tv PODKAST 1TV June 5, 2024 12:45am-1:31am MSK
12:45 am
12:46 am
einstein and we talk about film adaptations of pushkin and about those films that show or showed us pushkin on the russian and soviet screen. we are film historians, natalya ryabchikova and stanislav didinsky. pushkin in the eighties is really already becomes so completely caricatured, while someone is making film adaptations of pushkin quite seriously. and we go from the very beginning of russian cinema or... to the beginning with boris godunov, we end his eighties with boris godunov, this is a terribly fascinating story, the last completed film of sergei bondarchuk, and in the early eighties he released the film kuproduction with cuba, red bells , such a revolutionary opus and failure, and he takes on boris gudunov, and this is such the last takeoff of technology soviet film production, cameraman vadim yusov, costume designer. they cast some kind of
12:47 am
bell, take it to the kremlin, that is, they film in the kremlin, they find some factories in the soviet union that can sew and embroider the silk they need, they find some factory in sverdlovsk that sews either vestments, or some kind of church vestments, and the chief engineer tells them, well, if we... for the church we sew this fabric, we also make it for our beloved soviet cinema, how can we not sew, just give us samples , here's lydia novi sets up his assistants, they draw patterns from the time, yes, from the time this play is set, they make luxurious robes for the boyars, she looks at it and thinks, well, for gadunov it means they need even more luxurious, that means they make it even more luxurious, then they need ragozha, they find some...
12:48 am
specialized magazines, there is the soviet economy, soviet trade, they are trying to reproduce the culture of that time. at first they are torn, they have all these samples that have not been preserved, that is, pushkin, as a space industry, enriches the civilian production, something like that, yes, but you can see how it actually looks on the screen, it looks luxurious, and what are you, my son, doing, this is a drawing of the land of moscow, our kingdom from end to end, here you see, here is moscow, here is novgorod, here is astrakhan, here is the sea, here are the perm dense forests. here in
12:49 am
siberia, and what is this, a pattern winds here, this is the volga, how good, oh, the sweet fruit of learning, as if from the clouds, you can survey the whole kingdom, suddenly, borders, cities, rivers, learn, my son, science is reducing experiences for us, fast-flowing life, then he says further in this monologue, that perhaps soon you will get all this, paraphrasing pushkin and translating it into unchanged prose, but the main thing is to whom he says this, who sergei bondarchuk takes to play godunov’s children, if he himself plays godunov, of course, his children, therefore irina is played by alena bandarchuk, and godunov’s son is played by fyodor bandarchuk. it turned out
12:50 am
that the film boris godunov became a stumbling block at the fifth congress of cinematographers in 1986, which just about drove away the previous generation, yes the thaw generation and brought forward a new generation, the late soviet and then the post-soviet klimov, who headed the actual collection of kemetographers, takes a lot of banned films off the shelf, returns them to the screens, the story of a chick who loved until she didn’t get married, herman’s films, herman’s films, is coming out ilic's outpost in the author's version, and many different others, and in general the era is changing. and soviet catographers understand that in the west they are in demand at foreign festivals , some others should be in demand films, therefore, despite all the beauty of sergei modarchuk’s film, this is clearly not what the foreign audience needs, and the soviet audience needs something else, and this point is keenly
12:51 am
felt by director yuri mamin, who is directing the film sidebars with viktor sukharukov in the title role , and always, by the way, with pushkin... than seriously somehow reproduce him, yes, then a new generation arises, new pushkins appear on the screen, as before, everyone still watches, whether they are similar or not, our everything or or or not everything, not everything is ours, well, now soon in the next
12:52 am
12:54 am
in the film we see the figure of the author, and we see the screenwriter’s dialogue with the book, an attempt to understand where the creative roots actually lie . it seems to me that evgeniy anegin could become in the future for someone such a novel, where there is dialogue, the inner author’s voice, and the hero is endlessly in some kind of conflict, arguing with each other, because the actual author’s voice in genigin is very finite important, as well, read lotman, yes, who analyzes all this in detail, so in this sense, of course, i... for the fact that someday we will see not only the film adaptation of some pushkin works in a new quality, but we will see how -them at a new technical level, this was witnessstein’s podcast and its leading film historians natalya ryabchikova and
12:55 am
stanislav didinsky, we are talking about how to watch soviet cinema now, how to find new meanings in it, even more pleasure, and this episode of ours was dedicated to the 225th anniversary of birthday. she woke up, she looked out of the window through the frozen glass, the light of dawn was playing, the door opened, olga came to her, the aurora of the northern alley and flew in lighter than a swallow, well, she said, tell me who you saw in your dream, for the anniversary poet.
12:56 am
this is the easy money podcast, i’m its host , mikhail khanov, and today we’re looking at how to protect your personal data in the digital economy. today our guest is candidate of physical and mathematical sciences, cybersecurity expert, andrey mosalovich, hello, andrey, hello, well, here i was. literally not so distant, we were more worried about our physical safety, at best about economic safety, about money, and this was also physical, and money that the hooligans could take away by taking it out of their pocket, or we ourselves gave it to them under pressure , or it was there, what is called burglary, now the term “digital profile” is increasingly heard, in principle, i would like to understand what it is, but in the conditions.
12:57 am
parents, their place of residence, date and time there births, maternity home, everything, they went into some kind of digital file, so a digital dossier began to accumulate on you, which then became digital, now these are very dispersed databases, there are many of them, there is such a term big data, big data, this a database of big data that different companies, different people, different organizations collect for different purposes, but they have learned to be friends with each other, they are friends, but i wanted to ask, they are friends.
12:59 am
the hands of the special services or law enforcement officers, law enforcement agencies, the special services are fed by hand private companies that know much more about us, for some reason there is a company, well , a pizza delivery company knows where you are exactly, who you are with now, how many of you are there in this room, but this is at this particular moment, and the secret service, so that this or the law enforcement officers need to find out something, they need to get to the base, i tensed up when you said: that government specialists, state intelligence services, law enforcement agencies, do not have these databases , they go for certain information bases to private companies, the same marketplaces, yes, here are the platforms that bring together sellers, well-known to everyone, and electronic, in fact, each one is obtained from these platforms a collects, b stores c - uses this data, and d - it is also private, that is, it is not responsible as a state to you, it .
1:00 am
in particular, cvvs and passwords, there in most places they are stored not as cvvs and passwords themselves, but as some transformation of a one-way function, so-called hashes, that is, let’s say i have a password, well, well, for example, this same pin code, i can add up the sum of numbers pin code, divide by five, you get
1:01 am
the remainder, you have the balance written down, you tell me, tell me the sum of the digits of your pin code , the remainder, it won’t help, he won’t be able to use your password, he will be able to check whether you sent it correctly or incorrectly, but it won’t be able to restore, fortunately, that is, in this regard, there is some kind of reservation for our privacy to be preserved, but it’s small, in this place natalya kasperskaya would say, everything that can leak has leaked.
1:02 am
first due to disloyal employees, that is, when leaks occur from banks, then it’s either hackers breaking the database and downloading it, well, often with the help of insiders, or a disloyal employee simply takes your data and sells it, i can honestly say, probably six years, even more ago, i watched a film about hacker groups, and what it was like my surprise when there are very cool , very cool guys there,
1:03 am
well, in this case, employees of a banking organization, that is, the very human factor that gives the keys to hacking databases into the hands of criminals, it turns out like this, wait, we are with you for the last phrases they listed four or five different methods and... that’s not all and not the main thing, let’s figure it out. so, first, we store passwords carelessly, yeah, second, our passwords are not strong, let me remind you, a strong password now, well, according to the requirements of, say, kaspersky, at least eight characters, at least one letter, one number, at least large, one, one capital, one small letter, at least one service character, try to generate such a password, you will see that you
1:04 am
have never tried this, no, you are deep you’re wrong, i have three passwords, twelve digits with an exclamation point. and looked at the passwords, i won’t say that the blondes purely won, they have a complex spiritual world there, but the hackers and admins purely lost, that is, the person calls himself a superadmin or superhacker, he either has a phone number, or there is some other identifier, or date of birth, or last name is written there, well, right in my mask, yes, well, it’s clearly visible, so one
1:05 am
1:06 am
1:07 am
to change them periodically, then passwords , sad as it is, you have to change it once a quarter, they really leak, well, really, you type the password while under some camera, your device is often infected, that is, the keyboard can be combined if... go to the questions, but how to live in such a thing, how scary to live, how to live, you need to form a certain harmless image of yourself next to yourself, here i have a card, there are no more 3.00 rubles on it, even if everything is stolen from it, stolen, this will be the price of the lesson, this is the same way, as you said , that it is impossible to protect yourself from constantly evolving threats, and what can leak will leak, what they want to steal will be stolen, accordingly, then we minimize and build our avatar, our double. which we actually put on the front , we need to understand the following things: first, technically the enemy can reach what he wants to break anything, and this applies to the cyber troops of other countries, and
1:08 am
intelligence services, and hackers, but he is very busy, he is very highly paid and he really does not like problems, that is, as soon as he sees that messing with you is problematic, he will become uninterested, or looks uninteresting, this is an easy money podcast, i’m his... host mikhail khanov, we continue the conversation about how to secure your personal data in the digital economy, how to save your digital profile. and andrey mosalovich, candidate, is helping us with this today physics and mathematics, leading expert in the field of digital cybersecurity. let’s say i have an account at the bank, and let’s say i follow the first rule and change my passwords once a quarter. but this, as we have found out, is enough, not enough, more.
1:09 am
identifications or what to specifically ask for something there to double protect your money, try to go to the bank, if you have it in the bank, walk to the branch, write a statement that all transactions above this amount are only in my personal presence, without power of attorney, without electronic payments, there only in person, so we remember, that is... very simple, and banks accept this kind of application, in principle, well, change the bank, there are banks that accept, in principle it turns out that if some kind of transaction took place , they said that it was done remotely, or you called, you are not there , the physicist, that is, the bank bears it responsibly, according to this agreement, that is, in principle, it turns out that one of the most effective ways to combat fraudsters in the field of cybersecurity with your digital profile is to translate this is offline, that is, output. they formulated this , in fact, there is only one way, if you are fighting with the scum, you need to pull them out with sunlight, that’s it, if they call you and say, they’re calling urgently
1:10 am
from the bank, cool, i’ll go to the branch now, who should come in, they’re calling you from the investigative cool, send a summons , acceptance, yes, yes, yes, that it will probably be inconvenient for you to come up, when he tells me, i say, no, it will be very convenient for me to come up, a couple of arguments in addition to what grigin tasunyan said, that means first. studies have been conducted in the states, there is no correlation between resistance to fraud and income, position, professorial rank, that is, everyone is being scammed, adults and children, the average age of top executives, and just managers of all, that is, one should not think that this applies to grandmothers or children, of course , of course, these are those very mass schemes, those same scripts, yes, that you plant there, but also a person of not the highest intelligence, but due to... his enormous, as i say, observation, experience, yes , experience, thousands of such conversations, calls, not in the most abstruse ways, little by little, little by little you begin
1:11 am
to communicate some information to the pph. legal interception equipment, the requirements of any country, the provider that put you on the internet must have special equipment, in the world it’s called loveful interception, look, when you go online, but in russia it’s called sorm, a system of operational measures , this is the equipment that records your access to the network and records your most important
1:12 am
identifier and ip-address, the address of your computer, which is assigned to you for the time when you enter the network, this is such a sign, the provider knows who you are, well, it is obliged to know your patronymic names in order to be able to get somewhere, this place is tracked , accordingly, if you want to look somewhere where you don’t need to, there are two ways, one way is to use to remain invisible, you want, well, there are two main ways, first, if... you don’t take a complete crime there’s someone else’s sim card, someone else’s computer there and so on, the first one is called a proxy server, that is, you go out through someone’s server to look at it, well , it kind of turns your traffic into its own, i do this myself, that is, you knock on the proxy server, we won’t tell you the next part and all the secrets, this is the simplest thing, in this case it sees you, well, you violated the server, you violated the zero
1:13 am
trust environment, he is someone’s most likely. he belongs to some enemy or a scammer or just some company that will betray you at the wrong moment, but you violated, you trusted him, you violated the rules of a zero-trust environment, here he is sees your traffic, but the traffic can see you, but the traffic can be hidden, you can simply make an encrypted stream, for example, type azhps, yeah, then the server will not see the follow-up, now we are very complex, here is the second way, the most common, called vpn. when the server in the middle is also a stranger says i will take over all your entire connection with whomever you want to contact there with this and it builds a so-called tunneled connection, that is, everyone who intercepts along the way will not be able to see anyone, no matter where you came from who you are in a tunnel you are in a tunnel from nowhere you are with no one you are connecting nothing is going through this tunnel from outside it is just you and something some strange encrypted connection is not clear between anyone but there are several features
1:14 am
that are sad for you: first, this vpn -the server sees you naked, he just sees all your traffic, all your intentions, because he encrypts them himself, in general everything is divided into two parts: part is your traffic, that is, if you forgot to turn off the vpn, he sees all your connections, private emails, private transfers there, private these accounts, if you use them there too, he sees everything, this is one side, the other side, most of the vips are still asking to bet.
1:15 am
the question states with one hundred percent probability that by installing, or rather using, vpn virtual private network for connection, and especially by leaving it turned on, well, even at the moment when you are just using it, and even more so if you install, as the client program is called to yourself either on a computer, or on a tablet, on a laptop, on a phone, or an application, then you you are giving away absolutely all the information from this device. we figured out the second part of the morlesian ballet, as i say, and public accessible wi-fi networks that are located in public places, but now trying to save money, the first thing there is generation z, dazumers, going to any point, so what kind of wi-fi do you have? fi, i say, guys,
1:16 am
your mobile operator is distributing. that is, you pay pennies there, relatively speaking, if there is a fixed tariff, then in general, i don’t know about the speed there, 100 100 megabits per second, what kind of wi-fi do you need there, something that is not there, here basically we want to price it, how much is it? is it safe or unsafe, public wi-fi networks, well, it’s 200% unsafe, of which 100% is that you will end up on a fake wi-fi, for example, in reality, i myself have seen fake wi-fi in our voykovskaya in this very in the hypermarket and in sheremetievo, that is , the name of which looks like the real one, well, just one little letter is different, and the goal, it’s just someone set it... the suitcase drives all your traffic through itself, that is, it’s even, isn't there by chance something that you can spend money on, this time, this is one part, that you can get on wi-fi, and it can be in the subway, in a cafe, yeah, in any public
1:17 am
place, including open wi-fi, you we’re not sure that this is exactly who is written on it, that this is this particular store, or this is a cafe or an airport, it could be a scammer, okay, closed wi-fi, where there is a password from... and there is no lock, traffic is open there too, but even if there is a lock there, still the one who provided you with the channel sees you and he sees quite a lot of your information, well , that is, this is a cafe, a restaurant, a hotel, a hospital, and here, here is another break between everyday consciousness and reality, man, here we are talking about privacy, so... deliberately slips that privacy is the protection of traffic, that someone is interested in what i ’m talking about now, or what i’m watching, it’s not interesting, they’re interested in the composition of the criminal group, who i’m talking to, where i am , what kind of accounts i have i use it, what is my history, often these two sim cards are located
1:18 am
nearby, yes, yes, yes, that is, here is the data about your profile, you must admit, it is much less protected, even if you encrypted the traffic, but you were here at that moment and you were communicating with this, you burned yourself, you burned. your interlocutor, which is why open wi-fi, public wi-fi is another nail in the coffin of your privacy. this is the podcast smart money, i’m its host, mikhail khanov. we continue to figure out how to protect our personal data in the new digital economy, with help from a cybersecurity expert, candidate in physics and mathematics. science andrey mosalovich, if you remove the battery from a phone, is it safe as a reading device or not, even in this case can it do something? well, firstly, in many devices the battery
1:19 am
cannot be removed technically now, i think that this is also done for a reason, but no, firstly, any device can contain so-called means of undocumented influences, well , bookmarks. bookmarks, maybe micro, well, by the way, a microbattery is a reality, in a computer, for example, you take it from the network you turn it off, and it remembers the time, yes, for example, yes, there is a small battery that saves these systems, well, system settings for fast loading, just like in the phone a small backup battery can live quite calmly, which is enough to it’s not the right time to give any signals there or to control yours, here is also a way out to a place
1:20 am
when they were still installing the very first version of windows , a folder appeared on a blank screen with the inscription my documents, here are my words, who wrote it, you already at that moment, then eat this windows, this was written by windows, he already believed that this was his document, of course, this is not a joke, this is part, unfortunately, this is part of reality, that is, your smartphone, it is not yours, and the data on the smartphone is no longer yours , moreover, if you... read the license agreement, you will see that they are definitely not yours, i can give you one little hint, well, it will work easiest for those who have android, but in principle, all smartphones have this, but everyone has it pretty well hidden, there is a function
1:21 am
called privacy dashboard, that’s the screen privacy management, privacy dashboard, if it takes a long time to say in the settings, you will find it, if you are too lazy to dig around, there are such applications, you can download them, well, with that name, by the way. this is a program that shows how other programs are currently spying on your smartphone, who turned on the camera, who turned on the microphone, who turned on the motion sensor, who stole files, that’s who was filming there.
1:22 am
1:23 am
but a week later he showed up and said, you don’t have to i'm sorry, she really turns out to be pregnant, and not only did i not know, but she didn't know, that is, the store, analyzing large data on changes in behavior profile, saw that this girl obviously did not go to the doctor, some tastes just changed, so that is , before she went where there were some cookies, now she went there to eat some stars from the wall. here or there solyonogorets, everything is mechanical, this is imprinted, this is recorded, that is , for now, for now, yes, an important note, this is used from the point of view of extraction commercial profit from the sale, basically, all of it for the whole world, precisely because this is the money, yes, this is the most important money in the world, this, that is, all some kind of spy games - these are side games, and spy games, they are usually targeted and...
1:24 am
the intelligence services are not in the hands, not because they can’t do it, because they will choke, they don’t need so much raw data, they are in the right place, that’s where we come from today they began that such bases will turn in the moment and receive, will receive what they need, well, upon request, then the main conclusion from our conversation is that the devil is not as terrible as he is painted, that you are certainly not the object and target of the intelligence services, hackers, spies, and so on, that the main thing for which the hunt is going on. for data, this is collecting them, storing them in an impersonal form and using them for sale by huge corporations, in fact, ultimately to sellers , of anything, goods and services, in order to sell you high quality, yes, well , sell, as we say, there, impose, and services, using your predisposition to at one point or another to purchase this product and service, in fact, this is what the whole game is for.
1:25 am
1:26 am
don’t press it, if the button is unfamiliar, do n’t press it, they wrote it down, that is, don’t press the buttons that seem unusual to you here ; they invented a telephone on the internet to make a call, and not to answer strange calls, you need to call, call, don’t call, don’t listen to who you are there, so let me know who it needs to find you, the second second second rule, do not communicate with... with unfamiliar subscribers, even if it seems to you that you are head and shoulders above them in intelligence and experience, but i really liked your phrase that remember that that according to statistics. the number of times you get online to telephone manipulators, let’s call them that, scammers, it does not depend on your level of intelligence, not on your income, but depends only on the mastery of experience of those who are on the other side of the line. please remember that although we have
1:27 am
the digital world, we have a digital economy, but the methods of work of special services remain the same. poisonous mushrooms, do not share them with others, and what else needs to be done, you need to clean it, and you need to come up with fairy tales of the digital forest, because well, the fairy tales of old generations are concentrated safety precautions, if you go into the forest, the forests will be thrown, the bear will eat the bear, now, unfortunately, they have not
1:28 am
been written yet, here is a book by ashmanov and kasperskaya, digital hygiene, read it, i really liked the advice, here is an analogy, how to... fight the apurs, you need to bring out their light, that is, if you are called to perform some atypical actions in the digital space, try to transfer them to real life as much as possible. they offer to choose a visit to the office, or click on the button, go to the office, that is, if it really seems important and dangerous to you, then spend a little of your time, go to the office, so to speak, and make sure that this is really the case. make sure it's a bank or a mobile operator or someone else came up with something, but as a rule, now everyone says, that we don’t ask for any data, numbers, and so on over the phone, but in the networks there are leaflets for grandmothers in retail grocery stores, so i just read
1:29 am
very detailed, very high-quality texts, calm in simple words, explaining how behave there, that is, the state, not only the state. conversation, you transferred money to your friend, and the bank refunded it to you, so the bank, in short, will not intercede, you must remember that your personal data is one of your most important assets, along with your health, along with you and your brain, your personal data is indeed a very valuable asset, which, together with other personal data of such a huge
1:30 am
number of people, can become a source of profit, well, actually about some products, services or goods imposed on you ? everything is so not difficult in principle, andrey, thank you very much that we have taken the first, i believe, step towards this digital literacy to digital literacy from the point of view, a small step, a wonderful analogy with digital a forest where you should not put unfamiliar mushrooms in your mouth, much less eat them and not share them with others, where you must remember that you are alone and you must already be armed with knowledge, at least, you are not lazy about basic things there, and because she... often change passwords at least once a quarter, do not store them in electronic form and do not make only passwords for the entire device, plus try to replace some kind of small avatar in case this bank creates some kind of digital image there card secure with a small amount.
7 Views
Uploaded by TV Archive on