Listen early, and ad-free!

305: Norton unlocked, and police leaks

With ,

Carole is in her sick bed, which leaves Graham in charge of the good ship "Smashing Security" as it navigates the choppy seas of credential stuffing and avoids the swirling waters of apps being sloppy with sensitive information.

Find out more in this latest edition of the "Smashing Security" podcast, hosted by Graham Cluley with special guest BJ Mendelson.

Warning: This podcast may contain nuts, adult themes, and rude language.

Episode links:

Sponsored by:

  • Bitwarden – Bitwarden vaults are end-to-end encrypted with zero-knowledge encryption, including, the URLs for the websites you have accounts for. Migrate to Bitwarden for a more secure password manager.
  • ManageEngine PAM360 – A fully functional privileged access management suite that offers a holistic picture of all the privileged devices, users, and credentials in the IT infrastructure. From managing and governing access to all your enterprise resources to automating the access management life cycle in your organization, PAM360 does it all.
  • DigiCert - DigiCert's Trust Lifecycle Manager sets a new bar for unified management of digital trust.

Support the show:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!

Follow us:

Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.

Thanks:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.

Privacy & Opt-Out: https://redcircle.com/privacy

Transcript +

This transcript was generated automatically, and has not been manually verified. It may contain errors and omissions. In particular, speaker labels, proper nouns, and attributions may be incorrect. Treat it as a helpful guide rather than a verbatim record — for the real thing, give the episode a listen.


BJ MENDELSON. Anything with him when he's not punching people in the face tends to be bad.


GRAHAM CLULEY. Are you telling me Sylvester Stallone doesn't punch anyone in the face in Tulsa?


BJ MENDELSON. Oh, he does, and it's wonderful.


GRAHAM CLULEY. Okay, I see.


BJ MENDELSON. All right. Okay. That's how you know it's good, because—


GRAHAM CLULEY. Oh, the good ones are the ones where he punches people.


BJ MENDELSON. Yes, exactly.


GRAHAM CLULEY. Okay, I understand. Right.


BJ MENDELSON. That's the barometer.


UNKNOWN. Smashing Security, episode 305. Ransomware, Norton Unlocked, and police leaks without Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 305. My name's Graham Cluley.


BJ MENDELSON. And I'm BJ Mendelson.


GRAHAM CLULEY. What? Hang on. What? What do you mean? Where's Carole? Where's Carole gone? What's all this about? BJ, welcome back to the show, obviously.


BJ MENDELSON. Yeah.


GRAHAM CLULEY. But the audience want Carole Theriault.


BJ MENDELSON. Yes, they do.


GRAHAM CLULEY. What have you done with her?


BJ MENDELSON. I'm a poor substitute for all the wonderful things that she does on this show. But I'll do my best.


GRAHAM CLULEY. So I should explain to the listeners, Carole unfortunately is laid up in her sickbed with ailments which I could describe to you, but frankly, I don't want to put you off your dinner. So maybe I'll let her fill in the gaps if she returns to the show next week and if she's in a healthy way. I hope she gets better, obviously. Yeah, no, we—


BJ MENDELSON. I'm always happy to come back though.


GRAHAM CLULEY. Well, this could be your audition piece, Peter. Maybe we don't need Carole anymore. You know, maybe we don't.


BJ MENDELSON. Well, I mean, Stupid Sexy Privacy is only 24 episodes, so there's always room in schedule.


GRAHAM CLULEY. You're a pro, so you've already plugged your own endeavor. Tell us more.


BJ MENDELSON. Stupid Sexy Privacy. So the Simpsons joke, Stupid Sexy Flanders, because I know my audience well, right? And I know that they will get and appreciate the Simpsons reference.


GRAHAM CLULEY. So, and what is Stupid Sexy Privacy? Privacy or privacy about?


BJ MENDELSON. Yeah, we just wanted to make this stuff as simple as possible. So for example, why you should use a YubiKey and where to get one. These are things that, you know, people listening to the show— if you don't have a YubiKey, I'd be shocked, right? Or some kind of hardware authentication token. But there is a severe knowledge gap, particularly in the United States, about securing your data and how to protect it and how to keep private. So we wanted to make it as stupid and as simple as possible so that anybody listening could do it. Including me.


GRAHAM CLULEY. Well, I'm stupid and simple and I've been enjoying the episodes which I've listened to. So it's working in that regard. But before we kick off, let's thank this week's sponsors, Bitwarden, ManageEngine, and Digicert. Their support helps us give you folks the show for free. Now, coming up on today's show, this is the bit Carole normally does. Coming up on today's show, Graham, what have you got? Oh, thank you for asking, Kroll. I'm going to be talking about a police raid which could have gone very wrong.


BJ MENDELSON. Every police raid.


GRAHAM CLULEY. BJ, what are you going to talk to us about?


BJ MENDELSON. I'm going to talk about a company getting hoisted on its own petard.


GRAHAM CLULEY. Well, all this and much more coming up on this episode of Smashing Security. Now, chums, Chums. Let me tell you a story. Let me tell you a story about the police, police in America.


BJ MENDELSON. Oh, I really don't where this is going.


GRAHAM CLULEY. Well, because it's in America.


BJ MENDELSON. You said police in America immediately a warning light started flashing over my head.


GRAHAM CLULEY. Police in many countries do get a bit of a bad— I mean, are there— I'm sure there are nice police people out there.


BJ MENDELSON. Yeah.


GRAHAM CLULEY. You know, there's a lot of bad stuff out there as well, isn't there?


BJ MENDELSON. Unfortunately, I look at, you know, my dad was a teacher for about 40 years and, you know, there are terrific teachers and then there are god-awful teachers that you will hate for the rest of your life. And being a police officer, it sort of has that dichotomy. Just here in the United States, there seem to be more on the bad side than the good side.


GRAHAM CLULEY. Well, this is not a story about police being awful. This is a story about how police in Southern California last September arrested more than 600 suspected sex offenders.


BJ MENDELSON. Wow.


GRAHAM CLULEY. Yeah, it was one of the largest raids there'd been in years. It involved over 64 agencies, an operation called Protect the Innocent, and it was specifically targeting people who were involved in possession, distribution, creation of child sexual abuse material. So obviously we want those bad guys rounded up. Right.


BJ MENDELSON. Let me ask you though, could they have come up with a better name?


GRAHAM CLULEY. Right?


BJ MENDELSON. Because this sounds like an issue of Batman more than it does a serious police matter where 600 people were arrested. You know, Protect the Innocent. Okay. I think I saw that in theaters? What phase of the Marvel Cinematic Universe is that?


GRAHAM CLULEY. Well, it could be something like that, couldn't it? Yes, it could be Avengers Protect the Innocent, or yes, that's right. It was— I know. I mean, it must be difficult for the police to come up with new code names all the time for their operations. I don't know how they— I mean, we have a hard enough time naming our hurricanes, don't we?


BJ MENDELSON. Yeah, that's right. Well, we're running out of names in the English dictionary for them.


GRAHAM CLULEY. Anyway, it must be complicated to manage and coordinate a multi-agency raid involving 64 agencies. Can you imagine the Zoom calls? It's hard enough, as we found today, getting 3 people to show up for the podcast, let alone people from different law enforcement agencies and police departments, getting everyone lined up.

And this is what we're going to do, and this is when we're going to knock on the door, and, you know, make sure that we all do it at the right time and we've got all the information we need. So it's no surprise that the authorities like to use tech, they like to use technology to share information before a raid and helps coordinate.


BJ MENDELSON. I have to say though, that there is a non-zero chance that someone joined that Zoom call in their pyjamas. Right? Or at least from the bed.


GRAHAM CLULEY. I like to think that policemen actually wear police pyjamas as well.


BJ MENDELSON. Yes, yes. Yo, Paw Patrol is huge with the kids. So I could easily see some Paw Patrol wearing officers that joined the Zoom call.


GRAHAM CLULEY. So according to the journalists at Wired magazine, the LA police did use technology. They used an app. In fact, they used— I don't quite understand this. They used a free trial of an app.

Were they not prepared to pay the $0.99 in the App Store? I don't know. But anyway, they used a free trial of an app called Sweep Wizard. So yes, there are wizards. And sorry, not— well, obviously there are wizards. There are.


BJ MENDELSON. There are. There could be wizards involved. They're notoriously slow, though.


GRAHAM CLULEY. There are apps out there which help you, or at least help the police, organize raids to round up the bad guys, right? So there's obviously a market. I doubt they sell for 99 cents, but well, maybe. Maybe you have to buy a subscription.

I don't know. Depending on how many agencies are involved. Anyway, the raids last September were a big success.

They arrested hundreds of people. Including over 100 for possession, distribution, and manufacture of child sexual abuse material.

They contacted over 500 targets. You know, there was a lot which they did with this.

And so, you know, that's all good news, right? These people have been rounded up.

They're going to be questioned. Hopefully, if they're guilty, they'll be brought to justice, blah, blah, blah, blah, blah.


BJ MENDELSON. Let me ask you real quick. So 99 cents in the App Store for the premium version of Sweep Wizard. Do they do the arrests for them?


GRAHAM CLULEY. That's right. Maybe you have to— maybe it's downloadable content.

Maybe it's an add-on if you want that to happen as well. I'm not sure.

That's maybe when the real wizards actually get involved with Sweep Wizard.


BJ MENDELSON. Exactly.


GRAHAM CLULEY. So what the cops didn't know, however, was that this Sweep Wizard app, which they were trying out and they'd been relying upon, wasn't perhaps quite as good as they might have hoped.


BJ MENDELSON. Oh no.


GRAHAM CLULEY. Because it was leaking confidential information about the raid to anybody on the internet. No password required.

All you had to do to find out information about the raid was simply visit a specific URL on the Sweep Wizard website. It didn't authenticate.

It didn't ask for a password. Nothing at all.

Oh, wow.


BJ MENDELSON. I just, I, you know, I wish that there was a video component just so you could see the lack of surprise on my face.


GRAHAM CLULEY. Well, maybe we'll tweet one later. We'll get a screengrab of you looking shocked.


BJ MENDELSON. Oh, jeez.


GRAHAM CLULEY. So if you went to one of these URLs, you could find out private information about the suspects, as well as sensitive details that maybe in the wrong hands could tip off the suspects as to when exactly their house was going to be raided. And also it would obviously cast suspicion on people who hadn't yet been convicted of anything, because anyone could go there and say, oh, Bob down the road, he's obviously a wrong'un, because he's been rounded up by the cops.

So the Sweep Wizard app is built by a company called, unpretentiously, Odin Intelligence.


BJ MENDELSON. Now wait, isn't Odin the name of the security agency that's a rival to ISIS in that cartoon Archer?


GRAHAM CLULEY. Oh, I've never seen Archer.


BJ MENDELSON. Oh, okay. Archer is terrific, but I could swear Odin is the name of the inept security company that they're always competing with.

That's kind of perfect here.


GRAHAM CLULEY. Oh, so it's an incompetent organization, is it, in Archer? I didn't know.

It is. Okay, I'm gonna have to watch it.

Now, Sweep Wizard didn't just leak information about the Protect the Innocent raid, which happened last September. It had also been leaking confidential details from about 200 other raids that dozens of departments have organized over multiple years.

If you went to these URLs, you could find out details about the police officers, hundreds of them, thousands of suspects, the locations of suspects' homes, the time and location of raids, their contact information, sometimes even the suspects' Social Security numbers. So as if someone wasn't having a bad enough day that they were being raided by the cops, you could also defraud them in other ways.


BJ MENDELSON. That's right.


GRAHAM CLULEY. Maybe they deserved it. Maybe they're guilty.

But we don't know that yet, right? We have to assume that they're innocent.


BJ MENDELSON. That's always the case.


GRAHAM CLULEY. Yeah, right. So in all, it looks like it exposed over 5,700 suspects. In some instances, it included their height, their weight, their eye color, and even whether they were homeless or not.


BJ MENDELSON. Let me ask you real quick. So the information that's in the app, right? So this information is from, I'm assuming, across all 64 agencies. So we would think, right, that they were pretty sure on who they were targeting in this, we think.


GRAHAM CLULEY. I suppose so. But I think it's anyone who they just wanted to bring in for questioning. I'm sure some of them, they were pretty certain these are people who we've got lots of evidence on, but others may simply have been, well, we think he seems to be associated with these guys.

Maybe we should bring him in and have a little bit of a chat and see if there's more to come. But all of this information wasn't being protected.

It was being understandably exchanged with the other agencies. It was just sitting on a cloud drive somewhere.


BJ MENDELSON. That's right.

Did you ever see Zero Dark Thirty?


GRAHAM CLULEY. Oh yeah, yeah, yeah, yeah.


BJ MENDELSON. So, and basically there's paperwork that got lost for 15 years or whatever and they just fished it out and they're like, oh, that's where Bin Laden's been this whole time. That sort of reminds me of this, right? Where it's well, I guess there's 5,700 suspects. We're not really sure, but you know, maybe.


GRAHAM CLULEY. And all of this was because of simple misconfiguration in the app. So the app, it appears, wasn't properly testing whether the users were authenticated or not.

There was no authentication check, which meant that anyone could go to this URL and find all this information. Now, the police knew nothing about this problem until Wired magazine contacted them.

And obviously the cops said they were concerned about this revelation. And they said specifically, "We don't want people to know when and if we're coming to get them." Which is—


BJ MENDELSON. That kind of defeats the purpose of police sirens, does it? Sure.


GRAHAM CLULEY. Well, I don't know. Well, BJ, I don't know if you've ever been the subject of a surprise raid.


BJ MENDELSON. Oh, not yet.


GRAHAM CLULEY. I suspect it may happen any moment now. You may get swatted while you're on the podcast.

But I suspect they aren't playing the sirens if they're trying to actually catch you. Maybe if they're in a car chase, they would.


BJ MENDELSON. You're giving the LAPD too much credit.


GRAHAM CLULEY. Am I? Well, they have since suspended the use of the app, so they're no longer using Sweep Wizard.

You know, I don't think they are primarily to blame for this. I think the people we should be complaining about are Odin Intelligence, who appear to be as incompetent as their fictional existence on Archer.

So they declined to be interviewed by Wired, but they said in a statement, and this reassured me a great deal actually when they said this, I thought, oh, well, that's fair enough then. They said that they take security very seriously, unquote.

And I thought, oh, finally, a company which says they take security very seriously. That's all right then. That's all fixed.

They also said that they'd been unable to reproduce the problem. Which Wired had reported on.

But of course, their website's no longer accessible. Their app has been removed from the Google Play Store and the Apple App Store.

And it actually turns out that Odin Intelligence have got other problems because just a day or two after this Wired story came out, its website was defaced with some rather abusive ASCII art. So some hackers got in.

And they said that all cybercops are bastards. That's a bit mean of them, I think.

But obviously, Odin Intelligence aren't being that smart when it comes to their own security.


BJ MENDELSON. Well, I mean, you know, it's funny because Odin is supposed to be the one that sees everything.


GRAHAM CLULEY. Right.


BJ MENDELSON. Right. So they should have seen this coming.


GRAHAM CLULEY. Is Anthony Hopkins Odin in those Thor movies?


BJ MENDELSON. Oh, yes. Yes, he is.


GRAHAM CLULEY. He's Odin, right? Well, there you are. Anthony Hopkins. Oh, Anthony Hopkins. Lovely.


BJ MENDELSON. I just have to say, Anthony Hopkins seems to be at the stage of his career where he'll do anything for money.


GRAHAM CLULEY. Totally.


BJ MENDELSON. So I feel he could have easily reassured everybody in this story by speaking with Wired and saying, "Oh yeah, we take this very seriously." Because who's going to question Anthony Hopkins?


GRAHAM CLULEY. That's a good point, actually. They could have got him on the answering machine to say, "Oh, don't you worry about here, boyo." That's meant to be a Welsh accent. I know he's American now, but never mind.


BJ MENDELSON. The Welsh accent is notoriously hard.


GRAHAM CLULEY. It is difficult.


BJ MENDELSON. It's beautiful, but it's notoriously hard to reproduce.


GRAHAM CLULEY. It's a very dangerous path to tread, can I tell you.


BJ MENDELSON. I don't know if I told this story before because it's been a while since I've been on the show, but I remember my first time going to United Kingdom and passing through Heathrow, and I was going to Wales and I had to explain to the customs and immigration person that I had no idea what these letters meant because it was all in Welsh with the Welsh spelling and the Welsh lettering.


GRAHAM CLULEY. Oh, yeah. Lots of double Ls and Es everywhere, yes. And so he just looks at me and goes, "You're going to Wales?" I'm like, "Yes," he's like, "All right, you're fine, go ahead." BJ, what story have you got for us this week?


BJ MENDELSON. Yes, so this requires some time travel to go back. I don't know if they were big in the UK, but in the early 2000s and even the early '10s, I guess is what we're calling the previous decade, there was a company called LifeLock.


GRAHAM CLULEY. Yes.


BJ MENDELSON. And the gentleman who ran LifeLock would drive across America with his Social Security number on the side of a truck, and then they would make these ridiculous claims, "Oh yeah, you know, I've never been the victim of identity theft." And of course it turns out that he's had his identity stolen 13 times. So that's the company that we're revisiting in today's story, except in that time, I guess through a complicated series of purchases and ownership changes, it's now called Norton LifeLock. Yeah, and so Norton, for reasons known only to them and God, if you choose to believe that God exists, they have decided to continue offering this LifeLock software. And so there was a pretty serious security breach that just went down.

We still don't know how big and how complicated this is. It's sort of the LastPass thing, where they did their best to kind of obscure how bad the situation was. But what was funny to me about this story is that the same service they sell to, you know, promoting and enabling two-factor authentication is the same service that could have stopped this attack in the first place, right? There was a credential stuffing attack. You know, people were basically just copying and pasting information that had been previously leaked, and Norton LifeLock, wouldn't you know it, were not exercising good security hygiene, and using strong passwords. And so someone had reused the password that had been previously leaked, and all hell broke loose. And so now they are dealing with the situation. And here's the kicker to it, the solution that the company is offering, you'll never guess what it is.


GRAHAM CLULEY. What are they offering?


BJ MENDELSON. It's to use their service.


GRAHAM CLULEY. Ah, right. Yes.


BJ MENDELSON. You know, the reason why I picked this story is because the thing I keep hearing, and I'd love to hear your take on this, the thing I keep hearing consistently from security professionals is that 90% of these hacks and data breaches, if it's not caused by a pissed-off employee, it's usually because of poor security hygiene, right? It's usually reusing passwords.


GRAHAM CLULEY. Yeah, it's normally either a dumb password choice or more commonly password reuse. And that seems to be what happened in the Norton LifeLock situation is that, as you said, a whole bunch of usernames and passwords were stolen from who knows where.

Some other site, not from Norton LifeLock, and then they were used to try and unlock accounts at Norton LifeLock. And for those users who hadn't enabled multifactor authentication, obviously those credentials were enough to get them in.

So my question is, why wasn't Norton LifeLock enabling two-factor authentication by default? Right, surely that would have— if Norton LifeLock is storing really sensitive information, including people's passwords, then you need an additional level of protection than just a dumb password to protect that account.


BJ MENDELSON. I'm convinced that most of these companies— and this is a great advertisement for Bitwarden and some of the other, they're pretty good, they've got a good reputation. Yeah, but then I look at something like Norton, who should know better, right, and has been around forever I'm convinced that it's just at this point they're cashing checks and they're not really taking this stuff seriously.


GRAHAM CLULEY. Yeah. I mean, the thing is with the Norton name, Norton has been around for 30-odd years.

You know, in different forms. But of course, it's no longer Peter Norton with his crossed arms who's running the company.

That brand name has been sold on and on and on from different companies and different organizations. And it's now part of this big security conglomerate, the overarching parent company is called GenDigital, and they also own Avast and Avira, I think, and CCleaner as well as Norton.

You know, there may be some very smart people working there, but there's probably resistance from inside maybe the product team or the marketing team saying, well, yes, of course it would make sense to make two-factor authentication mandatory. But it's going to really piss off our customers because it's going to be a nuisance.

They're going to say, oh, well, why do I have to type this 6-digit number in? Or why do I have to do this?

It's suddenly become more difficult to use. And there's always that battle, isn't there, between ease of use and security.

And it feels like in this case, the people arguing for it should be easier won to the detriment of securing those accounts.


BJ MENDELSON. Absolutely. To me, it's just sort of mind-boggling too, because this is the thing you sell.

Right? This is the service you sell and for you to not be using it tells me not to use your product.

I can't think of a more clear, this is true of any tech company, right? If they're not using their own product in-house, you should avoid them.


GRAHAM CLULEY. Yeah. I mean, I don't, I'm probably not feeling quite as, I don't want to beat them up quite as much as maybe you do on this.

I mean, I think this isn't as catastrophic as what we saw at LastPass.


BJ MENDELSON. Yes, that's right.


GRAHAM CLULEY. Where they were breached and there was design issues in how LastPass had done it. And maybe they were warned years ago about some of the problems which they experienced.

In the case of Norton LifeLock, it does feel like maybe they could have gone a few extra steps to better protect their customer base from what was, as you said, a credential stuffing attack. There was someone else who got hacked, not them, which led to this happening.

Yes. And these are credentials being flung at their logging pages, but they could have done rate limiting, they could have looked for suspicious behavior.

You know, when you're protecting passwords, you've really got to go the extra mile, I think.


BJ MENDELSON. Absolutely. And you know, the reason why Stupid Sexy Privacy exists in the first place is that people don't want to think about this stuff.

They just want to know that they're secure. And so it's to me partly the responsibility of these companies to take that extra step for people because I think that privacy and security is complicated.

Right? And so if I'm paying for a solution like Norton LifeLock, then my expectation is that you're going to kind of take that complexity out of my life and into yours.

And so I'm always disappointed because I just feel like, you know, until we get to the point where my generation and younger are taking privacy and security a bit more seriously than we do, that extra layer of protection just needs to come from the companies. And clearly in this case, it wasn't there.


GRAHAM CLULEY. Yep, afraid not. Dear, oh dear. So there's probably a lot of Smashing Security listeners out there who might be concerned after hearing about the data breach which recently occurred at LastPass.

Now, that allowed hackers to steal customers' password vaults, and unfortunately there were parts of those password vaults which were astonishingly unencrypted. There's no doubt a lot of questions users are going to ask LastPass about how that could have happened and why some of that data was left in that insecure state.

But one password manager that isn't making that mistake is our sponsor Bitwarden. Customers of Bitwarden know that their vaults are entirely end-to-end encrypted with zero-knowledge encryption, including, unlike LastPass, the URLs for the websites which you have saved passwords for.

You can learn more about that in the Bitwarden Help Center and at bitwarden.com/privacy. And if you happen to be looking to switch password managers right now, well, Bitwarden makes it easy.

They support importing from lots of other solutions, and there's even a LastPass migration guide available. Learn more at bitwarden.com/migrate.

That's bitwarden.com/migrate. And stay safe.

You've probably heard that organizations are experiencing increased pressure to manage digital trust at scale across multiple functions in IT. The problem is many have a lack of centralized visibility and control, and this is why companies are looking for a unified digital trust strategy.

Enter DigiCert Trust Lifecycle Manager. The Trust Lifecycle Manager from DigiCert sets a new bar for unified management of digital trust.

DigiCert Trust Lifecycle Manager is a full-stack solution that unifies CA-agnostic certificate management, private PKI services, and public trust issuance for seamless digital trust infrastructure. Find out how you can implement a full-stack solution in a single pane of glass that offers superior performance, handling, and automation with a single vendor accountability.

All you gotta do is visit smashingsecurity.com/digicert. That's smashingsecurity.com/digicert.

And thanks to DigiCert for sponsoring the show. Hacks are happening all the time.

Databases are being breached. And as we know, 80% of all breaches happen when passwords are compromised, stolen, or abused.

An efficient way to combat threats is using a Privileged Access Management solution, or PAM. An enterprise PAM tool like ManageEngine PAM360 offers a holistic picture of all the privileged devices, users, and credentials in your IT infrastructure.

ManageEngine comes from Zoho, which offers IT management solutions to over 280,000 enterprises around the world, so you're in safe hands. Well, ManageEngine PAM360, fully functional privileged access management suite, easy to adopt and implement.

From managing and governing access to all your enterprise resources to automating the access management lifecycle in your organization, PAM360 does it all. And they offer great support for businesses looking to do this without making a dent in your IT budget.

Learn more for yourself about ManageEngine PAM360 at smashingsecurity.com/pam360. That's smashingsecurity.com/pam360.

And welcome back. Can you join us on our favorite part of the show?

The part of the show that we like to call Pick of the Week.


BJ MENDELSON. Pick of the Week.


GRAHAM CLULEY. Good man.


BJ MENDELSON. I remember. It's been a few years.


GRAHAM CLULEY. It's been 3 years, but you remember you have to say Pick of the Week.


BJ MENDELSON. Pick of the Week.


GRAHAM CLULEY. Pick of the Week is the part of the show where everyone chooses something, could be a funny story, a book that they read, a TV show, a movie, record a podcast, a website, or an app, whatever they wish. It doesn't have to be security-related necessarily.


BJ MENDELSON. Oh boy, they could be.


GRAHAM CLULEY. Oh, Crowe, get better. You may have heard that a chap called Elon Musk is busy breaking Twitter. His most recent—


BJ MENDELSON. Oh, I don't even know where to start with this one.


GRAHAM CLULEY. His most recent crazy decision is to start blocking the third-party apps which actually make Twitter usable. Things like Twitterific and Tweetbot and all of those things. He wants you to use the official Twitter app because that is festooned with ads and its algorithm keeps on recommending that you follow vaccine deniers and conspiracy theorists.


BJ MENDELSON. Far-right politicians. If you like Nazis, Twitter is for you.


GRAHAM CLULEY. Yeah, it's such a turnaround because Twitter used to be such a— well, it was never a lovely place. There were plenty of arguments going on. But it was seen as sort of the liberal social media place.


BJ MENDELSON. You know, it reminds me a lot of if Elon Musk purchased hell, right? And then walked in and said, this is fine, but how can I make it worse?


GRAHAM CLULEY. Well, he is making it worse because he's blocking all these third-party apps. I can understand for a moment his very simplistic thinking on this. He's thinking the more people I get to use the official app, the more people will eyeball the ads which we're making money from.


BJ MENDELSON. Yes.


GRAHAM CLULEY. The problem is that Twitter isn't just about the technology. Twitter is actually about people and content producers, people who are actually posting interesting things. And the biggest users of Twitter are, I would suspect, people who aren't using the official Twitter app. Yes, that's right. They've gone to the effort of finding a better app to use Twitter. They're making the content which people want to read on Twitter. So stopping all of those people suddenly overnight from accessing Twitter, not a good idea.


BJ MENDELSON. No, you know what's funny too is that I've been using Twitter since 2007, right? I was part of that initial vanguard and there has always been TweetDeck and services that people have preferred to use over the main app. It's funny 'cause I always thought it'd be a matter of time before they clamped down on it. It's just interesting that it had to happen under this guy of all people.


GRAHAM CLULEY. You know what I saw? I saw one person suggest what Elon Musk should have done. I'm sure he listens to the show, so here's a tip from us. What he should have done is this Twitter Blue subscription thing he's trying to get us to pay for, you know, a way of paying $9 a month to prove that we're idiotic enough to care about a blue little badge. If he'd said one of the benefits is you will be able to use third-party apps— Yes. I might have even actually been prepared to sign up. Maybe, maybe.


BJ MENDELSON. I'm not sure.


GRAHAM CLULEY. Maybe, maybe not.


BJ MENDELSON. I could see. So I mean, so I'm torn on the Twitter Blue thing, right? Because I've always had the legacy checkmark since 2013.


GRAHAM CLULEY. Yes.


BJ MENDELSON. So all of the features that he's now making available to people, I was okay, that part is fine, but it— $12 if you're an iOS user because he doesn't want to pay the tax— seems kind of outrageous to me. You know, the other thing is that— and I'm just putting my marketing hat on for a second— you know, Twitter ads have always been terrible. I can think of maybe one or two instances since 2007 where I can point to and say, wow, that did really well, that was a Twitter ad campaign. But now not only are you putting money into a service that doesn't really perform well, but you're now actively saying I support Nazis by running ads. So even if Twitter Blue allowed you that third-party access, I would still be a little hesitant to give this guy my money, you know?


GRAHAM CLULEY. Anyway, I know that Carole will be listening to this and she'll be very frustrated that I've hijacked the Pick of the Week section to talk about Twitter. The reason why my Pick of the Week is not Elon Musk being an idiot, my Pick of the Week is an app called Spring.

Spring is a highly customizable Twitter app, third party, which is available for iPhone, iPad, and the Apple Mac, and it hasn't been shut down yet.


BJ MENDELSON. Interesting.


GRAHAM CLULEY. And I have to say, I really like it. You don't get the ads, you don't get the promoted posts, you don't get the ghastliness of recommendations as to who to follow, which you really don't want.

But this app is like, oh, if only the official Twitter app were like this, it's really good. And they've also produced one for Mastodon as well, so that's in beta at the moment.

So I'm on Mastodon. I'm a big fan. I like Mastodon. I like the idea of it, and it's working well.


BJ MENDELSON. I think the biggest issue with Mastodon is not telling people, just pointing them right to mastodon.social. I feel like that would have solved 90% of the onboarding problems for them. But yeah, I've enjoyed it so far. Do you like it?


GRAHAM CLULEY. Yeah.


BJ MENDELSON. How long have you been made, the switch over?


GRAHAM CLULEY. Oh, I switched over a few years ago.


BJ MENDELSON. Oh, okay. Yeah.


GRAHAM CLULEY. So maybe — but I wasn't using it much because there was no one up there. Now that's all changed in the last few months.

And I have switched occasionally from instance to instance because, you know, frankly, the one I was on just got so clogged down and slow when there was this huge migration of people to Mastodon from Twitter when Elon Musk took over Twitter. So I have changed from time to time, but now I'm more active on Mastodon than I am on Twitter, and I find it more interesting and more useful and just a nicer conversation.


BJ MENDELSON. It's so much more calmer than Twitter. Because I feel like at any second on Twitter, there's someone waiting to take what you said out of context to make some obtuse point.

And Mastodon, so far anyway, I feel like if I post something, I get much more thoughtful responses.


GRAHAM CLULEY. Yeah, absolutely.


BJ MENDELSON. That's been nice.


GRAHAM CLULEY. And I've got far, far fewer followers on Mastodon than I'd have on Twitter, but I get more engagement on Mastodon. Isn't that interesting?


BJ MENDELSON. Yes. Well, I mean, Twitter's always been filled with bots.

I mean, it's been filled with bots since at least 2009 with the whole Ashton Kutcher Oprah thing, for people that remember. But yeah, so far Mastodon, it doesn't seem to have that problem yet.


GRAHAM CLULEY. Not yet. I'm sure it will come as it grows in popularity.

Anyway, my pick of the week is the Spring app for iOS and Apple Mac. If you do become a customer of Spring, so I paid them, I don't know, $9 or whatever it was, then you can also get an early access to Mona, their app for Mastodon, which looks identical, works brilliantly so far.

So I'm really impressed, and that is my pick of the week. So BJ, what's your pick of the week?


BJ MENDELSON. Well, I tend to watch bad television.


GRAHAM CLULEY. Okay.


BJ MENDELSON. And the reason why is simply just to escape the hell world that we live in today. And so I was pleasantly surprised by Tulsa King.

It's this goofy little gangster show with Sylvester Stallone, and anything with him when he's not punching people in the face tends to be bad, right? You can track good Sylvester Stallone content based on how often he punches someone in the face.


GRAHAM CLULEY. Are you telling me Sylvester Stallone doesn't punch anyone in the face in Tulsa King?


BJ MENDELSON. Oh, he does, and it's wonderful.


GRAHAM CLULEY. Okay, I see.


BJ MENDELSON. All right, okay. That's how you know it's good because if you—


GRAHAM CLULEY. Oh, the good ones are the ones where he punches people.


BJ MENDELSON. Yeah, yes, exactly.


GRAHAM CLULEY. Okay, I understand, right.


BJ MENDELSON. That's the barometer. So if you watch something with Sylvester Stallone, if he does not punch someone in the first 10, 15 minutes, you can turn it off.

In this, he knocks someone right down in the first episode. It's terrific. So you know you're in for a good time.

And so, you know, I'm always looking for these little escapes. The juxtaposition of the American West with this old-school gangster who looks like he rolled out of a 1980s mobster flick is just terrific.


GRAHAM CLULEY. So explain to me the premise of Tulsa King, because I've never heard of this before. What's it about?


BJ MENDELSON. So Sylvester Stallone's a mobster who just served almost 30 years in prison, and he's released. And when he comes out, the mob that he was a part of is completely different.

They don't know what to do with him. So basically on a lark, just to get rid of him, they're like, "Why don't you go out to Tulsa?"

It's like, "What? So Oklahoma?" And so he goes and you have this character who does not belong there, is right out of Brooklyn in the 1980s interacting with the things you would come to expect with Oklahoma. And just the juxtaposition of it is very funny, it's very entertaining, and the characters are terrific.

Gilfoyle from— what was that called on HBO? Oh, Silicon Valley.

He's also in there and there's actually a really nice tie all back together to the show. In the season finale, he makes a reference to most hacks occur because of poor security hygiene.

And I thought that was really nice and really great to hear in a TV show because it's just a really smart observation about security in general. But I can't say enough good things about it.

If you're looking for a little bit of an escape, if you don't have access to it, use a VPN to access. I don't know what the global restrictions are, which to me is stupid.

This is one planet, let's all enjoy our content together. But if you can't access it, please use a VPN to go and check it out.


GRAHAM CLULEY. Terrific. Well, that just about wraps up the show for this week.

BJ, thank you very much for being our Carole Theriault clone under these unusual circumstances. Hopefully Carole will be back next week, but really appreciate you stepping in.

It's terrific. I'm sure lots of our listeners would love to hear more about Stupid Sexy Privacy, your podcast, and the other things which you're up to, what's the best way for folks to do that?


BJ MENDELSON. Oh, just visiting stupidsexyprivacy.com. It's available where all podcasts can be found.

But as you know, podcast discovery is a bit of a pain. So I just send people to Stupid Sexy Privacy.

It's a 24-episode miniseries, which is why we gladly promote Smashing Security throughout the show, because our time on the topic will end with episode before, but we always prefer people come and listen to this show and listen to yourself. But yeah, as I said, it's just we want to make this as simple as possible when it comes to privacy because so much of the discussions on a high intellectual level.

We wanted to bring it down into the dirt, where everyone could enjoy it.


GRAHAM CLULEY. Fantastic. Well, thank you very much for that. And you, if you are a Nazi, you can follow us on Twitter @Smashing Security, no G wouldn't last a— we also have a Mastodon account. The easiest way to find it is go to smashingsecurity.com/mastodon and that'll take you straight there.

And you can also look up the Smashing Security subreddit as well. And don't forget to ensure you never miss another episode.

Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Google Podcasts. Thanks as well to our episode sponsors, Bitwarden, DigiCert, and ManageEngine PAM360.

And to our lovely supporters on Patreon and Apple Podcasts as well. Thanks to them, this show is free.

For episode show notes, sponsorship information, guest lists, and much, much more, check out smashingsecurity.com. Until next time, cheerio, bye-bye, farewell, toodle-oo, pip-pip.


BJ MENDELSON. Pip pip, that's nice. I haven't heard that in forever.


GRAHAM CLULEY. Yeah, we need a bit more of that.

-- TRANSCRIPT ENDS --