Do You Trust Homeland Security And The FBI For Your Cyber Security?

What a week the FBI got hacked, Homeland Security supposedly is sending out emails about hackers in your network. This is what we’re going to talk about to start with today. What are these new emails and how are they trying to con you? And can we trust the Feds for our Cyber Security?

[Following is an automated transcript]

This is a little bit concerning. We know that the FBI’s email system got hacked. And for everyone that’s sitting there saying gee, if the FBI gets hacked, there’s no way my business can possibly survive an attack. Remember that the FBI is a huge target. They have so many systems, so many people and the bad guys really would love to send email out as though they are the FBI.

[00:00:47] And in fact, they did, they used the FBI’s email servers to send out some of these fake emails. I thought that was funny, but be that as it may, the FBI closed. But there are things you can do to protect yourself, to protect your email. And my wife and I have been working diligently on a guide.

[00:01:10] Now, that I protect businesses. I work closely with the FBI, been doing cyber security for more than 30 years. I hate to admit that. But I’ve been on the internet for more than 40 years. So I’ve been at this for a very long time and there are things you can do.

[00:01:29] So we’re making available a guide. So she’s taken a lot of my teachings and is boiled it down. It looks like it’s going to be 25 ish pages. And it’s just the key things, the primary things that you can do. To stop your email from getting hacked, your bank accounts, et cetera. There are some pretty simple things you can do.

[00:01:54] So we’re putting that together and we’re also putting together a bootcamp and both of these are free. Okay. Absolutely free. And in the bootcamp, again, this book isn’t about selling you all of the, my services and stuff. It’s giving you. Actionable things you can do. Yes, you can do. You don’t need to be the FBI or a cybersecurity expert to do them, but five things you can do that will, I don’t know, 10 X, your cybersecurity, really?

[00:02:30] It’s that big a deal. And it’s going to take you less than an hour to do all of this stuff. So for those people who like the boot camp, so we’re going to have. And one of these zoom things and we’re going to do it live and I’m going to explain it to you, spleen it. And you’re going to have some homework before the bootcamp, because I want you to have some skin in the game too.

[00:02:56] You’re not paying me or anything. So I want to make sure that you’ve done your homework so we can quickly. Go through all of the stuff that we need to cover in the bootcamp and people who are interested in being the example, which means they are going to get more information than anybody else.

[00:03:13] You can also say, Hey, listen, yeah, please use mine as an example. So we’ll look at all of these different things. We’re going to focus in on that first bootcamp primarily on. The stuff with passwords, what should you do? How should you do it? How can you tell if your password has been stolen? If your email accounts been compromised, all of that sort of thing.

[00:03:37] And you need to be on my email list in order to find out about this stuff. And in fact, when you sign. I’ve got three special reports that Karen and I wrote that are really going to be helpful for you. These are three that we’ve been using with our clients for years, but again, actionable. To do right, is not some marketing sales guy trying to sell you the latest, greatest piece of antivirus software that doesn’t work.

[00:04:09] So you can get that. If you go to Craig peterson.com right now slash subscribe. If you want the deep link, Craig peterson.com/subscribe. We’ll go ahead and sign you up. I have a little automated sequence. It’s going to send you the emails with all of the attachments. We got one, that’s an introduction to Karen and I, you get to see both of us.

[00:04:35] And it’s a really cool picture of when we’re on vacation one time and you can get all of that again. It’s free. This is the free newsletter. This isn’t the paid newsletter. Craig peterson.com. Slash subscribe. All right. So I can help you out with all of that free content. And I have lots of it. I’m on the radio every week talking about free, right.

[00:04:59] And you can avoid these things. So I hate to bring up this FBI hack because as I discussed again with Karen this week I don’t want people to feel like there’s nothing that they can do. I have a friend, her name’s Laura and she’s in one of my mastermind groups. And Laura is, was listening to me because another mastermind member got hacked and it had what was it?

[00:05:24] $45,000 ultimately stolen from him. And we helped him out. And so I was explaining, okay, so here’s the things you can do. And. Basically all she heard was I’m never going to be able to do this. And she’s a technical person. She teaches people how to become business analysts, which is pretty technical, there’s a lot of steps involved in doing business and analyst work. And so I was really surprised to hear from her that she had. The securing herself was just too hard. The FBI gets hacked, et cetera. And so that’s why when I came to this realization, the bottom line is, yeah. Okay. It can be hard if you’re like me and you’ve been in doing this for 30 years, you’ve got the curse of knowledge, right?

[00:06:16] So all of this stuff, this isn’t for you. If you know everything, okay, this is for people who. Quite understand what’s going on. Definitely don’t understand what they should do. Don’t know what they should buy. Don’t know how to use the free stuff that Microsoft and apple give you and how to pull it all together.

[00:06:37] That’s what I want you to be able to understand, and we spend time every. Going through this and every newsletter. I have a, an opening now that is a lot about three to five minute read. If that it can be very quick read and is helping you to understand some of the things that you can and should do.

[00:07:00] So you’ll get that as part of the newsletter. Again, Craig peterson.com. That’s in my free newsletter. You should see the paid newsletter. It’s a big deal because it’s your life. It’s a big deal because it’s your business. It’s a big deal because it’s your job on the line. And most of the time, and when I pick up a new client, it’s somebody who’s the office manager.

[00:07:23] Frankly, more than your office manager, sometimes the business owner, owner operator says to the office manager, Hey, we got to do something about cybersecurity and then I get. Saying, Hey, can you do a cyber health assessment for us and that cyber health assessment, which we’ll do for almost anybody out there will tell you the basic self.

[00:07:46] Okay. Here’s what you got to do. You’ve got to update this. You should turn off this software or you should do this and that with your firewall so that they have. I a little checklist, that they can run through. That’s the whole idea behind one of these cyber health assessment. And then what happens is they say, okay let’s talk some more and we go in and talk with them, talk with the owner.

[00:08:12] Do they want to do, help them put together a more detailed plan and then they are off and running so they can do it themselves. They can hire someone, they can have us do it for them, whatever seems to make the most sense, but it’s very important. To do it, to do something because sitting there trusting the Google’s going to take care of you or apple or whomever, it is trusting Norton antivirus is going to take care of.

[00:08:43] I was reading a quote from John McAfee. He’s the guy that started the whole antivirus industry. Now, of course, he passed away not too long ago, under suspicious circumstances, but he came out and said, Hey, listen, antivirus is. Because right now this year, these weren’t his stats. These are stats published.

[00:09:04] You can find them online. Just duck, go them. Yeah. I don’t use Google for most things. And you’ll find that the antivirus is ineffective 77, 0% of the time. What do you need to do? You need to listen to me here because I am going to help keep you up to date here. Some people are auditory listeners.

[00:09:23] You need to make sure that you get the newsletter so that you get the weekly updates and you find out about these free trainings and special reports that we put together. Makes sense to you and you can attend the boot camps where we cover the basically one hour meetings on zoom, just like you’re used to, and we cover one or more specific topics and we do it live and we use your information.

[00:09:54] The information you want us to have a, do you want us to share? So how could that be better? And it’s the same sort of stuff, but deeper dives and more interactive obviously than radio. And you can listen to me here every week. I think it’s important that you do, and you understand this stuff. So anyways ramble.

[00:10:14] It all starts with email. How do you keep your emails safe? You might remember years ago, you, people were getting broken into and emails were sent out using their accounts. That happened decades ago and it’s still happening today. Right now, Craig peterson.com. I promise you. I am not a heavy marketer.

[00:10:36] Okay. You’re going to get good, actionable information that you can put to use in a matter of minutes, Craig peterson.com/subscribe. Hey, stick around. I promise. I’ll get you this department of Homeland security warning in just a minute. We’ll be right back.

[00:10:59] Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a fist sophisticated chain attack. Your, I am trying to put on this like official voice. And it didn’t do so well anyways, that’s what we’re going to talk about.

[00:11:14] This is an email that came from the department of Homeland security warning about hackers in our network.

[00:11:23] Okay. The subject line here, the one I’m looking at, and this is a justice week, urgent threat. In systems read the email goes on. We tried to black hole, the transit nodes used by this advanced persistent threat actor. However, there is a huge chance you will modify as attack with fast flux technologies. I don’t know if that ties into a flux capacitor or not, which he proxies through.

[00:11:53] Multiple global accelerators. So this is somebody who doesn’t really know what they’re talking about. They’re just throwing up big words. We identified the threat actor to be. Somebody whom is believed to be in of course, whom wrong usage of the word here is believed to be affiliated with the extortion gang, the dark overlord, comma, uppercase.

[00:12:18] We highly recommend you to check your systems and IDs monitoring. Be where this threat actor is currently working under the inspection of the NCC. I see, as we are dependent on some of his intelligence research, we cannot interfere physically within four hours, which could be enough time to cause severe damage to your infrastructure.

[00:12:44] Stay safe. USDA department of Homeland security, cyber threat detection and analysis network analysis. Total control panel. So this is classic when it comes to scammers. And the classic part is that you could do. Is the grammars bad. The wording is confusing, his punctuation is wrong and he’s throwing out all whole bunch of words that are used when it comes to hackers.

[00:13:20] There are things like advanced, persistent threats. That’s one of the biggest problems in fact, businesses have today. But in reality, the way he used it, Incorrect now that’s something I would notice cause I’ve been doing this stuff for more than 30 years, but the average person is never going to notice something like this.

[00:13:44] So it’s been pretty, in fact, pretty successful now, a little different than usual here. These fake messages don’t have attachments. They don’t have phone numbers. They don’t have web links. Therefore what? Your email filter is not going to look at them and say, oh, these look risky. These URL links are going to risky sites.

[00:14:11] I’m going to block it. That’s what we do. We have the advanced email filtering from Cisco that we use for our clients, or that includes their amazing artificial intelligence for fishing and stuff. So an email like this is not go. To trigger those types of alarms. So they’re saying don’t panic, avoid contacting the FBI for further details and ignore the accusations that are made in the email.

[00:14:39] This is so focused though. So flows is a cybersecurity company. They have a lot of stuff. They have some pretty good stuff. It’s not there’s not. But spam house is tracking it. Now, if you’ve ever been blacklisted, it’s called black holing really by people who might’ve used your domain to send spam, or maybe you’re a spammer, you’ve heard of spam house and I’ve been blacklisted before inappropriately.

[00:15:07] The good news is my. That I use for emailing is about 30 years old as well. So it’s got a pretty good reputation over the years, but spam house is saying now that this is a scam they’ve been tracking it. It’s a well-known scam and it’s been widely circulated. To those office managers that I said are often the people who call us when there’s a cybersecurity problem, or we get calls from office managers when something doesn’t look right with the emails.

[00:15:44] And we have a client that had been getting these weird emails and. We were called saying, what’s going on, have a look. We looked and we found all kinds of problems. So that again, an office manager approaching us and thinking everything’s fine because they had Norton and they had the more advanced Symantec stuff and it didn’t catch.

[00:16:09] Any of this really nasty stuff, but that’s part of what Spamhaus does. And they’re looking at it and saying, oh, okay, wait a minute. Now we’re seeing these emails come out. They are definitely not coming from fbi.gov, which is what the return address is. And so spam house tags, it spam. Assassin’s going to tag it and it’s not even going to make it.

[00:16:37] Anything about a log on are our email filter. So a number of people have received it. If you’ve received this email, I’d love to know it because they really are trying to go after the people who are a little bit more into this now, how do they find them? Apparently? They have stolen the email addresses by scraping them from public sources.

[00:17:03] So databases published by Aaron, for instance, the American registry for internet numbers. And I’m assigned my own number is CP 2 0 5 because I was so early on by Aaron they’re the guys that have been managing. The basic internet domain stuff here in the U S for very long time. And it also doesn’t mean by the way that Aaron had any sort of a breach.

[00:17:28] And really just showing that the crooks behind this disinformation campaign have really been focusing on people who appear to be in network administration, because those are the email addresses and names that Aaron is going to have. So why are they doing this? Why are they sending it out into it’s frankly, it’s kinda hard to tell some of the emails have a QR code in them.

[00:17:58] Now that is intriguing because here’s how, again, how a lot of these basic email filters work, they look at it, they say what links are in there? How many links, how much of the email is a graphic? And they understand while it’s going to internet bad guys.com. There’s the link right there. Forget about it.

[00:18:22] I’m not going to forward this email to the intended recipient, but if there’s a QR code in that email to almost every email filter out through. It only looks like a graphic. So might’ve been a picture of your mother as far as it knows. Most of them are not very smart. So you getting an email, having a QR code in it and saying, oh, that’s interesting.

[00:18:47] Let’s check out that QR code. That’s where the hazard com. All right. So be very careful fake news like this. It’s not only unfair to the people who are accused in it, which is what happened here. They can be accusing your own it department. They can be accusing. People within your department, which is typically what’s happening and then what they may try and do now that you don’t trust your, it people, your security people, because they’re mentioned by name in the email, but remember their names are probably scraped off of a.

[00:19:27] That you don’t trust them. And now they attack you and you don’t trust that you’ve been attacked. So fake news, a term coined by Hillary Clinton during hurricane campaign, but that’s exactly what it is entirely fake. So this email, if you get one from Homeland security about threat actors in your systems, almost certain.

[00:19:51] Fake stick around. We’ve got a lot more coming up. Don’t forget to subscribe. Get my weekly newsletter. I’m going to be published and even more, I think probably starting next month. I’m going to be sending a couple emails out a week because I got to get you guys up to speed so that you’re ready for the upcoming bootcamp.

[00:20:13] Stick around.

[00:20:15] Everybody knows about the chip shortage, right? Computer chips. They’re just hard to find. I’m hearing all kinds of ads from Dell lately on the radio. And they’re saying just buy now. They’re not selling new high-end machines anymore.

[00:20:30] This is a story from the verge about who has allegedly kinda stepped in about Intel’s plans to increase chip production.

[00:20:42] And you’d think that the white house would be encouraging chip production. Considering the shortages, the justice week, it came out Tesla hasn’t been delivering their electric car. Without USB ports. Other manufacturers are no longer providing you with an electric window for your car. It’s a crank window.

[00:21:05] Car manufacturers did it to themselves, frankly, by stopping orders for chips during the lockdown, thinking that somehow people wouldn’t need cars anymore. And yet their sales of cars went up and when they go. Yeah. Guess what happens to the price? The price goes up, right? Inflation. You have more money chasing fewer goods.

[00:21:29] So they really nailed themselves. Don’t feel so sorry for some of these car manufacturers. We need more chips. I mentioned one of the manufacturers of PCs, the many of us use in our offices and Jews in our homes. Dell is a good company. They have been for a long time. However, you gotta be careful when you’re buying computers because Dell makes very low end computers all the way up through good solid servers.

[00:21:58] Same. Thing’s true with. P Hewlett, Packard, excuse me, Hewlett Packard. Remember those guys back in the day? Yeah. They also make everything from cheap computers that you never would buy should not buy all the way up through really good ones. It’s like going to Walmart, you go to the Walmart and you don’t want to buy any of the computer sitting there with one exception.

[00:22:24] And that is the Chromebook. If you buy a mid tier Chromebook at Walmart, you’re going to get a good little computer. Doesn’t run windows, doesn’t run Microsoft office word, et cetera, but it can still edit those documents. And it’s a very good machine that is kept up to date. Just watch the price $110 Chromebook, probably isn’t going to last.

[00:22:48] It doesn’t have much storage on it, et cetera. A $2,000 Chromebook is probably major overhead. So go somewhere in the $400 $500 range for a Chromebook, which is by the way where they’re selling some of the laptops. Wouldn’t those laptops, same price point. Now again, that’s why I just wouldn’t buy any of that.

[00:23:12] So we need more chips. We need higher end chips. They are very hard to get our hands on right now. We’re talking about electrification of everything. And if you’ve heard me on the radio during morning drive time, I’ve been just bemoaning how the government’s putting the horse before the. They’re out there saying electric, and shutting down pipelines and coal mining and coal power plants.

[00:23:39] Although coal is one of the cleanest energy sources nowadays because of all of the scrubbing that’s going on with the output of the coal plant. And also of course, they’re, they’ve been stomping. Most of the nuclear plants from coming online, even though the new. Technology in nuclear is impossible to fail.

[00:24:01] They use basic physics to make sure that these things aren’t going to do a Jane Fonda China’s syndrome thing. Okay. So it’s just crazy. We don’t have the electrical. Even if we put up, it would take literally millions of wind farm, our turbines, and obviously millions of rooms and fields covered with solar cells.

[00:24:29] We would still need nuclear. We would still need other sources of power because the sun doesn’t shine all the time and the wind doesn’t blow all of the time. This is just completely backward. People aren’t thinking it through. It’s again, it’s the knee jerk. And of course they’re investing heavily. They being the congresspeople of themselves, particularly those Congress people like the Al Gore’s of the world and Nancy Pelosi and Chuck Schumer, because they are forcing a move to this technology that isn’t ready for prime time.

[00:25:05] And at the same time, we are trying to buy electric cars. How are we going to charge them? How are we going to run our homes? It’s like Europe, people froze to death last winter in Europe. It’s going to happen again this year. And the thing about what happened in Texas last year. Yeah. Some of that was because they weren’t prepared, but guess what else happens?

[00:25:30] Sometimes the wind isn’t blowing in Texas. So there’s just all kinds of problems. So Intel is saying we got to increase our chip production. Intel’s main business right now, by the way, he seems to be moving towards making chips on behalf of other people, other companies, rather than making their own chips.

[00:25:53] Isn’t that kind of interesting. And the industry, the chip fab industry, the ones that fabricate the chips, make the chips are spending about $2 billion a week. According to the latest numbers I saw to try and expand the manufactured. Apparently Intel went to the white house because they want some of our tax dollars.

[00:26:17] The money they’d take at the point of a gun. They want some of that so that they can build their business, build it back better. And apparently some sources close to the situation told Bloomberg that Intel. Posed making silicone wafers in a Chinese factory, which could start production towards the end of next year.

[00:26:44] But in a move that I agree with had the Biden white house, apparently Intel was strongly discouraged due to potential security issues. Yeah, no kidding. Some major security issues here. We don’t want to give away our technology to make this leading edge stuff. Think about the us. We were always the country that people came to for technology.

[00:27:15] I mentioned this week on the radio, the cotton gin way back when look at how much labor. That that cut look at the internal combustion engine. And again the Teamsters, the horses, the cleanup crews in New York city. All of that went goodbye pretty much because of technology and people got higher technology.

[00:27:40] Jobs and everyone became more efficient and that’s, what’s supposed to happen right now when right now waste, basically we have stagflation in other words, prices are going up, but we’re not getting any more productivity out of it. That’s a real problem. And that’s why they keep talking about the problems we were having in the late seventies.

[00:28:01] And I remember those well, I remember gas lines sitting there in California waiting to buy gas. It was incredible what was happening out there. So Intel thinks it needs to secure funding from the federal government in order to ramp up the production. Bloomberg announced, Orwell said that Intel currently has no plans to produce silicone wafers in China after discussing it with governor.

[00:28:31] Officials and it will instead consider other solutions. Now I hope those other solutions are to make those plants, those chip fab plant here in the United States. Let’s put ourselves back on a leading edge footing here. Google moved its artificial intelligence lab to China talking about. Anti American thing to do moved it to China, artificial intelligence.

[00:29:01] That’s something we need. The us needs to be the world leader in some of these technologies. And frankly, we’re not the leader anymore. It’s it frankly, a. So you can check this out. It’s on the verge. You’ll also find it up on my website. Craig Peter sohn.com. Make sure you sign up for the newsletter so you can get all of these little trainings, five minutes a weekend can make a big difference.

[00:29:33] Craig peterson.com.

[00:29:35] Hey, I don’t want to depress anyone, but Bitcoin is now a 13 year old teenager. And back in January, 2009, Bitcoin was priced at well. Wow. We’ll get into this in just a minute.

[00:29:51] Bitcoin January 3rd, 2009 is when it was launched. And E Bitcoin was priced at you ready for this point?

[00:30:03] Zero 8 cents each. Okay. The and because of that, a lot of people. I have been seen we’ve got to get into this and that in fact, Elon Musk has been pushing up the price of another digital currency. All of the initial price increases in Bitcoin were due to fraud.

[00:30:26] According to a lot of reports and we can get into those if you’d like fraud. Yeah. That’s a great way to launch a whole new product. And they also played some other games. For instance, the biggest driver of Bitcoin price for a long time was crux. For ransomware. Yeah. People had to buy ransom and pay ransoms.

[00:30:54] How do you pay a ransom while usually it was with Bitcoin and that meant you had to turn us dollars or other foreign currencies into Bitcoin. And as economists in the white house, don’t seem to understand when there is more money tracing, a limited commodity, the price of the commodity goes up, whether it’s gasoline, food, or Bitcoin, and that’s exactly what happened.

[00:31:27] Percentage wise, how much of an increase has there been in the value of Bitcoin? Let me see here. If I can figure this out 7 billion, 750000000% increase. Isn’t that something now of course we don’t all have these magical glasses that let us look forward to figure it out. Out, but it’s based on this peer to peer electronic cash system that was written about by someone or a group of people that went by the pseudonym of Natasha Nakamoto.

[00:32:07] And there’ve been a few people over the years who have claimed that they are the person that started it and maybe one of them is, and may be, none of them are who knows, but this was first published, October 31st, 2008. So about a month later is when it started to trade and it is just incredible here.

[00:32:29] Bitcoin was really perceived initially. Threat by government and financial institutions. I think it’s still perceived as a threat. My government, they are able to track Bitcoin and other cryptocurrencies in many cases and the way they track it as well. If you have Bitcoin, what good is it? Unless you can use the Bitcoin to either buy something or to traded for us dollars or another hard currency, that’s how they’re tracking.

[00:33:03] Without getting into a lot of detail here, but it’s interesting to look at because the Bitcoin white papers proposing a solution to prevent what they were calling double spending. And when you don’t trust a third party necessarily, and that’s where we got these logs, if you will, the. Balance sheets that were being used to track everything.

[00:33:29] And then you had the voting, you had to have 50% of these systems that were tracking all of the transactions, agree on a transaction, et cetera. And that’s actually been a problem for Bitcoin because of the. Intermediaries, you have to go through or get to approve your transaction. It’s a, frankly, a problem that’s really slowed down transaction.

[00:33:57] So you can’t just go like with a credit card and pay for something that’s done. It can take your day or more. Now it’s interesting that we’re getting close to the ultimate limit of Bitcoin offerings. The blockchain’s mind blocked number 707,000. Which by the way, offered a mining reward of six and a quarter Bitcoins.

[00:34:25] So think about that. It costs you more to mine, Bitcoins than they’re worth. If you’re trying to do it in the Northeast. Pretty much anywhere in the United States. So don’t just run out and start doing it. My son and I don’t know, five, eight years ago, something like that, we decided we’d start trying to do some mining and we didn’t find any Bitcoins and it was just cooking some machines.

[00:34:50] And so we said, forget about it. And we gave out on it. It does have a hard cap. Then it’s got a ways to go. I said, it’s approaching. It is, but there’s 21 million Bitcoin is the hard cap and the community that maintains the software and maintains Bitcoin because it is a committed. Has it been modifying the rules as time went around at about how many Bitcoin you get when you’re mining something, into solving these problems and how the blockchain works.

[00:35:26] And how many honest and dishonest mentions were in the original Bitcoin white paper and how can they reject invalid blocks? So there’s a lot of technical stuff going on and it’s changing. All of the time. And ultimately it’s the consensus mechanism that has been slowing it. So when it costs you more to mine, a Bitcoin than you get for it.

[00:35:54] So let’s do a little bit of math here. If we say that how much is a Bitcoin worth right now? So we say current value of Bitcoin. I’m typing it in right now. So it’s about $57,000. Per Bitcoin, if say 57,000 here we go. 57,000 times. What did I say? Six and a quarter, right? So $362,000 equivalent is what they, the person who mined this block was paying.

[00:36:32] That sounds pretty good. Doesn’t it? Yeah, it really does. It adds up quite quickly. But when you consider that it costs more to mine, a Bitcoin than it costs, then you get to paid for it. 350, $6,000. That’s a lot of electricity on a lot of hardware. And because of that, China has. Down Bitcoin mining operations, because it uses so much electricity and in the United States and in some other countries, but here in the U S and in the UK, some of these Bitcoin mining operations have been buying.

[00:37:11] Coal powered power plants, coal fired power plants so that they can produce their own electricity so they can make it worthwhile to mine. So things are going to change. They’re going to be changing the rules. As I said, we’ve got a total of 21 million Bitcoin ultimately. And so far we’ve only just mined number 707,540.

[00:37:38] So the interchange, the rules, I’m going to keep an eye on this cause that’s an interesting one. Elon Musk, his quote is Crip. Cryptocurrency is fundamentally aimed at reducing the power of a centralized government. And that by the way, can be one of the main reasons that Bitcoin hasn’t been really adopted in the mainstream yet.

[00:37:58] And Ilan has all kinds of tweets. Bitcoin and other cryptocurrencies, he says, Bitcoin is my safe word. Isn’t that? Something he’s been primarily the guy behind Dodge coin, which is yet another crypto currency, D O G. Coyne D O G E coin doge, coin. And you can find that online. I think it has new doge even publicly traded while it’s certainly traded as a crypto.

[00:38:28] Okay. So doge coin right now is worth 22 cents. It’s down from its month, week, and day highs. I’m looking. Here. Yeah. Yeah. So it’s gone up and down. It’s been worth more. Yeah. A couple of weeks ago. So that’s part of the problem with it. If you don’t have money that you can absolutely waste, don’t buy this stuff and I’m not an investment advisor, but I’ve never bought any Bitcoin or any other cryptocurrency.

[00:39:01] And the problem is, and from my perspective that it is not real at all. Yeah, you can say, look at this, I could have made 7000000% on that. You could do the same thing almost if you had, instead of buying a brand new Tesla model as eight years ago, seven years ago, and paying $77,000 for that.

[00:39:25] If you had bought $77,000 worth of Tesla stock, you’d be in the millions of dollars in value. And so we’ve got the Raven company out there. I don’t know if you know these guys or not. I watched a motorcycle show. They’re going from the tip of south America all the way on up to San Diego. And they had this Rivy and electric truck, which is really quite cool.

[00:39:52] They are public right now. They just won. And they have a market capitalization. In other words, a value of ribbon, which has only made a couple of dozen vehicles. That’s it? Total. And they’re owned by people who work for the company. Their market capitalization is 50% more. Then most of the major manufacturers out there, it’s just crazy how much it is worth and why it’s because people are looking at it saying Tesla appreciated 7000000%.

[00:40:30] Ravion’s going to do the same. And by the way, they are cool cars. I love the idea behind. Electric vehicles. It’s just that we got the cart before the horse who don’t have the electricity. We’re not making the hard decisions. We’re just ripping stuff out. It’s absolutely crazy. By the way, they had a 15% drop in the value of their shares on Wednesday.

[00:40:54] It’ll go up. It’ll go down. But it’s w it’s something we got to test remember? Okay. Cryptocurrency is not it yet of Tesla. Stock is worth something will probably always be worse. Something cryptocurrency is worth something, but tomorrow may be worth zero, and don’t go crazy. These market caps of startup companies that have never done anything being worth 50% more than major us auto manufacturer.

[00:41:26] What that’s crazy. Visit me online. Craig peterson.com.

[00:41:33] Clothing prices have been going up. In fact, apparel prices were up 4.2% in the last 12 months that as of August, we’ve got cotton going up. There’s a whole bunch of things that are going up and a company out there called dress X thinks it has a solution for all of these prices.

[00:41:58] Hi everybody. I’m Craig Peterson, your cybersecurity strategist, and all around technology guru. And you’re listening to news radio w G a. I am five 60 and FM 98.5. I like to invite you to join me on the morning drive right here on w G a N Wednesday mornings at seven 30. The clothing has been going up.

[00:42:26] Everything’s been going up, I put some gas in my car the other day. I have a, you might know, of course, a 1980 Mercedes and my wife drives a nice little Ford edge, not a particularly big SUV, a, guest’s a midsize SUV. And I put, I think it was about 15 gallon Zan and it costs me more. 55, $0. I can’t believe it.

[00:42:57] We used to have a little diesel little Volkswagen Passat diesel. We would drive around and we were getting pretty close to 60 miles per gallon, around town. And diesel was about a buck, a gallon, and it cost 20 bucks to fill the silly thing up. And we could drive all the way down to New York city and back on.

[00:43:17] $20 worth of diesel one fill up. Okay. None of that’s true anymore, is it? And we’re looking at some increases. It’s not like the kind of increase we’ve seen in certain foodstuffs or gasoline or eating oil. Apparel prices are up and there’s a company out there that thinks that maybe they have a bit of a solution for you.

[00:43:41] It’s called dress ex I found a video online of a young lady. Who’s got a lot of followers, interesting lady. And she was trying them out. She’d tried a different dress or different clothes every day for a month. No, I did not watch all of the video, but I got the basic idea. And the idea is that people are buying digital clothes.

[00:44:09] Now I think of that for a minute. Would you pay for a designer? And maybe you wouldn’t pay for designer dress, already and AOC is dress that she wore, the lady of the people only cost. What was it? $30,000. Per seat for her to go to that banquet. And I think her dress was like five or $6,000.

[00:44:33] You can get a dress just like AOC. That’s designed by a high-end fashion designer for somewhere between 40 and $60. Okay, but it’s a virtual dress. It’s not a real dress, not in the real world. It’s interesting what they’re doing and trying to do. If you have used some of these online sites like Instagram, they have various types of what they call filters.

[00:45:01] So you can put a filter on you and there’s like a makeup filter, for instance, that makes you look like you’re all made up, it gets rid of all of the blemishes on. In, and there’s other filters that do backgrounds and do different things and make you look like you’re a kitty cat or whatever. They’d all kinds of crazy things.

[00:45:22] This company called dress ex has now come out with filters that you can use in their app. And they don’t work too well right now, but people have been buying these digital close to. Now you don’t wear them out. Okay. There, this is really like the King’s new clothes. You might remember that story.

[00:45:46] And if all you have on are your digital clothes, you don’t have anything on. However, what it does is if you’re using their app and you’re moving around and with their app, Paste these clothes on you. And it’s a little funky right now. It’s not the best, but you can bet that’s exactly where it’s going.

[00:46:09] And it reminds me of a blues, a Bruce Willis movie. I can’t remember the name of it. And it’s I think really bringing up a whole type of. Dysphoria that I think people are going to have more and more where you’re living in this artificial life and that artificial life that you’re in now that’s called SIRA gets, I was just looking up as we were talking that artificial life that you’re in is so nice.

[00:46:40] You don’t want to live. In the real world. And I’m starting to see this now with things like dress X, which you’ll find online, address x.com. You can now wear anything you want. You can use the filters that are available generally to change. Parents to change your ethnicity, to change anything you want.

[00:47:04] And if you ever saw Sarah gets, it was a very interesting movie. I liked it. I watched it because I generally like Bruce Willis and Rosa Mon pike, who were the two primary actors in this movie. But in the movie, everybody was just sitting there. And they were in these 3d chairs. And while you’re in that chair, you could be anybody anywhere doing anything and literally anyone.

[00:47:32] And so you’re sitting in the chair. If you can see around you, it looks real. It feels real everything about it is real, at least for the most part, but in reality, And none of it’s real. And these people, they, some of them got out of those chairs and while they were out a nasty things happen to them. In fact, it was, he was a cop and they were investigating some murders of these people who were again, using what they were calling.

[00:48:05] Sarah gets nowadays with what our friends over at face. Or doing, you are going to see it called something else. Facebook, in case you didn’t know Facebook changed its name. Now Facebook is still Facebook, but the parent company like Google split off and change the company name Facebook did the same thing.

[00:48:27] They’re calling it. And the idea is to have this meta universe where again, just like in surrogates gets nothing is real, just like on dress ex you can wear any fashion you want to, and instead of paying thousands of dollars, you pay tens of dollars, basically. Now I mentioned that their video isn’t very good.

[00:48:53] At least not yet over address X, but you can go to dress X. You can take photos of yourself and send them to dress X. They will go ahead and put whatever clothes you want to be. On you it’s basically. Yeah, it’s Photoshopping, but they do a pretty good job in general. I looked at a whole bunch of them, but it it, it looked pretty real.

[00:49:19] You don’t have to consider the fit. You don’t have to worry about how big you are because all of these clothes adjust, infinitely a store. Doesn’t have to stock a bunch of them. So we’re moving. This whole metaverse idea and these digital clothes, which are really a thing nowadays has vice said, vice.com.

[00:49:43] We’re moving more and more to this unreal world and some real unreal fashions too. I’m looking at some of them and it’s hard to even describe them. It looks like there’s all of these. Things growing all over the clothes that are coming out and just doing all kinds of weird things. So there you go.

[00:50:06] I’m note on fashion. I’m looking right now at a picture that’s right in front of the metropolitan museum of art in New York, and a lady is wearing one of the. Digital dresses. Now they tell you what you should be doing. And when you take that picture is aware of skin tight clothes so that they can match the digital close to you a little bit better.

[00:50:31] But w we’ll see, she’s saying that in this. Tweet at the, in front of the mat, she’s saying I just can’t wait for the met gala. What it will look like in 21, 21, because you know what, she’s not wrong about this. It’s really coined to change. There’s some real cool stuff. Go to my website. If you want to see this, you can find it on vice, but I have a link to it.

[00:50:54] Just look for this. Show notes and you’ll find it right there. In fact, you’re getting even search for on my website because I have everything transcribed. Just look for digital clothes because there are thing now. Hey, I also want to talk a little bit here about. The the next little article, which is what’s happening right now with apple.

[00:51:17] And you’ve probably heard about these ID cards in Austria right now, they are stopping people randomly and asking for their papers. They want your papers. If you are, have not been, they call it vaccinated. It’s not a vaccine. Really. It’s so funny to see the CDC change to the definition of vaccine, just so it meets their jab standards.

[00:51:45] But if you’re not vaccinated, there’s an immediate, it’s about of $3,500 fine that the police officer will issue to you. And of course, there’s police everywhere. Just stopping people randomly and asking for their papers. Apple is making various us states that have decided they want to use a digital ID card.

[00:52:11] For customer support. And also for some of the technology. Now, the initial idea behind this and apple has been working on it for a while, is that you can have your driver’s license in the iPhone wallet, app, more secure. It’s certainly more convenient for most people. Sometimes you might forget your wallet, but most people don’t forget their iPhones.

[00:52:38] Yeah. The feature when combined with Apple’s biometric security measures really could also cut down on fraud. So we’ve got about a half a dozen states right now that have signed up with apple and our pain part of the freight for these things. And when they pull you over and ask for your papers, you’ll have them right there in your iPhone.

[00:53:00] Isn’t that handy stick around. We got more to talk about. Thanks for joining. Today and visit me online. Craig peterson.com. Stick around.

[00:53:11] I had more than a little guilt installed in me when I was a kid. And I still hear to this day, there’s a lot of people who had that right. There was your mother, maybe your father, but man this scammers are using it.

[00:53:26] This new scam is an interesting one.

[00:53:29] It’s a consumer complaint, email scam, and it really is building on your fear of getting in trouble. At work, right? It’s your fear of just basically getting in trouble? And man, my, did my mother ever beat that into me as a child. So the bad guys are using this now. Great article over at Sofos and they’re naked security blog here.

[00:53:59] But the goal of these criminals is really to make you feel guilty, to convince you that if you don’t excuse me, that you haven’t done anything, you skip doing something, you, maybe you did something wrong and you’ve caused a serious inconvenience, not only to the company as a whole, but to someone more important than you inside the organization.

[00:54:26] Hey, I’m looking at an email right now. It’s too Paul Deklan. It says, doc, I’m on my way to the sofa post office. Why didn’t you inform us about the class customer complaint in PDF on you? Please call me back now. The main manager assistant is how it’s signed. And it’s got a link right there to what looks like a customer complaint for.

[00:54:51] Supposedly in PDF. So technically this is called spear fishing. It’s a targeted attack and this greets you by name and it pretends to come from a manager in your company. So they’ve done a little bit of research on you and on the company, and that makes it something that really pops out. And because we’re all used to ignoring the Nigerian prince scams and I helped to design a system.

[00:55:23] In fact, that got rid of those Nigerian prince scams and found some of the scammers. But have you ever had an angry customer who was yelling at you and said something like just you wait, I’m going to report you to your manager. It’s scary. I’m going to ask like this, what did I do? I was at a McDonald’s this week grabbing a double cheeseburger and the people who were running the drive-through were amazing.

[00:55:54] Simply amazing. And the guy who handed me the bag was, again, really great. These, you don’t see this type of person very often in so many of these lower end, if you will, jobs. And so I asked to speak to the manager. And so the guy called over his managers says, I don’t know what’s up. And she came over and I congratulated her on how wonderful per team was that the lady that took the order was just as pleasant and helpful as can be.

[00:56:27] And the young man who handed me the food again, Greeted me nicely and just took care of everything. It was just absolutely amazing. But I could tell that he was worried about what I was going to say. Is he going to get in trouble because of something he did or didn’t do with his manager? Cause he doesn’t want.

[00:56:49] Fired obviously, but doesn’t want to get down onto her bad side. How about if you got one of these types of messages in your mailbox, because if you’re feeling guilty and you’re afraid of what’s going to happen, they have now activated a center in your brain. Basically the lizard level of the brain that is going to cause you to make mistakes.

[00:57:15] And you are going to hurry and feel guilty and click the link. It’s just like that customer of ours, where he clicked the link in an email thinking it was from the better business bureau. It’s the same sort of thing worried about, oh my gosh, what’s going to happen here. Oh, no. Operations manager, the business.

[00:57:34] It can be a lot of trouble. The owners are really going to be upset with me and he opens it up. And what is it? It’s ransomware now the good news is we were protecting them and since we were protecting them, the ransomware was stopped. In its tracks and that’s what you want to have happen. But they were using the same psychological tactic.

[00:57:56] So we’ve gotta be careful, right? This is more believable than a dear colleague or hello. It’s got your name in it. And when you look deeply in the headers, you’ll see that it’s fake. But from the basic text alone, Not so much so interesting. Interesting. Here’s another one attention and your name dear you.

[00:58:21] You’re in big trouble. I suggest you bring your coat. When you come to the meeting, yours sincerely, and it’s got the outsourcing manager’s name. As a signature. So yeah. Okay. The junior staff in these outsource jobs, like the frontline support, the pressure’s high, you’re getting these, you’re going to make mistakes.

[00:58:43] So I just want to warn everyone. Watch for mistakes. Watch what you’re doing. The these PDFs that they’re sending you are not necessarily legit. You’ll click on the link. It’s going to have something that usually says something like a customer complaint PDF. You’re going to download the thing. And then you’re going to click on view my file.

[00:59:06] And of course, preview PDF is not really going to preview the PDF. In fact, in this particular case, Sofos is saying that it was a Microsoft app bundle. Okay. It’s like a PKG format. So be very careful. The other thing that we’ve seen a lot of, and it’s still happening now is aimed at Adobe.

[00:59:29] Now Adobe has had some horrible software from a cybersecurity standpoint, such as flash. You should no longer have flash on your machine at all. Apple has never directly supported flash. They never shipped it because of the major security problems and because of the issues that apple and Adobe had back and forth with each other, that’s a kind of a separate thing.

[00:59:55] The PDF. Component Adobe reader that so many people have, you don’t need it on a Mac is really rare. You need to preview the built-in Mac reader works great. And you can fill out the forms using just preview on a windows machine that doesn’t have that feature. So you’ve got to get the Adobe PDF component knock yourself out and get it, but be careful because.

[01:00:23] It is one of the top things people are doing or using to lure you into downloading bad socks. So you can see in this particular case from Sofos, sometimes a trusted app with the check mark and it’s totally bogus. Okay. If you click on trusted app, you’ll see what purports to be a software bundle from Adobe in the us and the digital signals from an accounting firm in Southeast England.

[01:00:56] So it’s all stuff to look at. Here’s the bottom line. If you get an email like this and you’re not. If it claims be from your bank, the IRS, you name it, reach out to them directly. Call them look them up. Do not use a phone number that’s in the email. Do not use a phone number. That’s in a link page, linked page from the email.

[01:01:22] Find out what their number is, call their customer support and find out if it’s legit or con. Your security people to find out if it’s legit, it’s really that simple. Okay. Very simple. So check it out online again, this was a sofa article, but you’ll see it at my website. Craig peterson.com. I also want to remind everybody in case you haven’t heard, maybe it wouldn’t be a reminder, right?

[01:01:48] That we’re doing some boot camps starting up here in about them. Free cyber-security bootcamps are goon to teach you things you can do over the course of an hour that are going to 10 X, your cybersecurity stance. That’s the whole goal of the boot camps and workshops stick around. We’ll be right back.

[01:02:11] Craig peterson.com.

[01:02:13] What are the features these secure email providers are providing? What are the costs? Which ones might you want to consider? We’re going to run through the top three right now. What are their features and why would you want to use them?

[01:02:30] We started talking a little bit about proton mail, some of the real basics here, and it is still the kind of 800 pound gorilla when it comes to secure email, finally they had to capitulate to the Swiss court because they are located in Switzerland.

[01:02:49] So just goes to show that even being Swiss doesn’t mean that it is. Completely secured, then there’s a difference too. I want to point out between having a government issue, a subpoena and a court order to have your information revealed. There’s a big difference between that and a hacker who’s trying to hack you and get into your life.

[01:03:16] So I think most of us understand that we need to be secure in our documents. We need to have that privacy is guaranteed to us from the constitution, but we also need to have one more level of security, which is okay. How. The hackers. So having a hack free life means you there’s a lot of things that you have to be concerned about, email being one of them.

[01:03:43] So I’m not too worried about proton mail and the fact that they had a court order to. Provide IP addresses for a specific group of people. And it was a very small group and I can see that. I can agree with that. Proton mail does have a free version. That’s the one I have because I want to try it out.

[01:04:06] And it has a 500 megabytes of free. The storage, you can get up to 20 gigabytes and proton mail starts at $4 a month. It has end-to-end encryption, which is really important. Again, it means from you all the way to the recipient, all three of these that I’m going to talk about have end-to-end encryption.

[01:04:32] They also all have. Two-factor authentication. Remember when we’re talking about two factor authentication, a lot of places try to pass off this thing where they send you a text message with a number in it. They try and pass that off as two factor authentication. Yeah, it is a type of two factor authentication, but it’s not a.

[01:04:53] If you’re already doing something like maybe you’ve got cryptocurrency, you are potentially not only under attack, but I’m very hackable. If you’re using a text message in order to verify who you are. So that’s an important thing to remember. Proton mail has self-destructing messages, which is a very big thing, very positive.

[01:05:18] It tends to be expensive. Proton mail being the 800 pound gorilla kinda dictates what kind of price they want to charge and they are on the more expensive. Side the web client is a little bit on the outdated side. It does not support pop three, which I doubt is an issue for any of you guys out there because nowadays the modern email clients aren’t using.

[01:05:45] Anyways, any more now proton mail has PGP support. I use PGP, I have a built into my Mac mail and it allows me to send and receive end to end encrypted messages. And that’s something you might want to look at a plugin that uses PGP or GPG, which is effectively the same. Which allows you to send and receive encrypted email using your regular email client.

[01:06:15] However, the person who’s receiving it the far end has to have that PGP client or GPG client as it is. So it might not be the best idea in the world to use that. I use it and I use it for. People within the organization that I know have PGP, because again, we’re dealing with third parties information.

[01:06:38] We have clients and the clients trust us. So we have to be pretty darn careful with some of that stuff. So that’s our first one, proton mail. It’s something I’ve used. I know a lot of you are using it. I had so many responses to that email that I sent out to everybody talking about secure email and specifically proton mail.

[01:07:00] And you guys were all telling me, Hey, listen, I’m switched on I’m away from Google forever because Google is by far the least secure of anybody you could be using out there. Now, the next one is called Tata. To U T a N OTA. So it gets just what Tatan call 10 town, tow hours, something like that, but a N O T a I’m sure you guys are gonna all send me pronunciation guides and it has again, a free version, one gigabyte.

[01:07:34] So twice as much as proton mail and it doesn’t really offer quite as much storage, but it starts at a dollar 18 month. Down from proton mail’s four bucks a month. It also has end to end. Encryption also has two factor authentication. It has an encrypted search function, a calendar function, and aliases. I use aliases not only for my hack free life, but I use aliases because I will.

[01:08:04] To use a different email address for pretty much everybody I’m dealing with. So these, this way to do that is with an alias. One of the problems here with top I, this is a German company. I bet you it’s a German word. Somehow Tottan TOA is that it is injured. Germany is one of those 14 eyes countries. That means it’s one of the 14 countries, large countries that share information about people online and spy on each others.

[01:08:42] Citizens. See, that’s how the government’s gotten around it. The government have preclusions from monitoring citizens. So what did they do while they all get together, serve with the five eyes now once twenty-something eyes, but they’re part of the 14 eyes agreement. So Germany, for instance, would spy on us citizens while they’re in the U S.

[01:09:07] And the U S will spy on German citizens while they’re in Germany and all over the world. Okay. So that’s a negative, however, as a general rule, the European union has pretty good privacy laws, so you’re probably safe. And then the third one, which is again, the third in my priorities here too, is called counter mail.

[01:09:33] Now it has. Interesting features, for instance, they have what are called Ram only servers. So the server boots up, obviously it has to boot off of some sort of a device, but once it’s running, everything’s in memory. So if that server loses power, it loses everything. Now that’s an interesting thing to do and can be a problem if you’re trying to store emails, right?

[01:10:01] It has men in the middle attack protection, which all of these due to one degree or another, but counter male makes that a kind of a big deal. They have a safe box and anonymous payment systems that you can use. And it starts at $3 and 29 cents a month. They have a four gig storage limit. They do not have a free version.

[01:10:23] So I liked this one counter mail, but I do use proton mail, at least for testing. Some mothers also rans here that allow you to send and receive encrypted mail. Secured mail is Zoho mail, Z O H O mail. The X, Y Z is another one post steel. So I’ve used Zoho before, by the way post geo P O S T E O.

[01:10:51] You might want to look@mailbox.org and start mail. So there you go. Top three proton mail. That’s still my recommendation. If you want some secure email and it’ll cost you a bit, if you want cheaper, look at this two U T a N O T. T U T a N O T a. All right, everybody make sure you spend right now about a minute.

[01:11:16] Go to Craig peterson.com and sign up for my weekly newsletter and training.

[01:11:22] Is there no such an example of Silicon valley and they’re a attitude of fake it until you make it, or is it the reality of Silicon valley? What’s happening out there? We work in another.

[01:11:43] Hi, I’m Craig Peter Sohn, cybersecurity strategist. And you’re listening to me on news radio, w G a N a M five 60 and FM and 98.5. You can listen to me anytime, anywhere, just grab the tune in app and type in w G a N, or pull out your smartphone. It’s all there. Theranose. How many of you guys know about therum knows they had a really great idea and it was started in 2003 by a 19 year old young lady named Elizabeth Holmes.

[01:12:24] That is pretty young, but her idea was why do we need to have a whole tube or more of blood in order to do blood? With the technology we have nowadays, we should be able to just use a drop of blood and be able to test for hundreds of diseases with just a pinprick of blood. It seemed pretty incredible at the time, but she was able to.

[01:12:51] Been a yarn that got a lot of people right into investing in her company. We’re talking about nearly a billion dollars in capital that was put into their nose. How could she have fooled all of these people or was she fooling them? Was she doing what you expect to have done in Silicon valley? That is in fact the argument that her attorneys are using right now.

[01:13:21] She is on trial because this company Theranose was never able to produce and tests. They could just take out a drop of blood and run hundreds of tests on it. And there’s a lot of evidence that has come out that has shown in fact, a great little documentary that I watched not little on her and the company Theranose.

[01:13:47] That showed that they had in fact, been taking vials of blood and using other people’s equipment, not the Theranose equipment to do the valuations of the blood, to look for diseases, to look for things like vitamin D deficiency that is in fact, something that could have helped with this whole COVID-19 thing.

[01:14:10] A real quick. Check a vitamin D levels in your blood, but what happened? Elizabeth Holmes was really a great talker. She was able to convince a lot of people and a lot of businesses, including Walgreens to invest in her. Not only did she have Walgreens invest in her, but some of the biggest names that you can think of in the investing community, including Rupert Murdoch, he invested in fairness.

[01:14:41] Now her argument in her, or at least her attorney’s argument is, Hey, listen, we’re not doing anything differently than any other Silicon valley company that’s out there. It’s this whole creed that they have of fake it until you make it. Is that legit. Is it just one more live from Silicon valley? There’s a great article that was in Forbes, talking about some of these, what are called unicorns.

[01:15:11] These are companies that are startups and are taken under the wing by investors, starting with angels, and then moving into venture capitalist, actually, even before angel. Friends and family and moving into venture capitalist positions, and then eventually public companies, all of these businesses really required proof before they got any funding.

[01:15:37] So here’s an example from Forbes, Airbnb. Obviously they, hadn’t what we consider today to be a rather unique business model. But it had been tried before. The whole assumption was that people would rent rooms in their homes on this huge scale, but they didn’t have any. They were the first to make it in this global trend, they built up this whole idea of becoming a hotelier yourself with your home.

[01:16:08] But when the founder, Brian Chesky tried to get angel capital, he did not get a dime. He had to prove that renters were interested and people were interested in renting out their homes and that he could pull them together. Once he proved that, then he was able to get the money and prove is you. To have a viable business.

[01:16:34] First, it’s really rare that you don’t have to, Facebook was started by Zuckerberg now, all of those stories, but the whole idea was having Harvard students connect with the. And then he expanded it to students and other universities and then expanded it to the world at large, his natural initial investors, like most are friends and family, people who give the money to you because they want to see you successful.

[01:17:01] Eventually. Zuckerberg was able to prove it and get money from Silicon valley. And then VCs, I’m not getting into any of the ethics of how he did it or any of these other people that had Google. Google was started by these two Stanford students page and Brin, and they got angel capital from investors.

[01:17:24] And, but these investors were different than most the investors into Google, where people who were already very successful in the computer industry and could understand the ideas behind the algorithm and believed in page and Brynn and that they could grow this company. Microsoft. Again, another company that started with a extremely questionable methods was started by gates.

[01:17:52] And now. They didn’t have any VCs, either. They started by running programs for other people. They convinced IBM that they needed to license an operating system from Microsoft and Microsoft didn’t even have the rights to, and then they went out and acquired it on a non-exclusive basis. IBM acquired it from Microsoft and non-excludable exclusive basis.

[01:18:15] Then they got VC money after they started to take off. Okay. Amazon was started by bayzos with funding from his family and small investors from Seattle. He got a VC from Silicon valley after he launched and was already earning thousands in revenues. Bezos had real proof. Walmart was started by Sam Walton with 25 grand from his father-in-law.

[01:18:43] He built this business and financing strategy and used his skills to become one of the world’s most successful companies as he grew. We work. I don’t know if you’ve seen these. There’s a great documentary out there. And we work that I watched too, but again, like Elizabeth Holmes, he was a great guy at standing in front of a group and getting investors to put money.

[01:19:08] And he was even great at getting people to buy from. We work that he even started this whole, I think it was called wee life thing where he had people who would move into the building. That they were renting this office space from, and they’d all lived there. They all had their own little units and they’d get together every night and they’d eat together and have community and everything again, collapsed when they couldn’t sustain the momentum.

[01:19:38] And it was like a Bernie Madoff thing where he needed more money coming in order to support it. And he got incredible amounts of money from this big Japanese investor. And then we’ve got Theron. Elizabeth Holmes. She failed when this investigative reporter questioned whether the technology really works, the investigative reporter said, Hey, can you really do hundreds of tests reliably with just a drop of blood?

[01:20:10] Why did this report, or even have to ask the question at all? How about all of these investors? Huge companies? My, including my medical field companies. How did all of them get built basically into spending about a billion dollars with her in an investor? It is a real problem. And it’s a real question because ultimately what we’re talking about is companies and Silicon valley thinking you fake it till you make it, who are bilking investors and everybody else out of it.

[01:20:46] Now you have to have a certain amount of that. No matter what the company is. Do you. Faith in yourself. You’ve gotta be able to stand up and make a presentation to customer or to an investor, an angel investor or friends or family, whatever it might be. But how could you have sold value to customers that convince them?

[01:21:09] To pay the rent that’s needed before you’ve even shown her profit. And that’s a big question. Things have not changed in Silicon valley because of what we work did. And because of their failure, things have not changed because of Elizabeth Holmes and Theranose and the major failure there. These people are investing money.

[01:21:30] They hope that two times out of 10, one times out of 10, they will actually make money from their investments. We’re talking about the venture capitalists and they are jumping on all of these things that are, maybe. Quite legal. That was actually the pitch that was used by the founder of Uber.

[01:21:52] Yeah. We don’t really know if this is quite legal or not, but we’re going to let people use their own vehicles to drive their own cars, to pick up strangers and take them places. And it was obviously not legal, especially in big cities where they had laws about all of this. And then all of a sudden now Silicon valley.

[01:22:14] Really listening closely and say, oh, not quite legal. Okay. That means you are going to completely overturn the whole industry. And that means we could make a whole lot of money on you again, just the knee jerk. So we’ve got to be careful. The other side of the point and coin is the secret sauce, which is many companies are being careful to not disclose things for very good reason.

[01:22:40] They don’t want an employee to leave and take with them. Their secrets. Look at the lawsuits that have been out there with Google and some of the other self-driving companies. You stole an executive, the executive brought all of this knowledge. Them. And maybe even some documents, this should not be legal.

[01:23:01] And now you’ve got the Biden administration issuing an executive order, trying to change this whole thing by saying, while you cannot lock people in to not disclosing or to your secrets or to not compete with you. How well to Silicon valley or any business anywhere. To keep their secrets, their secret sauce, the recipe to Coke.

[01:23:28] If you will, how are you going to keep it secret if you cannot hold people to these non-disclosure agreement? And so I think again, the Biden administration is going the complete. Wrong direction. I’m going to keep an eye on this whole Theranose thing, this trial that’s going on. I didn’t have an idea how it’s going to turn out, but we do have to change the fake it till you make it.

[01:23:54] Ideology of Silicon valley. Hey, take a minute and sign up online. Get my free special reports and trainings. Craig peterson.com. Your cybersecurity strategist.

Listen to this episode