Listen early, and ad-free!

325: Rick Astley and the little birdie scam

With , ,

Australia's signal intelligence agency calls upon an Eighties popstar to fight terrorism, and a simple act of kindness leads to a woman being scammed for thousands.

All this and much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Plus - don't miss our featured interview with Max Power of Bitwarden.

Warning: This podcast may contain nuts, adult themes, and rude language.

Episode links:

Sponsored by:

  • Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
  • Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Zero Trust for Okta. Watch a demo today!
  • Centripetal – Centripetal’s CleanINTERNET defends your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale.

SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!

FOLLOW US:

Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.

THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.

Privacy & Opt-Out: https://redcircle.com/privacy

Transcript +

This transcript was generated automatically, and has not been manually verified. It may contain errors and omissions. In particular, speaker labels, proper nouns, and attributions may be incorrect. Treat it as a helpful guide rather than a verbatim record — for the real thing, give the episode a listen.


GRAHAM CLULEY. Presumably the Taliban don't show up at the airport with a little piece of paper saying "Taliban Taxi Service." Presumably they— I don't know. I don't know. I haven't been there.


CAROLE THERIAULT. I think they do get picked up.


GRAHAM CLULEY. Yes, but I'm expecting they're not waiting behind the gate with a sign, are they, saying this is who we are?


CAROLE THERIAULT. With their 15 guns. Yeah, no.


GRAHAM CLULEY. If anyone listening is a member of the Taliban Taxi Service—


CAROLE THERIAULT. Don't get in touch.


UNKNOWN. Smashing Security, Episode 325. Rik Astley, and the Little Birdie Scam with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 325. My name's Graham Cluley.


CAROLE THERIAULT. And I'm Carole Theriault.


GRAHAM CLULEY. Carole, how are you doing this week?


CAROLE THERIAULT. Well, I'm a little freaked out at the moment.


GRAHAM CLULEY. What's wrong? What's wrong?


CAROLE THERIAULT. Well, you probably, I don't know if you've read, but there's a lot of wildfires in Canada, in Quebec, right? This is where I went to school. Yada, yada, yada, 160 wildfires.


GRAHAM CLULEY. In Quebec?


CAROLE THERIAULT. Yeah. So my family who were in Ottawa, which is 100 miles from there, 120 miles, they're noticing total air quality issues. And Canada's seeking international aid because the fires are raging.


GRAHAM CLULEY. I thought Quebec was just covered in snow permanently, but it's actually alight.


CAROLE THERIAULT. No, it's covered in trees and there's not been a lot of water, I guess. But other than that, I'm great. It's just the poor trees, man. Should we get this show on the road? Cheer me up?


GRAHAM CLULEY. Mm-hmm.


CAROLE THERIAULT. First, let's thank this week's wonderful sponsors, Bitwarden, Kolide, and Centripetal. It's their support that helps us give you this show for free. Now, coming up on today's show, Graham, what do you got?


GRAHAM CLULEY. I'm going to be explaining how Rik Astley has been fighting Islamic State.


CAROLE THERIAULT. Okay, and I'm going to talk about how a lady and a bird walk right into a trap. Plus, we have a featured interview with Max Power. Yes, that's his real name, of Bitwarden, who introduces us to Bitwarden's Secrets Manager. All this and much more coming up on this episode of Smashing Security.


GRAHAM CLULEY. Now, Chum Chum, I think I've explained before how I have a bit of a penchant for little old ladies. I think it's come up from time to time.


CAROLE THERIAULT. What, you bend over for them because they're very short? Is that what you're trying to say?


GRAHAM CLULEY. Well, no, no, no, that's not what— No, I just have a fondness. I have a fondness for the elderly lady. I love to hear their stories. I love to hang out with them. I enjoy their company.


CAROLE THERIAULT. You used to want to sleep with Diana Rigg, so.


GRAHAM CLULEY. Well, yeah, you know, not sleep with her so much, Carole.


CAROLE THERIAULT. Just be cuddled.


GRAHAM CLULEY. I just admired her. Through the ages with the help of a time machine, perhaps. But I was reminded of my love for the older lady when I was watching a documentary, a documentary which has come out in Australia called Breaking the Code: Cyber Secrets Revealed.


CAROLE THERIAULT. And you were like, I need to see this.


GRAHAM CLULEY. I need to see this, I thought. I'm interested in this because it's all about Australia's Signals Directorate. Also known as the ASD.


CAROLE THERIAULT. What do they do?


GRAHAM CLULEY. Well, they are a bit like the codebreakers. Well, their origins are like the codebreakers at Bletchley Park. So Bletchley Park in the UK.


CAROLE THERIAULT. Yeah.


GRAHAM CLULEY. As we all know, were cracking the Nazi Enigma machine during World War II. At the same time, the ASD in Australia in some sort of hot garage, the Garage Girls, as they were called, were working round the clock to crack Japanese messages during World War II. And there are these old biddies, lovely ladies, who are telling tales of what they got up to, and it is covered in this programme.

The ASD, rather like Bletchley Park, eventually became GCHQ.


CAROLE THERIAULT. Yeah.


GRAHAM CLULEY. Working on signals intelligence for the UK.


MAX POWER. Mm-hmm.


GRAHAM CLULEY. The ASD from those origins has become an equivalent to that. So, in the decades since, obviously, the ASD has been working a lot on military situations, and since September 11th, of course, it's been very much focused on the fight against terror.

That's been an additional thing for them to worry about, and they've been looking to invent ways to disrupt terrorist activity. And that's what the documentary is all about.

It's all about the ASD and what it gets up to. Now, it doesn't really cover anything super dodgy the ASD might be doing against Australian citizens, or what, you know, it is in some ways.


CAROLE THERIAULT. I'm sure they wouldn't do that.


GRAHAM CLULEY. Well, you know, GCHQ, I'm sure they probably would. I'm sure these intelligence agencies are used to spy covertly on their own population.


CAROLE THERIAULT. Beta testing, Graham. Beta testing.


GRAHAM CLULEY. Well, maybe. Maybe that is.

But that's not what this programme is about. This programme is all about sorting out Johnny Foreigner and keeping an eye on them and any terrorists and any baddies.

And anyone who might cause Australia any trouble.


CAROLE THERIAULT. Right, okay. So they're just a national service.


GRAHAM CLULEY. Exactly, exactly. It does look at ways in which the ASD has tried to trick would-be Taliban fighters away from the battlefield.

So they go through a number of cases which the ASD has worked on over the years, which haven't previously been made public. I found this really interesting, this talk.

It's a 1-hour-long documentary, and I thought I'd just tell you a couple of the stories which happened during this documentary.


CAROLE THERIAULT. Okay, I want to hear, but I'm just wondering right now why they are sharing it with the world. But anyway, crack on.

Let's hear what they say.


GRAHAM CLULEY. Well, it's propaganda, isn't it? It's a PR stunt.


CAROLE THERIAULT. To say what? For whom?


GRAHAM CLULEY. For Australia saying, "We're serious." To say, "Isn't this a wonderful department? And isn't it great how they're fighting terror?

And shouldn't they be able to listen into our end-to-end encrypted messages and telephone calls and everything." That's what it's actually about is, come on, let's not beat around the bush.

It's to present them as really, really good guys who can be trusted.


MAX POWER. Right.


GRAHAM CLULEY. So we're not going to get into that because we've had that discussion many, many times, but I thought it was interesting. Yeah.


CAROLE THERIAULT. Yeah.


GRAHAM CLULEY. Well, you know, we can do non-fun stuff, but that's true. I thought it'd be interesting to see what they've done in these particular situations.

So they talk about Operation Lost Jackal. Now, when I heard about Operation Lost Jackal, I thought, oh, someone's lost his dingo, right?

It's they've lost their dog in the Australian Outback. I think it's quite clever.


CAROLE THERIAULT. It's Operation Kangaroo. You're must be Australia.


GRAHAM CLULEY. Lost moggy, lost cat. Well, who knows what it could be?

But on this particular occasion, what it is is that the ASD, Intelligence Services in Australia, found out that a 24-year-old man who they call Ali for the purposes of the documentary. He had been radicalised online and was travelling to Afghanistan to join the Taliban.


CAROLE THERIAULT. Terrible. Yeah.


GRAHAM CLULEY. And the problem was they only discovered about this chap once he was already in the air on the plane going to Afghanistan.


CAROLE THERIAULT. I've read a lot about some of these cases. It's just terrifying.


MAX POWER. Right.


CAROLE THERIAULT. Yeah. Okay. So they find out about it and they're, oh shit. If only we were spying on our people, we would have known.


GRAHAM CLULEY. Well, maybe, maybe. And maybe it was his family or someone else who reported or realised, oh, hang on, he's not going to Barbados or Mallorca or wherever on holiday. He's going to Afghanistan. We don't know how they found out, but they found out.

And they knew he was going over there and they were worried that he was going over there to get trained up and then he might be sent back to Australia on a terrorist mission or he may even be killed by the Taliban. Who knows what's going to happen to him? And so they don't want that to happen.

And so the ASD operatives, these sort of codebreakers and hackers who work for the Australian services, are trying to find a way to get his mission disrupted so that he won't encounter the Taliban. Presumably, the Taliban don't show up at the airport at Kabul with a little piece of paper saying, "We are the Taliban, Taliban Taxi Service." Presumably, I don't know. I haven't been there.


CAROLE THERIAULT. I think you do get picked up. From the stories I've heard, you do get picked up at the airport. And it's a harrowing mission to get you into the place where you're going to be.


GRAHAM CLULEY. Yes, but I'm expecting they're not waiting behind the gate with a sign, are they, saying, "This is who we are. We're going to pick you up." Yeah, with their 15 guns.


CAROLE THERIAULT. Yeah, no.


GRAHAM CLULEY. If anyone listening is a member of the Taliban taxi service—


CAROLE THERIAULT. Don't get in touch. Crack on, Graham.


GRAHAM CLULEY. All right. So he's already in the air and the ASD are thinking, "What are we going to do?" And they had access to various cultural and language experts. And they decided, what we're gonna do is we know his email address because he's in contact with family members.

So we're going to write an email to Ali. And we're not gonna send it from asd.gov.au or whatever their address is. So they created an email address which appeared Taliban-ish. I don't know if they have their own version of Yahoo or whatever.


CAROLE THERIAULT. I'm just trying to think what would be UK-ish or Canadian-ish?


GRAHAM CLULEY. Some sort of—


CAROLE THERIAULT. They'd have ASCII art of the poutine?


GRAHAM CLULEY. Oh yes, for Canada, yes, possibly. Or you could have a corgi or something for Britain, couldn't you?


CAROLE THERIAULT. Yes, or a crest with a corgi, yeah.


GRAHAM CLULEY. Yes, Her Majesty's internet.


CAROLE THERIAULT. Yeah, okay, interesting.


GRAHAM CLULEY. So they write an email in broken English claiming to be from his Taliban operator and saying to him, "Watch out, matey boy." That's not actually what they say, but it's along the line. If you watch the documentary, you'll get the actual words.


CAROLE THERIAULT. You're paraphrasing.


GRAHAM CLULEY. I'm paraphrasing, exactly. They say, "Watch out, buddy, because your phone number and email address have already been compromised. You need to ditch your phone number and you need to ditch your email address and reply to us telling us what your new phone number and email address are. Because otherwise, intelligence services may work out who you are and what you're up to." That's quite a clever ruse.


CAROLE THERIAULT. I think interesting approach. Okay, so what happens?


GRAHAM CLULEY. What's he do? Well, it took a couple of months. At first he didn't reply, and so they had to keep on sending him more messages.


CAROLE THERIAULT. What?


GRAHAM CLULEY. Couple months? Yeah, apparently. So what do you say?


CAROLE THERIAULT. What's the next message you say? Like, "Okay, so you haven't ditched your phone."


GRAHAM CLULEY. "It's really important." Well, because they could see he was still communicating with people via his email address because he was sending messages back home, "Hey, having a lovely time in Mallorca," or whatever it was. But they knew he wasn't there.


CAROLE THERIAULT. Yeah.


GRAHAM CLULEY. So he was speaking to his family members. They knew he's still there. He hasn't changed his phone number, posting up on Instagram or whatever it is. I think we've got to stop this. And so they kept on sending messages, and they said that they made the language simpler and simpler and more direct, saying, look, you aren't obeying us. This is really important. The Taliban bosses are getting really upset with you.


CAROLE THERIAULT. But presumably he's in with them by then.


GRAHAM CLULEY. Well, this is the thing. He's coming over there with a vague contact, but he wants to impress the leaders so that he can get a good job. He wants to prove his worth. And so the ASD, the Australian officers are sending him messages saying, we're getting really angry with you because we've told you what to do and you haven't done it yet. And eventually he does respond with a new phone number, with a new email address, and they basically put the fear of God into him.

And they said, you've done it, good, but our senior officials are so angry that you haven't been serious enough. You should return to Australia right now. "Get on the next plane out of here, because if you don't, if we see you around the place, you're endangering our mission." Because obviously they're on a very important jihad. And so that's what he did — he got on the plane back.


CAROLE THERIAULT. Interesting. Okay, so they just scared the shit out of him so that he flew home.


GRAHAM CLULEY. That's right. And who knows what the Australian authorities did when he landed back at Brisbane or Perth or wherever it was that he went back to. So that's one of the operations — that was Operation Lost Jackal.

And obviously since then, the situation's got even worse. It's not just the Taliban and things, but there's also Islamic State, or ISIL, who have posed a new challenge to intelligence agencies around the world. ISIL have embraced technology and social media — they're recruiting, they're raising funds, they're spreading the ideology. And there was this military operation, Operation Valley Wolf, which was trying to liberate the city of Mosul from ISIL control.


CAROLE THERIAULT. Valley wolf.


GRAHAM CLULEY. Valley wolf.


CAROLE THERIAULT. I have to look that up and see if that's actually—


GRAHAM CLULEY. An actual type of animal?


CAROLE THERIAULT. Yeah, yeah, it is. It is.


GRAHAM CLULEY. Right, there you go. It must be so much fun to be in the department which comes up with the names of stuff.


CAROLE THERIAULT. They're 5 to 7 feet tall. So big wolves. What?


GRAHAM CLULEY. 7 feet tall? Well, I don't know. Are they standing on their back legs?


CAROLE THERIAULT. Tall at the shoulders. And yeah.


GRAHAM CLULEY. They are 7 feet tall at the shoulders.


CAROLE THERIAULT. Hold the phone. I'm just reading the internet, which is full of crap, right? So give me a second. I know nothing about this, ladies and gentlemen.


GRAHAM CLULEY. Are you on Wolfopedia at the moment?


CAROLE THERIAULT. The McKenzie Valley wolf has a specialized body that has made it one of the world's most efficient hunters. It measures 32 to 40 inches tall at the shoulders and has a length of 1.5 to 2.1 meters, 5 to 7 feet long. Okay, still freaking big.


GRAHAM CLULEY. Well, yeah, it's big.


CAROLE THERIAULT. That's as big as my husband. I'm just saying it's big.


GRAHAM CLULEY. And probably not quite as hairy, I would expect. So, the ASD, the cyber operatives, let's face it, they're basically hackers, right?

They're hackers who are working for the government. And they are supporting the military operation on the ground in Iraq, and they're supporting Operation Valley Wolf.

And they're sometimes camping overnight in their basement office so that they can be available whenever required to help the military operation. And they're working with the NSA in the United States.

They're launching cyberattacks at the same time as military maneuvers. And what they found was that ISIL fighters were using apps that were privacy-conscious.

They were hiding their location. So they weren't, you know, they weren't just using a cell phone.

Like WhatsApp?


CAROLE THERIAULT. Okay.


GRAHAM CLULEY. Well, they were using something called ShoreSpots, Wickr.


CAROLE THERIAULT. Right, I've heard of that.


GRAHAM CLULEY. Which I know is very popular with drug dealers. I was about to say, I know it's very popular with drug dealers.

Interesting to see. I've heard of it.


CAROLE THERIAULT. Not 'cause I'm a drug lord, Graham.


MAX POWER. Jesus.


GRAHAM CLULEY. And Telegram, amongst others. So, and they're thinking, "Oh, crumbs, you know, all these bloody ISIL soldiers are using all these different apps.

How are we going to crack all of them?" And they're all encrypted.


CAROLE THERIAULT. Yeah, yeah.


GRAHAM CLULEY. Yeah, and they thought, "Well, hang on, hang on. We don't have to crack all of these apps.

We don't have to find vulnerabilities in all of these." What we can do instead is target the way that any app works on a smartphone.

And all of these apps require internet access. So all we have to do— I say all we have to do, but all we have to do as an ASD hacker, someone working for the Australian authorities, is devise a way to disable the smartphone and prevent it from accessing the internet.


CAROLE THERIAULT. And so you just ban it from an area. You could just say anything that's in the Taliban regions of power, block, for example.


GRAHAM CLULEY. Oh, what, turn off the internet somehow?


CAROLE THERIAULT. Oh, I suppose. So they can only do it within their jurisdiction, turning off the internet.

So that's what they think they're going to do. They're going to turn off the internet somehow or stop this phone from contacting.

Is that the plan?


GRAHAM CLULEY. We could do that, but then you'd also have data signals as well. And clearly losing all cell coverage in a city when you're trying to take it over yourself could also compromise your own ability to communicate.


CAROLE THERIAULT. 100%.


GRAHAM CLULEY. If you're the coalition forces. So what they did was, it sounds like they came up with some rather crafty zero-click exploits.

So a zero-click exploit is something which you can send to a smartphone—


CAROLE THERIAULT. It's the worst.


GRAHAM CLULEY. Yeah, exactly. It's really bad.

So it doesn't rely upon the Taliban fighter clicking on a link or opening an attachment or doing anything like that. It instantly activates on their phone.

And they came up with a number of attacks. There was, for instance, an attack they wrote called Care Bear.

And Care Bear apparently required some fairly advanced IT sophistication to reverse. It wasn't just a case of turning off and turning on the phone again.


CAROLE THERIAULT. That normally doesn't get rid of malware, just as an FYI.


GRAHAM CLULEY. But anyway. No, no, it doesn't.

But to be honest, most problems are fixed by turning off something and turning it on again, right? So Care Bear was a bit more complicated than that on your smartphone, which meant that you'd have to come out of your bunker as an ISIL warrior and go to ISIL tech support for help, right?

To get them to do something with the phone, which, you know, was going to be beyond—


CAROLE THERIAULT. And you wouldn't even necessarily know it was there. I mean, it was, you know—


GRAHAM CLULEY. Well, your phone was no longer working. That was the thing. So it was quite obvious that your phone could no longer access Wickr and Telegram and all these other things. Your phone is basically just a useless brick.


CAROLE THERIAULT. It becomes a brick. You bring it to the IT guy and he's like, oh, fuck, this is— yeah, this is not— yeah.


GRAHAM CLULEY. And there was another one called Darkwall, which apparently couldn't be easily fixed. It was a really destructive payload, which kind of permanently prevented your phone from working, even if you did go to tech support. So if that was coordinated with an attack being launched at you by coalition forces as an ISIL fighter—


CAROLE THERIAULT. You're talking about this very knowledgeably, I'm feeling really out of my depth here talking about ISIL and— Well, you know, I'm quite an expert.


GRAHAM CLULEY. And there was also, and that's the one I really want to talk to you about, there was an attack called Light Bolt. And what Light Bolt did was it had a fascinating payload. With no user interaction on your smartphone at all, no clicking whatsoever, it would launch a Rickroll payload on the smartphone sent to them by ASD hackers in Canberra. So, the Australians were making ISIL fighters' phones play "Never Gonna Give You Up" by Rik Astley.


CAROLE THERIAULT. So, to mindfuck with them. So, this would play aloud, embarrassing them.


GRAHAM CLULEY. Is that what was the plan? What's the plan? Well, if it was playing, then they couldn't do anything else with their phone.


CAROLE THERIAULT. Well, you can text while it's playing.


GRAHAM CLULEY. Okay, then in which case we'd launch Operation Care Bear or Dark Wall or the other attacks. But one of them was this Light Bolt, which got it to play a Rik Astley song instead. Anyway, it was a really interesting programme, a good documentary.


CAROLE THERIAULT. And should have been your pick of the week, but you didn't want to get told off.


GRAHAM CLULEY. Well, wait until you hear what a great pick of the week I've got, I'll put in a link in the show notes. Now, this was an Australian documentary shown on the ABC. It is geofenced, but I'm sure most of our listeners will know how to get round that.


CAROLE THERIAULT. No, because it's illegal and don't listen to them.


GRAHAM CLULEY. Is it illegal? Is it illegal? Yes. To use a VPN?


CAROLE THERIAULT. Is it? No, it's not legal to use a VPN. It's illegal to access things that are not, you should not access. Mr. Crewel.


GRAHAM CLULEY. Okay, well then make sure nobody click on the link in the show notes when they've set up their VPN to be in Australia and wait for the documentary instead to come out in your territory. Carole, what's your story this week?


CAROLE THERIAULT. My story, Graham, we're kicking off my story with a salute to the kinder humans out there.


GRAHAM CLULEY. Lovely.


CAROLE THERIAULT. I even have written up a completely unscientific questionnaire so that we can gauge our own level of kindness.


GRAHAM CLULEY. Oh, okay. All right.


CAROLE THERIAULT. Okay.


GRAHAM CLULEY. Yeah.


CAROLE THERIAULT. And listeners, why don't you guys play from wherever you are? So a person is walking in front of you, right, on the sidewalk or wherever, and they drop a sweater.


GRAHAM CLULEY. Right.


CAROLE THERIAULT. What do you do?


GRAHAM CLULEY. What do I do, or what would you do?


CAROLE THERIAULT. Yeah, what do you do?


GRAHAM CLULEY. Well, I think I'd say, "Hey, you dropped a sweater." Right? Pick it up, maybe. Maybe gently jog after them.


CAROLE THERIAULT. Would you jog?


GRAHAM CLULEY. Well—


MAX POWER. Would you?


GRAHAM CLULEY. Maybe. Well, how far ahead are they?


CAROLE THERIAULT. Would you actually bend over and pick up someone else's sweater?


GRAHAM CLULEY. Well, maybe with my foot. You know, maybe I could sort of kick it up to hand level, so I wouldn't have to bend over. Kick it up? I don't know. You know, something. Or maybe if you're there with me, I could ask you, "Carole, could you pick that up so I can present it—" Who's the person who's dropped it? Is it Diana Rigg? Who's dropped her sweater?


CAROLE THERIAULT. No, no, it's not Diana Rigg. It's—


GRAHAM CLULEY. Better beep that out. Okay, no one's gonna touch the sweater in that case. If it belongs to them, no one wants to go near it. Who knows what you could catch?


CAROLE THERIAULT. Okay, okay, you see an old man, okay? You see an old man walking through a car park, looking lost. Oh. But he hasn't seen you.


GRAHAM CLULEY. Right. What do you do? Ah, so maybe I shouldn't shout out, "Oi, mister!" Right? Because it could give him a heart attack or something. He hasn't seen me.


CAROLE THERIAULT. You have things to do. You're a busy man, aren't you?


GRAHAM CLULEY. I'm a busy man. If he's looking lost, maybe he's enjoying, you know, just having a look around all the cars. I don't know. I mean, am I really going to be able to help him if he's looking for his car? I'm not sure. I wouldn't know one car from another. I think he's got it under control.


CAROLE THERIAULT. Exactly, exactly. You just— you duck your head down, wouldn't you?


GRAHAM CLULEY. I'll duck my head down. Yeah, I'll do that. Yeah, yeah, yeah, you would.


CAROLE THERIAULT. Totally. Okay, and finally, you go crazy one day and you buy 6 donuts from your local cafe. Okay, they're still warm. Okay, you only need 2, you only want 2, but you couldn't help yourself because it's such a good deal. Good deal. Yeah. You see a homeless person on your way home sitting in front of the co-op asking for change. You have none.


GRAHAM CLULEY. What do you do? The thing is, he might be diabetic. That's the thing. Do I really want to push a donut onto him?


CAROLE THERIAULT. You know, that's a really good answer because I have done that exact thing. And the guy was like, oh man, I wish I could, but my tooth. So the poor fucker had a toothache as well. Oh, oh dear. Okay, last one, last one. You're at work. You have a very big palatial window in front of your desk, and you spot an injured bird outside. What do you do? What floor am I on? I don't know. Irrelevant.


GRAHAM CLULEY. Oh, okay. So it's not that I'm going out onto a ledge or anything?


CAROLE THERIAULT. No, no, no. Sorry. No, no.


GRAHAM CLULEY. Ground level then. Ground level. Okay, okay, okay. So it's a little injured—


CAROLE THERIAULT. I didn't think about that.


GRAHAM CLULEY. Little injured bird out there. Yeah. I'm not sure what I can do. Maybe I could gently pick it up, I could cradle it in my hands and feed it back to healthiness with a little—


CAROLE THERIAULT. You would not dare. Giving it bird food. You wouldn't, you wouldn't, would you?


GRAHAM CLULEY. I love animals, I love them.


CAROLE THERIAULT. You'd go pick up a bird?


GRAHAM CLULEY. Yeah, why not? What kind of, is it like an emu? What kind of bird is it?


CAROLE THERIAULT. Yeah, I didn't mention that, it's an ostrich.


MAX POWER. It's an ostrich.


GRAHAM CLULEY. Oh no, I don't want an ostrich, no. No, no.


CAROLE THERIAULT. Okay, well, look, I think you wouldn't, right? Because I don't think you're as kind as Mumbai's very own Dhwani Mehta. And you're saying, wow, Carole, you said that strangely, her name. But I have it from Yogi. I got Yogi to tell me how to pronounce it.


GRAHAM CLULEY. Our friend Yogi? Yeah, okay.


CAROLE THERIAULT. Yeah, do you want to hear it? Do you want to hear Yogi's, uh—


GRAHAM CLULEY. Oh yeah, yeah, let's have Yogi on the podcast.


CAROLE THERIAULT. Dhwani Mehta. Thanks, Yogi.


GRAHAM CLULEY. Thanks, Yogi. Dhwani Mehta.


CAROLE THERIAULT. So Dhwani Mehta works as a manager at Famous Studios. This is a studio that provides video and dubbing services, that sort of thing. There she was last week, Dhwani's working away and she looks up and she spots an injured bird. But she doesn't know much about birds, she's not a birder, she doesn't have vet skills or anything like that. But she can tell that the animal's in distress and she wants to help.

But how? Well, she's not an idiot, she's not going to hug it to her breast and feed it with pipettes or whatever. She hits the web to find details of the local bird rescue org.


GRAHAM CLULEY. Yes.


CAROLE THERIAULT. And with a few tippy taps, she lands on the bird rescue organization with a toll-free number. She calls and explains the situation. And the responder's waste no time, asks her to send a form.

So they ask her if they can send her a form so that she can register the request by email. So basically saying bird injured, this is the location, this is what I saw, all that stuff. And she needs to pay a nominal fee of 1 rupee, which is just shy of a cent.


GRAHAM CLULEY. Or a pence. Yeah.


CAROLE THERIAULT. And then she waits.


GRAHAM CLULEY. And what are they going to do? Are they going to send round an emergency van or something to pick up the bird?


CAROLE THERIAULT. Yeah, come pick up the bird, bring it to a shelter, nurture it back to health, do whatever they can.


GRAHAM CLULEY. Wonderful.


CAROLE THERIAULT. That's the whole plan, right? So she's waiting there. It's the RSPCA that exists in our country as well.


GRAHAM CLULEY. It's Just Eat or Deliveroo really, isn't it? But for animal welfare. In the opposite direction.


CAROLE THERIAULT. Unless you're a vegetarian. So she's waiting. She's waiting.


GRAHAM CLULEY. And there's the bird still twitching, is it?


CAROLE THERIAULT. Exactly. And sadly, the whole day she waits, no bird rescuers show up to help the poor thing. But then about 4 days later, she's on the train and she gets a message.

Not a note from her mom reminding her to come for dinner that evening and not one from her boss saying she's got a promotion. She gets a text saying that ₹100,000 have been debited from her account.


GRAHAM CLULEY. So when she paid the ₹1— what the fuck?


CAROLE THERIAULT. Yes, when she paid the ₹1, she gave them enough information for them to extract considerably more. But how would that work, right?

So normally the way it worked was they give me your credit card number over the phone, and perhaps in this case it was just put in your card details here on the little form. And we're just going to take ₹1. And this, folks, is when she realizes that she's been duped by an opportunistic con looking for people who want to help distressed little animals.

Feels very niche. It's not actually, it's a toll-free hijacking scam where the scammer gets a phone number that is very similar to a popular toll-free one, perhaps number of the customer support line. And it's a copycat phone number that will have 1 or 2 digits from the official one, or different toll-free prefix, 888 rather than 800, for example, in the States if they were there. And then when the customer types in the wrong number, the call goes to the bad guy.


GRAHAM CLULEY. So that's what she did. She went to a legitimate website which had a legitimate phone number, and she mistyped the number.


CAROLE THERIAULT. I think perhaps what might have happened is when she went to Google and typed in, give me the number for the local sanctuary, what came up was a fake ad or a poisoned ad or a poisoned account. Shame on you, Google. But she's no dumb-dumb.

So this happens to her. She's £1,000 out of pocket and she's no dumb-dumb. She immediately takes action, lodging the complaint online with the cybercrime department. And visits her bank to submit a written complaint right away when it happens.


GRAHAM CLULEY. Hang on, when she contacted the cybercrime department, did they say, "We can take your complaint, but you're gonna have to pay us 1 rupee"? How did she get the number for the cybercrime? That's the—


CAROLE THERIAULT. I know, I saw that when I read this. I was like, "Jeez." So she also contacted the Mumbai Central Government Rail Police, perhaps because she received this when she was on the train. Filed the complaint against the fraudsters for impersonation, cheating, and forgery under the Indian Penal Code.


GRAHAM CLULEY. Feels a bit random to contact the Rail Police just because that's where you were when you— What if she'd received it at the pizza restaurant? Would she go and send a complaint to them?


CAROLE THERIAULT. Yeah. I'm a little worried that perhaps the story is— Because the story is basically quoting a member of the Central Government Rail Police as— They're, yeah. But this officer said, you know, that they've written to the bank to obtain details about the account where the money was transferred, as well as to the cell phone companies. So they're on it.


GRAHAM CLULEY. She hasn't got her money back yet then.


CAROLE THERIAULT. No, no, this is what, remember we talked about this. I think this is what you would call authorized fraud. Oh yes. Right, so it was fraud, but it was instigated by her.


GRAHAM CLULEY. Yeah, she gave the permission.


CAROLE THERIAULT. She handed over the details 'cause she was duped. Yeah, yeah. And not that that's necessarily fair, and not that all banks follow those protocols, but there's a risk there anyway.

So advice for do-gooders like you, Graham, who runs after the Diana Rigg who drops her sweater: yes, be freaking careful when you dial phone numbers. That's the advice from AT&T, right? Really, don't dial the wrong toll-free prefix, don't hit a number twice, don't hit an adjacent number because they're all waiting for you to do that apparently. Jeez. And, right? And you're just trying to do a good thing. You're just like, oh, this poor little animal, I'm gonna go out of my way to do something good.


GRAHAM CLULEY. Do you think the bird was in on it? Do you think it was actually faking that it was hurt?


CAROLE THERIAULT. Smashing Security is brought to you by Centripetal. Centripetal is the global leader in intelligence-powered cybersecurity.

Security, the company operationalizes the world's largest collection of threat intelligence in real time to protect your company from every known cyber threat. Now available as a cloud-based deployment, Centripetal's Clean Internet service is a revolutionary approach to defending your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. The addition of AWS Clean Internet Cloud protects your enterprise whether on-premise, remote or in the cloud, removing the need for a more costly cybersecurity infrastructure.

Learn more about Centripetal's intelligence-powered cybersecurity solutions at smashingsecurity.com/centripetal. That's C-E-N-T-R-I-P-E-T-A-L. And thanks to Centripetal for sponsoring the show.


GRAHAM CLULEY. Now there's some big news from our sponsor Kolide. If you are an Okta user, they can get your entire fleet up to 100% compliant. How do they do that, you're asking yourself?

Well, if a device isn't compliant, the user can't log into your cloud apps until they fix the problem. It's that simple. Kolide patches one of the major holes in zero-trust architecture, which is device compliance.

Without Kolide, IT struggles to solve basic problems like keeping everyone's OS and browser up to date. Unsecured devices are logging into your company's apps because there's nothing there to stop them.

Kolide is the only device trust solution that enforces compliance as part of authentication, and it's built to work seamlessly with Okta. The moment Kolide's agent detects a problem, it alerts the user and gives them instructions on how to fix it.

If they don't fix the problem within a set time, they are blocked. Kolide means fewer support tickets, less frustration, and most importantly, 100% fleet compliance.

Visit kolide.com/smashing to learn more or to book a demo. That's k-o-l-i-d-e.com/smashing.


CAROLE THERIAULT. Smashing Security listeners, did you know that Bitwarden is the only cross-platform password manager that can be used at home, on the go, or at work. Bitwarden's password manager securely stores credentials spanning across personal and business worlds, and every Bitwarden account begins with the creation of a personal vault, which allows you to store all your personal credentials.

These are unique and secure passwords for every single account you access, and it's easy to set up, it's easy to use. I honestly love Bitwarden. I use it at home, use it at work, use it on the go.

Get started with a free trial of a Teams or Enterprise plan at bitwarden.com/smashing, or you can even try it for free across devices as an individual user. Check it out at bitwarden.com/smashing.

And thanks to Bitwarden for sponsoring the show.


GRAHAM CLULEY. And welcome back. Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.


CAROLE THERIAULT. Pick of the Week.


GRAHAM CLULEY. Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security related necessarily.


CAROLE THERIAULT. Better not be.


GRAHAM CLULEY. Well, my pick of the week this week is not security related. It was recommended to me by an avid listener to the podcast. Thank you to Connor G for dropping me a line. Shout out Connor.

About this series of documentaries on Netflix called Connected: The Hidden Science of Everything. Now, Connected, which is hosted by a chap called Latif Nasser, who listeners may know, he's the co-host of Radiolab.


CAROLE THERIAULT. Sorry, I wasn't listening. I was Googling.


GRAHAM CLULEY. You weren't listening? Latif Nasser, I think his name is.


CAROLE THERIAULT. Oh, I don't know his name. That's— okay.


GRAHAM CLULEY. I think he's been the co-host since late last year of Radiolab.


CAROLE THERIAULT. Oh, okay, okay, okay, okay. He's new. Sorry, sorry. I used to listen in the old days.


GRAHAM CLULEY. This show is quite interesting, and it looks at the connections between different things from the world of science. Connor, who recommended this documentary, which I've watched, he called out a couple of episodes. So I watched one all about nukes, nuclear bombs, and obviously nuclear weapons, not necessarily a great thing, right, Carole?


CAROLE THERIAULT. Yeah.


GRAHAM CLULEY. Wrong, Carole. Wrong, Carole. Apparently they're brilliant. Well, not brilliant exactly. Well, there are some benefits. Maybe we should just watch the show.


CAROLE THERIAULT. There are some benefits.


GRAHAM CLULEY. And the benefits are, for instance, how it pertains to the identification of fake art and how nukes have helped in terms of medicine and all these links. And there's another show— Nukes?

Yeah, as in nuclear weapons. Yeah, okay.

And there's another one about excrement. And as Connor says, it's not a shit show, but it's brilliant about apparently, for instance, Thames Water, the testing that's done on the Thames.

It's able to determine which day of the week it is by how much cocaine is present in the water supply. For real?


CAROLE THERIAULT. We're definitely Sunday morning kids.


GRAHAM CLULEY. Anyway, this series of documentaries, they remind me a little bit of a brilliant 1970s BBC TV series hosted by James Burke called Connections. Have you ever seen Connections, Carole?

It was shown in the States on PBS. I'm sure they would have shown it in Canada.


CAROLE THERIAULT. I was a PBS watcher.


GRAHAM CLULEY. Right. And it was all about the different connections, different people, how they were connected, how, for instance, the opening of the Suez Canal directly links to the writing of the musical Aida, and all sorts of things like that.


CAROLE THERIAULT. Anyway— Oh, yes, yes, yes, yes, yes. I recognize his face completely.

You recognize his face? Yeah, I don't know his name, but yeah.


GRAHAM CLULEY. James Burke is still alive. He's right up there with David Attenborough and Carl Sagan as an extraordinary communicator.

But I love that. Anyway, this feels to me like a modern version of Connections, this Connected Netflix TV show.


CAROLE THERIAULT. Do you think it was the name that gave that away, that gave you that idea, or?


GRAHAM CLULEY. Well, I think it's just a rip-off of the name, to be honest. Obviously, I prefer Connections, the 1970s version, more.

But I still think a lot of people will enjoy Connected. You can find it on Netflix, and it is my pick of the week.


CAROLE THERIAULT. Well, I think it sounds very cool because I don't know Latif Nasser, but I do love Radiolab. And last time I was listening, they were repeating old shows.

So I guess he's come on board. So I should go check it out, excellent.


GRAHAM CLULEY. What's your pick of the week this week?


CAROLE THERIAULT. Oh, God, did I go down a wormhole? Okay, so my pick of the week is— okay, surprise, surprise— podcast.

But the topic of the podcast is reality TV. It's a podcast called Unreal: A Critical History of Reality TV.

I shared it with you earlier midweek. Did you have a nose?

I haven't had a listen yet to it, no. Okay, well, it's hosted by two journalists, Pandora Sykes and Siren Kale.

Both have journalistic chops. And also, they declare a love for reality TV from when they were preteens, right?

And they watch Big Brother together. You remember watching the first Big Brother.

We watched that. I think we were all hanging out during that time.


GRAHAM CLULEY. Oh, the first series of Big Brother was quite an event, wasn't it?


CAROLE THERIAULT. Wasn't it? I think people coming into work bleary-eyed, I didn't go to sleep because they would air it all night, didn't they?


GRAHAM CLULEY. First series where people didn't really know what they were doing if they were taking part. It was more of a sort of scientific experiment.

Later, it became all about people going on because they wanted to be famous. But I think the first series, in the UK at least, was really quite interesting.


CAROLE THERIAULT. Yeah, but there's, listening to this show, you realize how many societally cringey moments we sat watching. Right, it's too much to bear.

They talk about one show. This is the one that I thought was just the most— It's called The Swan.

Have you heard of The Swan? Oh.


GRAHAM CLULEY. Is that where they did cosmetic surgery on someone?


CAROLE THERIAULT. Yep, a reality show where an average-looking person would go and get serious surgery, go on extreme diets, you know, change everything, and come out not looking like an ugly duckling, but a swan.


GRAHAM CLULEY. One of my favourite ones was called "There's Something About Harry," I think it was, where they brought over a bunch of American women in their early 20s and they convinced them that this chap who they were meeting was actually Prince Harry, and that Prince Harry was trying to find his bride. This was obviously a while ago before he met Meghan Markle, etc. And so they were all being duped. So gross.


CAROLE THERIAULT. You know, well, it was gross, but also someone made that show. They said, let's just dupe people and film everything because they signed their lives over because they think we're telling them the truth.


GRAHAM CLULEY. Another one, sorry, I'm enjoying this too much. I saw another one where they took a bunch of people and they told them that they were going to put them on a space shuttle flight or the Russian shuttle into orbit. And they went on astronaut training and then they put them on a plane and flew around the UK for a while, landed them and pretended that they were in Russia.

They changed all the signs and everything and made them think that they were going to— Fuck's sake. It is obviously horrendous, but obviously most importantly, it was entertaining. Can't look away.


CAROLE THERIAULT. Yeah, as long as it makes money for somebody. Right. But yeah, so The Swan was pretty gross.

It was 3 months, right? So some of them would go through something like 10 surgeries. Oh, my God, that's horrible.

They weren't allowed to have a family. They would only allow one brief phone call a week. They had to do therapy on TV as part of their contract.

And if you were not open enough with your horror or your trauma, you were out. Points were against you. They would say, "You held back."

And at the end, the swans come out, right? After they do their pageant, there's a queen swan. It's just— anyway, it's just disgusting.

But the worst, the worst thing was a lot of this surgery. You don't go on the show because you're loaded and can afford all this. Because you've got some issues, you know, and you're not good in yourself and you don't have a lot of cash.

But there's things that need maintenance, right? So if you get your lips filled, or you get a lot of Botox or shit like that, you need to go and maintain that stuff. Otherwise, it starts sagging, it doesn't work.

And it's not like these people were being looked after by the show once they got kicked off. Anyway, fuck me. I'm watching it, I'm listening to this podcast going, "How did we let this happen?" I found it mind-blowing.


GRAHAM CLULEY. Which country was this in?


CAROLE THERIAULT. This was in the States. Oh, I kind of guessed. Yeah, but come on, the UK ones are pretty outrageous as well.


GRAHAM CLULEY. It does feel like the UK is just a few years behind.


CAROLE THERIAULT. Love Island, X Factor, Pop Idol, Made in Chelsea. It's quite interesting because they interview creators and producers and contestants, right? And you kind of get this cross of what everyone experienced and why they were doing things.

But anyway, I found it— Basically, Graham, you gleamed at some of these horrible moments, so maybe you should face your reckoning and go listen to it and see if you're embarrassed at what you thought was hilarious not even 15 years ago. Unreal: A Critical History of Reality TV. It's for BBC Radio 4, and I think they did an excellent job. Find it on BBC Sounds or wherever you get your podcasts.


GRAHAM CLULEY. And that is my pick of the week. Excellent. Well, Carole, you've had a busy week. You've been chatting to the chaps at Bitwarden, I believe.


CAROLE THERIAULT. Yes, I spoke with Bitwarden's Max Power, and let's find out exactly how cool this Bitwarden Secrets Manager is. Listen up.

All right, listeners, today we have Max Power, probably the person with the best name I've interviewed on this podcast. He is product lead for Bitwarden's Secret Manager. Hi, Max.


MAX POWER. Thanks for coming on the show. Hi, thanks a lot for having me.


CAROLE THERIAULT. We've been trying to get together to do this for some time now, and I'm so glad we finally pulled it off.


MAX POWER. Absolutely. We had a couple of very busy weeks, didn't we?


CAROLE THERIAULT. Well, the password manager kingpin Bitwarden has a brand new product currently in its beta phase, and Max is going to give us the lowdown. But before we get to that, perhaps, Max, you can tell us a little bit about you and your current role at Bitwarden.


MAX POWER. Absolutely. I'm the product lead for the Secrets Manager. I've been working in various different product roles over the past couple of years, mostly in for open source projects that were somehow related to dev tooling or cybersecurity.

And since about 1.5 years, we are working on the Secrets Manager, which is super exciting because it's a completely new product and a lot of new stuff we need to conceptualize.


CAROLE THERIAULT. I know, and it's got a great name as well. So maybe we should talk about that. So tell me, what is a secret in Bitwarden world?


MAX POWER. A secret can be pretty much anything. So for a lot of people, it may be confusing because a normal password is also a secret.

But for the Secrets Manager, we're particularly talking about developer secrets. So that may be API keys or anything that is development related, such as database credentials and so on.


CAROLE THERIAULT. Right. Let's start with the pain points. So where would a product like this prove to be very useful in your mind? Use cases, maybe.


MAX POWER. So one of the key benefits of a secrets manager is that you're able to share secrets securely with other team members. So let's say, for instance, you are developing a product, you have multiple secrets, you have a Stripe API key, database credentials, and so on.

And in order to operate securely and in order to collaborate securely, you need to share those secrets in some way with your team members. Right.

One of the current ways of doing it is that you set up an env file and share secrets via Slack or other unencrypted channels. And that's definitely not the ideal way of handling things.

So one very common error is that env files are not added to a.gitignore file and they accidentally get published to GitHub, maybe to a private repo, and then that private repo is open sourced later. This has happened in multiple instances leading to really huge, huge database leaks affecting some of the largest companies in the industry, amongst others Uber.

But they had a very massive leak of their driver's details. That's right.

There are different reports, but GitGuardian, for instance, publishes a report and they mentioned that around 5 million credentials and other secrets get leaked on GitHub every year.


CAROLE THERIAULT. I think every single listener who has worked in an office, right, has used an insecure way to share a sensitive piece of information with a colleague. From writing it on a piece of paper to sending it via text, maybe, right?

Or email. We're all guilty of it.

And so, what you're offering is this tool that is super safe and allows employees to share information, particularly, you know, serious information related to infrastructure, right?


MAX POWER. Absolutely. And the infrastructure is protecting a lot of additional secrets, right? So, it's the one secret to a holy grail of potential secrets if your database gets leaked, there's much bigger damage than just this one secret. So there's a big trail of secrets, which need to be protected pretty well.

Primary target group is definitely for teams, for employees, but there may of course be use cases where you want to exchange secrets with third-party vendors. There might be some certificates you want to share in a secure way. This is not a primary use case for Secrets Manager, but definitely something that would be possible as well.


CAROLE THERIAULT. And do you have any kind of cool config options within this service that might allow it to lend itself to a specific environment better than others, for example?


MAX POWER. Generally speaking, we're building Secrets Manager to target as many use cases as possible. So we're trying to simplify building out various integrations and to cater to pretty much any sort of use case. We have the traditional use cases of development teams that are building a product, but we also have a lot of customers from the IoT and OT space.

So for instance, big factories that have a lot of robots. These robots need secure credentials as well. And the way we're building things is that we try to cater to all of these different use cases. So we have our SDK, currently built in Rust. We're working on other languages as well, which make it easy for anyone to build stuff using Secrets Manager. And then we have our CLI, a completely revamped CLI, not based on the existing Bitwarden CLI, which also simplifies a lot of the process.


CAROLE THERIAULT. You know, that was a little bit of a trick question on my part because, hallelujah, that is a simplified system that anyone can use because it's really complicated when people add so many bells and whistles to different products to make it work for you, but it never works perfectly. And then no one else really understands your use case very well. So that's a good thing.

How's the beta been going? So how long has the beta been going so far and what have you learned from that?


MAX POWER. We launched the beta in March. And so far we have over 1,200 organizations that signed up. Wow. Which is a very big number and much more than what we expected actually. So we're very positively surprised by that.

We have gathered a lot of really valuable feedback there. We're aware of a lot of things that we still need to build. Luckily our internal roadmap was very well aligned with what customers during beta requested. So a lot of the important requests that customers had are already in preparation and already being worked on, which is of course great to get this confirmation and feedback. But we of course also got a lot of great ideas that weren't on our roadmap. And luckily with Bitwarden, we have a super great, very supportive community of people that are contributing either with ideas or contributing actually to our open source repositories.


CAROLE THERIAULT. You have a really hard job, Max, because I've worked very closely at this level. And as I remember, you have to kind of manage the ideas that go in and make sure they, when they go in, that they work seamlessly and perfectly and don't blip out in any way. And of course you've got deadlines from everybody, so it's fantastic if you're able to have the time and flexibility to really test everything. So I love hearing about a long beta phase. I think that's really good.


MAX POWER. Absolutely. I mean, one thing that is always our primary focus is security. So we don't publish anything without thorough testing, without third-party audits and so on. Before we are sure that we would use it internally, we are not publishing anything.

The beta is very useful in determining what features we should prioritize and also, for instance, determining what is the right pricing approach. So that was a very big question for us during beta as well, because a lot of the competitors in the landscape have super confusing pricing. That's also something where we wanted to add a little bit more simplification I love that.


CAROLE THERIAULT. What kind of feedback have you received from some beta testers that have made— that make you feel like we're really on the right track here?


MAX POWER. Overall, the feedback has been very positive, which is really great. A lot of the people were very happy to have one place for all of their secrets, for their user credentials, their normal passwords and their developer secrets.

We have received a lot of great feedback surrounding how secrets should be organized and structured, which we already had more or less planned anyways. So the way that we are resembling, for those that are already using the password manager, resembling collections where we have project, just a very neat way of organizing secrets.

And then we got a lot of great feedback also on how granular the access policies should be surrounding secrets, which was very useful and we were already more or less planning. So there's lots going on.


CAROLE THERIAULT. So how long is your beta scheduled to last?


MAX POWER. We are planning to launch general availability version in Q3. Mid-July, most likely, yes.

Yeah, there's still a couple of factors. There's always the question of how much additional functionality and features do we want to add before we launch general availability.

There's still some debate about some minor features that would improve usability. Of course, my personal approach is that it won't hurt to launch GA as long as we follow up with these features very shortly after, which is currently the plan.

So there are a lot of features like additional SDK languages, additional integrations, improved documentation, and so on, which of course all takes quite a bit of time to build out. But whether we launch that a couple of weeks after we launch GA, or before, it doesn't make a huge difference for users.


CAROLE THERIAULT. So are you still taking people in your beta?


MAX POWER. Absolutely. The beta is public to anyone. It's free for anyone. And we're always looking forward to additional feedback. It's super helpful for us.


CAROLE THERIAULT. And I'm sure it's great for people to get a sneak peek at what you guys are working on. Definitely.


MAX POWER. I mean, that's also one of the beautiful things about Bitwarden is that our users can really drive the direction the product is taking. We're taking our user feedback for anything, also for password manager.

User feedback is one of the most important things for us. And that is really one of these beautiful things about the general open source community that we're listening to users and users are providing us with great feedback. So there's a very nice symbiosis. Yeah.


CAROLE THERIAULT. And you guys are the only open source password manager currently available at any scale. Is that right?


MAX POWER. The only really user-friendly security and open source password manager. That's a very important distinction.

Therefore, more tech savvy users, there are some decent alternatives that are from the pure perspective of encryption standards and so on. That are very good as well. Yeah.


CAROLE THERIAULT. But your main focus as well is to have serious tech, but overlay it with really simple UI interface and usability to make everyone's life a bit easier.

Absolutely. Yeah, can't argue with that.

Listeners, if you want to take part in Max's Bitwarden Secret Manager beta test, or if you just want to learn more about this service, may I suggest you go to bitwarden.com/smashing. That's bitwarden.com/smashing.

And Max Power, product lead for Bitwarden Secret Manager. Thank you so much for coming on Smashing Security.

Thanks, Carole. I have to ask you one question before we go.

I was doing some research on you and I found a Max Power website, Max's Island. Is that you?

No. I was thinking you had a name for an inspirational speaker and look, there's already someone out there with it.

Have you seen this? No, I haven't seen that yet.


MAX POWER. Well, there you go.


CAROLE THERIAULT. MaxIsIsland.com. You can go have fun and check that out.

Thanks for coming on the show, Max. I appreciate it.


MAX POWER. Thanks a lot, Carole.


GRAHAM CLULEY. Well, that just about wraps up the show for this week. You can follow us on Twitter at Smashing smashingsecurity, no G, Twitter won't allow us to have a G.

Smashing Security also has a Mastodon account and you can look up the Smashing Security subreddit on Reddit. And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Overcast.


CAROLE THERIAULT. And huge, huge thank you to this episode's sponsors, Centripetal, Kolide, and Bitwarden, and to our wonderful Patreon community. It's thanks to them all that this show is free.

For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 324 episodes, check out smashingsecurity.com.


GRAHAM CLULEY. Until next time, cheerio, bye-bye, bye! Good Pick of the Week, Carole.

That sounds interesting.


CAROLE THERIAULT. It's fricking fascinating.


GRAHAM CLULEY. Talking of Pick of the Week, it's been pointed out to me that my Pick of the Week last week.


CAROLE THERIAULT. Yes, I did find it. Uh-huh.


GRAHAM CLULEY. Which you said, this kind of rings a bell, you said, maybe I've seen it. Turns out it was your Pick of the Week back in February.


CAROLE THERIAULT. You made a comment, didn't you make a comment like, well, maybe I'm more with Netflix than you are these days, or I don't know.


GRAHAM CLULEY. Oh, and also, not only have we both now recommended it, but on both episodes, Mark Stockley was our special guest. What?

It's really his fault for not spotting that we've both recommended the same TV show. Bad Mark.

It was a good show though, Black Butterflies. Yeah.

Yeah, I enjoyed it.


CAROLE THERIAULT. Good. Well, good.

Bye. Bye.

-- TRANSCRIPT ENDS --