35 Burst results for "VPN"

"vpn" Discussed on The Vergecast

The Vergecast

02:13 min | 4 months ago

"vpn" Discussed on The Vergecast

"We need this screen. We need this housing, put it together, we'll sell the phone. I think as that happens, probably the marketing is going to turn into this. Oh, you're a car person? Cool. Here's the car person's phone. That's probably just a somewhat kind of inevitable shift as the kind of as the big breakout technologies kind of shift into the past a little bit. Alison, you did the whole review, obviously, we're going to put it in the show notes, everybody should read it. But what is your top line takeaway? Obviously, most people listening to this will not be able to get this phone, at least for now, because it's not coming to the U.S., but it is going to be available. Lots of places. Should people buy it? What's the verdict on this phone? It's hard to judge. It's the first one they've ever made, right? Yeah, it is kind of wild card. There's a lot of fine print on it that's good too. They say they're going to offer four years of security updates, which is really good for a mid range phone. I think that that's kind of my bottom line is it is a very good mid range phone if the look of it appeals to you if the flashing lights you think are cool. As long as you go in, not expecting it to help you find your souls in our purpose, then you're going to get a cool looking mid range phone. And I think it's a shame that we seem to get so few of these devices in the U.S.. We sort of have our couple of very good choices but limited in this kind of price range. It would be cool if one of them was the nothing phone. So if you like phones that go blink blink blink, you would not be crazy to buy this phone. Yeah, this is the phone for you. I like it. I think it's astonishing and I really interesting sign of the times that a company is able to establish themselves and then less than two years later, release a full on smartphone and I think it's very interesting that technical challenges of doing that do not seem to be that big anymore. But as we've kind of seen in the U.S., the business challenges seem to be what's preventing lots of new entrance into the market. So for all of their over hyping this thing, I think to fundamentally release a phone within two years, I still find quite impressive. I have to admit. I agree, we've seen a lot of companies try and most of them not even get very close. So the fact that nothing got this far is legitimately impressive. I totally agree.

U.S. Alison
'I Didn't Choose Covid, It Choose Me' Dr Vladimir Zelenko Treats Small Community

The Charlie Kirk Show

01:54 min | 1 year ago

'I Didn't Choose Covid, It Choose Me' Dr Vladimir Zelenko Treats Small Community

"I want to thank Charlie, he's an incredible guy, his spirit his love of this country. He's done an amazing job, building one of the most powerful youth organizations ever created, turning point USA. We will not embrace the ideas that have destroyed countries destroyed lives and we are going to fight for freedom on campuses across the country. That's why we are here. Hey everybody, this episode is brought to you by my friends at ExpressVPN, ExpressVPN dot com slash Charlie, secure your device, anonymize your online activity, protect your action online, express VPN dot com slash Charlie, help our show out by also helping yourself protect yourself ExpressVPN dot com slash Charlie. Hey everybody, welcome to this episode of the Charlie Kirk show. I'm honored to have someone that I've admired for quite some time here on the show. He's someone that has been spreading some needed information around treating the Fauci virus that is doctor zelenko, doctor, welcome to the Charlie Kirk show. Charlie, thanks so much for having me. I'm a big fan. Thank you. First, why don't you take a moment here to introduce yourself? Kind of your work, your credentials and how did you find yourself into this line of work? Well, I didn't choose COVID. It shows me. I'm a family board certified family physician plus 20 years in an upstate New York community. And in March of 2020, my community got hit and I found myself in the epicenter of the largest most concentrated outpatient code outbreak in the country. And at that time, if you recall, there was no treatment. So all we were telling patients that go home take Tylenol when you get sicker, go to the hospital, get on the respirator and New York area, 80% were dying. That didn't seem like a very good treatment approach.

Charlie Kirk Charlie Zelenko Fauci USA New York
"vpn" Discussed on Smashing Security

Smashing Security

09:04 min | 1 year ago

"vpn" Discussed on Smashing Security

"Know like think about it now so now post pandemic times certainly while currently in uk with quotation marks big quotation marks. Angry people need to get for me to be for worker to pick up their kids or all the things and you know maybe some people are going to gyms and you know people are now looking to facial recognition to help them process. People like hotel. James or jim okay. And how do you feel about these people say pa- maybe even public spaces like local government. How do you feel about these people having your facial recognition information or data or data points and then storing that. Does that make you feel so similar to mark story. How do you feel about that. Is that good. Or do you not care. Confidence in the powers that be store in such information securely and only using it appropriately. I'm sure it would never come to any harm and would never fall into the wrong hands. So no i agree with graham. I think after three decades of nobody having that data breach and everybody understanding perfectly secure systems. Keep day to safe. We could rest easy. The nobody will come this. I cannot wait to use those quotes out of context. He needs lyre bird. So i think the thing that really disturbs me about these systems is not even so much. Who's gonna stolen or whether or not gonna safely. It's the things the more complex you make things the more unintended consequences. You have. yeah. I think that's what's happening with facial recognition now. There's an initial sort of burst of enthusiasm for police forces around the world will embrace this technology and then there's a lag and then you start to see the unintended consequences and the fact that so many of these things rely on machine learning which is prone to whatever bias you have in the material. It's trained them. Because it's it's you know it's a machine that learns you you give it examples of the things you want to spot an an sports. The you know whether it's faces or whatever. I don't think anyone would say though it's not in. Its nascent age so to speak right. So i would agree. It's totally you know. I believe that it's completely probably biased. To an extent because the the samples have not been representational of the world in any way but as they use it. More can imagine the argument being used like. Well look if you can use it and all these places everywhere across the world internationally. Our data will become very accurate raises the second problem which is public or rather the users of spatial recognition. Season that weird to say that if it's an in public domain that your user facial recognition but you have not consented to being scanned right so somebody to mike story. You're you've not said okay. Well you might have done. And i don't think my face should be my license plate there. Might there might be a little sign on the outside of the building. Same by entering here you agree that we will be using facial recognition. We'll be doing explains it and okay. But what if your local government decides to do it across the city in a shopping mall. I suppose you know how big that signed be. Does it can be like in ten point font like near the door where they say see in action you know is that as long as it's about the same size as the one which tells people who are wearing google glass or face off any who not everyone's happy about facial that you've learned so there's a few research is that they're trying to push the boundaries and see if it's possible to duke facial recognition now. We talked a little bit about this in episode one. Six eight where we talked about cv dazzle. This was an artist who explored how fashion could be used as a camouflage from face detection technology now. One of the arguments at the time was okay. Cool but people will see coming a mile off with you. Know that. Sort of like razor haired you know basically structures in front of your face mask your actual. Tv does they. They sort of crazy haircuts and things didn't end and bizarre make up exactly now. There's been a recent new study that i wanted to share with you to see if you thought this was more legitimate okay so motherboard covered this. This is where researchers found a rather easy way to bypass facial recognition technology and according to their own reports. It's pretty darn successful. And they used makeup. So i'm gonna quote. We're not say. They used makeup. Justin trudeau uses my couple. Some of the. Hey hey hey come on. What happens with the elections yesterday. I looked yet you go did. He still has a minority snigger. Let me know that. I mean impoundment. Okay okay man. i'm sure mark mcgrath this. We're not big fans of justin showdown. Okay why it's too hard. He's tape lobby s. Yeah he's too. He's too young powerful okay. This is what motherboard wrote about this research. Okay in their experiments. The researchers defined twenty participants as blacklisted individuals right on the facial recognition software so that their identification would-be flagged by the system when recognized make sense So i say if graham clearly here's his pick you know. This guy comes through flat alert alert. Lock all doors. No right Then they used a selfie app called. You can make up to digitally apply makeup to the facial images according to the heat map right which targets the most identifiable regions of their. When you sit makeup. I assumed human makeup out. They know she mentioned meant makeup. Monks you didn't make up okay. Okay i've sent you guys a link k. And here let me give you the time stamps. Just so you can quickly see the The looks the can be created by rumors. So what it says on this video has how to become a tick. Tock eagle with just a few tops right and you can go through a few of the looks there. This is how you blow up your you can make up. These are all. The words always adds makeup. Virtually to your little video thing. So if i was doing a tick talk dance. I'm not sure. I call any of these things makeup though. I don't know if you saw the one where she's actually wearing clouds across her nose. So we have the look. The sweetheart look which has hearts across her nose as though they're like like p. p. long stockings freckles. And then you've got clouds desert sandy. Glue look i'd love. You should show your daughter mark and see if she thinks is amazing are horrific. Tell ready because he's already very well versed in this. I'm show i'm just. I'm amused by the idea of trying to touch facial recognition by wearing clouds in front of your face. I mean i think. I think that's a fantastic idea. I'm just wondering how you maintain the clouds. Yes well here's part two swim thinking This is going to be fairly obvious to people if like graham clearly walked down the street with like a bunch of cloud over his nose and eyes. I wouldn't walk down the street. Lavalle sachet but then i got it wrong. Because quote a makeup artist then emulated the digital makeup from you can make up onto the participants but using natural pigmented looking makeup in order to test the target models ability to identify them in a realistic situation so so the one with the clouds for example across the face they would put them all in flesh. Tones across your face Yes they say. They did it in different lighting and they had two or three different cameras set up along a hallway. There is a youtube video. Let me send it to you guys. You can take a look. And i'll put it in the show notes for our listeners may be sees. Tv cameras used that special wavelength of light. The reveals weapons and bans. Yes so here. He says this it says participants wearing the makeup walked through a hallway to see whether they could be.

jim okay mike story graham Justin trudeau mark mcgrath pa James uk google justin Lavalle sachet mark youtube
"vpn" Discussed on Smashing Security

Smashing Security

01:42 min | 1 year ago

"vpn" Discussed on Smashing Security

"The car to spirit all over your vehicle when you go to the market or whatever the supermarket or whatever. You don't paul all the oranges as you might have preko vid in order to find juiciest ones. You might go. I'm gonna use my eyes up to just a just pick pick was that i want so i don't you know yup i am. I being crazy until i was just imagining you. Smooching arrange into your life. That i realize you meant looking at them like he. Just don't touch as much. I don't think graham you. And i have hugged in years. Probably been great okay at also. I haven't had a cold in two years like literally. That must be a total record and it sucks not hugging kids. You and all this but you know the silver lining is good health right so i just had a horrible cold kids exactly idea. I hadn't realized how much i enjoyed having colds. And then it kind of you know. It's like the germs have been saving up so when you finally get one. It's like not normal cold. A lot of people have talked about this saying that. They're getting a lot less colds and so they want to avoid that. So i don't know like think about it now so now post pandemic times certainly while currently in uk with quotation marks big quotation marks. Angry people need to get for me to be for worker to pick up their kids or all the things and you know maybe some people are going to gyms.

graham colds uk
"vpn" Discussed on Smashing Security

Smashing Security

03:24 min | 1 year ago

"vpn" Discussed on Smashing Security

"War on us. If you want to put all of your internet traffic through some company you've never heard of rav your right and hope that they will treat your data. We've respected and i'm most them say that's what they do right that they dump flush the data to keep nothing. They're your best friend privacy buddies express. Vpn or an interesting company just this week. They were acquired by an israeli uncle. Cape technologies for the small stuff. Just just a trifle nine hundred. Thirty six million dollars. Oh my god. They didn't even make it to a billion prophetic tried harder. Now cape technologies which is bought express. Vpn they used to call themselves cross writer. Now cross writer was rougher unpleasant firm that injected adds into websites sometimes removing that the sites wanted to be there. So the sort of thing you might want to. Vpn to protect against exactly this sort of thing that you you wouldn't find particularly trustworthy grubby. Keep your friends. Close your enemies closer right. Yeah so then. Pivoted from being adware provider kevin to becoming some kind of security firm and provider a vpn subsidies a renamed themselves cape. They bought upside the ghost. Zen mate private internet access three big vpn companies and they also bought two leading vpn review websites. So when you sign this is funny so you will find if you go to two particular very popular. Vpn review websites. They will typically recommend vpn's which are run by this company on the under their umbrella. Okay so yeah so. It's a little bit grubby and has enough grubbing controversy about express. Vpn being acquired by cape. We now have this revelation that express vpn cio was not so very long ago helping the united arab emirates government track americans and activists and heads of states journalists. And i have to say. Would you really trust your vpn. If they hired somebody like that well he offers. He knows what he's doing. Which is pretty much express. Ppnce point of view they have posted gloag. They say oh. We knew about his background. We knew that he provided counter-terrorism intelligence both to the united states and while employed dark matter to the uae. But it says we know the details of what you've got up to earn his classified activities. Well blow me down with a feather they sure do know now so what is expressed. Vpn attitude doing about this pretty presley saying we're very proud to have him on board yet since publishing a post well. They're not doing is they're not saying that far in him they ought to be keeping him and they think that this is going to go down a storm with their customers. I suspect he locked himself into a very beautiful contract. Saying if you decide to get rid of me you need to give me which are mutual. Wonga 'cause i think that they probably sat down for.

Cape technologies uae gloag kevin presley united states
"vpn" Discussed on Smashing Security

Smashing Security

08:59 min | 1 year ago

"vpn" Discussed on Smashing Security

"Can you trust your vpn's vp's and what about you. Mark i am going to be talking about facebook's worst idea ever forget and i'll be talking about duping facial recognition. Can it be done all this and much more coming up on this episode of smashing security now chums chums might bring to you news of a legal nature. It comes from the united states where the department of justice has just revealed the three four might. Us intelligence personnel have admitted helping the united arab emirates get their hands on a series of zero day exploits for the purposes of spying against people including american targets. Is this kind of like Cia wanted to but someone internally can't go the fbi. They hate each other so they get a third party to intercept and do it for is that is that what your mind. I love you bro. It's complicated you've just made it as if world politics complicated enough you've taken it to a whole new level where the cia is outsourcing spying against its own nation. They've taken that to enemy country now. That's that's that's not what's happening okay. What is happening you i. E they had an operation called project raven. Good name and what they did was they. They hide within project raven a number of people who used to work for us intelligence. And they said oh. Could you join our clandestine hacking team. Could you possibly help us. Hack your fellow americans with your knowledge and three people who used to work in. Us intelligence have now admitted that they've been doing this for the a e and those three people are you their names. Mark bayer daniel garrick and ryan adams. They were senior managers at a you. A base company called dark matter. I can only think of two reasons why somebody would do this one disgruntled to wonga disgruntled with their longer or disgruntled by their longer. Yes well yes. I for one. I'm shocked that spies of turned out to be untrustworthy duplicitous. There who want he said one thing another and now he's come to work this foreign company dark matter and if you go to dock matters website by the way they haven't got much the website it's gotta hold in visit dark it is yes they've they've used some css to you have a black background and it says they are dedicated to providing secure trusted and integrated cyber protection services to government agencies and businesses. It but everyone says that boilerplate don't say they help those toll into their website. It's a cutting face now three men. They are accused of integrative exploit into a a hacking tool a hack into accord com. Kamo allocate. that's ironic now in early. Twenty nineteen reuters reported that comma could basically give hackers access to your iphones. We add to toby. Can upload loads of phone numbers or email addresses and as if by magic it would hoover up photos from the phones. Emails text messages. Used enough to click on anything last week. We had tom langford. Took matt zeroed. Click exploits so that like that. Get location information from people sifi. Tony works against fans can't intercept franco's but clearly could cool. It's a lot of mischief. You wouldn't even know it was on your phone. They'd just go collecting all this stuff from you. Hoovering it all up. And i know everything about you and the thing about phones is if you can successfully get on them. There's nothing on there that can detect you because this is complete walled garden. And you can't have antivirus or anything like that. So there's this you hope the great big wall that protects you hold up if it doesn't then you have no idea. Basically and targets include the amira qatar journalists senior turkish official and nobel peace prize winning human rights activist in yemen and his claims that these attacks dumb with the common tool they accessed compromising and sexually explicit photographs of some of their many people. How many people have sexually explicit photographs themselves on their phone. All of them yes. Let's do a survey right now. Mark now obviously not everyone apart. Power market only the camera. But i just don't get it just in case you forget what your boobs look like. You're of a generation. You might want right now. Crossing remember them in the future should never gonna get any better than they are. Now see anyway aside the fi- assume it's safest just around up and save wants doing it. I mean clearly. Not everyone is doing it but i think enough people do that. You can just round up to everyone. But i go to all the trouble of hiring these x. spies yes and coming up with zero day for iphones. which is you know. it's not simple. it's certainly very very expensive. And then you have crazy spyware on there and then you like nude photos here porn sites mark. They're not doing it for a quick rubber. That's not why they give them the photos influence. Isn't it so you know it's it's back. Matt matt yeah. That's why they're doing all they might want. Wanna see where you are in what we might want. See your emails and who you're talking to and that sort of thing but you didn't mention those things now. I'm just like Nudes now gentleman right. These three gentlemen who've been charged by the justice. I was interested in so the this company dark matter. What are they doing now right. I thought how to use linked in exactly and it turns out that these former us intelligence personnel knew better than to maintain elite profiles wasn't able to find out much about mock bayer didn't find that much him but the next guy ryan adams bryan adams nico successful singing career. Exactly everything i do. I do it for you know brian. also ryan adams ryan adams and brian adam. Yeah how's that allowed obviously looked brian and went for him. Was it twitter. Wouldn't allow him a b. or something. What's this one called ryan as well as brian. It shouldn't it should be like actors. They should have to have different names. I think anyway. So couldn't find that much better ryan adams but the third guy daniel gurecki okay interesting chap because he is currently working for a computer security company specifically accompany which is a well-known. Vpn company could express vpn. What he's currently working for them. Yes daniel tucker. Ricky has been hard since december twenty nineteen as c. I o. says the doj came out and said hey these three dudes have admitted to help in the uae. Nothing we can do about it. So there's gonna crack on. Well thanks for listening. That's no other. Doj press releases we can do they wish. They admitted their guilt. And if they assist the authorities that maybe they'll get off with a fine of a few million dollars. Okay so how do we know. They're not already assisting the authorities or maybe they are. Maybe there's kind of like wink wink. F you assist us well so express. Vpn cio is this chap daniel. Ricky was the i handful daniel the daniel this study bio always see chief insecurity of maybe i don't know anyway express. Vpn if you go to their website. They describe themselves as first and foremost a privacy company because it goes..

ryan adams Mark bayer daniel garrick Cia Us tom langford amira qatar uae department of justice Mark fbi Matt matt facebook toby franco reuters yemen Tony matt brian adam
"vpn" Discussed on TechStuff

TechStuff

04:35 min | 1 year ago

"vpn" Discussed on TechStuff

"Strickland. i'm an executive producer. With iheartradio and i love all tech. This is tech news for september. Seventh twenty twenty one. It's a tuesday and we got a ton of stuff to cover and a lot of it is pretty heavy. So let's get to it tech times reports that the russian government has cracked down on six virtual private network services as the country is nearing a parliamentary election and virtual private networks aka. Vpn's have lots of different uses a lot of companies use vpn's for employees to log into before they use corporate systems. One big reason to use. Vpn's is that it provides a shield when browsing stuff on the internet so the way it works from a very high level. Is you log into vpn essentially a server and then the vpn does all the info fetching for you so to someone who is snooping from the outside looking at your connection. All they would see that you are connected to a vpn. They wouldn't be able to see what you were doing beyond that. So if you were researching stuff maybe a researching stuff that the government would disapprove of. Let's say you're in russia and you wanted to research something that perhaps the government wasn't in favor of well using a vpn. It would be very difficult for them to figure that out now. This is of course assuming that the vpn in question is encrypting all communications. That are taking place and also taking appropriate steps to protect users. So that's all true then. Yeah it stands as a way for people to access stuff without outsiders necessarily being privy to it anyway if the government feels like this is a bad thing then the really the easiest course of action is to block. Vpn services in that country. and that's what russia has done so those services include big names. If you've been listening to podcasts or watching videos you probably heard some of these because they often advertise on those so it includes stuff like nord. Vpn express vpn ip vanish vpn. Ola vpn keeps solid vpn and speechifying vpn now..

russian government Strickland Vpn russia
"vpn" Discussed on The Security Ledger Podcast

The Security Ledger Podcast

05:57 min | 1 year ago

"vpn" Discussed on The Security Ledger Podcast

"Chemical supply companies food supplies for since the forties. So we're not inventing things from whole cloth with bill of materials. What we're trying to do is apply them. faster to this new digital Supply chain much like the benefits of others. So we're not starting from scratch. We know how in ware those supply chains got better in. We hope to apply those proven practices here and again. That's the median long term. I think the purpose of sos and the purpose of bad practices was for someone. Who's doing nothing or doesn't have the staff to do much. Or maybe they will have the staff post pandemic but they're very strained during the pandemic we wanna start On the most egregious avoidable points of exposure and then climbed the ladder towards Something more tractable and sustainable across those fifty five national critical functions. Could you just give a kind of a quick overview on if people are curious about sos like what they'll find on the society and what resources are available to them. Sure view right Well the whole cisco desperate esteem helped put this together but It's essentially a one page and photographic kind of like the pineapple pizza one misinformation got a bunch of emojis on it. But it just hadn't says see what your adversaries can see There are tools like showed. Dan census thinly that can reveal instead of cat pictures. You know Industrial control systems or remote connectivity ports increasingly exposing skated ics not environments or spark connected physical devices. That can have a kinetic impact if exploited So we're not trying. Do give a tutorial per se on those things but we really have four functions that we outlined in this one page graphic. I assess your posture. Second evaluating reduce your exposure. Maybe didn't know you had all those. Maybe you don't need all of them for the ones do need you. Hartnett and mitigate that and then make it routine right During the pandemic for example even hospitals that had fairly decent exposure in a very big hurry had to stand up new. Vpn's new telemedicine technologies. Do they not go to their standard change management. They do not get hard. And in some cases they weren't licensed so they couldn't be patched so because new staff in shadow. It can creep up do this routinely and at the website we have this one page info-graphic To get your stuff off search. But then there's specific implementation guidance enforce supplemental documents ones the general how to it followed up by a specific Step-by-step for some of the major tools like showed in census ceo and i'll emphasize the shadow. It portion to because our the shadow iot is not is because often the it..

Dan census cisco Hartnett Vpn
"vpn" Discussed on TechStuff

TechStuff

05:52 min | 1 year ago

"vpn" Discussed on TechStuff

"The breakouts. I was talking about apple. It's time to talk about apple a little bit more. The company's image scanning technology has recently come under fire from the electronic freedom foundation. Eff so this technology scans images sent through a message in an effort to detect and thus report on child exploitation and abuse in other words like this background. Technology is scanning stuff that otherwise is being set privately between individuals to make sure that it's not in violation of this that it doesn't depict child abuse or exploitation. The eff maintains that you know fighting those things noble right. We want to protect children. However the method that apple is using is also open for abuse namely that apple has now created a method to intercept and analyze material sent through. I message and that's meant to be an end to end. Encryption communications channel that should provide secure private communications between two people that means that the whole secure thing there and private thing all they gets thrown out the window if you have a system that's actually analyzing the material being sent back and forth now. The eff points out that governments including the united states government have frequently sought ways to get around encrypted communications channels up to and including demanding that companies include a back door access. So that they. These various government agencies can actually see what's being set back and forth companies like apple traditionally have really resisted that and this approach of creating these ways to get around encryption invariably creates a surveillance state can grant more power to authoritarian leaders. That they can then abuse and the victims then are the citizens and and others related to that government. This is one of those situations. That's actually really really hard for me to grapple with because on the one hand i absolutely want there to be more systems in place to protect children. I really want that. But on the other hand i don't want that pursuit to then enable systems that could harm entire populations through misuse where the cure ends up. Having its own kind of disease that affects society. I won't say it's worse than the disease because it's hard for me to think of things that are worse than child abuse but it could be another bad consequence of that solution and the eff warns that various governments and regimes around the world already are standing up to take advantage of apple's decision and find ways to turn it to their own purposes for the you know the the aim of surveillance and the f. f. is adamant that apple's choice ultimately weakens security and privacy. Even if the intention behind the decision was a good one this just points out. The world is an incredibly complicated place and again while technology can.

electronic freedom foundation apple united states government
"vpn" Discussed on TechStuff

TechStuff

04:11 min | 1 year ago

"vpn" Discussed on TechStuff

"Has licensing deals with various studios and it allows netflix to stream content certain content to certain regions or audiences. For example. there are programs on netflix. That are available in the u. k. On netflix. But i can't watch them because i'm in. The united states and netflix does not have a license to stream that specific content to people here in the us but through a vpn. I could potentially circumvent those rules and just log into vpn server in the uk and try to get around it that way. This isn't exactly legit. But a lot of folks use vpn's for this specific reason now net flicks is blocking certain pe- addresses that the company associates with vpn services. Because some of these services what they're doing is they're using ip addresses that look like residential ap addresses so netflix is starting to block some it addresses that appear to be residential ones and some of them turn out to actually be residential ap addresses now the whole goal is to prevent the vpn users firm relying on this work around right but in the process that means some innocent folks are getting misidentified as vpn services and they find that their access to net flicks ends up being limited so clearly there. Some collateral damage going on here as the company tries to crack down on vpn users attempting to skirt region locking but it is impossible to say how common this is like how frequently as net flicks affecting legitimate users. Those getting hit with the ban are still able to access netflix original content. But they might not be able to see stuff. Produced or distributed outside of net flexes owned properties. Once again we see how a media companies response to people breaking the rules can cause further harn see also digital rights management and the various massive lawsuits that media companies leveled against people who were identified as being pirates. I do not have a solution to this problem. By the way and i'm not saying that flexes necessarily in the wrong as far as it goes trying to uphold. Its end of these licensing deals. My guess is that the licensing agreements mean that netflix is obligated to pursue solutions to this problem or else face some pretty tough consequences such as not being able to secure future licensing agreements with you know various tv and movie studios. It's just unfortunate that the current solution can have a negative impact on people who are not part of the problem at that is really unfortunate. Really says that solution is a bad solution. I just don't have a better one to offer. So bummer now when it comes to picking what the top stories of twenty twenty were here in the united states. There is a lot to choose from me. Corona virus is an obvious candidate as was the election and all the trappings around that from misinformation campaigns to the fights around voter suppression and more. There's the big story of the black lives matter movement which i support. It needs ongoing support. And there's a related issue the fund the police movement. now that last one is extremely controversial and politically. A lot of leaders. Don't want to have anything to do with it. They don't even want to address it but then we have a story like this one that brings into sharp relief. The concerns of those who want to see an overhaul in how the united states handles law enforcement so according to documents obtained by the legal aid society and the surveillance technology oversight project. The new york city police department has spent around one hundred sixty million dollars on surveillance systems since two thousand seven..

netflix vpn services us harn uk legal aid society new york city police departmen
"vpn" Discussed on TechStuff

TechStuff

02:25 min | 1 year ago

"vpn" Discussed on TechStuff

"Jonathan strickland. I'm an executive producer with iheart radio and a love all things tech and it is time for the tech news for thursday august twelfth. Twenty twenty one. Let's get into it now. You've probably heard me talk about vpn's or virtual private networks before this is a service in which you use a piece of software to log in to a remote server and that server kind of acts as a type of proxy to access content on the internet on your behalf and that means like all the the sites you're visiting are going through this server before coming to you so anyone who might be say spying on your side of the connection all they would see that you are in communication with this vpn server with ideally all of that communication encrypted so that whomever is snooping on. You has no idea what it is. You're looking at right because they can only see that it's coming from this bpm server. They cannot see beyond that point so they wouldn't have any clue what was going on. And then anyone who was snooping on the opposite side of this all they would see. Is that this server is communicating with other web servers. But not knowing you know whom on the other end is actually responsible for that. Like let's say that you were visiting your bank. Well they would be able to see that. There was communication between this vpn server and the bank server but they wouldn't know who was ultimately trying to access that and also that communication would be encrypted so there are a lot of legit reasons to you that use this just like i was just mentioning like if you wanted to use extra precautions when accessing certain services like banking services. While you're on say a public wifi hotspot so you're at a coffee shop. You might wanna use a vpn to access various things so that someone snooping on that public wifi hotspot wouldn't know your business but one other popular use of vpn's is to access region locked material that is otherwise unavailable to you and recently net flicks has been on the warpath to fight against that..

Jonathan strickland iheart radio
"vpn" Discussed on TechStuff

TechStuff

07:16 min | 1 year ago

"vpn" Discussed on TechStuff

"The way we intended so get ready to charge up and feel the thrill of the road. It's all made possible by altium. A revolutionary new ev platform from gm built for power flexibility and range ensuring. You keep the good times going. Isn't it time for everyone to feel good about driving a vehicle. They love discover the thrill that awaits at gm dot com. Everybody in waiting months to hire the right person is like trying to get a video to load on three g. You deserve better upgrade your hiring speed with indeed instant match. When the hiring gets hard you need indeed the job site that makes hiring incredibly simple just attract interview and hire in fact with indeed you can do all of your hiring in one place even interviewing. Don't just hope you're perfect. Candidate will find you. Indeed hiring tools help you cut through the noise to hire faster and smarter in fact. Indeed instant match provides a list of quality candidates whose resumes on indeed. The moment you post a sponsored job. According to talent nest indeed delivers four times. More hires than all other job sites combined get started right now with a seventy five dollars sponsored job credit to upgrade your job post at indeed dot com slash tech stuff. Get a seventy five dollars. Credit at indeed dot com slash tech stuff indeed dot com slash tech stuff offer valid through september thirtieth terms and conditions. Apply i got a hypothetical for you. What happens if you run a company. That's focused on online privacy tools like virtual private networks or vpn's and you get caught out running unencrypted services. Well you go into damage control. And that's kind of what's happening with the company wind. Skype wind scribe offers virtual private networks or vpn services and the way vpn's work just from a really high level is pretty simple so you use a vpn client to log into a remote server that is kind of standing as proxy for you then all of your internet activity actually filters through this vpn server before it comes to you anyone who snooping on your connection. We'll only see that you are communicating with this vpn server. They won't be able to see what you're doing beyond that server. So let's say you're using a vpn to get past some regional controls or you're trying to avoid having your internet service provider. No which sites. You're visiting maybe you're shopping for different. Isp's and you would just prefer if the isp you have doesn't know about that. These are all basic things that you could do and this could be really important for protecting your security and your privacy. Now it can also be used to hide your activity. If you're up to no good so there is a double edged sword here but all of this really hinges on having the vpn servers protected with encryption as well as a good policy with regard to keeping so in general it's it's considered best practice if the vpn is not keeping activity logs of its users because if it is keeping activity logs a compromised server could potentially reveal all the stuff that the users were up to when connecting to that specific server one the ukraine authorities seized a couple of vpn servers belonging to wind scribe and those servers proved to be poorly encrypted using an outdated methodology that has long since proven to be insecure. It's been deprecated in other words. We don't use it anymore because it's not reliable. The company has essentially cop to that saying. Yeah that is what happened. And they said that. Generally they encrypt servers that are considered to be in high risk security areas but they failed to do so appropriately in this case in the ukraine which i would think of as being a high security area considering the political issues that go on between the ukraine and say russia and this opened up the potential for someone to compromise the system and ars technica has a really great piece about this. It's titled. Vpn servers seized by ukrainian authorities weren't encrypted that undergo goes into a lot more detail about both the issue at hand and win scribes response also ars technica wisely points out. The vpn services have really taken off over the last few years and there are a lot of different companies that are offering them so it really pays to do your research to make sure that whichever service you're looking into is following the best practices of the industry in order to keep your activity. The way gandalf would want you to you. Know is it secret. Is it safe if it's not don't use it. The verge has a piece titled vigilante app. Citizen is paying users to livestream crime scenes and emergencies which to me just sounds a lot like the plot to the film night. Crawler starring jig. Jilin hall if you haven't seen that movie it's intense. It's for everybody but the movie follows jake. Jilin hall's character is a man who finds out that he can make some pretty decent money if he's the first on the scene of Like an awful accident or a grisly crime and he shoots footage of it and then of course he gets more and more involved as it goes on. I won't spoil any more of it in case you wanna watch it but it is a pretty intense film. Well now. there's an app for that. The company behind citizen is offering between two hundred two hundred fifty dollars a day for people to live stream. Quote unquote newsworthy. Events in their local area so creating kind of a gig economy on on the ground instant reporting the company expects applicants to not just point a camera at like a developing situation but also to conduct interviews like to talk to witnesses and on lookers and the police now. They're not supposed to interfere with police procedures or to put themselves in harm's way but they are supposed to interview folks. This is. i feel like it's active. Asking a heck of a lot from users. The skill set for being a good interviewer is really nuanced and deep skill. Set and i say this is someone who occasionally interviews folks. And i have for a few years but i still feel like i've got a good way to go to become a really great interviewer and it just seems disastrous to open this up to me. Apparently the company has folks in los angeles working ten hour shifts for two hundred fifty bucks a day which is better than minimum wage. But i imagined the work can get pretty risky for numerous reasons also. I don't know how the company works as far as paying people like if you're wandering around your area and it just happens to be a quiet day. Do.

gm ukraine altium Jilin hall Skype jake los angeles
"vpn" Discussed on The Shared Security Show

The Shared Security Show

03:37 min | 1 year ago

"vpn" Discussed on The Shared Security Show

"And <Speech_Male> <SpeakerChange> <Speech_Music_Male> at the same time <Speech_Male> you protect protected from <Speech_Male> diaz <Speech_Male> tax <Speech_Male> when you gaming <Speech_Male> all you have <Speech_Male> the best <Speech_Male> speeds end <Speech_Male> answer privates <Speech_Male> connection <Speech_Male> whenever used jimmy. <Speech_Male> Something on unprotected <Speech_Male> <SpeakerChange> <Speech_Male> fx resembling <Speech_Male> public with actually <Speech_Male> eighty. <Speech_Male> One the senate. <Speech_Male> If i'm greg eighty-one percent <Speech_Male> of americans <Speech_Male> use public wi <Speech_Male> fis and <Speech_Male> only seventy nine <Speech_Male> and seventy <Speech_Male> nine percent <Speech_Male> of those <SpeakerChange> <Speech_Male> Using a <Speech_Male> don't know that it's <Speech_Male> risky. <SpeakerChange> Yeah <Speech_Male> out while <Speech_Male> easing and they <Speech_Male> end only twenty <Speech_Male> five percent <Speech_Male> of those seven <Speech_Male> of those eight <Speech_Male> one percent. <Speech_Male> No that <Speech_Male> at they can use. <Speech_Male> Vpn <Speech_Male> to <SpeakerChange> actually <Speech_Male> secure that connection. <Speech_Male> Yeah that's that's <Speech_Male> one of the big things <Speech_Male> we've from promoting <Speech_Male> on our show <Speech_Male> To our listeners <Speech_Male> is <Speech_Male> whenever you <Speech_Male> travel or <Speech_Male> you're on public wifi <Speech_Male> you absolutely <Speech_Male> need new. Vp <Speech_Male> n <Speech_Male> It just <Speech_Male> we tell <Speech_Male> people to make it a habit <Speech_Male> right when you're <Speech_Male> when you're out <Speech_Male> and about and traveling <Speech_Male> <SpeakerChange> it's that important <Speech_Male> and the best <Speech_Male> thing about a <Speech_Male> <Speech_Male> Is <Speech_Male> that in. Terms <Speech_Male> of traveling <Speech_Male> is that you <Speech_Male> don't struggle with <Speech_Male> your laptop. <Speech_Male> You just have <Speech_Male> simple yourself <Speech_Male> your phone. Your tablet <Speech_Male> and flavian <Speech_Male> is <Speech_Male> multiply full <Speech_Male> submission so you can use <Speech_Male> it on up to six <Speech_Male> devices <Speech_Male> Enjoying <Speech_Male> those <Speech_Male> chevy look <Speech_Male> which <Speech_Male> which <Speech_Male> <Speech_Male> Expand them <Speech_Male> this list opportune <Speech_Male> <Speech_Male> Small devices <Speech_Music_Male> smart kettle <Speech_Music_Male> <Speech_Music_Male> <Speech_Male> <SpeakerChange> <Speech_Male> for you to be protected <Speech_Male> anyway. <Speech_Male> And you have <SpeakerChange> so anyway <Speech_Male> whenever you travel. <Speech_Male> That's great <Speech_Male> so one <Speech_Male> of the one of the last <Speech_Male> questions i want to ask <Speech_Male> you. And this is <Speech_Male> a big one because <Speech_Male> this is a a <Speech_Male> security and privacy <Speech_Male> show. You know <Speech_Male> what is clear. Vpn <Speech_Male> stance <Speech_Male> on logging <Speech_Male> and <Speech_Male> logs <SpeakerChange> in <Speech_Male> those that topic <Speech_Male> festival <Speech_Male> <Speech_Male> encryption <Speech_Male> and security <Speech_Male> you have to <Speech_Male> <hes> say <Speech_Male> that we have <Speech_Male> The <Speech_Male> industry greats <Speech_Male> algorithm <Speech_Male> a astute <Speech_Music_Male> two <Speech_Male> five six <Speech_Male> and <Speech_Male> <Speech_Male> We have <Silence> soup protocols <Speech_Male> that <Speech_Male> we use <Speech_Male> <Speech_Male> Around <SpeakerChange> custom <Speech_Male> protocal <Speech_Male> Edition to <Speech_Male> I <Speech_Male> t. v. Two <Speech_Male> and opened. <Speech_Male> Vpn <Speech_Male> and that's where <Speech_Male> our technology <Speech_Male> than coach <Speech_Male> Understands <Speech_Male> how to balance <Speech_Male> between those <Speech_Male> protocols <Speech_Male> to maintain <Speech_Male> a top security <Speech_Male> on high speed <Speech_Male> and <Speech_Male> the main thing that <Speech_Male> we don't have <Speech_Male> we have <Speech_Male> strict null <Speech_Male> expos so <Speech_Male> don't store <Speech_Male> don't clicked <Speech_Male> down sharia <Speech_Male> data. We simply <Speech_Male> don't need that because <Speech_Male> you pay money <Speech_Male> so it's It's <Speech_Male> it's <Speech_Male> fair <Speech_Male> and we <Speech_Male> also. We <Speech_Male> have strict alex <Speech_Male> policy. <Speech_Male> We don't collect <Speech_Male> we don't store. <Speech_Male> We don't shy <Speech_Male> York tippety <Speech_Male> rebellion <Speech_Male> fully by <Speech_Male> the address. Any any <Speech_Male> data which <Speech_Male> is <Speech_Male> so yeah <Speech_Male> so <Speech_Male> Including we <Speech_Male> we try to <Speech_Male> put your <Speech_Male> security and your private <Speech_Male> says our top <Speech_Male> priority <Speech_Male> when you go online and <Silence> have

"vpn" Discussed on The Shared Security Show

The Shared Security Show

02:33 min | 1 year ago

"vpn" Discussed on The Shared Security Show

"We try to analyze Users location and the needs that user nation for this Network so for example if you are on saying saudi arabia and you have a censored internet uncensored access to some websites. Pb understands that and Excess to the website's you might want to have access to you don't have access to ends for example in saudi arabia. And you have the soda. ethics uganda have access to the. Yes so we'll be understand is focused on helping you have Have full access to the The fully v band potential without thinking. Okay what should i do next. How should i launch it now. You don't even have to thank you. See showed gods and they differ every user. You have them on. The dashboard ends on Have three. I'll show when we come to the and we have the show cuts in the ocean. Yeah i really liked that How it's kind of customizable based on your location profile. That's something i haven't seen with other. Vpn we have around technology. It's dynamic flow technology which is integrated System and instantly analyzes your current network status and some so welcome actions service actual regional content demands. Something that's and connects you to to the best idol seva to for this particular show got for example for some show gets you might need more speed less unprepared and For this you need. And that's where dynamic flow understands These balance and choice maintain it so. This is something that we've been working on a long time. That's great because i know. That's one of the myths I've also heard is You know if you're gaming or if you're streaming video as an example of vpn is going to slow that down right. Yeah it's it's It's not a myth. Some vpn's analysts Effects of cases where some bands through affected by gaming a game in this effective against but in terms of we've gone we try to have this golden ratio where you have streaming for gaming loping.

saudi arabia uganda
"vpn" Discussed on The Shared Security Show

The Shared Security Show

04:09 min | 1 year ago

"vpn" Discussed on The Shared Security Show

"Simple. I'm often reminded about you. Know social networks is a great example of their free. But you are the product because your data is being sold and it's very similar on the vpn side of things as well. Every company has to make money into the day. Have we have a great report on social media on websites One of our our writers analysts are made disagree to search on how social media's actually like motivated candidate imagine and how they use it so Yeah we'll rodents is to go to dot com such in. Yeah yeah we'll definitely link that in the show notes for sure you so the other myth i hear about too is all. Vpn's are the same right. They all do the same function kind of protecting your ip address in injured data. But why is that. Not always true depends are not created equal. That's obvious They defend terms of fees. Experience they defend himself customers vote. They defend himself. His service and Give you but there's one thing that is very common to all the vpn's and this is the i guess the framework that they have for users and that's something that We as lebron tried to Distraught and great something that would Give users another experience. That is focused on them. Let me explain that. so when he usually fleas. Who have tried You know that you open the app and have this seven became you Connect and it all seems very easy but only when you understand which serve need why you need to connect to the server and what you wanna do next but this is not the case for most of users because massachusetts jumble after you need one thousand one needs to watch. Something needs change country and you change to have to bank. We have two big server. Inslee seventy greg born and afterwards you'll left alone it's like someone opened the door this new inexperienced the university. They you know go get new somewhere something and you don't want which to focus on what uses actually need why they come to the beginning. Fetch place whether they want to watch something whether you want to Improve connection whether they want to modernise state fully private on any network. And this is where we came with this idea of shots so basically every show Is focused on using these network streaming on change. Ip safe jets No malware so. We try to protect us from accessing the militias sides and this is how we change the whole direction with us through the app now. Dan becomes not only psychological solution..

Inslee greg born lebron massachusetts Dan
"vpn" Discussed on The Shared Security Show

The Shared Security Show

04:20 min | 1 year ago

"vpn" Discussed on The Shared Security Show

"We own our how the laws of bent from the mental site site. It's kinda sketchy that's right that's right. You know that kind of leads me to talk a little bit about. I love to hear your thoughts on how. Vpn's are you know. The myth is that there are only used by security and privacy. People like myself right. Why is that such a myth wire. Vpn's really anybody should be able to use vpn. I think that the ground for this memphis because it's tricky technology means it's It's not that comprehensible by mess and sites As it used merciful for security reasons people that it's only for security nets however it's vpn is a very versatile you can use it. It's full security against full content In terms of content for example as we're talking about says china north korea 'em separate situation Raw shack Of bbn's lies in the attempt to control. The contents that uses have access to and vpn is a perfect tool to gain access to content. And we're not talking about some sense of content talking about expanding the contents example Not many stream lebas near that. Netflix has different libraries for every country. And they changed. They changed drastic from concentra conseco is one of the biggest in wild yes is not and some shows are available netflixing. Us available for example nassib spain and vice versa. So using vpn you can gain access to content with exception of course not do anything illegal ice And you can just expand the content. So vpn is a tool for base protecting is online and expanding We like opening a window to any world if at allegory. Yeah that's true that's true. A lot of people don't think about that from a content perspective where we're vpn's are absolutely useful. And i think too i i think. Vpn's have gotten easier to us over the years companies like clear. vpn has definitely. i think Just in a interface perspective made things a lot easier for people that don't have a lot of technical experience to us So it's great to see that as well now. One thing i hear a lot about is while i get a free. Vpn writes They're they're available. Why should i pay money for a vpn. And i think it's important to note that free. Vpn's aren't necessarily free at the end of the day. Can utah nevada. That's right yeah It's there's a misconception Let some is something free online. It's free but it's not at all. Everything is a surprise and at some point you become the products when using some through things and with free began to the same station when you imagine how much africa have to put Paid up that has uses that has retention that has customizable and all of this people have to feed their families so that has to be some money and even freebie beyond is three and they don't receive any revenues so that kinda doesn't match up that's where it's become strictly because Some really beyond simply cellular data to the counties they They ads Advertisement is just like top on books. So the main problem is selling data with bbn's This is just eliminated because you'd pay money and there are no walks. Your v bands like allies like giving collected even donated. We simply needs you to be happy space money and for everybody to be joyful without funders. It's.

concentra conseco memphis north korea Netflix china Vpn spain nevada utah Us africa
"vpn" Discussed on The Shared Security Show

The Shared Security Show

04:51 min | 1 year ago

"vpn" Discussed on The Shared Security Show

"This sponsored episode of the shared security. Show from our friends at clear. Vpn today artem shchukin content marketing manager at clear. Vpn will be speaking with me about the popular myths about vpn's will welcome to the show artem. Yeah welcome everyone. Thanks for having me and it's a pleasure to have you might so. Can you tell us a little bit about yourself and your role at clear. Vpn yes you will as you stated greatly on the content to manage manager Beyond ends basically. That's what i always see the content whether it's connected sue began whether it's impli fan so everything that has woods visual Anything that sorts. I oversee that excellent so so today we're going to talk about these myths of a vpn. Because i think a lot of people have miss misperceptions about what a vpn is what it does. So i thought it'd be great to have you on the show where you could talk a little more detail about that and also talk a little bit about clear. Vpn and what you guys do. That's a little bit different from the other. Vpn's that are out there so stay tuned for a demo of some of the features and functionality of the clear vpn product which i think our listeners would would love to see love to show them. That's why the loss of myths surrounding vpn technology and it's pretty young lease But however It's already widespread attitude to the technology involved in that environment. That who are leading now So can stop Guest full the full you of us. Who are not in similar. With vm itself. So it's virtual private network and basically what it does it creates a tunnel Your connection that allows you to group it stay privates at two from the rain is of anyone government of hackers of lake your neighbor Ends up this is the thing. This is key point where many people just sing that. It might be something illegal because we think that something that allows us to consume..

artem shchukin
Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

Cyber Security Headlines

02:10 min | 1 year ago

Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

"Israeli firm uses windows zero days to deploy spyware microsoft and citizen lab have linked israeli spyware company. Candy also tracked as sour gum to new windows. Spyware dubbed devil's tongue deployed using now patched windows. Zero day vulnerabilities. Candy row is a secretive israel based company. That sells spyware exclusively. The government's explained citizen lab and their spyware can infect and monitor. Iphones androids max. Pc's and cloud accounts citizen lab also tied over seven hundred and fifty websites to kangaroos spyware infrastructure finding that many of these domains mimicked domains representing media companies and advocacy organizations including amnesty. International and. Black lives matter. Cyber attacks increased seventeen percent in first-quarter. Twenty twenty one with seventy seven percent being targeted attacks this according to a new positive technologies cybersecurity threats scape q. One twenty twenty one report cybercriminals typically attacked government institutions industrial companies and science and education institutions. The main motive for attacks on both organizations and individuals remains acquisition data. Other findings in the report include. That ransomware is still the malware that is most often used by attackers. That the most popular vulnerabilities for attackers. This quarter were microsoft exchange server acceleration and sonic wall. Vpn and that more cybercriminals are developing malware to conduct attacks on virtualization environments another unpacked bug in windows prince. Buhler microsoft is warning of another vulnerability in its windows print spooner that can allow attackers to elevate privilege to gain full user rights to assist them this follows they're patching of two other remote code execution bugs that collectively became known as print nightmare. Microsoft released a new advisory late. Thursday for the vulnerability tracked as cv. Twenty twenty one dash three four four eight one microsoft credited dragos vulnerability researcher jacob baynes for identifying the issue. The vulnerability exists when the windows print spoiler service improperly performs privileged file operations

Microsoft Israel Government Buhler Jacob Baynes Dragos
Russia Still Using 'Brute Force' to Break Into Computer Systems

Cyber Security Headlines

02:18 min | 1 year ago

Russia Still Using 'Brute Force' to Break Into Computer Systems

"Russian military cyber unit behind large scale brute force attacks a press release issued by the national security agency on thursday indicates that the russian military cyber unit used a cooper netease cluster to quote conduct widespread distributed an anatomist brute force access attempts against hundreds of government and private sector targets worldwide and quote. The advisory indicates that the threat actors used the brute force capability to access sensitive data and identify account credentials. The actors exploited well known vulnerabilities including microsoft exchange bugs for remote code execution in further access to target networks. The advisory notes that the attacks are ongoing enlists mitigating steps. That network administrators should adapt including use of multi factor authentication implementing timeout in lockout features. Use of strong passwords and deploying zero trust security models authorities sees double vpn service used by cybercriminals a coordinated operation by authorities in nine countries from north america and europe resulted in the take down of the double vpn service which allegedly served as a hideout for ransomware operators and fishing scammers double vpn which was heavily advertised on both russian and english speaking underground cybercrime forums offered its customers single double triple and even quadruple vpn connections for as little as twenty five dollars per month to help them hide their misdeeds a seizure notice appearing on the now defunct site indicates that law enforcement has taken possession of double vpn servers including details of all of its customers and goes on to state quote. Double vpn's owners failed to provide the services. They promised and quote microsoft research team reveals critical. Vons in nekia routers on wednesday microsoft's three sixty five defender research team revealed three critical authentication. Vulnerabilities impacting neck year routers. The first bug allows unauthenticated access to any page a susceptible device by appending get variables in sub string requests while the second flop permit side channel attacks which allow attackers to extract stored credentials in the final bug allows extraction of the net gear back n. t. g. r. b. k. Encryption key allowing remote attackers to decrypt an excess stored.

National Security Agency Microsoft North America Europe Vons
BP's Role in a Net-Zero Carbon World

Switched On

02:26 min | 1 year ago

BP's Role in a Net-Zero Carbon World

"What is it about that you think differentiates them in this space that it's quite progressive to say that you're you think that an oil and gas firm is exact right place to be in looking at decarbonization the energy transition. I actually think that if we want to play a critical role getting to the paris alignments the carbonized energy systems. We need to walk energy companies. I think that's the first element brooches you conscious decarbonize energy systems by walking with companies. But if we really want to get the pass alignment winnie talks support such as us which energy plus industry transport represents seventy percent of global emissions. So we need to really work with companies such as Gas companies to actually help them decarbonised in. Go along that journey. So i i don't see joining a company such as vpn Gas company which is committed to she decarbonising as a progressive jenny. I think it's actually very much lines towards the ambition on the purpose in terms of what is unique about ep. When i actually had my first conversation with the time when i was actually considering jet joining the had already involved on a series of multiple conversations with multiple types of stakeholders from institutional stakeholders eeg governments. They called as with investors across the world and with less obvious stakeholders such as ngos and some of the most challenging gio so there was a whole process of listening which was going on and that person of listening actually very much shaped his perspective and also the l. tease perspective leadership teams perspective. So what. I was actually struck by the super superstrong alignment within the whole leadership team within the company itself on this ambition to transition at the end of the day. If you're actually working in the morning gas company and your delivering energy to the world he also wanna feel good about what you're doing and in equivocally we all delivering energy to the world's anna frame of the energy transition we have capabilities in the skills to continue doing so trudy energy transition and and towards the low-carbon well

Vpn Gas Company Winnie Paris Jenny
A New Kind of Tournament Platform with Trey Christensen

Esports Network Podcast

02:58 min | 1 year ago

A New Kind of Tournament Platform with Trey Christensen

"Welcome in trade Christensen, the VP of growth Faith or First Blood. How you doing tray? Very good, appreciate. Appreciate you having me for today. Kevin, I appreciate it. Now, this is your second time on on the show. First time was with the Mitch over a year ago. So yep. Yeah, you know, what's going on. So in case you guys missed that that his previous outing with us, she's a former Halo Pro Gamer. I like I said, currently VPN for a growth that first Blood you were also, if you are still part of the Air Force National Guard CRVs, Gigi your formerly director of Esports and later director of digital Communications for Dallas, the Dallas Mavericks, I guess they're gaming. Then the team itself, which is awesome. And so, I mean, you've been through the ringer on on quite a lot of of things here. So you go from Pro Gamer, to working with the Mavericks to kind of forming their own way through the business of Esports. And I just got to say, Applause all around, not many people can make that that kind of transition know, I appreciate it. I think that it was, I'll say that some of it was an accident, some of it was just need a shipping but overall it's been, you know, a very been very fortunate, very excited to, you know, move on to the next project and see what I can make happen, but it's been an adventure. Definitely wage Uh, to take a career in gaming, essentially After High School. Just instead of going straight to college like everyone else did, I went straight into gaming and I was just all about it and sort of led me here, so that's cool. So I'm glad you bring up something first. I really want to, I want to go over just your former career. I guess, as your past life, as a Halo Pro, I mean, you can pay for about four or five years on the page, the circuit. And then you you I imagined there were some, some important lessons you learned as a player that kind of helped you later on. As you kind of went as more, you know, managerial corporate business. He type of Esports a personality. So, what kind of lessons did you learn? As a player know, I think the biggest lesson is networking. So when I was competing I was, I was off hyper focused on, you know, just rivalries competition in general. And at that point, you know, I'm like eighteen, nineteen, twenty. I'm I came into it a little bit later than everybody else. Then I was competing against, but the networking side was something that I had to pick up gradually. I didn't just have it. So I went into it and I treated every rival as if they were like my Fierce enemy. And I, you know, it was like the only people that I hung out with and talked to were the people that I was teeming with and trying to make a career with. And it took me a while to start to understand that, you know, if she is on my side and the more connections and friendships that I cater to, the more people I had the opportunity to team with the more people that ended up staying in the industry and working in the industry. And so by the end of my career change, you know, just gaming and Halo. I was able to make a lot of friendships that I now, even utilized

Air Force National Guard Christensen Digital Communications Dallas Mavericks Gigi Mitch Mavericks Kevin Dallas
Nigeria Demands Social Media Firms Get Local License

BBC Newsday

01:31 min | 1 year ago

Nigeria Demands Social Media Firms Get Local License

"Nigeria. First we're adding to the ongoing Twitter ban, the government has announced as social media companies will now have to register them be licensed by the Broadcasting Commission over 170 civil organizations are vowing to continue or tweet continue tweeting and they've lodged a legal case against Nigeria's government with eco US. Meanwhile, while others trying to circumvent the ban by using VPNS their fears of plans afoot to create a comprehensive Internet firewall and the foundation for Investigative Journalism, claims that last Saturday, Nigerian government officials held talks with the cyberspace Administration of China. In order to explore ways to further restrict freedom of expression. Well, let's find out more from Socrates. Mom, Lou, who is from the foundation of Investigative Journalists, greeting to you, and thanks very much for joining us this morning. So tell us what details you have. About this meeting, please. Socrates. Thank you so much. Um, Basically what? What? I what I know about what I was told. Was that emitting held on Saturday. You know, just as specified in the report, and it was between some government officials in Nigeria here and, uh, Some Chinese officials from that particular organization, a particular um, administration and it was all about creating a firewall that would be able to create even Nigeria. Some sort of, um, independence and it's uh, Internet space, so it's sort of Nigeria Internet.

Broadcasting Commission Nigeria Foundation For Investigative J Cyberspace Administration Of C Foundation Of Investigative Jo Socrates Nigerian Government Twitter LOU United States
Apple to Reveal Where Your Podcast Data Goes

podnews

00:34 sec | 1 year ago

Apple to Reveal Where Your Podcast Data Goes

"Apples. Ww dc event announce new privacy features which could impact podcast publishers in future. The app privacy reports will allow users to see what the main has been requested by apps which may be useful to see data. Your podcast app is shared with others. A private relay will also be available for icloud plus paid customers. It appears to be a combination of a secure. Dns service and a vpn and could give some challenges to podcast management and dynamic audio insertion if it's extended access to the whole os.

Icloud
Canadians Still Fall for Windows Support Scams

Cyber Security Today

01:44 min | 1 year ago

Canadians Still Fall for Windows Support Scams

"Canadians are getting smarter in refusing to fall for windows tech support scams. These are scans. Were callers pretend to be from microsoft or its partners and claim your computer is infected or they caused messages to pop up asking users to phone a window support number. The goal is to get victims to pay for fake windows fixes according to a briefing for reporters last week by microsoft's digital crimes unit microsoft gats six thousand complaints a month from people around the world about these scams in canada last year. It got just under two thousand two hundred complaints. The good news is that's almost half as many complaints as we're filed in twenty eighteen and that's partly because cybersecurity awareness. Education is succeeding. The bad news is is that of the complaints. Canadians filed last year. Fourteen percent or about three hundred people fell for the scam. Paid money to the crux so a lot of people haven't learned microsoft. Won't phone you. Microsoft partners won't phone you. Microsoft won't make alerts pop up on your screen asking you to phone them. The threat group microsoft nicknames nobel bellingham is added again. this is believed to be a russian based gang. That was behind the attack last year on solar winds in report last week microsoft said it discovered a new series of nobel ian attacks these target more than one hundred fifty organizations mostly in the united states

Microsoft Canada Bellingham IAN United States
"vpn" Discussed on Rocks Across the Pond

Rocks Across the Pond

03:40 min | 1 year ago

"vpn" Discussed on Rocks Across the Pond

"It is awful Now that everyone at the grand slam of curling hates us Which i really don't care what was eight says grandson. Curling hates us. I'm making all kinds of friends today. Jonathan it's great team. Schuster and team peterson participating at this nationals I really don't mind it This event does not lead to of world's birth because it's taking place after world's obviously There is an olympic trials. Spot up for grabs. The twenty twenty. Two worlds spot will go to the team. That wins the nationals. That'll be held in february of next year So i don't mind that they're not participating in fact. I think that it makes these tournaments more wide open and it makes the round robin more exciting to watch. Yeah i i agree. I especially on the men's side because links schuster's kinda really dominated I think i think with peterson. Not they're probably sinclair's the maybe prohibitive very strong favorite. Let's put it that way on the women's team christianson..

Jonathan Schuster peterson february of next year christianson today sinclair Two worlds grand slam of curling twenty twenty links schuster eight robin
Another warning to Fortinet administrators

Cyber Security Today

01:54 min | 1 year ago

Another warning to Fortinet administrators

"I started the week users of fortinet security devices that hackers are actively looking to exploit several vulnerabilities in its products unfortunately. It administrators have been slowed patched them. Well on thursday security company kaspersky said one of those vulnerabilities is being exploited on fortinet. Vpn gateways to launch ransomware attacks. The initial now where steals user names and passwords which an attacker uses to get into the computer network through the fortinet device. Then the ransomware is downloaded. It administrators that haven't learned from the earlier warnings from four dinette to install the latest patches. Maybe sorry by the way in one case that kaspersky investigated the victim firms. Antivirus was also behind in its database updates so remember for best protection every corporate application has to be regularly updated and that's not all also contributing to the success of the attack. Kaspersky looked at where other failures for some reason. Some of the modules of the antim- our protection. The company used were turned off now. The idea of malware is to protect the company why some features were turned off is mystery. In addition all employees at this firm could access any data that the company had one of the prime defenses of any organization is limiting employee access to sensitive data to only those who need it. Now that can be hard in small firms but if you allow everyone to access everything that a hacker only needs to steal one person's password and they can easily spread malware

Kaspersky
Supreme Court sides with Google in Oracle’s API copyright case

Cyber Security Headlines

01:57 min | 1 year ago

Supreme Court sides with Google in Oracle’s API copyright case

"Supreme court rules in google's favor on java. Api case the us supreme court ruled six to two in favor of google in its copyright dispute with oracle over twelve thousand lines of code from the java. api used an android originally written by sun microsystems which oracle acquired in two thousand ten the decision perverse decision by the. Us court of appeals for the federal circuit oracle had asked for nine billion dollars in damages. In the majority opinion justice. Steven brier wrote the use of the code was protected under the copyright doctrine of fair use firmware malware on the rise according to microsoft's march twenty twenty one security signals report over eighty percent of enterprises were victims of at least one firmware attack. In the past two years the survey had respondents from one thousand companies from china germany japan the uk and the us reported the majority of security investments or going to security updates vulnerability scanning and advanced threat protection solutions. The report notes that nist national vulnerability database has seen a fivefold increase in firmware attacks. In the last four years the report found that only thirty percent of business invest in hardware based memory encryption forty six percent are investing in hardware based colonel protections while twenty one percent of decision makers said they were not able to monitor firmware at all. Ap ap's exploiting vulnerabilities in s ceasar and the fbi issued a joint advisory that over the past month threat actors have been seen. Exploding three vulnerabilities in fort annette's four two zero s currently the seems limited to scanning of devices on three reports for the s s. Vpn web portal flaw. But the advisory warns this could escalate to more sophisticated diaz or sequel injection attacks or serve to gain access to networks across multiple critical infrastructure sectors to gain access to keep networks as pre-positioning for follow on dead exfiltration or dead encryption attacks patches for the exploits are now available and the advisory recommends applying them immediately as well as disabling unused ports

Oracle Us Court Of Appeals Supreme Court Steven Brier Google Sun Microsystems Ap Ap Fort Annette Microsoft Germany Japan Ceasar China UK FBI
Microsoft: 92% of vulnerable Exchange servers are now patched, mitigated

Cyber Security Headlines

00:37 sec | 1 year ago

Microsoft: 92% of vulnerable Exchange servers are now patched, mitigated

"Fast and furious exchange server hack addition. We've reported previously that microsoft released critical updates to fix for vulnerabilities in microsoft exchange servers on march second despite microsoft urging immediate attention to zero day vulnerabilities f secure reports that only about half of the visible exchange servers on the internet have been patched and criminals are attacking tens of thousands of them a day. The uk's national cyber security center recommends those who cannot patch right away should block untrusted connections to port. Four forty two andrew access through vpn. Microsoft has an automatic mitigation tool for unpacked servers. Available in defender

Microsoft National Cyber Security Center UK Andrew
Encrypted messaging app Signal blocked in China

WSJ Tech News Briefing

05:16 min | 1 year ago

Encrypted messaging app Signal blocked in China

"The encrypted messaging app signal became unusable for many people in mainland china this week with users concluding it had been blocked authorities. Their signal was one of the last widely used messaging apps that could send and receive encrypted messages in china without a virtual private network. Our asia tech reporter stephanie. Yang has been following this and she joins us now to talk about it. Stephanie thanks for being on the show. Yeah thank you for having me. So can you just give us a sense of how people have used signal within china and what role it's played in discourse there. Yeah so signal tends to be a very barebones messaging app. That people generally use to communicate when they want an encrypted option so traditionally everyone in china really uses chat but we also subject to censorship and surveillance so signaled has often provided a different venue for that journalists. Have use it in their work or people overseas have used it to keep in touch with friends family and sometimes activists on politically sensitive issues that they wouldn't want to put on a different app and so signal was gaining in popularity in china for some of the reasons that you just mentioned but were there other factors that were contributing to its growth. Yeah so it's interesting. A signal has actually been used much less than some of the other encrypted apps that are blocked in china such as telegram and what's app but it had been gaining traction leading up to this moment most notably in august according to some research on app downloads that signal had seen record high downloads. After the trump administration had announced that it was going to ban we chat in the us got it. I want to get a sense of the impact of this apparent blocking of signal in china. I'm for someone who wants to use signal there now. What does this mean for them. So it seems that signal can still be used using a virtual private network or a vpn tool that you can log into to circumvent china's censorship blocks so these are used for people in china who need to access facebook or read some foreign media for business things like that. The problem is that because signal used to be available out. Vpn and now it requires one that may cause complications for some people who would like to use signal. because it's getting increasingly more difficult to find. Vpn's that work and that work well so hundreds of vpn. Recent years have been removed from the app stores and then at the same time there have been an increasing number of fines and penalties on people who both use and provide vpn's which is a strong deterrent for those who might be looking for that option so even though feasibly there is a work around you could still use signal and mainland china. It just makes it that much harder. Got it and we should be clear. The china's government has not said that it blocked signal there have been several other social media and messaging apps that have become unavailable in china. What do with authorities say about this. So actually the ministry of foreign affairs in china feel the question on a signal in their daily briefing and so the said that they weren't aware of the situation and referred it to the relevant department for questions but did say that china has an open and free internet but which also governed by china's laws so Is this apparent blocking signal surprising. So it actually isn't a lot of people have said this would kind of the expected given that signal is used for encrypted and private communications so what some people think may have happened is that signal has been flying under the radar for a while because its user base has been so small compared to some other popular messaging apps like whatsapp or telegram of for reference signals style nodes in china have only reached about five hundred thousand compared to millions for for what's upper telegram so in this case it's not clear why now but it could be that the slow but steady traction that was gaining was enough to put it on someone's radar so big picture. What do all of these restrictions on various communications channels in china mean for public and private discourse there so. I think that it's kind of just one more on the pile of unavailable apps in which people can speak freely and communicate in an encrypted way so kind of consolidating everyone towards the main channels of chinese apps like we chat for signal. This was really one of the last ones that people widely used to communicate with each other off of we chat. And so not having that option i think is just detrimental to being able to speak freely about certain sensitive issues especially communicating with others even outside of the mainland

China App Stores Yang Stephanie Ministry Of Foreign Affairs Facebook United States
Encrypted messaging app Signal appears to be blocked in China

Daily Tech News Show

00:17 sec | 1 year ago

Encrypted messaging app Signal appears to be blocked in China

"Multiple reports including a test from texas show the signal messaging app no longer works in china signals. Website appears to have been blocked as of march fifteenth. The app was still available for download on apple's chinese app store as of the morning of march sixteenth but was not functioning without using a vpn.

Texas China App Store Apple
Stolen password leads to loan company hack

Cyber Security Today

05:06 min | 1 year ago

Stolen password leads to loan company hack

"Citywide home loans. Which lends money in. The united states is now notifying people that it was. The victim of ransomware and data theft attack in november information on a number of employees and customers was copied according to letters filed with several states and attacker got hold of employees log in credentials for the company's virtual private network. It isn't explained how that happened. One possibility is vpn. Software was hacked in the past twelve months. The software of corporate vp ends of at least two manufacturers have been cracked to expose user names and passwords. These are being sold on criminal websites. There have been many warnings so. It administrators recently to install the latest vpn security updates and have users changed passwords in order to fight this other possibilities. Are the loan company. Employees password was guessed or they were tricked into revealing it no matter the method experts say the proper use of multi factor. Authentication is a good way to add extra protection to log ins now. The next to items take a bit of explaining so please be patient organisations. Worry that personal data of customers and employees can be violated in two ways through a hacked by outsiders or abuse by an insider but who is an insider an employee for sure but it also includes employees of partner contractor or supplier firms with data access and as an article this week on the new site data breaches dot net points out. It can also include the subcontractors of contractors the author gave the following example. An american health insurance provider fought risk management software and services from firm. Alcohol company to this firm subcontracted some work to affirm call company three one of company threes employees with access to the insurers data had aside business training people how to do data coating. This person was using the insurance company's data for training material with those people without permission so unapproved people. We're seeing patient data. That's the data breach so far just under one thousand people have been notified. Their personal and medical data may have been involved. This incident raises a number of questions. Why didn't the insurance provider anonymous is. The data sent to company too so the risk of compromise was if that wasn't possible. Why didn't company to anonymous the data. That was by company three. What other security measures could have been used to prevent company three employees from seeing real data and did the health insurer realize all the risk it was taking opening. Its data to several companies as the author notes organizations can force employees of contractors and subcontractors to sign business associated agreements the cover the proper data handling and privacy however compliance with those agreements has to be regularly policed. Finally crooks have been manipulating the results of search engines like google for years to spread malware. The idea is to get a high result of a search to be an infected website. A security company sophos said this week it recently found a gang using one of those techniques. Not only for spreading viruses but also ransomware. It works like this. You ask the search engine to find the answer to a specific question that the crooks think people are likely to want answered high up on the list of returns our links to what looks like legitimate companies. Click on a link and you go to a forum with a message that offers a file downloading with the answer to the question. Download that file and you get like similar. Search engine scams crook start by secretly placing code on the websites of unsuspecting companies. So their site will call them up high enough. Search that fools people because they'll trust legitimate-looking web address in one example. The report says the question was do. I need a party wall agreement to sell my house. The first on the list of search engine responses was the website of canadian medical practice underneath. That address was linked to do. I need a party wall agreement to sell my house.

United States Sophos Google
A Live Animated Stage Production... Wait, what?

Kottke Ride Home

05:13 min | 1 year ago

A Live Animated Stage Production... Wait, what?

"Thing. I feel like i haven't spent enough time. Thinking about is how the pandemic will change arts not just what kind of pandemic themed stories will see and have already begun to see but literally how it will change the medium for some things. It's something that a lot of other people have been thinking about. However and some technologies that were previously relegated to low budget. College tinkering are starting to get their moment in the spotlight and the funding to boots. Here's one example. The royal shakespeare company in england is putting on a virtual production using real time animation created by actors in a motion capture space who will interact live with virtual audiences basically they have actors in motion capture suits and facial regained with corresponding avatars of their characters. The audience will be able to see both the actors and their characters as they move around and perform inside a virtual forest scene and as they go about the story. The actors and audience will be able to interact. What exactly that will look like in real time. I don't have a clear sense of. But on their website the royal shakespeare company says quotes audience plus to get holders take on the role of firefly's helping to light the forest and interacting with their mouths track pad or touch screen the actors respond to audience interaction and direction making each performance. Unique and quotes won't many different groups around the world have been working on similar technology. The royal shakespeare company claims to have been the first to pioneer this technology for a live theater performance. Back in two thousand sixteen with their production of the tempest in that performance. The actor who played the spirit ariel was kitted out with sensors that were translated into live animation on stage enhancing the magical sense of the character for audiences as our a artistic director. Gregory doran said at the time the way the technology was being used means quote. The actor becomes the marionettes and the puppeteer at the same time and quotes old now. Almost five years later. Technology has advanced even more allowing them in partnership again with epic games's unreal engine to make more sophisticated of multiple actors plop them into a virtual setting and allow an audience to interact in real time. The show itself is not a complete play like the tempest was but rather a fifty minute experience. Based on the world of shakespeare's a midsummer night's dream led by puck you as the audience will explore the forest and meet other sprites and ferries from the play working to prevent an oncoming threats of destruction. If you want to experience what they're calling simply dream you can get tickets at the lincoln the show notes if you just want to watch. Tickets are free. You don't even need to reserve them in advance but if you want to be a part of audience plus get to interact with the performers. It's ten pounds. And i think you may need to actually be based in the uk to participate in that. Their site checks the compatibility of your device before allowing you to purchase audience plus tickets and no matter which browser device were vpn. Trying to use. I couldn't get mine to be marked as compatible so you can try it yourself but definitely you can tune in for free if you are not in. The united kingdom shows are march twelfth through the twentieth at various times through the afternoons and evenings. So even if you're watching from another time zone you may find one that works for you but getting back to the technology of dream another cool thing that they're doing that as you're on that journey with the fairies if you interact or the actors change things up based on audience response the musical score will change accordingly quoting again from. Sec dream features a symphonic score based on recordings by the philharmonia orchestra conducted by principal conductor and artistic adviser sullivan. The recordings are expanded by music. Created in real time by the movements of the performers this living dynamic soundtrack adapts and interacts with the narrative and the prerecorded orchestral tracks and quotes. I'm super fascinated by this technology. In terms of its impact on both live in virtual theatre in general but also as an interpretation of shakespeare and other older plays you know so often performances of shakespeare set in his time with stuffy elizabethan costumes and settings feeling so intensely old and uninteresting to many people but shakespeare and his contemporaries were cutting edge. They were innovators. They pushed the limits and once he got over the paranoia of this being the devil's work. I think shakespeare would have been really into this giant leap forward in live. Theatrical portrayals are a or director. Dora thinks similarly telling the observer quote this is a twenty first century reimagining of shakespeare's play which is giving us a completely different vocabulary of imagery. That's extraordinary when we did the tempest in two thousand sixteen explored the opportunities that the digital world could give to us. I really did think then quoting the play. This is a brave new world. There's so much opportunity out there. It says if technology is now providing us with this amazing paintbox. We've a lot of very exciting talent that can find uses for those new tools and quotes.

Royal Shakespeare Gregory Doran Shakespeare Royal Shakespeare Company Ariel England UK Lincoln Philharmonia Orchestra SEC Sullivan Dora
Clubhouse Blocked in China

Daily Tech Headlines

00:12 sec | 1 year ago

Clubhouse Blocked in China

"The api for the audio bay social number clubhouse is now blocked and china though the apps website remains available. The app was not officially listed in china's app store but the app could previously be used without vpn in the

China App Store
Virginia legislature votes to end death penalty

Here & Now

03:40 min | 1 year ago

Virginia legislature votes to end death penalty

"Virginia today. Lawmakers in the state house voted to abolish the death penalty and if governor ralph northam signs. The bill virginia would become the twenty third state to end capital punishment. Whitney evans is report for member station. Vpn and she joins us now from richmond and whitney. What's the latest in virginia. Where things stand with this bill. Hi yeah. Both chambers have now approved their versions of the bill but they still have to resolve a disagreement before it can actually go to the governor's desk and that's whether people who were at one time sentenced to die in virginia would perhaps be eligible for parole down the road and the senate is actually pushing for pearl eligibility. So are they going to have to vote. they're going to have to go into what's called a conference committee and hash it out and then they will have then and then it would go to the governor for his signature so democrats are in control of the state legislature in virginia. And the votes on this. Bill have been think largely on partisan lines party lines. But you note that at least a couple of republicans have shown some support along the way. Why is that news newsworthy. That's right well. Democrats have been wanting to abolish the death penalty for some time but they didn't have control of the legislature One republican senator. Bill stanley actually signed onto cosponsor. This bill The senate version of the bill but he backed out because senate democrats wanted to leave the parole provisions in and In the house today to republicans join their democratic colleagues to vote for the bill. In what are you hearing from other people who have an interest in keeping the death penalty groups supporting the victims families or maybe police advocates. How are they responding right. So law enforcement groups in virginia support the death penalty. They wanna make sure that people can still be sentenced to death particularly for killing police officer. the majority of virginia republicans. Again say You know they also support the death penalty and they say victims families deserve what they see. As as this form of justice mind you. I've spoken to numerous family members of victims. Not just in. Virginia who say you know it only makes healing more difficult. And they don't see it as justice at all. I really spoke to rachel. Set sutton the daughter of a police officer who was murdered by name. William in two thousand six more of it was executed in two thousand seventeen against his wishes. Did we just lose. Whitney their whitney. Are you okay well. Why don't we play that tape. If we're waiting for whitney to come back here on the line why don't we play that tape if we have it or many of us and we have continually spoken out that this is not what we wants however we want to honor that is who disagree with us and we are not speaking against them but against this issue that we see from combat society. Yes up and told me that following the whole process leading up to more of his execution was just really painful. Sorry for the technical difficulties. There whitney could you put this into context for us quickly. Virginia has a long history of executing people but actually hasn't done so in a few years. So what does that mean for. People who are still on death row right there to people on death row for capital murder. Both men are black in their forties One of those individuals was convicted of murdering his girlfriend and her two young children. The other was sentenced to death for killing a police officer so abolishing. The death penalty in virginia would reduce their sentences to life in prison. All right whitney evans legal reporter for vpn in richmond. Virginia thank you so much. Thank you

Virginia Governor Ralph Northam Whitney Evans Senate Bill Stanley Legislature Whitney Richmond Bill Sutton Rachel William
Myanmar coup: Military blocks Facebook for sake of 'stability'

BBC Newshour

03:43 min | 1 year ago

Myanmar coup: Military blocks Facebook for sake of 'stability'

"Myanmar because today the military leaders who sees parents who are Monday blocked access to Facebook by father dominant social media platform in the country on most people's only access. Two news officials said they were shutting it out for several days for the sake of stability is the reaction of one university student in Yangon, who also has a job in I T blocking Facebook today means that the freedom of young people is restricted. From now on. I am a student how education has been suspended and business frozen amid the ongoing pandemic. Military coup has started costing us our jobs, and our education is now in trouble. Southeast Asia correspondent Jonathan Head is following developments from Bangkok. He's been telling me why this act of censorship is such a big deal for Facebook is almost uniquely dominant in Mama, and that's a peculiarity of the way in which modern telecommunications arrived very late in the country. Facebook offered people the chance to Rome using Facebook to surf the net or Sir Facebook free of data charges, and it just became the default browser for the whole country. It is the essential way in which people access information on communicate with each other. So this is a pretty big deal. Interesting that the military is says they're only gonna do it for four days. Think there would be a very angry backlash of it lasted longer and I suspect if it is for that short period, what they're trying to do at the moment is pre empt any early attempts to organize. Resistance to the coup on a lot of Burmese now rapidly trying tow discover other networks. There's been a surge of people going to Twitter. I've noticed a lot of people, Burmese people I know go on to signal All these various alternative acts, people discussing online how they can get around other attempts by the member authorities because they're now targeting VPN virtual private networks that people use to get around there blocking attempts. I've seen Burmese friends looking into the sorts of technology that people in places like China have had to learn to use because of official censorship. So that's resistance within the country. The U. N secretary general is calling for international pressure against the military. But I mean the military survive for years as a pariah state, and they They did. I'm in the argument about how effective sanctions were the first time round. They were applied in the 19 nineties and then at the start of the millennium is still going on. Many people view them as counterproductive is a blunt instrument. That largely heard poorer Burmese people and the military with their huge conglomerates linked to dodgy businesses like illegal logging and jade mining. We just unaffected. It is arguable that the isolation embarrassed the generals, and that was one of the motives for them. Opening up and allowing AH, form of democracy toe take root in Mama. I think if they're going to go for sanctions, they'd have to be targeted Sanctions and the problem there is that they've already applied those Tow. Those most involved in the atrocities against the revenge is there happened to be the very same generals who carried out this coup? Don't think of international pressure is going to make much difference at all at this stage. Governments have to say what they have to say The U. N has to say what it does. This is a very shocking coup right after a very decisive election results. But in the end, you know the generals will not want to go back to the isolation that almost destroyed the country in the seventies and eighties. They will want some kind of engagement. They'll start with their neighbors who are more willing to engage fairly quickly. I would imagine, and, of course, China.

Facebook Jonathan Head Yangon Myanmar Southeast Asia Bangkok Rome U. Twitter China