![]() ![]() ![]() This second Tuesday of the month, which we just had, addressed 40 vulnerabilities across 17 different security bulletins. The total number of updates in any year was in this year, in 2010. And the good news is this ends their updates for the year, this being December. Microsoft had a December update while I was gone. And all of that's because of our sponsors. You know we're going to build that - we're moving into that new facility, the 10,000 square foot facility, build all new studios. And Ford has rapidly become one of those things because they've really, I tell you, this has been a banner year for the TWiT network and for all of our shows, in great part thanks to Ford and our other sponsors who've really helped us. Leo: There are certain things I'm a fanatic about. Steve: Is that what it - I thought it probably was. And it occurs to me that isn't "fan" short for "fanatic"? Steve: You know, Leo, you started off saying that you were a fan. I see we have quite a few little updates here, including Microsoft's update. And, yeah, I think we could see a lot of that in the future. It's deliberately designed to have, like, a different functional curve. ![]() So it's different than just, like, low-power RF. Near field uses a different set of equations that essentially creates an extremely low-power, short-range connection which falls off very quickly. It uses a different set of sort of parameters or terms from the original, I think it was the Schrdinger equations for energy transmission, where normal radio uses one set and has a certain characteristic in terms of distance versus power. And apparently it's very popular in Japan. But you can pass the phone over a placard or a pay point or whatever, and data is transferred from that pay point into the phone. You have to really get up right next to the thing. And it's kind of like, I think it's very similar to RFID. But I just got the new Google Nexus S phone, which has an NFC reader built into it. Leo: You know there's a side story to this RFID, and that's something called NFC, Near Field Communications. Not surprising, some feedback from the controversial embedded-chip-under-your-skin episode. Steve: We got some feedback from last week. Leo: We also have questions, 12 good questions from our listeners. It's an interesting story, just broke, like, as we're recording this. Steve: Well, we're going to talk about it. One really freaky bit of news that everyone has been tweeting me about, to make sure I knew about it - and you may have run across this, although it just happened - which is the claim that 10 years ago the developers of the OpenBSD security framework, specifically the IPSec stack in OpenBSD, 10 years ago these developers were paid by the FBI to build backdoors and deliberate side channel key leakage into it. We've got, of course, some updates and some news. Steve: Today we've got a Q&A, our #107th Q&A. Leo: I don't know what that sound is, but it's annoying. And I don't know, I don't think it would kill him, but it might give him a headache. Steve: Talk about his ears perking up normally. But the good news is we're going to repeat the world-famous Portable Dog Killer episode. We should note that, while we will be here next week, that's the 22nd of December, we record on Wednesdays for a Thursday release, we will not be here the following week, the 29th, if you watch live or you download the podcast. Steve: We talked about implanting RFID chips in people and, if I were to have one implanted, what would be my minimum requirements from a technology standpoint. Steve Gibson: Well, the only problem is, Leo, you missed a really fun and somewhat controversial episode. I'm sorry I missed last week, but thanks to Tom Merritt for filling in. He's also done all sorts of security goodness for all of us, including ShieldsUP!, his DNS Benchmark - Steve, it's good to see you again. Look, spyware! And not only did he find it, he coined the term "spyware," wrote the first antispyware program. Steve Gibson of GRC.com, the man who found the first spyware. ![]() And boy, I can't think of any better person to do that than Mr. Leo Laporte: It's time for Security Now!, the show that protects you online. Quarter size (16 kbps) mp3 audio file URL: High quality (64 kbps) mp3 audio file URL: They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |