 You shoulda teared some of you with this thing. Now, keep your data usage below this thing. Or pay for, oh, you should, you're not on a family plan, are you, like a T-Mobile? No, well, no. We're actually, like I moved everything to business because the number of phones we have on this plan, a family plan doesn't hold it. So they had to upgrade us to a business plan. To a family business. Mm-hmm, man. You went with the enterprise plan because you have too many members. Yes, said Nabynese, Nabynese plan. Yeah, yeah, we can't, like on a family plan, I think the top, the top number of phones you can have is five. Uh-huh. I think we have seven. Geez. Now we have seven. I know. You're telling me, crazy dude. You should incorporate your family. LLC. They already are. Corralta LLC. Well, it is. It's under my business, right? Yeah, yeah. Everyone pays into the health plan. And they are now. I mean, I hire them to do stuff every once in a while. So. There you go. How are you not to go for that? The bandwidth gap data cap. On the control when you get a chance. You got it. Contarole. You already have it. Oh, why is it not showing up on me? Dang you. Dang you in your slow bandwidth spectrum. Someone printing something? No, that was just my, every time the air conditioning goes off in my house, the surge protector goes. No. Yeah, I get that. I get a switch on my UPS. It doesn't go off, but it does the, you have a, we have a power sag. Mm-hmm. Yeah. Just clicks. Mm-hmm. Yeah. With little relays. At least I know what's working. Saggy power that leaks. Saggy power. So here there's a Botox can do wonders for that. All right, Dan, you ready? Let's rock it. Have we entertained you sufficiently? Sufficiently entertained. Good. All right. Here we go. Daily Tech News Show is powered by you. To find out more, head to DailyTechNewsShow.com slash support. This is the Daily Tech News for Friday, July 7th, 2017. I'm Tom Merritt joining me today, senior writer for Tech Republic. Dan Patterson in the house. Been too long, Dan. How you doing? Hello, world. Great to talk to you today, Tom. Absolutely. Dan just recently returned from Ukraine at a global cybersecurity summit where you had many adventures it sounds like. Yeah, we did. We learned a lot and talked very serious things about the state of global cybersecurity, but also ran a crazy James Bond movie for a week or so. No kidding. So we're gonna talk a little bit about what was discussed at the summit, but also some of the crazy James Bond things that happened, but let's start with a few tech things you should know about. Court has decided to let Uber depose Alphabet CEO Larry Page as part of that Waymo Uber lawsuit. Waymo pulled three of their patents out of the case, but they still have one in it. And frankly, the main case is about trade secrets anyway. Uber plans to ask Larry Page about why Alphabet shows not to partner with Uber on self-driving. It's not just sour grapes, but Dan, it's probably them trying to show that Alphabet didn't think that Uber was doing something similar to what they were doing. Yeah, we'll see. It's one of those cases where the facts really are going to matter and these two companies, regardless as to what happens with this case, these two companies are on a collision course. So this is kind of the vanguard of news to come. Samsung projects its highest operating profit ever will come in Q2 at 14 trillion won, up 72% year over year. It's $12.11 billion US. Samsung hasn't provided all the details yet, but the analysts looking over everything say it's probably strong sales of the Samsung Galaxy S8 as well as strong sales of chips like RAM, processors and some display components have been selling well for Samsung. It looking very rosy for Samsung right now. Explosive growth. It shows you how short the news cycle is, right? A year ago, we were talking about this is the death of Samsung. How will they ever recover? They did just fine. Yeah, and I remember trying to deflect people saying like, how is this gonna hurt Samsung? And saying, look guys, it's a PR nightmare for them. Maybe it kills the note, although it looks like that's not even the case. They're gonna come out with a new note this fall if everything pans out the way the rumors are going. But remember Samsung does a lot besides phones. So I knew Samsung would do okay. And it looks like they did the right thing with the Samsung Galaxy S8 in getting people to understand, hey, this phone will not explode on you. And the S8 is just a really good phone. It is. The Verge verified a report by the information that Jawbone has entered into liquidation proceeding. So no more Jawbone or is it Jawbone co-founder and CEO Hussain Rahman reportedly started a new company called Jawbone Health Hub, which will focus on health related services and provide support for legacy Jawbone devices. So there's a little bit of a shell game going on here, Dan. Yeah, you know, there's massive growth in the industrial internet of things. In consumer IoT like Jawbone, it's a real heated space right now. And it's nice to see a pivot to help. We'll see if that Jawbone brand can carry in any weight or if they're gonna get trampled by the giants. This is one of those stories that people only read the headline and say, oh, Jawbone going out of business. Well, too bad, goodbye Jawbone. And then a year from now, they see some Jawbone health services things and go, didn't I read that Jawbone went out of business? I'm not gonna believe anything I see in the news anymore. And the fact is, yes, this Jawbone as we know it is going under, but it is like you said, it's a pivot where they're saying, look, this enterprise is not working anymore. We're winding it down, selling what assets are worth something to ourselves in this enterprise that we can get going and start fresh with. Smart move. Yeah. Comma.ai launched a toolkit Friday to help car owners access the data from sensors in their car. Toolkit consists of a few different parts. There's a hardware dongle called Panda. You plug that into your OBD2 port and it works with software called Cabana to read out the data. Not just the publicly available data you normally get from the OBD2, but with George Hott's computer magic, he's able to read a lot of the same stuff that the factory could see. It will then store that data in something called the OpenDBC, the Open Database for cars where you can all help each other. Other car owners that have this dongle can look at each other's data and help interpret it. So once it's interpreted for one car, it'll be easy for everybody else that has that same model to interpret it. Comma.ai founder George Hott believes it's the first step toward making any car autonomous. This is his step back from a $1,000 kit that he was going to sell to turn any car into an autonomous car. He ran into regulatory issues. So he has stepped it down quite a bit to this $88 kit that just helps you build the data that you need. That is expected to start shipping in four weeks. It's, you know, everybody's kind of sick of hearing about machine learning this and AI that, but this is really in big data. But this is where the marriage of machine learning and big data is really going to create some practical outcomes. Whether this particular manifestation exists in a year or so we'll see, but really this is where data and machine learning shines. I'm seeing more and more efforts to become the android of car services. So we've seen that from Baidu and George Hott says exactly the same thing. He's like, I just want to make a platform that anybody can build on. He would then stay away from the regulatory issues of having to create car parts and just create a platform that people could build upon with their own car parts. And I don't, like you say, I don't know if this becomes the android of self-driving cars or if it's Baidu or somebody else, but it does seem like we are going to get a few platforms out of this open and proprietary both, just like we normally do with new platforms. This is a signal of the future. Whether it's this company or this platform, who knows, but this is where the future is going. Remember, do you remember when Elon Musk got on Twitter and told the Australian billionaire, I can build you a battery storage for your power grid in a hundred days? I do know. Yeah. Tesla has agreed it's official to build the world's largest lithium ion battery storage facility at Australia's Hornsdale Wind Farm by December 1st or it's free. Tesla Power Packs will have 100 megawatts, 129 megawatt per hour capacity, and they hope to power a maximum of 30,000 homes. Of course, the reason for all of this is South Australia's power grid has suffered frequent outages because of storms and a lack of capacity. So this would allow them to use, among other things, solar energy and store backup power to get them through those outages. Tesla has built a smaller facility like this on Kauai, the Hawaiian Island. So they have a little experience at this point and this will still be their biggest project, though. More of this, please. Anything that pushes power and efficiency of energy storage forward is a good thing. Yeah, and I want it to succeed so that Tesla can do it elsewhere and other people start saying, well, hey, wait a minute, if he could do that, we could do that, too. Yeah. New York Times reports that according to a joint report of the U.S. Department of Homeland Security and the FBI, attackers have been targeting the networks of companies operating U.S. nuclear power plants for the past two months. The Wolf Creek Nuclear Operating Corporation is the only target named in the report, but there's around a dozen that aren't named. It's unclear if the attacks are meant to steal information or disrupt operations. However, attacks have been successful in infiltrating individual computers. They have not reached operations systems or control systems, which are kept separate. Thank goodness. Not yet that we know of. Not yet that we know of. Those are very important words. And hopefully they are kept as separate as this report would like us to believe. This is sadly not an uncommon story. This is not a surprising story these days, is it? We'll be bored to death and sick to death of stories like this soon. This isn't the far off future. This is the right now. And whether the public or consumers care, whether companies care, these types of cyber attacks that target critical infrastructure are going to present not just tactical challenges, but real existential threats when it targets nuclear facilities. And when we couple that with propaganda that's happening, I mean, everybody's tired of the fake news discussion, but social media helps spread this information which keeps the public from focusing on stories that actually do have critical importance like this. Yeah, it's the time where we find out if those scare stories about SCADA systems that had the passwords of one, two, three, four and the like were just scare stories and that these companies have locked those systems down better or if we need something bad to happen before everybody really gets in gear and protects these incredibly important and dangerous systems. Yeah, something bad is going to happen. What we saw happen in Ukraine with the shutdown of the power grid was hackers were able to overwrite the serial to ethernet cables and destroy, eliminate the firmware which prevented defense mechanisms from going into shutting down the attack. When we see something like that happen, we'll see other types of attacks happen here in the West and those type of attacks, sadly, there may have to be some sort of critical event happen, but those type of attacks really indicate a sophistication and an intent to do harm. Well, we're going to talk a little bit more about what's going on in Ukraine and global cybersecurity. So let's wrap this up. If you get all the tech headlines you want each day in about five minutes, you're listening to DailyTechHeadlines.com. That's what we do in our sister show. All the tech headlines quick and efficient for you as a podcast, as an Amazon Echo flash briefing or on the anchor app at anchor.fm that's DailyTechHeadlines, DailyTechHeadlines.com. So the Global Cyber Security Summit in Kiev, Ukraine was very interesting. You got to interview former U.S. Deputy Secretary of State Anthony Blinken about the need for cyber defense. On the one hand, this is governments and officials coming together trying to plan out a strategy, but on the other hand, Dan, it sounds like a lot of the speakers at this conference were saying, we really need governments and NGOs to come together and plan out a strategy. Yeah, so there are a number of cybersecurity conferences as everybody knows around the world, including Black Hat, RSA. This one brought together specifically folks in the government and public space, NGOs and private companies. And that message that you just said, it was exactly right. Everyone agrees that there needs to be public-private partnerships, but those are really hard to do when you have competing interests and you have, for the most part, a cybersecurity community of people who, I mean, let's be honest, we still use the word cyber security. This is an insular community that tends to talk to each other and they don't do a great job of talking to the public. Some of the people who do are like Greg Michaelides from the New America Foundation and others who really do a good job of using not the jargon and instead using common words and common language, but really a fantastic shot. This is an opportunity for a lot of people to talk to each other and kind of step out of the bubble. Excellent. Yeah, so if you're watching the video, you saw that my dog just knocked over the camera because someone was here with mail. We'll fix that in a minute, but you keep talking. I think what's interesting about this to me in a way is that Ukraine, I'm guessing, you didn't have a lot of representatives of Russia attending this Global Cybersecurity Conference. Oh no, no, in fact, we were, I mean, if ever the really interesting thing about these times is that in the age of terrorism, for the last decade and a half or so, you have kind of this amorphous and difficult, it's difficult to point to who the threat actor is and that's very similar to what we have in the hacking age. One difference though is the presence of Russia in terms of a financial underwriter of different types of attacks. Russia really, so Russia behaves in a way that they want to disrupt many of the systems in the West and they target not just IoT systems and computer networks and mobile networks, but they also use propaganda to dissuade people of real facts. One of the things that Blinken said was that we really need to have an emphasis on public-private partnerships. We need to set international norms and standards and we need to work on deterrence. Those three things will kind of slow down what we see in terms of targeted attacks against the West, but we won't ever, we won't get rid of the Russian threat and it's very strange to say this one actor underwrites a lot of the activity around the rest of the world or at least is a spark for a lot of the activity around the world. There aren't, I mean there are anonymous groups of hackers, but we can in this instance point to a group and say this is what they're doing. For example, Russia is fighting a kinetic war in the South in Crimea, but they're also targeting the infrastructure, the power systems in Ukraine. And what that causes is Ukrainians to write ransomware that then attacks the rest of the world so that they can fund the resistance against Russia. So if your company was hit by a ransomware attack, it's likely that this was to help raise money so that Ukraine can fight back. Russia also funds a lot of the organized crime groups in Eastern Europe and they also fund university students to study cybersecurity and study hacking. So it's a real asynchronous attack that's happening against Ukraine and then that's spreading out to the rest of the world. And of course, I mean, you're getting one side of this when you're in Ukraine because you're not getting Russian representatives and I'm sure there is another side of the story that Russia would like to tell about this. But the fact of the matter is, Russia is doing a lot of the things that you're saying and the United States is out there doing cybersecurity attacks on other nations. China is out there doing attacks on other nations. North Korea obviously has been suspected of doing cybersecurity attacks. The point of the matter I think isn't so much to point it at Russia or China or the US in particular, but to say, hey, wait a minute, we've got the Wild West right now and all you're gonna do is escalate it if you say, well, that country is doing all of this stuff. So now we have to do stuff too. I think one of the best messages that I heard coming out of the conference that you went to was, we all need to agree on these standards of practice, these norms and standards so that we as governments, we're not even talking about terrorist agencies or anarchist collectives or the ones who won't participate in this. Governments should be talking to each other saying, hey, we should all be fighting against the criminals, shouldn't we? Let's figure out some ways to deal with this. And part of that is to reduce the incentives. So if you reduce the financial component, then you can in theory reduce the threat actors and the various agents. And you're right, it is not just Russia behaving in a manner that find threatening, everyone is doing this. And this is an existential challenge because if there are vulnerabilities, there are agents who will exploit those vulnerabilities. And because we have critical infrastructure that civilians rely on, we have to treat every vulnerability as though it is high risk vulnerability. And it's hard to tell the state actors from the state supported actors from the independent actors as you sort of found out in practice just getting off the plane in Ukraine. Yeah, it's what's very interesting. So to share a couple of stories, we were initially hit with a stingray by Stropel Airport, the international airport in Kyiv, has been the target of cyber attacks since December, 2015. And there certainly are stingrays there. You can tell, we've written a few stories in tech republic about how the tactics are used, but you can tell if your phone tries to connect to a network and it just spins and spins and spins without providing any data. We were also- That used to be called Verizon and Marina del Rey, but that could also mean a stingray, yeah. And AT&T in New York City. Yeah, right, right. Right. So the other attacks we saw, and I think that probably your listeners are most likely to experience brute force attacks. And one of the things that you can do to make yourself more secure right now is to change your passwords and use a password manager like LastPass. You don't have to use LastPass, but it's a secure embedded application. One password is great too. Enable two-factor authentication on every site that offers it. And let's be honest, every site should offer two-factor authentication. When I took the stage to do a panel moderation at GCS, literally the moment I took the stage, my phone buzzed and didn't stop buzzing with emails that came in from different social networks saying, hi, we're Facebook. We noticed a login attempt from this IP address from every single account. Those were coupled with phishing attempts that looked almost exactly like, say, an audible email, but it came in from an audiobooks.com. One of the things that you can do that's real practical is to A, never click on links that come to your email, but B, double-check those domains. Often you see a domain attack where a typical misspelled domain. Also check the JavaScript that the redirect in hover over the link in an email and double-check that that redirect is actually going to the domain that it says and not forwarding you to some strange place. Often you don't have to enter your credentials. You can simply click on a JavaScript link and it'll pull in from your key chain, all kinds of information. So it's strange to take the stage and then immediately get hammered in profile as though we're coloring, we don't know what you look like, but we're gonna color in the lines around you. When that starts happening, you realize, okay, these attackers are real and they do want to at least send a message. And that is the James Bond stuff you're talking about, unless you were also chased through the streets of KL. Oh, we were, yeah, we were followed. Yeah, we were followed by, each day the attack stepped up. So a colleague of mine had, after room service came in, he had half, nobody's drinking glasses of water, he had a half full glass of water placed right next to a bed with a note that said, privet hello in Russian. And as soon as I heard that, I asked a room for, when was the last time? You know, I've been in and out all day, I forgot when was the last time I was here and I knew I'd not been there all day. And they said, well, 1235. All right, that's the last time. All right, definitely somebody has swiped into my room, let's change rooms. By the third day, I would sit and have a bottle of water in a courtyard, which was right next to the FSB, it's a Russian secret service. And these two goons sat like satellites on either side of me, one in a crisp white shirt, the other with tattoos and he was a big burly dude. And they, I mean, they make themselves known, they stare right at you and then followed us as we walked. And then we did the James Bond thing and kind of made weird corners and they're still following us. And it's just to send a message, but that's one thing that the Russians in particular are very good at doing, make you feel as though, I didn't know it was in a rabbit hole and I'm not sure where this ends. In fact, the final day we were there it was at the central bank conducting interviews and on the way home, we had strange emails show up in our accounts that simply warned that maybe we should back off a little bit and be quiet. I think one of the emails said, just change this topic of conversation. So. Yeah, and you know, that's the kind of intimidation that is meant to keep you from possibly inflaming passions around particular issues which Ukraine and Russia are fighting a border war by proxy in the West or yeah, I'm sorry in the East part of Ukraine as well as the dispute over Crimea which Russia now has under its control. So that doesn't surprise me that people are putting the pressure on you but it doesn't help the problem of look you guys need to talk to everyone else as much as we need to talk to you. And that's the climate that needs to be changed if we're gonna make it safer for everybody on the internet. Yeah, that's exactly right that there needs to be bilateral conversations. Yeah. Well, I'm glad you made at home safe. I'm glad you had a good experience at least, you know, informationally and would you go back again? I would. There are some other things that happened there. I would under some certain conditions. The people of Ukraine are fantastic. Yeah, absolutely. Well, thanks to everybody who participates in our subreddit, you can submit stories and build on them at dailytechnewshow.reddit.com not only stories, but you can submit guest ideas all kinds of things. People are in there chatting about the different stories as well. So go check that out. Got a couple of messages of the day regarding our discussion yesterday about Amazon and Dish having conversations about partnering up. Now, the sources that the Wall Street Journal and others have talked to say that Dish it wants to have Amazon fund the rollout of a wireless network because Dish has a bunch of spectrum and that Amazon has talked about some kind of connection with internet of things and Amazon Prime. That got us thinking along the consumer end, but anonymous person, although an Amazonian I don't have special knowledge of relevant products. I'm just guessing based on my understanding of how the company values and thinks, but he or she actually don't know which way it is is not representing the company anyway. This anonymous person says Amazon may make more internet of things devices, but I really don't think that's the main play. Interesting scale comes from being a platform for others. I think we want the things to succeed in an internet environment that includes Amazon web services so we can sell cloud resources to those who manage the things. Relevant IoT connectivity through Dish would be a compelling part of such an AWS solution. I'm sure we'll also happily run the shop where you buy the IoT services and hook them up. I think our sales assistants and facilities managers may already be in your house. But yeah, tying in IoT as a service to Amazon web services makes perfect sense. And then from our YouTube channel, Brandon added, Dish also does on-demand sell repair. They have sell parts in their trucks now, and I don't know if you've noticed, but Amazon services also offers on-demand sell repair. So maybe there's a partnership there as well. Dan, what do you think of these ideas? I think that's, I bet cash money, that's the direction Amazon goes. Making IoT devices is a lot less lucrative than making the networks that those IoT devices run on. Well, and now that I'm thinking about it, our theory had been, they'll sell more Amazon Echo-like devices for your home, for your smart home, maybe some doorknobs, et cetera, cameras, which they now have, right? In the Amazon Echo Show and the Amazon Echo Look, they both have cameras. But that also, I was thinking, okay, and then you run it on the Amazon Internet of Things platform, which is included in your Amazon Prime subscription. Well, yes. And they could probably provide serious backend, even if they do that for other enterprise services, other Internet of Things providers, and allow them to tap into that same network alongside of the Amazon Internet of Things devices. So yeah, I think our anonymous Amazon employee here is perfectly right. This would fit well into the AWS model. They probably would be considering all of those, don't you think? I think Amazon makes, I think that they want to make a lot of money from the scale here. So yeah, that makes a lot of sense. And as Microsoft and Google are chasing them in the enterprise web service and big data service, Internet of Things is kind of the next big field of play that Amazon wants to go put a stake in the ground first and maintain their leadership position. All right, well, let's check in with Len Peralta, who has been illustrating this episode and is very excited about Spider-Man Homecoming coming out this week. What do you got for us, Len? Yeah, I tried to shoehorn this into the idea. I mean, the discussion was incredibly fascinating. But I've got Spider-Man on the brain here. So I did take something here. This is actually an informative piece of art here. There's three components you mentioned on the show, but there are really four components for cyber defense on a global scale. One, of course, private public partnerships, international standards, deterrence. And number four would be, of course, Spider-Man. Oh yeah, Spider-Man is like, yeah. He's like, and Spider-Man's saying, oh geez, I wrote this. That's like totally untrue. And really, Tom's dog might be the best defense, though. You got to be on the right there. Tweet that to Blinken, he'll love it. Yeah. I think Ray may have been acting as an agent of a foreign power when she, when... Right. That's quite possible. Actually, it was Sawyer who knocked down the camera on Ray, but still, for purposes of... Yeah, yeah. But she made it in there. So, or he made it in there, I should say. Is Ray a boy or a girl? Ray is a girl, yeah. She made it in there. Like Ray from... Yes, there you go. So yeah, so this is available right now at my online store, lennparaltstore.com. You can also become one of my Patreons at patreon.com.ford slash Len. And back me at the DTNS Lover level and you get each one of these things that I draw every week as a digital download. So go ahead and do that. That'll be awesome. Thank you. So, wait a minute. Dan, so this has Ukrainian hackers, Spider-Man and my dog. It's perfect, right? I mean... Yeah. This is the future of cyber defense. Yes. I feel safer now. Thanks, dude. With Spider-Man, I do. Yeah, for sure, man. All right, once again, lennparaltastore.com. If you want to just look at it, and of course, you can order a digital or a physical print while you're there. Thank you again, Dan Patterson, for joining us. Where should folks go if they want to find more of what you're doing these days? Hey, thank you guys. You know, my Twitter at Dan Patterson is probably the easiest. We have a long tech republic URL, but I have the most recent story about hacking in Ukraine at the top of my Twitter at Dan Patterson. Go follow him now. Thanks to everybody who gives a little value back to this show for the value they get from the show, including Leonidas Vraknis, Ben Love, Chris Hunter, and many, many, many more. We thank each and every one of you for making this show possible. Our goal every month is to just have one more patron than we had last month. So if you've been thinking about joining, now's a good time. Patreon.com slash DTNS. Our email address is feedbackdailytechnewshow.com. We're live Monday through Friday, 4.30 p.m. Eastern, 2030 UTC at alphageekradio.com and diamondclub.tv. We're at facebook.com slash dailytechnewshow. And our website is dailytechnewshow.com. Back on Monday with Veronica Belmont. Talk to you then. Show is part of the Frog Pants Network. Get more at frogpants.com. Bob hopes you have enjoyed this brover. We did it, even with my camera going down. So Sawyer has a hurt paw, so he has the cone on, which is I think why he would knock the camera down because he was running to the door and didn't judge the distance properly. What kind of dog is he? He's a border collie mix. Interesting. Yeah. Awesome. Maybe not gonna be down here during the show until the cone comes off. Excellent. Well, thank you guys very much. I really appreciate it. Oh yeah, no, thank you, Dan. I appreciate you sharing the stories with us. Oh, anytime. And braving going to Ukraine to get the story in the first place. Ukraine is fantastic. We had some, I almost didn't make it out of the country. At the airport. There's a couple of stories that just are better, like not shared publicly at the airport. We had... Well, we're still live, so just be, you know. Yeah, yeah, definitely. We'll see, the next one will be fantastic. There's AK-47s and crazy hackers. You know, the AK-47 just had its anniversary of it going on sale for the first time. It did. It's like, you know, the most popular brands in the world are like AK-47 and Samsung. Those things you see everywhere. Yeah. Two great tastes. Two great tastes. They go well together. Awesome. Thanks guys, I do appreciate it and we'll talk to you soon. All right, thanks, Dan. Take care, bye. See you guys. So, Roger, what do we got for titles? Samsung's exploding sales. Yeah, exploding sales. Blame the dog. This episode was filmed in front of a live studio animal. Samsung with dollar signs replacing the S. Jawbone is dead. Long whip Jawbone. Dan's got a bad feeling about this. Wopper of a fishing tail. Get it, Wopper? That's the computer that controls the SDVMs in war games. Dan speaks in Kiev. Kiev goes fishing. I like that one. So without their hacking occurs with a Russian Ukraine on my parade. I like that one. I'm going to click on that just because I think it's funny. The insecurity of cybersecurity. Cyber attacks going nuclear. Was that one the insecurity of cybersecurity? That one's good. Yeah, the insecurity of cybersecurity. I like that one. Well, keep going, but I kind of like that one. Powered six months or it's free. Something's going to happen and they'll probably have to pay. Take some of it in. Digital meltdown, nuclear hacking. Cyber attacks going nuclear. Nuclear, nuclear, nuclear, nuclear energy. Samsung and the AK-47. Newt Jell-O says one has killed millions and the other is the AK-47. Then he says, sorry. Samsung hasn't killed millions. Maybe under a million. Probably not. Yeah, it's a conglomerate. Many of its various arms may have been out of it. Yes, it's pronounced nuclear. Nuclear, nuclear, nuclear, nuclear, nuclear. Nuclear. Nuclear. Nuclear. So I actually didn't see Sawyer knocked. I was like, I thought the dog was on Dan's side. Dan touched us. Oh, really? Yeah, cause I was drawn and then I heard the dog and I'm like, oh man. And then all of a sudden I look up in your sideways. Yeah. Somebody dropped a package off at the door and he went running over to the door to defend me. Days like that, it's like, you just want to like toss him out the window. Was it this week or late last week when my LEDs fell off in the middle of the show? One of those weeks, summertime. I've done that. This week is a weird week. I think it's because of the 4th of July holiday. In fact, my parents were here. Yeah, it's been a really weird week. We had guests all this week and so it feels like I was sort of on vacation but not really because I was still upstairs working. Yeah, look, I'm sorry for yawning, yonzer. It's not the company, it's the hour. It's the company and the hour. It's the company hour. The insecurity of cybersecurity is my vote. Yeah, I'm with you. Let's use that. Well done, KV. Done. Exportin'. Done, exportin'. At least I have a long enough cable that I can walk over there and still hear. That's my internet still crappy. Dang it, Spectrum. I pay you your introductory rate for a reason. Oh, so we have a home line. I don't even know why we have it anymore. I've been meaning to try to get rid of it because all we get is just junk on there. No one ever calls us. They always just call our cell phone or they text us or whatever. So what I've been doing is I've actually been answering every call that comes in and doing a voice that says, hello, this call is being answered by a robot. And I just keep saying that over and over and over again until they hang up. Hello. You know, you do what you gotta do, right? It's fun. I'm like, oh, the phone, because it used to be like all the phone rings. Now you get excited. Now I get excited. Oh, I get, I'm gonna do this. Hello, this call is being answered by a robot. What do I do? I normally just, I used to just answer the phone and say, yup, and then people who knew me would know what to say. And people who didn't wouldn't. And I said, all right. Do it this way next time, Rhett. Rhett, try this one. So say, hello. And as soon as they start talking, the call you're trying to complete cannot be completed as dialed. Please hang up and dial again or ask the operator for assistance. Yeah, I wanted to come up with a really good script, you know. No, the thing is you wanna make it, your call cannot be completed as dialed. Hello, your call cannot be completed as dialed. But the pause, you pause. Hello, and then as soon as they start talking, your call cannot be completed as dialed. I'll do that one. Hello, your call cannot be completed as dialed. Please hang up and try the number again. No, just hang up. It's great. But I don't know if that will deter them, you know. What if they call back? They'll just keep calling back. That's okay. And then just do it again. Hello. No, no, you should have like, scripts are completely different. One, you're like a piece of store or a piece of shop. Another one, you're like, you know, like you're just different people. Yeah, yeah, my brother-in-law, when he answers the phone, he says, hello, Sajja Maloney from the fraud department. And they just don't know what to do. Just start saying, thank you for calling. Your call is very important to us. Please hang on. And the next available operator will take. Did you read about that story about that guy who had this, he wrote a script to call back these scammers? Yeah. He made it call them back 28 times a second. Oh, yeah, I did hear about that. So it jammed their line so they couldn't make any calls out. That was great fun. Thank you for calling Len Peralta. Your call is very important to us. Please hang on the line. And the next Len Peralta will help you in the order in which your call was received. The next Len Peralta will call you. If you still had a voice fax modem, you could just plug your landlines to that and then set up your computer. Oh, yeah, there you go. And then just do what Kramer did on Seinfeld. Welcome to Moviefone. Please state the name of the movie you would like to see. Why don't you just tell me the name of the movie you want to see. Please press one for Len Peralta. Gladiator is also playing it. I bought tickets through Moviefone back in the day. Felt like living in the future. And it's so funny now that we would never call something to buy a ticket. Well, didn't Moviefone just become Fandango? I mean, that's all it became, right? Well, AOL bought it. So I don't think it became Fandango directly. But yeah, Fandango pretty much replaced it. Yeah, Fandango was the thing. Full disclosure, my wife works for Fandango. Yeah. Fandango is way better than it ever was. Full disclosure, this is my opinion. I love, I love Fandango. Yeah. I love Fandango's health plan. You're like that. And the paycheck my wife gets from them. You ever see that Twilight Zone where the, where that Billy Mummy like wishes people in the cornfield? He's like, it's called It's a Good Life. I love Fandango. That's real good. Right, Fandango's real good. Biocass says he got a sales call once and just started talking over them every time they started talking and then blamed it on delay. I remember, you could try answering the phone and then just pretend to break up. Hi. I can't just answer. Yeah, yeah. That brought the, I love. Interesting. Oh, I think I would, yeah. Reception. Oh, okay. Yeah. Really, all you need to do is just play the jerky boys over the phone. See, okay. All of these are funny until you realize that the person you're torturing with this is like a minimum wage employee who doesn't want to be there. Unless, unless you get those calls. See, every once in a while you get that jackpot call from Microsoft. We want to fix your. Oh yeah. Now if it's the fraudsters then they'll hold to Bard. Hello, this is Microsoft. I have found a virus on your computer. I told you about that. They called the other day and I was so excited. And I picked up by it because it came through with no caller ID and I was actually expecting a call from a client who has no caller ID. So I picked it up. Just thinking, yeah. And it was, hello, I'm calling from Microsoft. I'm like, oh, it is on. So, so, so all I did, I just kept calling, I just kept talking like I didn't speak English. Like I was just like, hey, okay. And I kept saying yes to everything. Yes. It's the wrath of Tagalog. They're just like, so, did you, is this okay? Can we, can we work with you now? Okay. What do you see on your computer? Puppets. And I just kept saying puppets over and over again. He's like, what are you seeing? Puppets. Yeah. Puppets. What were they trying to get you to do? Go to their website. They wanted me to go to my, they said there was a virus on my computer that is causing my computer to slow down. And they needed me, they needed to take over there. They were calling from Microsoft and they needed to take care of my computer. So they needed me to go to a website, type in a URL and then, then from that URL, they would be able to gain control of the computer. Yeah. My dad just calls me and I take over control of his computer. That's like Christmas day when you get one of those calls because. Puppets. I love that. Puppets. Yeah. I was. Did you say puppets? Yeah. Because I own a home. I get a lot of the, I get all of the telemarketers who want to sell me solar panels. Oh yeah. Tell me all the advantages. It's like, I know. It's like, oh really? It's like, so, so would you be considering investing? It's like I could be. And then at the very end, I just tell them I'm renting. It's like, oh. Oh yeah. I mean, it's not a lie because I am renting, but I go to that right away when I see people like that. I'm just like, oh yeah, I'm rent. Oh, nevermind. Bye. Occasionally they'll be like, how do we get in touch with the odor? I'm like, I don't know. I don't know. He lives on the boat. I just have an address. I have a PO box to send my rent to. I wrapped my check around the pigeon's leg. He's somewhere in the Caribbean. I was supposed to be paying for this? What? I just like, I just walked in here. I'm just squatting. I'm squatting here. Oh man. Yeah, I think the guy that had the scammers that were calling that one guy, I've gotten those before. They'll say that there is a judgment against you and the cops are coming to arrest you. And so he was like, this is wrong. Like, you know what I mean? Like they're basically going after people who don't understand what's happening. And so catch them in a vulnerable position. Right. So yeah, for sure, man. I love the fact that he kept, called them 28 times a second. That's awesome. Jam their phone lines. Man. Be a douche, die by oh, I shouldn't say that. See, Roger, you've got to think about what you're reading. This is the lesson of fake news right there. I'm not reading. Are you reading JollyRogerTelco.com? No. I'm just reading stuff. I'm just reading Newsarama and a couple of the things. There you go. T, told you. Newsarama. What's Newsarama? I was thinking about something else. It's another Arama, but it's not Newsarama. All Arama? No, I don't know how I can't remember what it was now. It was sort of like, it was sort of like a low, like a, I want to say a low rent Boing Boing, but it was like a, it was like Boing Boing. It was just a compendium of links. It was Boing Arama. It's called Booboo. Boing Boing. It was something Arama, I don't forget what it was. It's just called Boing, because they can only afford the one Boing. It was a fun sight though. I don't remember who it was now. Boy. Man, you know what? I haven't actually looked in my bookmarks in forever. Oh, yeah. And these are, I have a delicious folder. Delicious. There's only one thing in it though. That's sad. So these aren't up to date. I have identica.ca still in my bookmarks for some reason. All right. Hey, did you send me, Tom, did you send me something from Peach the other day? Maybe, I may have, yeah. It was a while back. Like maybe a couple weeks ago. Yeah, it was a couple weeks ago. Yeah, yeah, I did. It's like you waved hello or something. Like what the hell is Tom Peach for? I was going through my phone, getting rid of apps that I don't use anymore. And I saw Peach, so I'm like, hey, that'd be still in there. So I opened it, I'm like, is it even work? So I opened it up. And of course, you were at the top of the list. It was like the most recent activity was like, Len shared a thing. And it was like, you know, 110 days ago or whatever. Yeah, 370 days ago. And so I was like, oh, I must wave back to Len. I don't want to leave him hanging for more than a couple of years. Right, so I went back. I'm like, oh, I don't even know how to do that. I'm like, you hasn't even logged in for like a year. I'm like, how am I gonna wave to him? He hasn't even logged in. So then I thought, well, maybe someone's, maybe let someone hack my Peach account or something. That happens a lot. You hear that a lot of people having their Peach hacked. Oh, the Peach hacks. They're the worst. Peach hacks. Yeah, remember that? That's hashtag Peach hack. So I went to my Yahoo to see if my bookmarks were still synced and they're not anymore. I was gonna look through my old bookmarks. I guess I'd have to pull up Firefox then. I have my old bookmarks. Cause apparently the bookmarks didn't, sir, didn't, bio cow, bio cow just sent me a yo but yo was one of the apps I deleted when I was cleaning up my phone. I'll never get it. That's so sad. I'm gonna have to go and install yo so I can get your yo by okay. Yeah, I thought I had synced all my old Firefox bookmarks. Oh, there they are. Right? What is this? It's Lenny calls? What is that? Don't know what that is. Royalty free music for YouTube. Arena Paladin tier lists for Black Rock Mountain. Well, that's old. And recipes. Recipes. Yeah. Well, the recipes I actually use all the time. I keep recipes in Chrome bookmarks so I can get to them from my phone. All right. Well, thank you all for spending time with us today. I hope you have a lovely weekend. Yeah.