Skip to main content

tv   PODKAST  1TV  August 7, 2024 12:00am-12:51am MSK

12:00 am
certain notes, they do not have such a pronounced or serious political character, but they exist, here are the prerequisites for an alternative in germany, perhaps, more than in other countries, but in general it seems to me that we are in the initial, initial stage, of the formation of an alternative course in europe, and here, probably, as a basis we should take not what we usually have, well, there is a clash with the russian federation and so on. but such a pragmatic element as the standard of living, you see, i remember, i counted the statistics, here is how it developed the situation in europe in the post-war period, in the 50s, sixties, seventies from 40 to 90% increased in 10 years real wages, do we see something similar now, somewhere in european countries, no, well , that means, this is summing up in particular foreign policy, foreign policy. does not
12:01 am
send positive financial and economic signals to improve the situation in these countries, well, it remains to be, i think that patience, long-suffering and readiness to accept all this argumentation of the ruling elite, it too for the time being, therefore we need to watch the development of the situation very closely now and , as far as possible, generally support the signs of some new phenomena. i would like to say, without going into detail, that recently such signals have become stronger from western countries, from public organizations, from professional organizations that want to establish closer ties with russia, in order to develop some kind of realistic, peaceful agenda for improving the situation in europe and throughout the world, this alternative in europe really exists, it is represented by both the right-wing forces of the alternative. germany or the national
12:02 am
unification in france, and the left-wing forces, jean-luc milanchon, the head of the rebellious france, called for france to withdraw from the military component of nato, exactly what charles de gaulle did in his time, that is, milanchon, the far-left french politician turned out to be the ideological heir of charles, such are the twists and turns of european politicians, well, in yesterday's interview in tas, the russian ambassador to the united states anatoly antonov said, that... the goal of american discussions about the deployment of medium-range missiles in europe is not only a long-term confrontation with russia, but an attempt to drag russia into arms control negotiations without canceling the hybrid war that the united states is waging against us, according to antonov, this is an undertaking doomed to failure. well, let's go back a little, to germany, indeed the eastern lands, they are quite kind to russia and especially those germans who...
12:03 am
still remember the soviet union, that here says, this is of course a complete brain explosion, because well, if you replace russia with the united states and the west, then in principle her words will be normal, because of all the key ones, the anti- ballistic missile treaty, open skies, medium -range missiles, that is, from where it was the united states that came out under far-fetched pretexts or without pretexts at all, destroying the key nodes of this security system, as for the deployment of missiles, medium- range in europe, things have been heading towards this for a long time, because the americans, feeling just this is the point, and also the fact that they do not control the area of ​​china, this, uh, they have been preparing for this for quite a long time, that is, they already have the typhon complex ready, which is actually a grounded tomahawk, the dark eagle with hypersonic missiles is being prepared, but so far it only carries out electronic launches, but what does this threaten us with, it threatens us as always, when pershings and other weapons were deployed in
12:04 am
europe, but with a very short flight time, that is, this means that our missile attack warning system sprn, it, gives the management a very short time to make a decision, a key decision, whether there will be an apocalypse or not, or whether it is a mistake, and such technical cases have already occurred, at this point, and given that the dark eagle will be hypersonic, this time is reduced to minutes, such actions will ultimately force us to transfer our spr system from automated to automatic mode, trusting artificial intelligence, and given that no one will understand whether this is a decapitating strike when it flies from europe, or whether america has already started global war, respectively, the united states will be included in the target, the entire range of weapons will be immediately deployed, and the computer will decide whether we live or die, and we will not waste time , given the short flight time, on deciding warheads on these missiles, and not in the usual... russia will not succumb to blackmail
12:05 am
from the united states and will not go for compartmentalization, that is, negotiations on arms control separately from the entire range of problems and the hybrid war that the united states is conducting against russia, and what needs to be done and what russia, i am sure, is doing is to make it clear to the united states, to remind them that the intermediate-range land-based missiles deployed in europe for russia are strategic missiles, not tactical, so in the event of a military conflict, our response to a counter-strike will not only be against europe, but against the decision-making centers that are in the united states. it was a big game. goodbye,
12:06 am
this is the easy money podcast, i am its host mikhail khanov, and today we are figuring out how secure your personal... what is called burglary, now more and more often such a term as a digital profile is heard, in principle - i would like to understand what it is, yes, in the conditions of the digital economy and the digital profile, this is our image in this digital economy, what is it,
12:07 am
please tell us in more detail, well, let's try, let's remember the film 17th moment of spring, and there employees of different services walked around with folders, where there were dossiers on each other. and they trump these dossiers, here is a digital profile - this is exactly the same dossier, only electronic and much more complete, let's see how it is formed, you were born, you had your first records, what is your name, parents, their place of residence, there is the date and time of birth, maternity hospital, everything, they went into some digital file, this digital dossier began to accumulate on you, which then in figurative places or in one, now it is a very dispersed database, there are many of them. there is such a term as big data - big data, this is a database of big data, which different companies, different people, different organizations collect for different purposes, but they have learned to be friends with each other, they are friends, they exchange with each other, a dossier accumulates, in fact, you can quickly build it in one
12:08 am
place, this does not mean that it is physically stored somewhere, everything about you, but it is very easy to build and collect in one place, and moreover, at some point you can collect the so-called golden record, where literally everything about you will be stored, let's ... to the fact that in all police series, police officers, i beg your pardon, it is already standard phrase look at the cameras, and i want you, yeah, a common myth that our image is in the hands
12:09 am
of the special services or law enforcement, law enforcement, special services feed from the hands of private companies that know much more about us, that is, a company, well , a pizza delivery company knows where you are... exactly who you are with now, how many of you are there in this room, but this is at this particular moment, yes, in the special service, in order for this or law enforcement to find out something, you need to get to the base, i tensed up when you said that a state special, state special services, law enforcement agencies do not have these databases , they go for some information databases to private companies, the same marketplaces, yes, here are the platforms that unite sellers, known to everyone.
12:10 am
so i can add up the sum of the digits of the pin code, divide by five, i get the remainder, you have
12:11 am
the remainder written down, you tell me, tell me the sum of the digits of your pin code, the remainder, i say such and such o coincided, that is, you you cannot restore, that is, if it is someone else and he does not know the same algorithm by which he will not help, he will not help you he won't be able to use the password, he will be able to check whether you sent the right one or not, but he won't be able to restore it, fortunately, that is, in this regard, there is some kind of reservation for our privacy, it is in this place that natalya kaspersky would say: "everything that can leak - will leak", here i will add from myself, everything that can leak, has leaked. bank, how secure is the storage of your personal data? well, the first answer, the answer is no, it is not protected, but not because the database is not protected, the database is protected close to impeccability, that is, now banks are very...
12:12 am
an employee who threw a piece of paper with a password in the trash, so
12:13 am
they specifically rummaged through the dump, looking for trash, office trash, where there could be some data, suggested, that is, you wrote down the password on the computer on velcro, someone saw it through binoculars there through the building, then you threw it in the trash, they specially go there to the trash bins, rummage, get it, that is, this is the so-called phishing fishing, in fact, you yourself just said that and we ourselves actually yes, well in this case, employees. of a banking organization, that is, the most human factor that gives the keys to hacking databases into the hands of criminals, it turns out that, wait, you and i listed four or five different methods for the last phrases, and this is not all and not the main thing, let's figure it out, so, first, we store passwords carelessly, yeah, second, our passwords are not strong, let me remind you, a strong password now, well, according to the requirements of, say, kaspersky, is at least eight characters, at least one letter, one digit, at least a large one, one, one big, one small.
12:14 am
i collected about 100 lagins, similar to hackers and admins, there is an admin, superadmin, hacker, coolhacker, i am a god there, like that, and about 100 of some blondes, blondies, superblondes, i am a blonde, i am a shrimp, and i looked at the passwords, i won’t say that the blondes clearly won, they have a complex spiritual world there, but the hackers and admins clearly lost, that is, a person calls himself a superadmin or superhacker, he either has a phone number, or some other identifier, or a date of birth, or a last name written there. its own, yes, well, it's visually noticeable, and one girl with
12:15 am
a sixteen-character password won a clear victory, i looked at it for a long time, and it was really strong, there were service symbols there by chance, in general, then i looked at it, i saw that it was written in english letters in the english layout, a russian phrase: why am i such a fool, you don't need to save it, in fact, i'm exactly the same program program burtforcer any, well, which password picker will break on it. so the girl is great, well, let's go further, so, look, you haven't protected them well with the password, your password is weak, then the worst thing is the worst gift a person can give to a hacker, it's...
12:16 am
the enemy won't be able to, but again, these are the so -called zero-security cryptographic techniques, if the enemy has found them out, you've lost them,
12:17 am
so you need to change them periodically, then passwords, as sad as it is. you need to change them once a quarter, they really do leak, well , really, you type the password while under some kind of camera, your device is often infected, that is, the keyboard can be combine, if we move on to questions, how to live in such a thing, how scary to live, how to live, you need to form a certain harmless image of yourself next to yourself, here i have a card, there is never 3.00 rubles on it, even if everything is stolen from it, this will be the price of the lesson, this is the same way, as you said.
12:18 am
really does not like problems, that is, as soon as he sees that messing around with you is problematic, he will become uninterested, or looks uninteresting, it does not happen that a person was in your life, here he disappears, even if he dies, in this girl he will hardly recognize that a child who lost the most precious thing, his mother, 5 years ago, i don’t think that i am without her, i have a lot of memories, but this is my mother, yulia nachalova, who died very young, at 38, leaving her beloved daughter, vera, with her parents and ex-husband. i said that, unfortunately, i have very difficult news for you, that mom is no longer with us, that at that moment, that evening he experienced, only he knows, it is a great responsibility to tell your child that his mother is gone, how she experienced this loss, the only one yulia's daughter, what path did she take after her mother's death? i'm somehow really mega- strong, i somehow
12:19 am
pulled myself together, that is, our exclusive 5 years of adult life of a girl who decided... exclusive with dmitry borisov on saturday on the first. the capital of uruguay, one of the most developed and richest countries in latin america. people here dress. just a kilogram of makeup on the face is not about our women. montevide - rent for local residents is quite expensive, but there is an option when you can live even free. if we see that a person is normal, neat, tidy, just has financial problems now, we accept him and settle him in one of the rooms.
12:20 am
the favorite dish of uruguayans is meat-siege. usually this dish is eaten with bread, vegetables, sauce and... red wine, here's another rib, please, everything is fine in uruguay, the lives of others, the premiere, on sunday on the first, in the new season, on the first, rumors are already circulating in the city about this crime, wherever you go, they say everywhere, women are lured into a taxi and shot in the back, i i wanted to ask you about your find, this knot turned out to be very massive, although it was easy enough to break, you are worthy of great honor of moles, honor and trust of treikh, remember this. "after the war, i was looking for my son's comrades-in-arms, i was interested in what happened there at the end of the war , and anything could have happened there
12:21 am
, if you don't have a photo, it's strange where they are, they were here, oh my god, how similar he looks to my son, you are the only real witness, the only person he came to openly, well, major, the hunt has begun, confrontation"? this is the easy money podcast, me and its host mikhail khanov, we continue our conversation about how to secure your data, personal data in the digital economy, how to save your digital profile, andrey mosalovich, candidate of physical and mathematical sciences, leading expert in the field of digital cybersecurity, is helping us with this today. let's say i have an account in the bank, and let's say i follow the first rule, and change passwords once a quarter, but this, as we found out, is enough, not enough anymore,
12:22 am
how can i protect this money, that is, how can i divide it, should i put some kind of protection about the amount there in the same 3,000 rubles, ask there with some kind of double identification or something, what exactly how can i protect my money, try at the bank, if you have it in the bank, walk. to the branch, write a statement that all transactions above this amount only in my personal presence without a power of attorney, without electronic payments, there only in person, so we remember, that is, it is very simple, and banks accept this kind statement, in principle, the bank, there are banks that accept, in principle it turns out that if some operation took place, they said that remotely whether you called in you are not a physical person, that is, the bank bears responsibility according to this agreement, that is, in principle it turns out like this: that one of the most effective ways to combat fraudsters in the field of cybersecurity with your digital profile is to transfer it offline,
12:23 am
that is, to bring it out of the number into real communication you formulated here it is in fact the only way, if you are fighting with ghouls, they need to be pulled out by sunlight, that's it, if they call you and say: urgently calling from the bank, great, i'll come to the branch now, who should i go to, they call you from the investigative committee, great, send a subpoena, i'll give. in the states they conducted a study, there is no correlation between resistance to fraud and income, position, professorial title, that is , they are cheating everyone, adults and middle -aged children, top managers and just managers, everyone, that is, you don't have to think that this concerns. the highest intelligence, but at the expense of their which you plant there, but also a person not
12:24 am
of great, as i say, experience , experience, yes, experience, thousands of such conversations, calls, not in the most abstruse ways little by little, little by little you begin to say some information in papykh, and if you have also brought out an emotion, yes, what are they trying to achieve, bring out an emotion, and you can say one or the other there. when you go online, according to the requirements of any country, the provider that let you into the internet must have special equipment, that's what it's called in the world loveful interception, legal
12:25 am
interception equipment, in russia it is called sorm, the system of operational measures, this is the equipment that records your access to the network and there it records your most important identifier ip, ip address, the address of your computer, which is assigned to you at the time when you enter the network, this is such a table. that is, you go out through someone's server to look at well, it kind of turns your traffic into its own i do it myself, that is, you knock on the proxy server then
12:26 am
the next one. to tell yes all the secrets are not let's do this, the simplest thing, in this case he sees you, well, you violated the server, you violated the zero trust environment, it's someone's, most likely, it belongs to some enemy or a scammer or just some company that will give you up at the wrong moment, but you violated, you trusted him, you violated the rules of the zero trust environment, so he sees your traffic, but the traffic can be you, but the traffic can be hidden, you can just... make an encrypted stream, for example, dial hps, yeah, then the servo mediation will not see, now we very complex we give the most common way, it is called vpn, when the server in the middle is also someone else's, it says: i will take myself all your connection, whoever you want to contact, there with this and it builds a so-called tunnel, a tunneled connection, that is, everyone who will intercept along the way will not see who, or where you came from, who you are, you are in
12:27 am
a tunnel, you are in a tunnel, where you are from, you connected with no one, nothing goes through this tunnel, from the outside it will come out simply and somehow some kind of connection, strange, encrypted, it is not clear between whom, here, but there are several chips - such sad for you, first, this vpn-server sees you naked, it just sees all your traffic, all your intentions, because it encrypts them itself, in general everything is divided into two parts, one part is your traffic, that is, if you forgot to turn off the vpn, it sees all your connections, private letters, private transfers there. they ask to install a client program on your computer, this already really sees everything, the devil has stirred there on your computer with horns, that is, he - well, he can sleep, but at the right time, well, that is, always consider, first, there are no private firms, they
12:28 am
are all... they are all someone's, they, at least, to the special services of their country, they will hand over everything, here , eh, a candidate of physical and mathematical sciences, an expert who has been studying this issue for 40 years, claims with 100% probability that by installing, or rather using vpn, virtual private network for connection, and especially leaving it on, but even at the moment when you are simply using it, and especially if you you install, what is it called, a client program on your computer or on a tablet, on a laptop, on a phone, yes, an application, then you give away all the information from this device, absolutely, right up to what is, there are some clients that allow you to do some other actions without your knowledge, not just collect information, but do some other actions, figured out, the second part of the moralizing ballet, as i say, and publicly available wi-fi networks that are in public
12:29 am
places. but now trying to save money there first of all, here is generation z and zoomers, going to any point, so what kind of wi-fi do you have, i say guys, your mobile operator distributes, that is , you pay pennies there, so to speak, if there is a fixed tariff, then in general , i don’t know about the speed there, 100, 100 megabits per second , what kind of wi-fi do you have there, there is something missing, so we basically want to connect, how safe or unsafe is it, public wi-fi networks, well, it is unsafe by 200. of which 100%, what you will get to is fake wi-fi, for example, that’s real, i myself have seen fake wi-fi here novoikovskaya in this very hypermarket and in sheremetyevo, that is, which name is possible, the name looks like the real one, well , one letter is slightly different, and the goal is just someone put a suitcase, drives all your traffic through itself, that is, this is even, and is there by chance something there that
12:30 am
you can fry yourself with. yes, this is one, this is one part, that you can get on wi-fi, and this can be in the subway, in a cafe yeah, in any public place including open wi-fi, you are not sure that this is exactly the one who it says that this is this particular store, or this cafe, or this airport, it could be a scammer, okay, closed wi-fi, where there is a password from, that is, you, now if you use something wi-fi, and there is no lock, there is also open traffic, but even if there is a lock, all the same , the one who provided you with the channel sees you and sees quite a lot of your information, well , that is, this is a cafe, restaurant, hotel, hospital, and, and here lies another such breakdown between everyday consciousness and reality, man, here we are talking about privacy, so subconsciously suggests that privacy is traffic protection, that someone is interested in what i am talking about now or
12:31 am
what i am watching. not interested, interested in the composition of the criminal group, with whom i am talking, where i am, here are some, what accounts i use, what is my history, how often are these two sim cards next to each other, yes, yes, yes, that is. to understand how to save your personal data in the conditions of the new digital economy, a cybersecurity expert helps us with this, candidate of physical and mathematical sciences, andrey mosalovich. if you remove the battery from the phone,
12:32 am
is it safe as a reading device, or not, even in this case, can it do something? well, firstly, the battery of many devices is now technically not removed, i think that this is also not done for nothing, that's it. no, firstly, any device can contain the so-called means of undocumented impact, well, bookmarks, maybe micro, well, by the way, a microbattery is a reality, for example, in a computer, you take it out of the network you turn it off, and it remembers the time, yes, for example, yes, there is a small battery that saves these systems, well, system settings for fast loading, just like in a phone , a small one can live quite calmly.
12:33 am
not completely under your control, there are some signs, there it starts blinking, turning on, there is something else, wait, remember, let's roll back 20 years, remember, when they still installed the very first versions of windows, a folder with the inscription my documents appeared on the empty screen, here is the word my, who wrote, you already did it at that moment, that is, this windows, it was windows that wrote it, he already thought that these were his documents, of course, good.
12:34 am
i can give you one little hint, well , it will work easiest for those who have android, basically all smartphones have it, but everyone has it pretty well hidden, there is a function called dashboard, that's what...
12:35 am
that an advertisement for pregnant women went, and he has
12:36 am
a high school daughter, like, what are you doing here, an angry dad came to the store, because you are hinting at what you are doing, that's it they threw up their hands, said, we'll check now, well, if it's confirmed, we'll apologize, so a week later he showed up. he said: you don't have to apologize, it turns out she really is pregnant, and not only did i not know, but she didn't know, that is, the store, analyzing large data on changes in behavior profile, saw, and... this girl obviously didn't go to the doctor. that is, before she went somewhere to get some cookies, now she went there to eat and stars from the wall, here or there is salted mountain gourd, everything is automatic, this is what was imprinted, it is fixed, that is, for now, for now, yes, an important remark, it is used from the point of view of extracting commercial profit from sales, basically, the whole idea has become global precisely because there is money in it. yes, there is the most important money in the world in this, that is, all
12:37 am
of these spy games are secondary means, and spy games, as a rule, are pinpoint, that is what we started with today, that there are no such bases in the hands of the special services, not because they cannot do this, because they will choke, they don't need so much raw data, they will turn to you at the right moment and get it, they will get what they need, well, according to requests, then the main conclusion from our conversation is that the devil is not as scary as he is painted. that you are not certainly an object and target of intelligence agencies, hackers, spies and so on, that the main reason for the hunt for data is the collection and storage in an impersonal form and use by huge corporations for the sale, in fact , ultimately to sellers of anything , goods and services so that you sell qualitatively, yes, well, to palm off, as we say, to impose there. services, using your
12:38 am
predisposition at one time or another to buy this or that product and service, actually for this the whole game is going on, that is , in fact the whole game is going on for the sake of selling much better, more effectively, we still have all sorts of crap that has stuck around this , you can’t list it, there are also scammers, and saboteurs, saboteurs, and spies, there is a lot of everything, but the main game is going on, the main big money is the space of such targeted advertising, okay, let's then in at the end... here we will list practical advice, here is what we have discussed with you, uh, so, how to try to protect your digital profile, your personal data in the new digital reality, the digital economy, so, first and foremost, well, let me first start with the image, yes, everything is built from it, imagine that you went into a digital forest, well, into an ordinary forest, there are mushrooms in it, here are the good ones, there are white aspen mushrooms and... you know, such a red one, on the cap these
12:39 am
very spots, you will pull it into your mouth, well, in suddenly you see a beautiful unfamiliar mushroom, in the forest, a real one, no, why, yes it is most likely poisonous, since you do not know it, it is not edible, that's it, no, do not press, if the button is unfamiliar, do not press, written down, that is , do not press buttons that seem to you here are not the roadside, the telephone was invented to call, and not to answer strange calls, you need to call, call. no need to call, do not listen to who you are there, hang up, whoever needs it will find you, that is the second, the second second rule, do not communicate with unfamiliar subscribers, even if you think that you are head and shoulders above them in terms of interest in experience, yes, i really liked your phrase that remember that according to statistics, the number of hits on the network by telephone manipulators, let's call them that, scammers, it does not depend on your level of intelligence or your income, but
12:40 am
depends only on the skill of experience of those who are on the other side of the line, remember that despite the fact that we have a digital world, we have a digital economy, but the methods of work of special services have remained the same the same as those you were, remember that if someone needs you, they will come and take you away, and no one will call you. do not eat unknown poisonous mushrooms, do not share them with others, and what else needs to be done, you need to clean it up, yes. well, you need to come up with fairy tales of the digital forest, because
12:41 am
the fairy tales of old generations are concentrated safety techniques, you go to the forest, the forest will throw, there is a bear, the bear will eat you, now unfortunately they have not been written yet, here is a book by ashmanovo and kaspersky, digital hygiene, read it her, i really liked the advice, here is an analogy, how to deal with apuri, you need to pull out their light, that is, if you are called to perform some actions. atypical in the digital space, try to bring them into real life as much as possible, offer to choose a visit to the office or press a button, go to the office. that is, if it really seems important dangerous to you, then spend a little of your time, go so to speak to the office, make sure that this is really so, make sure that it is a bank or a mobile operator or someone else came up with something, but as a rule now everyone says that we do not ask there by phone for some data, numbers
12:42 am
and so on, but here in the networks there in retail grocery stores for grandmothers lie. the actions of the fraudster, the bank cannot intervene, because for it the situation is indistinguishable, whether you were really deceived or you are in collusion with the fraudster, or maybe you agreed, portrayed a fraudulent conversation, transferred money to your friend, and the bank reimbursed you, therefore the bank, in short, it will not intercede, you must remember that your personal data is one of your most
12:43 am
important assets, along with your health, along with you and your brain, your personal data is a really very valuable asset, which, together with other... personal data of such a huge number of people , can become a source of profit, well , actually, some products, services or goods imposed on you, everything is so in principle not difficult, andrey, thank you very much that we have made the first, i believe, step, towards this digital literacy towards digital literacy with point of view, a small step, the most beautiful analogy with the digital forest, where you should not take unfamiliar mushrooms into your mouth and especially not eat them. and not share with others, where you must remember that you are alone, and you must already be armed with knowledge, at least, do not be lazy there are elementary things, and that's why it is hygiene, often change passwords at least once a quarter, do not store them electronically, and do not make one password for the entire device, plus
12:44 am
try to replace some small avatar, if this can be created some digital image, there is a card with a small amount and a new digital reality and andrey mosalovich, a candidate of physical and mathematical sciences and a cybersecurity expert with more than forty years of experience, helped us with this. you can find all the episodes of the easy money podcast on the channel one website.
12:45 am
hello, this is a program deception of substances, today we will talk about meat. my name is olesya nosova, i am the editor-in-chief of komsomolskaya pravda, and with me is the famous endocrinologist zukhra pavlova. meat is our favorite product zukhra sharipovna, here at i have some great news about meat, in preparation for this broadcast, i spoke with our economics department, the komsomolskaya pravda newspaper, with experts who said that we have absolutely amazing things happening with meat now, russians have started... eating more meat, for example, one person eats about 79 kg of meat a year, just 20 years ago it was almost half as much, 41 kg, in general around the world a person eats about 43 kg, and rich countries 83 kg, that is, we are close to
12:46 am
rich countries, and this is very, very good, we can afford it, yes, yes, well okay child, why eat meat, it's very... good and right, well i always say in this situation that we have teeth, not only incisors, yes, like herbivores, but fangs, like carnivores, and this is absolutely not in vain, we must eat meat, including red meat, because this is how our body is designed, you can't fool physiology, of course there are people who do not eat animal proteins at all, including meat, but man and the human body have... so, that meat is its most important component of the diet, well, actually, and our digestive tract is not like that of herbivores, but like well , not quite like that of predators, like that of omnivores, right? that's exactly the middle ground, yes, we can eat both and even should eat both in order to maintain
12:47 am
health as long as possible. those people who refuse meat, in fact, they are making a mistake, in my opinion, yes, an evolutionary mistake, an evolutionary, physiological mistake, and we live in such a time of ethics, we do not which we do not force, but we must say, as it should be, as it should be, yes, as it is, yes, and then everyone. has the right to make decisions, i only feel sorry when parents make such a decision for small children, who in this regard are entirely dependent on adults, when they are deprived of meat, then this always causes such, well, let's say, a regret. why is meat so important in general? very often we hear arguments that a lot of other sources of protein, well, plant-based yes, as a a replacement, or something else very they often say that... it is not necessary to eat red meat, you can get the same thing from fish, yes, seafood, but this is how they try to replace protein sources,
12:48 am
yes, these are also animal sources of protein, but not meat, it is very important to put everything in its place, why is there such a special emphasis on red meat, red meat gives us something that we cannot fully get from other sources, well, for example, yes, that's the first thing that comes to mind? as a rule, no one ever stumbles in this plane, because they immediately say iron, yes iron, but if you read the composition - some plant sources, what the plants are made of, what we get when we eat plant foods, then there is also iron there, but iron is different, in plant sources it is such an ionic form of two- or three-component iron, it is very poorly absorbed in the human body, that is ... plant food cannot be a full-fledged source of iron, here is meat, which contains heme iron,
12:49 am
that is, in the composition of hemoglobin, these are animals sources, that is, red meat, here we absorb iron significantly, we absorb it many times more than from plant sources, therefore, by giving up red meat, we deprive ourselves of a source of well -absorbed, what is iron? to understand why we talk about it so much, iron is a toxin that carries oxygen to all organ systems, and there is probably no need to explain how important oxygen is, yes, because the heart can beat for a very, very long time, but if a person has not breathed for 5 minutes and has not received this very oxygen, then the brain will die, and we can somehow, what is called, function, but this is absolutely not life, therefore, with such a simple... example, you can understand why we talk about iron at all, there is red meat, there is white meat, that is, not every meat is equal to another meat,
12:50 am
what is the difference? let's designate what we generally classify as red meat: beef, pork, lamb, horse meat, venison, or deer meat, to be more precise, elk meat, goat meat, goose meat, duck meat, we will also leave two point on... chicken, only drumsticks, thighs, and turkey, we will also include wings there, these are the main sources of red meat, but if elk or, say, goat meat is still not the most common meat that we eat, then beef, pork , lamb is what we eat quite often, most of us, this is red meat, they often say poultry, i say that in principle yes... here are the basics, but what is the difference between white and red, in red meat there is that...

10 Views

info Stream Only

Uploaded by TV Archive on