Security Cloud Privacy Tech
Don't Trust The Network

Don't Trust The Network

Mornings With Mark no. 0074

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

Good morning, everybody. I am sorry. I’m a little late this morning as you can tell I am not at home. I am actually at the airport lounge honestly quite surprised and 74 episodes in how I have done many of these from an airport. How much is surprising cuz I tend to be in an airport way too often wanted to talk to you today but few things that flew across the wire have first of all the intercept had a really fascinating article about how I’m a teen T’s album has hubs across the u.s.

And that are a major intercept points for the NSA another clandestine organizations. That’s not a revelation. They have more detail than we’ve ever seen before but we’ve known that for a really long time and also the WPA 3 standard was announced around wireless security and I think you take those two things together and you start to realize I’m not fundamental principle of not trusting the network.

I don’t know right now. I’m broadcasting to you over cellular. We know as a 7 as far as a protocol and there’s some challenges and security there. So is it We deploy the encryption on top of the network is why we want end-to-end encryption and our messaging app. So right now I’m doing a broad-based encryption because this is essentially public information.

So I have a secure connection washing this out. So my data between me and Twitter, it’s probably not going to be intercepted and it should be secure and that’s fine. And that’s just type of information about my personal tax for my messages with friends. And I want to be reminded only decrypted on there and because we can’t trust them having The Intercept Point Network.

We can’t trust an atom. They never said we’re on this is a great example. I’m sitting there an airport lounge. They offer free. Wi-Fi will have free Wi-Fi isn’t under my control. This is under the airport lounge control or the airports in trouble and you want to make sure that you are taking precautions to protect yourself is why we say use a VPN out.

However, vpns aren’t the end-all-be-all understand. What a VPN is trying to achieve a VPN is trying to make a secure network on top of an insecure one, but you’re still on somebody else’s Network so on YouTube. I’ll see a bunch of pass for VPN providers and they have different abilities different capabilities different logging levels, but the end of the day what they do is get to get help you get a trusted connection over an untrusted connection, but then the question is how far do you trust the data connection? So really if I have a VPN running on the Wi-Fi here in the lounge now, I’m trading the threat of the lounge for the threat of my VPN provider.

So if you’re running your own VPN system, if you are running on a commercial be paying you need to understand the law under which that commercial VPN runs you need to understand the The jurisdiction where that traffic is going. So in the case of The Intercept article running as a selfie if I’m running a VPN over those in Zephyrhills that point the only has the intercepted a tank with the traffic.

So it’s a good thing. I’m protecting myself against that front of him. A question is can those organizations then simply subpoena my VPN provider to get the same locks are those logs? I’m actually in play which is one of the marketing as much as he arrived VPN providers lately is they are trying to say, hey, we don’t log this or we don’t log at all or alarm for 24 hours and then destroyed and those kind of things help protect your security but none of these are perfect scenario wp3 a standard or is it a V PS3 standards? Not perfect again, but they all helped produce certain types of threats the risk posed by certain types of so complicated.

There’s so many layers of networking challenges. It’s really difficult to understand those threats for anybody let alone the average user. So if you take the last attempt, I’m going to use with your home ISP connection. Omysky connection uses the ice beasts DNS and four years. We saw them intercept those DMS M and serve up ads for misplaced domains of his spell domains and things like that.

They’re also keeping a pretty detailed record to create a profile to try to tell you other services in to try to sell some provider list all that data even to other people and which is again that the truck model. So the question what how can you reduce your Reliance on your internet provider in that case, we need protection through regulation.

You also can do the VPN as well. I’m and you can change the DNS servers that you’re using so you could leverage somebody like cloudflare and you can pay for Gina Services. There’s any number of options there but against moving the threats around but do you have an internet connection on the road? I’m so for me when I’m on the road when I’m traveling and I do travel unfortunate quite a lot and I use a third-party VPN in a third-party view.

Can I bet it out? I understand the risks posed by that. So it’s a USB company and which means it falls under you as long as they keep minimum logging. So I’m okay with that. Look up stuff on top of the VPN encryption. The only thing I use my VPN Force to protect me from the local networks that connect to another use other measures to protect other things.

So the layers in this because that’s the nature of the internet and the Deathly have more on that, but I have to run to catch my plane. Thanks for jumping on a line and watching the show today as always. Hit me up online at Mark ncaam in the comment down below if you’re watching this on YouTube on another Network, and as always by email me at Mark n.

CA, how do you protect yourself online. How do you protect yourself? When you’re when you’re on-the-go. To see what them people how much I appreciate the fronts how much they appreciate. The challenges are how much they’re worried about it at all. Let me know. We’ll talk to you soon.

You guys have a fantastic day. Good morning, everybody. I am sorry. I’m a little late this morning as you can tell I am not at home. I am actually at the airport lounge honestly quite surprised and 74 episodes in how I have done many of these from an airport.

How much is surprising cuz I tend to be in an airport way too often wanted to talk to you today but few things that flew across the wire have first of all the intercept had a really fascinating article about how I’m a teen T’s album has hubs across the u.s.

And that are a major intercept points for the NSA another clandestine organizations. That’s not a revelation. They have more detail than we’ve ever seen before but we’ve known that for a really long time and also the WPA 3 standard was announced around wireless security and I think you take those two things together and you start to realize I’m not fundamental principle of not trusting the network.

I don’t know right now. I’m broadcasting to you over cellular. We know as a 7 as far as a protocol and there’s some challenges and security there. So is it We deploy the encryption on top of the network is why we want end-to-end encryption and our messaging app. So right now I’m doing a broad-based encryption because this is essentially public information.

So I have a secure connection washing this out. So my data between me and Twitter, it’s probably not going to be intercepted and it should be secure and that’s fine. And that’s just type of information about my personal tax for my messages with friends. And I want to be reminded only decrypted on there and because we can’t trust them having The Intercept Point Network.

We can’t trust an atom. They never said we’re on this is a great example. I’m sitting there an airport lounge. They offer free. Wi-Fi will have free Wi-Fi isn’t under my control. This is under the airport lounge control or the airports in trouble and you want to make sure that you are taking precautions to protect yourself is why we say use a VPN out.

However, vpns aren’t the end-all-be-all understand. What a VPN is trying to achieve a VPN is trying to make a secure network on top of an insecure one, but you’re still on somebody else’s Network so on YouTube. I’ll see a bunch of pass for VPN providers and they have different abilities different capabilities different logging levels, but the end of the day what they do is get to get help you get a trusted connection over an untrusted connection, but then the question is how far do you trust the data connection? So really if I have a VPN running on the Wi-Fi here in the lounge now, I’m trading the threat of the lounge for the threat of my VPN provider.

So if you’re running your own VPN system, if you are running on a commercial be paying you need to understand the law under which that commercial VPN runs you need to understand the The jurisdiction where that traffic is going. So in the case of The Intercept article running as a selfie if I’m running a VPN over those in Zephyrhills that point the only has the intercepted a tank with the traffic.

So it’s a good thing. I’m protecting myself against that front of him. A question is can those organizations then simply subpoena my VPN provider to get the same locks are those logs? I’m actually in play which is one of the marketing as much as he arrived VPN providers lately is they are trying to say, hey, we don’t log this or we don’t log at all or alarm for 24 hours and then destroyed and those kind of things help protect your security but none of these are perfect scenario wp3 a standard or is it a V PS3 standards? Not perfect again, but they all helped produce certain types of threats the risk posed by certain types of so complicated.

There’s so many layers of networking challenges. It’s really difficult to understand those threats for anybody let alone the average user. So if you take the last attempt, I’m going to use with your home ISP connection. Omysky connection uses the ice beasts DNS and four years. We saw them intercept those DMS M and serve up ads for misplaced domains of his spell domains and things like that.

They’re also keeping a pretty detailed record to create a profile to try to tell you other services in to try to sell some provider list all that data even to other people and which is again that the truck model. So the question what how can you reduce your Reliance on your internet provider in that case, we need protection through regulation.

You also can do the VPN as well. I’m and you can change the DNS servers that you’re using so you could leverage somebody like cloudflare and you can pay for Gina Services. There’s any number of options there but against moving the threats around but do you have an internet connection on the road? I’m so for me when I’m on the road when I’m traveling and I do travel unfortunate quite a lot and I use a third-party VPN in a third-party view.

Can I bet it out? I understand the risks posed by that. So it’s a USB company and which means it falls under you as long as they keep minimum logging. So I’m okay with that. Look up stuff on top of the VPN encryption. The only thing I use my VPN Force to protect me from the local networks that connect to another use other measures to protect other things.

So the layers in this because that’s the nature of the internet and the Deathly have more on that, but I have to run to catch my plane. Thanks for jumping on a line and watching the show today as always. Hit me up online at Mark ncaam in the comment down below if you’re watching this on YouTube on another Network, and as always by email me at Mark n.

CA, how do you protect yourself online. How do you protect yourself? When you’re when you’re on-the-go. To see what them people how much I appreciate the fronts how much they appreciate. The challenges are how much they’re worried about it at all. Let me know. We’ll talk to you soon.

You guys have a fantastic day.

More Content