say that when you bring up the Terminator. If you look at the Terminator movies. It perfectly describes the evolution of the internet.
it really does. And then you have that one blockchain, not saying that's it, but it's interesting because you have a blockchain called Skynet. And that's from the Terminator movies and a lot of the things that the community says and stuff, and there's this Logan machines, or, it's just really interesting because, as far as the. quantum realm goes and quantum mechanics it's literally outside of time. And so then you start thinking about all this okay.
So something from the future making its entrance into the present in a very organic way. The honest answer to that would have to be yes, scientifically. Yes. The answer would be yes.
Yeah. I think about the first movie when they shaved back a human and that was the internet. And the empathy phase, And then the second movie they said back. And he was the first machine. And then they sent him back and then they sent the liquid side war. And then in the following features,
This crazy hybrid.
Mechanisms and Bible words. metal.
Yup.
don't think I've seen. Any of the Terminator movies.
It's very interesting it's obvious, even if you don't certain scientific concepts and stuff, it's fairly obvious that if something from a different timeline or different place, Was to be here in the physical presence. It would be obvious that it would probably have to forsake some of its memory enabled to pull that off, which would explain why people don't necessarily understand themselves fully until, Maybe a certain point, but it makes perfect sense because you would have to give something up.
In order to pull that off. When you talk about quantum entanglement, we know that quantum entanglement is real because it's been studied, it's been proven. And if there is such a thing as quantum entanglement, then just due to the wall of homeostasis, there has to be something. To the idea of quantum unfoldment.
Yup.
I'm waiting for the real life Tron to happen. I dunno if you guys have seen. But this guy, Zach. Himself into his computer and then build the world. In the computer. Or. The digital space. And everything has a function of program and. And yeah, waiting for that to happen. I've told people before, if there's two things I can do that would never come back Ever. Let's go to space. knowing that it is a one way. I would die. and then do Y Tron go into my computer. Knowing I can never come back.
As long as I knew that type of environment would exist.
Wow. It's going to be the opposite. Blake, maybe that type of environment is stepping from the background to the foreground and merging with. And maybe that would be a great uplifting to all of us,
How do you know it hasn't happened yet?
I'd say that deep down he suspects it's happening. I personally will never be convinced that it was a coincidence that around the time that Craig was doing his heavy Bitcoin mining, there were all these Sonic booms in Raleigh that were on the news. I'm not hearing the boom. Kinda news stories about it. And I was like, that's interesting.
think it's happening now because obviously all the digital things are coming into the real world. But the organics aren't going into the digital world.
Perfect combination, because I think you hear people throwing around the term metaverse and I think even Zuckerberg misunderstood. What metaverse could really be or should really be because he was looking to make it, this blue and purple galaxy world. That's. Not real in the 3d, but maybe it's supposed to be the opposite. Maybe it's coming through of dark matter and the quantum, whatever you want to call it, coming into 3d and just giving us that extra sprinkle of.
A little, stand up straighter and everything's going to be okay. A little bit of help. Maybe that's the metaverse, maybe it wasn't the other way. Maybe that's why a loss of many billion dollars recently. Around that concept. Maybe it wasn't to be excluded.
I read this article about the metaverse and how it's not really the metaverse. can't remember what the name of the movie was, or it was a book or something. At the whole concept of the matter verse was constructed.
ready. Player one.
Kind of what it was a different. I can look it up and I can send it to you.
I think ready player one is probably the best. Book
For sure.
Neal Stephenson and snow crash, coined the word metaverse. I think it was a great read. And really. Painted the picture of what the metaverse could be.
You guys should really consider reading. The girl who's blind and then she wakes up and she can see the internet basically.
the title.
wake. It's three books in this series it's really cool. I've talked to BD about this so much. a story it's coming of age, it's the awakening of AI. And how this girl can see the internet. But she also is really smart and teaches it. to add and stuff and. The learning on it. Then it just learns more.
Let's just talk facts it's a weird, because sometimes people don't accept certain concepts because they consider them to be fanciful. But they're looking at the concept through preconceived notions and judgements instead of just looking at facts. And when you just look at the facts If you look at it, a lot of ancient scientists and philosophers, they were quite fanciful.
And because they looked at these facts and the facts, big these questions, because for an example, we were just talking about the internet and how it's connected to nature and science and along those lines, following that fact. Our bodies are 98% dark matter. They're 98% space. And there's religious teachings. Cause it's nice to study religion. Just through the lens of the history of humanity, because there's religious teachings. it said bringing forth what is within you.
Now that they're approaching quantum trying to understand quantum computers and they can't understand why they can't achieve this certain level of coherence with quantum computers. I propose that there's a large number of possible humans that are computers that are just had been in a sleep state not been in a full awareness. that when a certain level of awareness is unlocked, I do think that there are walking quantum computers all over the earth right now. And they're just.
Coming into awareness and that seems fanciful until you just studied the facts. You have 98% space within you. internet is literally cyberspace, and it's connected to science in nature. So tell me from a reverse engineering standpoint, how that could not be possible. There's no way you could tell me it's not possible, that look at how the brain works. Look at how the brain works that is unremarkable. The brain is a remarkable computer, but there's a disconnect between the mind, body and soul.
And maybe when those things are connected and not in the right alignment, maybe these quantum computers awakened.
Very interesting.
It brings us back full circle of why it's very important to know a smart cyber guy, because if we're all quantum computers, we're going to need some help. My awareness has definitely changed over the last couple of years. There's no doubt about that. I have reached a different level of awareness for sure.
And I can attest to the fact that when I do such things as yoga and stretching and certain things to work on my spine alignment and stuff, I can assure you that my body feels different than it used to. Let me give you an example. Yesterday. I was standing what appeared to be standing still. And my daughter walks by and she's mom, what are you doing? You're just standing there. I'm like, no, I'm actually working out. she was like, what are you talking about? You're just standing still.
I'm like, yeah, but you have no idea what's going on inside my body right now. I can feel all the space in my body and I'm in touch with it. I'm aware of it. And so I'm aware of movements in my body that I used to overlook. I never was in touch with the space in my body before and now I'm so attuned with it that I can literally sitting here right now, talking into my microphone. I can feel 5 million things happening inside of me. And this was always the case, but I was not aware of it.
as we know, the observer definitely affects the outcome, right? Of the scientific process. So now that I'm in an active awareness state, observing these things, I'm unfolding in myself, and I'm bringing forth what's within me. And I proposed that. I'm not the only one that can do this, This is the potential for humanity that we don't have to be shorter slumped in rope, we're being led to destruction. No, we can stand and we can shine our own white,
yup.
all right guys. We'll see you tomorrow. Have a good one.
take care.