Skip to main content

tv   PODKAST  1TV  August 12, 2024 3:30am-4:20am MSK

3:30 am
and there is one clipping, let's say, from an irkutsk newspaper, where the reviewer writes, such a wonderful film, very useful for a wide audience, and interesting, fascinating, but unfortunately, if you want to watch it, its distribution has already ended, although those who want to watch it still remain, let's return this film to the screens of irkutsk, i don't know whether they returned it or not, well , i think that the same story happened with the film, as with many other films that today...
3:31 am
why should we watch this film now, rewatch it, or maybe, watch for the first time, to think about what challenges an artist has to face, and in general, how to remain torical
3:32 am
. what we, these are blockbusters we learned later, yes, the disaster film crew or other films, but already then, and knowing the laws, how the market works, how the economy works, being able to count money, he understood how to create a real film that will buy itself, and this is the main thing for cinema, the producer does not consider cinema to be art, the producer measures cinema in money, if it bought itself in two, in three, in four times, then the film is good, this is the main criterion, and the director's task is to make a truly interesting, exciting, spectacular film. and at the same time not
3:33 am
to upset the investor, that is, a burning star is an example for us of how a work of art is created, and an example, showing the person who creates this work of art, and an amazing combination, a multimedia combination of various materials in this film and various genres, someone was confused by these genres at the beginning of the seventies, and you and detectives said that... in the state cinema to they were picky, they said, is it a tragedy or a comedy, you decide what kind of strange genre comedy is, they didn't understand this mixing of different elements of different genres in one film, as sergei gerasimov, a classic of soviet cinema, said after watching this film, that mita reveals the genre, he tries to liberate it somehow, this is inner freedom, it seems to me that this is ultimately what you need to watch this film for, it was under... witnesses from
3:34 am
einstein, where we, film historians, natalia ryabchikova and stanislav didinsky talk about who and how created famous, unknown, forgotten cult soviet films, about why we need to watch them now, how to find new meanings in them and how to get the most pleasure from them. this podcast was dedicated to the ninetieth anniversary of the remarkable soviet, russian director alexander metta. goodbye. this is the easy money podcast, i am its host mikhail khanov, and today we are figuring out how to protect your personal data in the digital economy. today we have in guests are candidate of physical and mathematical sciences, cybersecurity expert andrey mosalovich. hello, andrey, hello, well, in the times. literally not
3:35 am
so distant, we were more worried about our physical safety, at best about economic, about money, and this was also both physical, yes, money that hooligans could take away there you... them from your pocket, or we ourselves gave them under pressure, or it was there, what is called burglary, now more and more often such a term as a digital profile sounds, in principle - i would like to understand what it is, yes, in the conditions of the digital economy and the digital profile, this is our image in this digital economy, what is it, please tell us in more detail, well, let's try, let's remember the film 17 moments of spring and there is a favorite. employees of different services walked around with folders where there were dossiers on each other, they showed off these dossiers, here is a digital profile - this is exactly the same dossier, only electronic and much more complete, let's see how it is formed, here you were born, you had your first records, how your name, parents, their place of residence,
3:36 am
date and time of birth, maternity hospital, everything, they went to some digital file, this digital dossier began to accumulate on you, which then about simple or in one. now it is a very dispersed base, there are many of them, there is such a term as big data, big data, this is a database of big data that different companies, different people, different organizations collect for different purposes, but they have learned to be friends with each other, they are friends, yes, i wanted to from the outside, exchange with each other a dossier is accumulated, in fact, it can be quickly built in one place, this does not mean that it is somewhere directly physically everything-everything about you is stored, but it is very easy to build, to collect in one place, and moreover, at some point it is possible...
3:37 am
much more, that is, a company, well, a pizza delivery company knows where you are exactly, who you are with now, how many of you are there in this room, but this is at this particular moment, yes, in a special service, in order for this or law enforcement to find out something, you need to get to the base, i tensed up when you they said that - state special services,
3:38 am
state intelligence agencies, law enforcement agencies, do not have these databases , they go for some information databases to private companies, the same marketplaces. here are the platforms that unite sellers, well-known to everyone, yes, electronic, in fact, each one is obtained from these platforms, a collects, b stores c uses this data, and g - it is also private, that is, it does not answer to you as a state, but nevertheless it is guided by 152 fz, it is guided by profit maximization there and the cost of the company, well, in these places, such as marketplaces, there is not just our data, there is on the back side, which allows you to write off money without acceptance, well , of course, there are banks, there are large banks, yes , the largest, i would say, which require
3:39 am
confirmation by sms, but in principle, leaving this data and if they flow somewhere, then it turns out that you can write off money from the card, partly not quite so, part of the essential data, in particular. will not help, he will not be able to use your password, he will be able to check that you correct or incorrect sent, but will not be able to restore, fortunately, that is, in
3:40 am
this regard, there is some kind of reservation for our privacy that saves, here is where natalya kaspersky would say, everything that can leak, will leak. i will add on my own, everything that can leak, has leaked. bank: how secure is the storage of your personal data? well, the first answer, the answer: no, it is not protected, but not because the database is not protected. the database is protected close to impeccable, that is , now banks have a very high level of self-awareness, a very high level there internal protection and the fight for reputation, which is very easy to ruin and then have to be tormented to restore, but - banks are caught first due to disloyal employees, that is, when leaks occur from banks, then either hackers break the database and download it, well, often by the way, with the help of insiders, or a disloyal employee simply takes your ... and sells it, well, upon request, you know, i can honestly say that about six years ago, or even more, i
3:41 am
watched a film about hacker groups, and what was my surprise, when there are very cool guys there, computer and calculator guys, as i say, everything is stuffed with sensors, they typed very quickly, the program code was running, there is a huge number of server monitors, but all the major hacks were all done with the help of social engineering, what is it? here is office trash, where could there be any , they specifically dug through the dump looking for trash, the data suggested, that is, you wrote down the password to the computer on velcro, someone saw it through binoculars there through the building, then threw it in the trash, they go specifically there in the trash bins, they rummage, they get it out, that is , this is the so-called phishing, fishing, in fact, you yourself just said that... we ourselves actually, well, in this case, the employees of the banking organization,
3:42 am
that is, the most human factor, which gives the keys to hacking databases into the hands of criminals , it turns out that, wait, you and i listed four or five different methods in the last phrase, and this is not all and not the main thing, let's figure it out, so, first, we store passwords carelessly, yeah, the second password we don't have is strong, let me remind you, a strong password now, well, according to the requirements of, say, kaspersky is no less than...
3:43 am
either the date of birth or the last name is written there, well, right in its scale, yes, well , it's visually noticeable, so one girl with a sixteen- character password won a clear victory, i looked at her for a long time, and it was really strong, there was a case of service symbols getting there in general, then i looked at her, saw that it was written in english letters in the english layout, a russian phrase, why am i such a fool, here you don't need to store it, you don't need to store it, in fact i remember
3:44 am
it in exactly the same way. any program burtforcer, well, which is a password picker, will break on it, so the girl is a good girl, well, let's go further, so, look, you have poorly protected the password, your password is weak, then the worst thing, here is the worst gift that a person gives to a hacker, it is a repeated password, you can't have the same password on different services, you can't have the same password on different services, then the big data itself will collect information about you from different sources, compile it when it will turn out that one and the same... it won't turn out, there it even turns out at the moment when somewhere one password leaks, it's easy, well i can go long, and the hacker will definitely try it on all your services, well that is , let's have the first rule, now let's start writing down the audiences, different passwords, no matter how sad you are, yes, we remembered, well, from my experience i have three passwords that i use in a chaotic order, periodically sb where which one, here andrey, where to store all this, it is best to store it in some kind of cipher pads, that is, on...
3:45 am
then passwords, sad as it is, need to be changed once a quarter, they really do leak, well , really, you type the password while under some kind of camera, your device often ends up infected, that is, the keyboard can be read, if we move on to questions, how can we live in such a place, how scary it is to live, how to live, we need to form a kind of harmless image of ourselves around ourselves, here i have a card,
3:46 am
there is never more than 3.00 rubles on it, even if everything is stolen from it. this is the same method, as you said, that it is impossible to protect yourself from constantly progressing threats, and what can leak, will leak, what they want to steal, will be stolen, accordingly, then we minimize and build our avatar, our double, which we actually put on the front, we need to understand the following things, first, technically the enemy can get to anything, break anything, and this applies to cyber troops of other countries, and special services, and hackers. here, but he is very busy, he is very highly paid, and he really does not like problems, that is, as soon as he sees that messing with you is problematic, he will become uninterested, or will look uninteresting. this is the easy money podcast, i am its host mikhail khanov. we continue to figure out how to save your personal data in the conditions of the new digital economy,
3:47 am
an expert in cybersecurity, a candidate of physical and mathematical sciences, helps us with this. andrey mosalovich, if you remove the battery from the phone, is it safe as a reading device or not, even in this case, is there anything it can do? well, firstly, the battery of many devices is now technically not removed, i think that this is also not easy that's how it's done. well, no, first of all, any device can contain so-called undocumented means of influence, well, a micro-battery. the bookmarks can be micro, well, by the way, a micro-battery is a reality, for example, in a computer, you turn it off from the network, but it remembers the time there, yes, for example, yes, there is a small battery that saves these systems, well, system settings for fast loading, in the same way, a small backup battery can live quite calmly in a phone, which will be enough to
3:48 am
send some signals there at the wrong time or control your device, here too there is an exit to a place, 100% security. will not give, but it will greatly protect, once again, if you really think that no one needs you, that's it, if no one is dealing with you now, then the security level can be increased, but not to, but the danger level to zero, how to understand that your phone is not completely under your control, there are some signs, it starts blinking, turning on there's something else, wait, remember, let 's roll back 20 years, remember when... they were still installing the very first versions of windows , a folder with the inscription my documents appeared on a blank screen, here's my word, who wrote it? you already did it at that moment, that is, it's windows , it was windows that wrote it, he already thought that these were his documents, this is not a joke, this is part, unfortunately, this is part of reality, that is
3:49 am
, your smartphone, it is not yours, and the data on the smartphone has not been yours for a long time, moreover, if you... i can give you one little hint, well, it will work easiest for those who have android, basically all smartphones have it, but they all hide it pretty well , there is a function called privacy dashboard, that is the privacy control screen, privacy dashboard, if you dig around in the settings for a long time you will find it, if you dig around for a day, there are such applications, you can download them, well, with the name dashboard. this is a program that shows how other programs are currently spying on your smartphone, who turned on the camera, who turned on the microphone, who turned on there motion sensor, who lost the files, that's who , and, it's not necessarily some spies, it could just be operational spies, when you buy an empty smartphone, it already has more than 100 applications, they all spy on you, but then you look
3:50 am
at how this last, excuse me, the remnants of the central innocence are lost, that's when when you look at this, why? all the time our government cares, began to care, at least, that the data of our domestic social networks, our search engines are all stored on the territory of russia, because that these are huge databases that at least to some extent can belittle the state there, and not be located there on the territory of other countries, it turns out that we ourselves actually generate those same big data, which are then used, even if there for safe, but for commercial purposes, the question is why, why this? but these anonymized data are needed for targeting the space of contextual advertising, that here is beer advertising, here in simple terms, let's say that for
3:51 am
marking, who, what and how buys, who as themselves leads, yes, here is a great example, by the way, from the thirteenth year, now he doesn’t believe it , an angry dad came to the store because there was an advertisement for pregnant women, and his daughter is a senior in high school, like, what are you doing here, what are you hinting at, what are you doing? so they threw up their hands, said, we’ll check now, well, if it’s confirmed, we’ll apologize, so a week later he showed up, said, you don’t have to apologize, she really is pregnant, and not only did i not know, but she didn’t know, that is, the store, analyzing large data on changes profile of behavior, i saw, and this girl obviously did not go to the doctor, some tastes changed, that is, before she went somewhere there for some cookies, now she went there to eat and stars from the wall, here... or there solenogorsk, everything is automatic, this is imprinted, this is recorded, that is, for now, for now, yes, an important note, this is used from the point of view of extracting
3:52 am
commercial profit from sales, basically, actually the whole idea became, worldwide, precisely because there is money in this, yes, in this, the most important money in the world is in this, that is , all of these spy games are secondary means, and spy games are usually pinpoint and yeah. that's what we started with today, that there are no such databases in the hands of the special services, not because they can't do it, because they would choke, they don't need so much raw data, they will turn to you at the right moment and get it, they will get what they need, well, according to requests, then the main conclusion from our conversation is that the devil is not as bad as he is painted, that you are certainly not an object and target of the special services, hackers, spies and so on, that the main reason for which the hunt for... data is going on is to collect and store it in an impersonal form and use it by huge corporations for sale, in fact, ultimately to sellers,
3:53 am
of anything, goods and services, in order to sell you quality, yes, well , to palm off, as we say, there to impose a service, using your predisposition at one time or another to buy this or that product and service, actually, this is what the whole game is about, yes. in fact, the whole game is about selling much better and we still all sorts of crap that has stuck around this have not been listed, there are also scammers and saboteurs, saboteurs and spies, there is a lot of everything, but the main game is going on, the main big money is this space of such targeted advertising. okay, then let's list practical advice at the end, here is what we have discussed with you, and therefore, how to try to protect yourself, your digital profile, your.
3:54 am
everything is poisonous, since you do not know it, it is not edible, that's it, no, do not press, if the button is unfamiliar, do not press, recorded, that is, not press the buttons that seem unnecessary to you here the internet phone was invented to call, and not to answer strange calls, you need to call, call, no need to call, do not listen to who you are there, hang up, whoever needs it, that's the second second second rule, do not communicate with ... unfamiliar subscribers, even if it seems to you that you are head and shoulders above them in intelligence in experience, yes, i really liked your phrase that remember that
3:55 am
according to statistics, the number of hits on the network by telephone manipulators, let's call them that, a fraudster, it does not depend on your level of intelligence, nor on your income, but depends only on the skill of the experience of those who are.
3:56 am
now, unfortunately, they have not yet been written, here is a book by ashmanov and kaspirskaya , digital hygiene, read it, i really liked the advice, here is an analogy, how to deal with ... you need to pull out their light, that is , if you are called to perform some actions that are atypical in the digital space, try to transfer them to real life as much as possible. offer to choose a visit to office or press a button, go to the office, that is, if it really seems important and dangerous to you, then spend a little of your time, go, so to speak, to the office,
3:57 am
make sure that this is really so.
3:58 am
transferred money to your friend, and the bank reimbursed you, so the bank, in short, will not stand up for you, you must remember that your personal data is one of your most important assets, along with your health, along with you and your brain, your personal data is a really very valuable asset, which in the mass with other personal data of such a huge number of people can become a source of profit, well, actually about some products, services or goods imposed on you, everything is so. in principle, it’s not difficult, andrey, thank you very much that we took the first, i think, step towards this digital literacy, towards digital literacy from the point of view, yes, a small step, a wonderful analogy with a digital forest, where you should not take unfamiliar mushrooms into your mouth and especially not eat them and not share with others, where you should remember that you are alone and you should be already armed with knowledge, at least, do not be lazy there elementary things, and therefore it
3:59 am
is hygiene. change passwords often at least once a quarter, do not store them electronically and do not make one password for the entire device, plus try to replace some small avatar, in case of this bank to create some digital image, there a card with a small amount to protect yourself in case of a bank account, limiting transactions there some amount elementary 5-10 thousand for everyone it is different in which only your personal... resources in the bank can confirm the legitimacy of this operation. thank you very much, i think that the topic is endless, we will continue. thank you very much. this was the easy money podcast and me, its host mikhail khanov. today we figured out how to save your personal data in the new digital reality and we were helped in this by a candidate of physical and mathematical sciences, an expert in cybersecurity with more than forty years of experience, andrey mosalovich.
4:00 am
you can find the easy money podcast on the channel one website. hello, in the program sunday time about the events of this day of the outgoing week, days under fire, mines, glass broken, leaving here, they shoot at us, one was broken, we are leaving here, in trouble does not abandon, together with colleagues from
4:01 am
various departments, this work must be carried out - meaning the loss of property, loss of housing, it is necessary - it is necessary to work directly with people to reach every family to help in our way to us. here every second simply provided everything, we were accommodated, we were fed right away, all the children were taken away, to feed everyone to the last one on their own people were carried in cars, i bow low to these people, the kursk region is the main thing and new, combat work, frontline reports and new. enemy. lowering the age of imprisonment to 18 years - this actually buries future students, future lita, future managers, who in the country then must, well, relatively speaking, intercept the economic forks. the will of the west is the law for the expired. no longer prisoners,
4:02 am
fighters walk, they were introduced to us as alpha fighters. and at this moment it became clear that these are no longer our camwires, that we are no longer prisoners, but these are our defenders. a dear united family, it happened that way, that very exchange, we will tell you more, native walls, very beautiful houses, beautiful entrances, thanks to the chelyabinsk region that they really built such beauty. donbass, ural, siberia. russia is building the future. after all , school is not only lessons, but also such a rich, extracurricular life. and, of course, one cannot help but be proud of such a space. harvest in 10 years. olympics - thomas bach
4:03 am
against all the world. let's start with news and footage from the ministry of defense, three launchers and a radar of the american patriot system were destroyed in the area bordering the kursk region. also , on the approaches to the border , a column of enemy armored vehicles was hit by landet loitering munitions. and here. attempts by enemy mobile groups to break through on armored vehicles deep into russian territory in the areas of the settlements of tolpino, zhuravli, and
4:04 am
obshchaya kolodes were stopped, an attempt by the ukrainian armed forces to break through into the belovsky district of the kursk region was stopped. over the past day, the ukrainian armed forces lost up to 230 soldiers and 38 armored vehicles in the kursk direction, in including seven tanks, 28 armored vehicles, three... installations and a patriot air defense missile system radar station. in total, during the fighting in the kursk direction, the enemy lost up to 1,350 servicemen and heavy equipment, including 29 tanks, 23 armored personnel carriers, nine infantry fighting vehicles, and 116 armored vehicles. before that , the defense ministry reported that air defense forces had intercepted 14 ukrainian drones and four tactical missiles. u. the wreckage of one of them fell near a multi-story building in the regional.
4:05 am
well, that's how it happened to us at it's like the first time for us, this is really the first such massive strike by the ukrainian armed forces on kursk, our air defense repelled the attack, there were about ten explosions in the air, one shot down missile fell next to a residential building, people who were near the explosion site immediately ran for cover, the entrance was fast. the residents of kursk have already seen enough in 2 and a half years of the svo, how the ssu hit russian cities repeatedly, intentionally, when the rescue services arrived, and they know the safety rules for an air raid alarm, someone hid in the bathroom, someone in the hallway, the main thing is as far away as possible
4:06 am
from the windows, we are on the first floor, all the windows flew out, we were almost killed, but we managed to jump behind the wall, we heard, they announced, well , this is an attack, and we jumped out, we always immediately hide behind the wall every day, there is a meter of ledge. another room, here we were saved behind this wall, here one animal of ours got lost, we managed to grab the dog and two cats, and one cat of ours got lost somewhere there, at the very moment of landing, thank god.
4:07 am
again, more explosions are heard, apparently the air defense is working, it exploded in the sky, as it happens, yes, in the sky, because if it had reached land, it would be even more terrible, you have already learned to determine, and these explosions did not stop, half the night we with local residents every now and then went down to the shelter, okay or let's go, we pass, who are children, let's go further.
4:08 am
4:09 am
the playground is destroyed in the area several shops, several office premises and several buildings were damaged, this house got the most, we see the destroyed balcony.
4:10 am
what you need to know about our strikes in response: to break the enemy's reserves, that is the plan. today the ministry of defense announced a successful for our fpv drone operators hunting for heavy ukrainian baba yaga apparatus, and the russian national guard burned a tank, two armored vehicles destroyed several dozen militants. what happened earlier? a high-explosive three-ton fap-3000 aerial bomb was designed to target a cluster of personnel and vehicles against. intelligence confirmed the targets were hit. iskander operational-tactical complexes destroyed the command post of the ukrainian motorized infantry brigade and the location of foreign mercenaries. attack drones are used against a tank, landset under the turret, combat, the stowage catches fire. a lighter drone flies in american armored car maxpro. tornado multiple launch rocket systems destroyed a column of nato equipment. scrap metal cannot be restored. all available means of destruction are used to leave the enemy without ammunition, fuel, fresh forces,
4:11 am
to force him to stop running out of steam. the enemy attack began when, on tuesday, after shelling from the territory of ukraine, a column of armored vehicles from there left for the city in the direction of the city of sudzha, a district center with 5 residents, located 9 km from the state border. what forces did he pull together? the enemy, who resorted to the usual tactics of terror against the civilian population, and what measures. then i moved like that , like that, i flew like that, i moved and it all fell off me, the invasion of the kursk region, the ukrainian army began with a powerful artillery bombardment of peacefully sleeping cities and towns, from 3:00 in the morning, and no one
4:12 am
was sleeping, a shootout, and then they started the cas, well, either grads, or something from the sides flew, went into the basement, yes, of course, well, this happened here, the bricks were lying here on... on the very first day of the attack in sudzha, which was hit the hardest the ukrainian armed forces, a woman was killed, eight more people were injured, half of them children. to ensure maximum safety for civilians, to help the evacuated victims, is now no less an important task for the state than to actually drive the enemy out of the border area. as is known, the kiev regime has undertaken another large-scale provocation, is conducting indiscriminate shooting at ...
4:13 am
is called medical care, teams of specialists from the federal fmba have been brought in, a mobile hospital is currently being deployed, food and drinking water have been organized water. the kurbsk region government is currently under enormous pressure. alexey smirnov took over the region recently, in may, and this
4:14 am
is the first tough test of strength for the acting governor. the current situation requires a certain amount of courage, composure, and... a few words about the organization of the headquarters and the coordination of the activities of various government bodies. we are receiving constant support from the federal government, i am in constant contact with the prime minister, deputies, and, uh, i am
4:15 am
in connection with the assistant to the president of the russian federation, dyumin alexey yanavich, with the minister of defense. the deputy is present here now . on august 6, a ukrainian drone operator who attacked a civilian car with a red cross killed the driver alexander nikitichev and felcher alexander chikalin, who were rushing to a call in sudzha. felcher sent this photo to his wife on the day of his last shift, shortly before his death. only cardiologist daria
4:16 am
konova survived. the girl with serious injuries is now in the kursk regional hospital, where she and others the victims were visited the day before by the minister of health mikhail murashko. at the expense of the municipal budget or in business,
4:17 am
at the expense of the regional budget, who worked for it is recommended to support the same events, i ask you to support a one-time payment to those people who were forced to leave their homes in connection with these events, 1000 rubles per person, because many ...
4:18 am
for those affected by the emergency situation of a federal nature, which is exactly what was declared in the kursk region, other support measures are also provided. one-time financial assistance is 1,500 rubles. in case of partial loss of essential property - 75. in case of complete loss - 150. these payments can also be processed on public services. in addition, relatives of the deceased can count on 15 million rubles. citizens who have received. moderate or serious harm to health are entitled to 600,000, minor - 3,000. in eight districts of the kursk region, communication services for residents have been made free even with
4:19 am
a negative balance, for the entire duration of the emergency. and how soon it will end now depends on the security forces. with the onset of serious battles vladimir putin convened an unscheduled meeting of the security council. please report on the situation that is developing in the kursk region through your departments. the chief of the general staff is currently at... on august 6, a unit of the ukrainian armed forces numbering up to 1.0 people went on the offensive with the aim of capturing a section of territory in the sudzhinsky district of the kursk region. at present, a unit of the sever group, together with border agencies. the russian security council continues to destroy the enemy in areas directly adjacent to the russian-ukrainian border.
4:20 am
the operation will be completed by defeating the enemy and reaching the state border. kiev has invested a lot of effort in the current adventure. we are talking about thousands of regular army soldiers. at least three large units are involved: the twenty-second, eighty -eighth mechanized and eightieth airborne assault brigades. where did these brigades come from? they came from the, from those units that were supposed to... defend kiev, this is the elite, trained, which includes not only ukrainians military, but also those mercenaries from countries that provide assistance to ukraine, french, polish, and english were spoken during the negotiations, the kursk border regions are densely populated, while destroying the enemy, the military are still thinking about how not to touch their own, the ukrainian armed forces are doing everything to sow panic and disrupt the evacuation, what militant would want to lose a living person? the shield is a simple and familiar path for the kiev regime - terror.

14 Views

info Stream Only

Uploaded by TV Archive on