Are You Ready For the Next Hacker Wave? It’s Going to Be Brutal!
Right now, we’re going to talk about this vulnerability, this huge vulnerability in almost the entire internet that will affect your life over the following number of years. And if you’re a business, you better pay close attention.
[Following is an automated transcript]
[00:00:16] Well, we are looking at what is being called the single most significant, most critical vulnerability ever.
[00:00:24] And if you want more information on this, have a look at last week’s show, you’ll find it up on my website. I talked quite a bit about it. You can email me M email@example.com. I’ve put together a little cheat sheet that you can use to find out. What should I do? If you’re an IT professional, this isn’t something that you can do if you’re a regular home user because you probably don’t have any software your maintaining that has this log for J vulnerability.
[00:00:59] But I do have to warn you that you probably do have a little bit of hardware that might have it in there. Many of these firewalls used in homes have it, not all of them, uh, I’m, a minority of them, but here’s why this is the single most significant and most critical vulnerability ever. There is a programming lab library that is used in the job.
[00:01:26] Programming language that logs events, if you’re writing software and let’s say their software is running a website, it could be almost anything. And do you notice a condition that’s not quite right? What should you do while you should log it? And then, hopefully, the people that are running your software are monitoring the logs.
[00:01:49] See the logs? No. Oh my gosh. Uh, there is something wrong here. One of the logs that I keep an eye on that just absolutely amazes me, frankly, is the SSH Daemon logs. Now SSH is a protocol. It uses encryption to get onto other machines using the command line. Now I’ve used a lot of protocols over the years to do this.
[00:02:17] Telnet was the first, and SSH is something that I’ve been using for a very long time. You might remember the Heartbleed bug from a few years back. That nailed a lot of people, but I keep an eye on that SSH log because. If someone’s trying to log into my system from the internet, that log will show it.
[00:02:39] It’s going to say that someone to try to use this username; they were coming from this IP address, and they failed to get in. And I have software that automatically monitors that log and says, well, if someone’s coming from the same. Address multiple times. And they are unsuccessful at logging in add their internet address to my firewall blocking rules.
[00:03:09] So what ends up happening is. Well, they just can’t even get to my machine anymore. They’re trying to hack me. same thing’s true with the web blogs. If we have people who are trying to, for instance, kind of put us out of business doing what’s called a denial of service attack, where they are sending us a lot of data.
[00:03:31] Well, we can at our site or upstream from us have that IP address. Block. And that stops the attack, distributed denial of service attacks, or are a little bit more complicated. So all of this gets logged. It all gets written to a file, or it gets pushed off to a server that keeps track of the logs. And, and then there’s analysis software, the looks at logs for.
[00:03:57] Anomalies, all of that sort of stuff. It makes a lot of sense. Right. But this particular library that’s used by Java programmers has a bug in it that allows a remote user to send just a small string, nothing fancy at all that can command. The web server that is using the logging function to go ahead and download malware.
[00:04:28] Well, the easiest low-hanging fruit, when it comes to what kind of malware can we put onto a computer is quite simply crypto mining. So the bad guys they’ll go ahead and they’ll just send a small string, very simple. They don’t have to compile a program. They don’t have to do much of anything. They just send this little small.
[00:04:50] And if that string gets logged, for instance, by my SSH, my remote access demon, or gets logged by the web server or something else, all of a sudden that wonderful little feature that allowed you to easily log things. Is your enemy because that feature is going to interpret that particular string that was sent to the log and try and be helpful.
[00:05:18] But in fact, it could be given a command to download this remote file. Ran, then run that remote file. And that remote file initially here has primarily been crypto mining soft. So now your computer’s being used by someone else. Your electricity’s being used to mine. Things like Bitcoins or some of these other cryptocurrencies that are out.
[00:05:45] Now the real reason, this is a huge, huge problem. Again, let me quote here. This is from Ahmad, a mate. I should say you’re an over a tenable. It is by far the single biggest, most critical vulnerability ever. Why is that true? There’s a couple of reasons. Ease of use is the obvious reason. It is so easy to use, not just for crypto mining, but for hacking any machine you would care to hack.
[00:06:19] And then the second reason is it is in bedded everywhere. There are millions of computers that are vulnerable. We’re seeing a hundred. Computers per minute, being hacked using this vulnerable. And if you are running, let’s say a firewall that has this vulnerability. We have some clients that had this vulnerability and it is obviously a bit of a problem, right?
[00:06:51] Well, that vulnerability now allows bad guys to get onto that firewall. And perhaps beyond that firewall, in order to do pretty much whatever they want. To do. This is huge, huge, huge, lots of software has flaws, and you need to be able to recover from the flaws. I’ve talked many times about how there are only two types of software.
[00:07:23] There are software that has been hacked and there are software that will be hacked. So you need to make sure you know, that if someone gets into your network or gets into your computer, that you can restrict the damages, you can keep it under control. But with this log for J vulnerability, B. Everywhere in, not just that one library, but remember that one library is used all over the place.
[00:07:52] It’s in hundreds of thousands of pieces of software. Now, every one of these vendors has to grab the most recent version, recompile their software and send and re link it in deep pans. Right. I understand this is Java and then send it out to all of their customers to install the software. This is the second reason.
[00:08:15] It is such a big. There will be sites. There will be pieces of software that have this vulnerability for years to come. And one of the biggest examples of this vulnerability is almost every Android device out there. Think of all of the phones. People have Androids being used for tablets it’s in televisions, it’s everywhere.
[00:08:40] And with this particular vulnerability. Being everywhere. Every vendor that uses Android is going to have to release patches that you’re going to have to install. Now it’s one thing to have a brand new TV, and we’ve got a brand new Samsung TV and it’s hooked up to the internet. It streams, Disney and discovery.
[00:09:05] And it’s just a wonderful thing. I love my TV, right then of course you probably realize I don’t use smart TV features because of this particular type of person. What ends up happening? Well, how long is Samsung actually going to support updates for your television or Vizio who, by the way, one of the worst companies, when it comes to your privacy of your information on your television, how long, uh, how about your Android phones?
[00:09:39] More than half of all Android smartphones out there, we’ll never get another software. If you are still using Android smartphones now is the time to switch to an iPhone. I have been talking about this for years. I am not like the world’s biggest apple fan. I’m not trying to make everybody an apple fan. I really don’t care.
[00:10:06] What I do care about is the ability of the software designers, those software implementers and the hardware manufacturers, the people that are in the supply chain on that Android device. I care that they do. Provide updates when it comes to security problems. And if you’re using an iPhone, yeah. Again, two types of software right now, like phones have had vulnerabilities that can be vulnerable, but apple is supporting right now, still the iPhone six S which came out what five or six years.
[00:10:46] With full security updates. They’ve even gone back further. Sometimes the Nat. So make the switch right now. If you are an it professional, I’ve got this whole list of resources that I vetted, I know are good that you can use to scan for this vulnerability in your network or on your. To where just email me M firstname.lastname@example.org.
[00:11:12] And if you have any questions about this or cybersecurity in general, just reach out again. email@example.com.
[00:11:21] Did you know that cyber flashing is a thing. We talked about it a couple of years ago, but it’s back in the news this week and also apple air tags. They just released a new feature for our friends with Android. We’ll tell you why.
[00:11:38] Have you seen these air tags? Have you used them? They came from an idea that was really pioneered by company. Tile. And I guess they, I don’t know what happened with the patent. I guess it didn’t have one or apple wouldn’t have been able to do this, but then again, you know, you’ve got a really big company you’re up against a, it doesn’t matter whether you’re in the right.
[00:12:02] Sometimes I’m not sure what happened there, but they have. These trackers called air tags. And I mentioned before on the show that my daughters have a total of five cats, well, actually six cats. Now I think of it. And what they’ve done is bought air tags and put them on. All of the cats callers. So they took them, they they’ve got them fastened on with this little holder.
[00:12:31] You can get all kinds of holders. The air tags themselves are just little round buttons, really, and you can stick them into your wallet. For instance, in case you keep forgetting or losing your wallet, you can also put them into a holder. So they go on a key chain. I have a couple of flashlights at the house.
[00:12:50] And if you’re like me and you have other people around and it’s dark and they know where your flashlight is, they’ll take and borrow it right now. You don’t get your flashlight back. It kind of bothers me. I probably shouldn’t bother me as much as it does, but then when I need the flashlight, I just can’t find this.
[00:13:12] So, what did we put on the flashlight? We put an air tag on there. So the airtight ties into your iPhone. And if you have a newer iPhone, it’s just absolutely amazing because the, the airtight will tell you where it is, but the newer iPhone, you can use it and it will walk you through. Up to the air tag, like, okay, it’s a foot in front of you on the left-hand side or whatever, it’ll take you there.
[00:13:42] It’s very cool. It’s like these futuristic scifi movies. The problem with air tags that we discussed on the air here is that they have been used for evil. And what the bad guys have been doing is they’ll take an air tag. They might drop it in your purse in order to follow you. Isn’t that scary. They also have been taking the air tags and putting them on expensive cars so that they can follow you home.
[00:14:16] Now, obviously nowadays it’s extremely hard to steal one of the more expensive cars cause they’ve got all of this automation in them. The fancy systems do stop you from stealing it. Even my old F150 had a little chip built into the key so that it wouldn’t start and less, that key that was starting. It actually had that RFID chip in it so that this technology.
[00:14:45] Isn’t being used so much to steal the car, but to know where you live and when you are home and when you’re not home, you know, I’ve been warning everybody for many years, not to post on social media about vacation saying, oh, we’re leaving. We’re going to be gone in the Caribbean for two weeks. We’re going for new year’s party here, Christmas there, Hanukkah celebration, whatever it is you’re doing, because the bad guys use that information to.
[00:15:19] I’m break into your home and to steal things from your business. And I’m, I’m going to get into all of the details right now of how they do that. I’ve talked about it on the show before, and I’m sure I will talk about it again. And you’ll even see some of the references on my firstname.lastname@example.org.
[00:15:36] If you’re interested, there’s some real interesting stories up there. What’s happened to people. That particular problem of having an air tag and then having it put on to you to track you, or do you track your car or other devices is a huge potential problem. Now, apple built into the iPhone, a special little feature some time ago that when they, in fact, when they came out with the air.
[00:16:11] So that when an airtight is following you, in other words, someone dropped it into your purse or your pocket or on your car. And that air tag is moving with you. It says, Hey guy, uh, there is an air tag following you. And at that point you can say, wait a minute, uh, what’s going on here now? It’s not going to warn you about your own air tags.
[00:16:35] You know, the ones that you own. It’s going to warn you about an, a foreign air tag one. That’s not yours. In other words, someone’s trying to track you so brilliant. Move on. Apple’s part to get that out right away before there were any really scary, bad news stories about the same thing happened. How about Android users?
[00:16:57] That’s where the problem really is starting to come up. If you’re an Android user, you don’t have the ability to detect an air tag. Well until now. So if an air tag was following you, it wouldn’t. Let you know, it couldn’t let you know it didn’t know. So apple is now offering what’s called tracker detect.
[00:17:21] It’s an app on the Google play store, a free app that you can download if you using Android. And, you know, there are many, many, many, many reasons not to use Android and there’s. Are almost as many to use iPhones. Okay. So if you use an Android switched to an iPhone, but if you’re stuck on Android, because that’s what your business gave you until you have to use it, have a look for tracker detect to end the apps description on the play store says tracker detect looks for item trackers that are separated from their owner, and that are compatible with Apple’s find mine network.
[00:18:02] These items, trackers include air tags and compatible devices from other companies. If you think someone is using air tag or another device to track your location, you can scan, scan to try and. So, I’m not sure that it’s as good as the apple implementation, where the apple will pop up and say, even though you’re not scanning for an air tag, say, Hey, somebody’s tracking you.
[00:18:31] It sounds like you have to actually use. Just scan for it. But Android users, according to Mac trust can scan the area to find nearby error tag trackers. If they think that there’s an air tiger or other device that’s being used to track their location, uh, an apple support document that you’ll find online on support that apple.com.
[00:18:57] Says, if you think someone is using an air tiger, other item tracking to track your location, you can scan to try and find it. If the app detects an air tag near you for at least 10 minutes, you can play a sound to help locate it. So that’s the part that makes me think that it’s always active. Okay. On your, on your Android device, it’s free and you can get it right there in the Google play.
[00:19:23] This next item is really, it applies to all of us here in the us, and it applies also to people over in the UK. And the UK is really getting kind of upset about this because apparently there are no laws against. Flashing now there are in the U S and it kind of depends on where you live, but cyber crap flashing is really a crime or should be a crime what’s been happening.
[00:19:58] Is people again who have iPhones have this ability to share files or websites, et cetera, with another person. It’s fantastic. It’s called airdrop. I just love this. And I use it all the time even to share files between my own devices. And what happens with air drop is you, you take the file and the use open up airdrop and you see, oh, okay.
[00:20:26] There’s my wife right there. So I click on the file. I drag it on top of it, a little Karen icon in airdrop, and now she gets a notice. Hey, there’s a file from. Coming on in, and it does well, I always in my family and my business people, I always said to them, Error drop, uh, settings to only allow an airdrop from people that are in my contact list.
[00:20:57] And that reason for that is this particular problem. People have been cited. Flashing. So what they do is they send obscene pictures to strangers through airdrop. And this term can also of course, apply to Bluetooth devices because you can also send these things via Bluetooth. I don’t want to really talk a lot about what’s really happening here.
[00:21:28] Hopefully, you know what flashing is, or flasher is sending these obscene pictures, but the tone, the term was coined in August 25th. This female commuter was airdropped two pictures, obscene pictures, and they reported it to the British transport police. But we’ve seen, I have seen, and I’ve talked about cases where people are driving down the highway and all of a sudden on their phone come these obscene pictures because someone was driving past and they air dropped, or they use Bluetooth to send obscene.
[00:22:09] There is an easy way to not allow that to happen. And that is the settings that I use, which is only allow airdrop from people in your contact list. You know, these are absolutely amazing features that they have, but there are some really weird people out there that think that this is the, this is a fun way, uh, to really mess with other people.
[00:22:36] It’s. It’s just crazy. Okay. By the way, you can also turn air drop off. If you never use it, don’t worry about it or a turn it on when you need it. And when someone’s going to send something to you, Hey, I want you guys to take a couple of minutes here. If you go to Craig peterson.com/subscribe. You’re going to find out about the bootcamps we have.
[00:23:01] You’re going to get my weekly trainings that I have. These are just an email. They just last a few minutes. You are going to love them. I get all kinds of compliments and this is in my free newsletter. Okay. It’s not going to cost you anything. I’m not going to be hammering you on buying stuff. I want this information out.
[00:23:24] That’s why I am here today on. Everybody needs to understand this stuff. Craig peterson.com/subscribe, and I will be seeing you in the email world.
[00:23:39] One of the things we wonder the most about is what’s the future. What’s the future of laptops and future of computers. We talked about some of these new chips that are out there, but this is an interesting story about what Dell is doing. Yeah. Dell.
[00:23:55] I want to follow up a little bit about the 3g shutdown. We didn’t quite get through the list.
[00:24:02] All almost all of the Volvos from 2015 on to 2018, have this problem. There’s only two automakers that told the drive.com that U S vehicles are unaffected by the end of 3g. So if you own a Ferrari or a McLaren, You’re okay. Okay. Also what’s interesting is what the different guys are doing. Subaru has an interesting little plan here going forward.
[00:24:35] If you have what they call a connected vehicle plan. And this is according to a service bulletin filed with the national highway traffic safety administration. And then they will do a retrofit at no cost. How’s that for nice. A lot of these manufacturers are upgrading to 4g. Yeah, the, uh, you know, LTE, the stuff that was really fast, you remember that I was remembering getting 50 megabits and that it was just incredible.
[00:25:05] But at any rate, they’re offering that and the option to purchase a subscription. To 4g. So you’ll be able to get two gig of data per month at $10 a month. Now that’s for some manufacturers, not all of them, have it $30 a month if you want unlimited data. So depending on how much you’re driving GM started pushing a free over the air update in October to keep OnStar running.
[00:25:32] After the 3g shut down though, some 2015 model year cars will need a ma a hardware worse. Tesla says it plans to charge $200 to upgrade older model S vehicles, but no additional fees are noted for it. Toyota, Toyota and Lexus are not planning to retrofit. Affected vehicles in its public FAQ Toyota sites, a clause and its disclosures that said certain connected services may change at any time without notice.
[00:26:08] And when the drive ass Toyota, if it plans to offer an upgrade paid or otherwise for consumers who own effective vehicles, the answer was assumed. No. And Toyota, by the way, is one of the companies that has decided, Hey, um, we’re just going to go ahead. And, uh, you, you, you know, that remote start that you got for those cold winters.
[00:26:31] Yeah. W we’ve decided that, uh, even though you paid for, you know, what, three, four years ago, we’re going to start charging you monthly to use your remote start. Uh, come on guys. So have a little. Um, try and find out, talk to your, uh, your automotive dealer or go to duck, duck, go and look up your car and type in three G uh, end of life at the same time and see what it comes up with at your model in there.
[00:27:05] But I am very disappointed with Toyota. I have some friends that just loved Toyota. I bought a brand new one. Way back when, when would have been like 82, 3, something like that, a great little car Cresseta with a supra engine in it. And I drove that for quite a few years. The good, tough little car I had to keep replacing the water pump, but that was the only problem we ever had with it.
[00:27:31] But I haven’t owned a Toyota since then, but this is, and I’ve actually been thinking about it lately, but this is something that really turns me off. I don’t know about. Let’s get into our next, a little problem area. And that is fleet managers. If you are relying on electronic logging devices and other internet of things, devices to track your trucking fleet.
[00:27:57] There’s some problems. Uh, let’s see here, here’s a quote. This is from Czech Republic. Uh, John Nichols, executive vice president of sales for north America and mixed telematics estimated that about 80% of his customers are still using 3g devices. Now this was about a year ago. This is from a November, 2020 article.
[00:28:22] So this is going to be a very. Problem for you as well. Uh, for any people who have fleet vehicles that they’re trying to maintain, hopefully you know about this. Hopefully your vendors are going to take care of it for you. I’m impressed. The GM set their cars up with the hardware that can handle 3g and 4g.
[00:28:44] And all you need is a software upgrade to have it switch. I think that was very smart of them. So. Kudos to GM for that particular thing. Dell led let’s get into the future of computers and laptop design. Dell has been doing some interesting things. Now you probably heard me a couple of weeks ago be moan Dell because they have businesses.
[00:29:06] Specialists and experts that you can call that really know almost nothing about what you really need. And it just drives me crazy because Dell has been selling my customers, hardware that doesn’t meet the customer’s needs because frankly, the customers don’t really know what their needs are. And so that’s something that I’ve helped them with.
[00:29:28] And I, if you email email@example.com, I written up. On what the best computers to buy are based on what it is you need, you know, what, what are the tricks that you need to follow? But what Dell is doing right now is something they’re calling concept Luna, and I’ve seen things like this before. There was a, a cell phone that was being manufactured that allowed you to change modules.
[00:29:58] They were literally just click and go and kind of like Lego. Almost and the phones weren’t that popular. I don’t even think they’re in business anymore. I can’t remember their name, but those particular clicking NGOs were clicked and gone is kind of the bottom line on it because they were kind of big.
[00:30:19] They were kind of clumsy. They weren’t released something people wanted to use. You know, Android comes from Google. And Google has their basic tests and says, this is what Android should look like, but every manufacturer puts their own look and feel on top of that Android operating system. And what that ends up doing for you is, you know, makes it a little more pleasant and also.
[00:30:49] So that you don’t really, really want to go and change your phones. Cause you’re used to the way this particular phone works, but Dell is looking at doing kind of the same thing. They’re looking at this electronic waste problem where you have a laptop, it gets old, you throw it away. And, but now it looks like there’s more sustainability.
[00:31:14] Built into things like this Luna design, they’re trying to make the company’s laptops more environmentally friendly and in the process are going to make them more repairable, which is kind of cool. If you look at what Apple’s done in their laptops, there’s basically nothing inside there. That’s user replaced.
[00:31:36] Okay, you can probably replace a battery. I use a company I’ve had their president on my show a few times. Uh, Larry, um, Connor, I think it is his last name, but OWC other world computing and they’ve got. Little upgrades and replacement parts and videos on how to do it and all the tools you need to, to upgrade your Mac.
[00:32:00] But nowadays apple is soldering the memory on the motherboard, or even more recently using the apple chips. And by the way, this is part of the reason they’re so fast. They are putting the memory right on the same silicone and. The CPU itself. So they’re moving towards a one chip with everything on it. So if you buy an apple computer nowadays, I love them.
[00:32:29] They are great. They’ve got great security built in, et cetera, et cetera, but you better buy a computer that has enough memory and enough storage on it to last you for some years. Because a lot of these computers I’m picking on apple right now, but there’s a lot of other vendors the same way. They are not upgradeable, but concept Luna should work pretty well boring.
[00:32:56] This idea from that’s right. It was framework. That was the name of it. Anyways, stick around and visit me online. Craig peterson.com.
[00:33:05] If you own a car and that car has been made, uh, all the way up to 2021 and your car is using. The internet by a 3g, which is most cars. I got a little news for you.
[00:33:22] We are looking at a real big problem here that most people haven’t heard of.
[00:33:29] I was talking in fact, this week on the air with someone who has a car to Volvo and they have a remote little starter, which has been great for. And they were informed that they needed to do an upgrade. And that upgrade turned out to be very costly. I had another listener who has a solar panel on the roof of their house and their solar panel on that roof is designed to.
[00:34:03] Be able to get updates, software updates, let you know, what’s the charge like how much sun is there today? Maybe you should brush off some of the snow. All of that is communicated by the. But how, how was that working? The problem that most vendors have is, uh, how do they get the data to, and from their devices?
[00:34:30] If you think about, for instance, Elon Musk, with the wonderful little Tesla cars, they want to push an update and we’re seeing this more and more by. The older cars, most cars, non Tesla, as you take them into the dealer for service. And while it’s there they go ahead and plug it in. They download new software firmware from the internet and install it on your car.
[00:34:56] And you are often driving. Maybe you’re none the wiser. Maybe you got some new features. So it’s one thing for them. To have control over a basic network, uh, network that our car dealer might have where they say, okay, here’s the specs you need this much. Download speed. You need that. You need the other thing simple enough.
[00:35:20] But how about you and your home or you and your business? How does that time system keep track of the employees when they sign in and out? Does it upload it to the internet? Did you have to plug it into your network? Did you have to hook it up to your wifi? I can tell you from personal experience, anytime we touch your network and there is.
[00:35:45] Problem later on, we own the problem, even if we had nothing to do with it. It’s again, it’s another Craig ism, whoever touched the computer last owns the next problem. So these vendors have decided, well, we can solve that problem. All we need to do is use cellular phone data. So they put effectively a little cell phone onto their devices.
[00:36:13] Just like that Volvo we were talking about or other high-end luxury cars. So there’s solar panel has a 3g modem in it. The cars have 3g modems in them to unlock the doors, to start the. In many cases, right? They also have updates that come down from the cloud, quote, unquote, over three G for your navigation system to let you know, Hey, there’s heavy traffic.
[00:36:45] I’m going to reroute you. We’re rerouting all of that data coming from the 3g network, coming through it, or being pushed up via the 3g network. All of that data is in trouble and it’s in trouble because. Every major carrier is eliminating three G next year. Yeah, it is really that bad. A T and T is shutting down 3g services in February.
[00:37:16] Sprint’s following in March and T-Mobile in July and Verizon. On December 31st, all of them, 2022, that is a very big deal and a very big problem. So what can you do about it? No, it depends. The roof, solar panels, we were just talking about their vendor, told them they could do the upgrade for them, and it would be $800.
[00:37:47] Very very big deal. We also had other people who were talking about their cars and what had to happen with them. And the cars are look like they’re tending to be more expensive. You can expect to pay between 520 $500 for an upgrade because many of them are saying, Hey, w you know, we’re not going to just fix this one problem.
[00:38:10] We have to replace the whole module. And that means. To replace your infotainment system in your car. Infotainment of course, being basically everything that has to do with your GPS navigation, your satellite radio, your, uh, your car play from apple or Android car or whatever it is you might be using.
[00:38:33] That’s why it gets so expensive. So. Keep an eye out. This is going to be a very, very big deal. We’re looking at everything from owner applications, like going ahead and starting that engine to warm it up to emergency calls services to in navigation, functionality, reporting telematics, which is the data about your car back to the dealer.
[00:39:02] Ultimately, so, you know, your car says, oh, uh, you need to go in and get your oil changed. And it’s going to be a, you know, we can set up alarm and you want it. And you know, some of them are very, very fancy and all of that is going to go away and includes a lot of luxury cars all the way through. Some 2021 models, but many, many of them, if not most of them through 2019.
[00:39:29] Okay. Is that a very, very big deal or what these 3g towers are going away? The companies, the cell phone companies are planning on reusing that bandwidth and they’re going to put it into where yeah. 5g, exactly 5g. So here’s a few. The cars that you might want to be concerned about Acura. They have something called link, uh, and they have, let’s see the MDX ILX, RDX, uh, RLX TLX NSX, like kind of sounds like almost all of them.
[00:40:06] So Acura is going to have a problem with almost all of their cars that were made between 2014 and 2017. Audi. They’re going to have problems with, again, all their cars, a three, four or 5, 6, 7, 8, the RS Q3 five and seven. Yeah, pretty much all of their cars from 2012 through 2018. So I already saw this coming and decided to fix it early, so good for them.
[00:40:39] So basically if your car is older than 2018 model year, you’re going to have some problems, Bentley. A number of models produced prior to 2020. And if you’re driving a Bentley and do you want to give it to some guy, you know, really great looking guy, you can just let me know Craig. Yeah. Yeah.
[00:40:57] firstname.lastname@example.org BMW number models produced before 2019 general motors. Models may between 2015 and 2021 across its fleet will be affected, but it’s not breaking down with specific vehicles across it’s brands of Buick Cadillac, Chevy, GMC, but they did in this case, it’s the drive.com track down a technical service bulletin that indicates almost every post 2015 model is affected.
[00:41:32] Okay. Yeah. Bu-bye a Honda again, pretty much everything. From 2018 to 2021 Lexus all models 2010 to 2017 Mazda. Pretty much everything. 2016 to 2019 Mitsubishi, every eclipse cross and Outlander Porsche 9 11, 18, 7 eighteens, et cetera, et cetera. All of them, 20 14, 20 19 Subaru. Pretty much everything. 2016 and on Tesla model as built before 2015 Toyota.
[00:42:14] Ooh, they got some interesting problems, 2010 and on Volkswagen, much the same stick around. Visit me online. Craig peterson.com.