Skip to main content

tv   PODKAST  1TV  August 28, 2024 12:00am-12:51am MSK

12:00 am
maintaining a systemic peace in the greater middle east, this is connected with the motivation of one belt, one road, this is connected with the contribution that china has already made to the iranian-saudi reconciliation, it accepted 14 palestinian groups successfully, there are many other groundworks, and especially relations with iran, all this is certainly taken into account in washington, but the reality is that for now the plan of china, and russia to create a palestinian state is the eye of the beholder... well, in the un there in the security council or in the desert, that is, in fact, the reality of the middle east is a constantly pumped-up cauldron, where the us throws spices and god forbid this cauldron explodes and tears apart the entire middle east. well, of course, russia and china, they are really interested in peace in the middle east and are doing everything possible for this. it was a big game, goodbye, see you tomorrow.
12:01 am
this is the easy money podcast, i am its host mikhail khanov, and today we are figuring out how to protect your personal data in the digital economy, today our guest is a candidate of physics and mathematics at...
12:02 am
yes, let's see how it is it is formed: here you were born, you had your first records, what is your name, parents, their place of residence, there is the date and time of birth, maternity hospital, everything, they went into some digital file, here this digital dossier began to accumulate on you, which then about digital about one, now it is a very dispersed base, there are many of them, there is such a term as big data, big data, this is a database of big data, which different companies, different people, different organizations. for different purposes, but they
12:03 am
have learned to be friends with each other, they are with each other a friend is exchanged, a dossier is accumulated , in fact, it can be quickly built in one place, this does not mean that it is somewhere directly physically everything-everything about you is stored, but it is very easy to build collect in one place, and moreover, at some point you can collect the so-called golden record, where literally everything about you will be stored, let's list that everything, you have identification data by which you can be identified, determine where you live. there, who you are, who your parents are, where you came from, where you worked and so on, one, two, your medical data, actually the holy of holies, what you were sick with, are you sick with, there, no, serious illnesses, yes, that's very, but they also leaked there, then, all your types of activity, well, in fact, any action of ours, any, leaves a digital trace, you walked past a bus stop, the sensor beeped, already to the fact that in all the police series. police officers, i beg your pardon, already
12:04 am
a standard phrase: look at the cameras, and i want to please you, i don't know, it's a common myth that - our image is in the hands of the special services or law enforcement, law enforcement officers, special services, feed from the hands of private companies that know much more about us, why is there a company, well , a pizza delivery company knows where you are exactly, who you are with now, how many of you are there in this room, but this is at this particular moment. the special service, in order for this or law enforcement officers to find out something, needs to get to the database. i tensed up when you said that state special, state special services, law enforcement agencies, do not have these databases , they go for some information databases in private companies, the same marketplaces, yes, these are platforms that unite sellers, well-known to everyone, yes, electronic and , in fact, each of these platforms a collects, b stores and... c uses this
12:05 am
data yes and d it is also private, that is, it does not answer, as the state does to you, so it is guided by 152 fz, maximization. then it turns out that money can be written off from the card, well, in those, some are not quite so, some essential data, in particular cvv and passwords, there in most places are stored not as the cv and passwords themselves, but as some transformation of a one-way function, the so -called hashes, that is, let's say - i
12:06 am
have a password, well, for example, this very pin code, so i can add up the sum of the pin code digits, divide by five, i get a remainder. you have the remainder written down, you tell me, tell me the sum of the digits of your pin code , the remainder, i say such and such a match, that is , you you cannot restore, that is, if it is someone else and he does not know the very algorithm by which he will not help, he will not be able to use your password, he will be able to check that you are correct or the wrong one was sent, but fortunately it won't be able to be restored, that is, in this regard , some kind of reservation for our privacy is preserved there. here is where natalya kasperskaya would say: everything that can leak, will leak, here i will add from myself, everything that can leak, has leaked. bank, how secure is the storage of your personal data? well, the first answer, the answer is no, it is not protected, but not
12:07 am
because the database is not protected, the databases are protected close to impeccable, that is, now banks have a very high level of self-awareness, there is a very high level of internal protection and control, well, and the fight for reputation, which. but - banks are caught first due to disloyal employees, that is, when leaks occur from banks, then either hackers break the database and download it, well , by the way, often with the help of insiders, or a disloyal employee simply takes your data and sells it, well, i can honestly say that the request is probably six years old, even more, i watched a film about just hacker groups. and imagine my surprise when there are very cool ones, here are some really cool guys, computer and calculator guys, as i say, they are all stuffed with sensors, they typed program code very quickly, there was a huge number of server monitors, but all the major hacks were all done with the help
12:08 am
of social engineering, what is social engineering, what andrey says, when there is some employee who threw a piece of paper with a password in the trash, they specifically rummaged through the dump looking for trash. office trash, where there could be some data suggested, that is, you wrote it down on velcro password to the computer, someone saw it through binoculars there through the building, then you threw it in the trash, they go there specifically to the trash bins, rummage, get it, that is, this is the so-called phishing of catching fish, in fact, you yourself just said that, uh, we ourselves actually yes, well, in this case, the employees of the banking organization, the very human factor that gives the keys to hacking into the hands of criminals. four or five different ways, and this is not all and not the main thing, let's figure it out, so, first, we don't store passwords carefully, yeah, secondly, our passwords are not strong, let me remind you, a strong password now, well, according to the requirements of, say,
12:09 am
kaspersky, is at least eight characters, at least one letter, one digit, at least one capital, one, one capital, one small letter, at least one service character, try to generate such a password, you will see that you never. no, you are deeply mistaken, i have three twelve-digit passwords with exclamation marks with urgent capital letters with numbers, well , super, well, the best i've ever seen in my life, i have it was, let's digress for a second, i had an episode when a lot of passwords for different work were flowing through my hands, so i decided to conduct a study of blonginka against hackers, i collected about 100 lagins that looked like hackers and admins, there is an admin, superadmin, hacker,
12:10 am
russian phrase: why am i such a fool, you don't need to store it, any program burtforcer, well, which is a password picker, will break on it, so the girl is great, well, let's move on, so, look, you didn't protect their password well, your password is weak, then the worst thing is the worst gift a person gives to a hacker is repeating passwords, you can't have the same passwords on different services, you can't have the same passwords on different services.
12:11 am
i remember that these numbers are here, and there are also options, there are not many options, i
12:12 am
can always always change them, even if i screw up once, the enemy won't be able to, but once again, these are the so-called zero -cryptosecurity techniques, if the enemy finds them out, they are lost, so they also need to be changed periodically, then passwords, as sad as it is, once a quarter you need to change it, they really do leak, well really you type the password on... but how can you live in such a thing, how scary it is to live, how to live, you need to form some kind of harmless image of yourself next to you, here i have a card, there are never 300 rubles more on it, even if everything is stolen from it, that will be the price of the lesson, this is the same way, as you said, that it is impossible to protect yourself from constantly progressing threats and what can leak will leak. what they want to steal will be stolen, accordingly, then we minimize and build our avatar, our
12:13 am
double, which in fact, you need to understand the following things: first, technically the enemy can get to anything, break anything, and this applies to cyber troops of other countries, and special services, and hackers, but he is very busy, he is very highly paid, and he really does not like problems, that is, as soon as he sees that messing with you is problematic, he will become uninterested. or looks uninteresting, no need to talk, squat, our formidable housekeeper, now also a physical education teacher, any roads, roads, to see you soon, see you soon, look, you look. and i did everything i wanted, thank you very much, saw
12:14 am
us tonight, saw, yes, it's fantastic. the final is on friday on the first, the apple trees of toys have blossomed, the fogs have floated over the river, let the pedestrians run clumsily on the left through the puddles, and the water on the asphalt like a river, i'm screwing my horses, whipping them, driving them. the little ones were lyoli for half a dot and at night,
12:15 am
i give my sister, who soaked me at night, since september 6. this is the easy money podcast, i am its host mikhail khanov, we continue the conversation about how to protect your personal data in the conditions of the digital economy, how to save your digital profile, andrey mosalovich, phd in physics and mathematics, a leading expert in the field of digital cybersecurity, helps us with this today , let's say i have an account in the bank, and let's say i follow the first rule and change passwords once a quarter, but this, as we found out, is enough, not enough, i need to protect this
12:16 am
money, that is, i need to divide it, i need to put some kind of protection. in the same 3,000 rubles to ask there with some kind of double identification or what, what how exactly to protect your money try in the bank? if you have them in the bank, walk to the branch, write a statement that all transactions above this amount only in my personal presence without a power of attorney, without electronic payments, only in person, so we remember, that is , it is very simple, and banks accept such statements in principle, well, change the bank, there are banks that accept. it turns out that if some operation took place, they said that remotely whether you called, you are not in visas, that is, the bank bears responsibility, according to this agreement, that is, in principle, it turns out that one of the most effective ways to combat fraudsters in the field of cybersecurity with your digital profile, to transfer it offline, that is, to bring it from the number to the real
12:17 am
formulated, here it is in fact the only way, if you are fighting ghouls, you need to pull out the sunlight, that's it, if they call you and say, urgently busy from the bank, cool, i'll come to the branch now, who should come in? you are called from the investigative committee, cool, send an understanding, yes-yes-yes, that it will probably be inconvenient for you to approach, when they tell me, i say, no, it will be very convenient for me to approach, a couple of arguments in addition to what gregen tasunyan said, so the first in the states conducted research, there is no correlation between resistance to fraud and... income, position, professorial rank, that is , everyone is being deceived, adults and children, middle age, top managers and just all managers, that is, you don’t need to think that this concerns grandmothers or children, of course, this, this is what these are the most widespread schemes, those same scripts, yes, which you plant there, but also a person not of the highest intelligence, but due to his
12:18 am
enormous, as i say, observation, experience, yes, experience, thousands of such conversations, calls, not the most... you were also brought to emotion to what they are trying to achieve, they are brought out and you can say there this or that information, which in the end will lead to losses, very therefore immediately, as they say , we pull the plug and go out, hang up the phone, that's it, one of the most frequently asked questions that people ask, especially relevant now, what is vpn. what is it from the point of view of cybersecurity? well, let's start with what is vpn? virtual private network, yes, virtual private network, the word private here, so, look, when you go online, according to the requirements of any country, the provider that let you out on the internet must have special equipment, in the world it is called loveful interception,
12:19 am
legal interception equipment, in russia it is called sorm, the system of operational-gross measures, that's it... use to remain invisible want, well there are two main ways: first, if we do not take into account completely criminal, there is someone else's sim card, someone else's computer there and so on, here the first is called a proxy server , that is, you go through someone else's server to look at well, it sort of turns your traffic into its own , i do this myself, that is, you knock on the proxy server, then
12:20 am
we will not tell the next part and all the secrets, we will not, this is the simplest, in this case it sees you. well, you violated the server, you violated the zero trust environment, it is someone else's, most likely, it belongs to some enemy or there to a scammer or just some company that at the wrong moment will give you up, but you violated, you trusted him, so you violated the rules there of the zero trust environment, so he sees your traffic, but the traffic can be you, but the traffic can be hidden, you can just make an encrypted stream, well, for example, dial azhps, yeah, then the server in the middle will not see. here is the second way, the server in the middle is also a stranger, it says: i am widespread, it is called vpn, when i take myself everything, your entire connection, with whom i want.
12:21 am
a few sad features for you: it is not clear between whom, here, but there is the first one, this vpn server sees you naked, it just... sees all your traffic, all your intentions, because it encrypts them itself, in general everything is divided into two parts: part is your traffic, that is, if you forgot to turn off the vpn, it sees all your connections, private letters, private forwarding, forwarding, these private accounts, if you also trump them there, it sees everything, this is one side, the second side, most of the vpns also - they ask to install a client program on their computer, this is already really sees everything, on your computer it started to move there.
12:22 am
an expert who has been studying this issue for 40 years, claims with 100% probability that by installing, or rather using. for connection, and especially leaving it on, well, even at the moment when you are simply using it, and especially if you install, as it is called , a client program on your computer, or on a tablet, on a laptop, on a phone, yes, an application, then you give away the whole information from this device absolutely, up to what is, there are some clients that allow you to do some other actions there without your knowledge, not just collect. information, but do some other actions, figured out, the second part of morley's ballet, as i say, and publicly available wi-fi networks
12:23 am
that are in public places, but now i'm trying to save there first of all, here is generation z and zoomers, going to any point, so what kind of wi-fi do you have, i say, guys, does your mobile operator distribute it, then there you pay pennies there, so to speak, the tariff is fixed, so in general with the speed there i don’t know 100 100 megabits per second.
12:24 am
or this airport, it could be a scammer, okay, closed wi-fi, where there is a password from actually, that is, you have this k there, if you use something wi-fi and there is no lock there, there is also open traffic, but even if there is a lock there, all the same the one who provided you with the channel sees you and sees quite a lot of your information, well, that is, this is a cafe, restaurant, hotel, hospital, moreover, moreover here is another one of these...
12:25 am
where is natasha? they told me that she went to the city, but that can't be, why do you need this max, well, he'll finish his agricultural studies, he'll be an agronomist on a collective farm, and what do you need him for, and
12:26 am
you and i are mountains. soviet counterintelligence has established that a foreign intelligence agent is operating in moscow, the security officers only know the agent's call sign, trianon, the nagoni are on the verge of a coup, if agana overthrows grisso, the americans will immediately deploy their bases, the leadership of the committee expects the most from us decisive action, forgive me please, this message from... tell me, does it look like a fake or not? you, vitaly, urgently fly to louisbourg. we need to find the author of the letter. he is a kgb colonel, here under his own name. report to me about every step of this slavin. it is necessary that the fleet be redeployed on the day and hour when we begin our operation, which we called fakim. this kind of intensity of work is possible only on the eve of events. and here in
12:27 am
africa, the russians are to blame for everything, we are interfering only to keep them out. yesterday london broadcast a very interesting commentary on nagoni, for the 12th anniversary of das. this is undoubtedly the one you are looking for. the legendary multi-part film based on the novel by yulian semenov. tas is authorized to declare, on the first weekend. this is the easy money podcast, i am its host mikhail khanov, we continue to figure out how to save your personal data in the new digital economy, cybersecurity expert, candidate of physical and mathematical sciences, andrey mosalovich helps us with this, if you remove the battery from the phone, it is safe as a reading device or not, even in this case it can do something, well , firstly, many devices have a battery
12:28 am
now...
12:29 am
how to understand that your phone is not completely under your control, there are some signs, there it starts to blink , turn on, there is something else, wait, remember, let's roll back 20 years, remember, when you were still installing the very first version of windows, a folder appeared on the blank screen with the inscription my documents, here is my word, who wrote you, it was already at that moment, then there is this windows. this was written by windows, he already thought that these were his documents, understand, good, no, this is not a joke, this is part, unfortunately, this is part of reality, that is , your smartphone, it is not yours, and the data on the smartphone has not been yours for a long time, moreover, if you read the license agreement, you will see that they are definitely not yours, here i can give you one little hint, well, it will work easiest for those who have android, in principle, all smartphones have this, but everyone has it pretty well hidden, there is such
12:30 am
a function, which is called privacy dashboard, that is , a privacy control screen, privacy dashboard, if you spend a long time poking around in the settings, you will find it, if you spend a day poking around, there are such applications, you can download them, well , with such a name, prograssi dashboard, this program shows how other programs are currently spying on your smartphone, who turned on the camera, who turned on the microphone, who turned on the motion sensor, who stole files, that's who , well, these are not necessarily some spies, they can just be this. cares, began to care, at least why is it that our government is always trying to ensure that the data from our domestic social networks, our search engines, are all stored on the territory of russia, because these are huge databases that
12:31 am
can at least to some extent belittle the state, they... are located there on the territory of other countries, it turns out that, indeed, we ourselves actually generate that same big data, which is then used, even if there in safe, but... well, for the sake of which all this is done, they are really impersonal, they do not require any personal control, but these anonymized data is needed for targeting the contextual advertising space, that here is beer advertising, here is advertising in language , let's say, that for marking who, what and how buys, who behaves how.
12:32 am
i saw by the change in the behavior profile, and this girl obviously did not go to the doctor, no, that is, before she went where there are some cookies, now she went there to eat and stars from the wall, here or there is salted mountaineer, everything is automatic, this is printed, this is recorded, that is for now, for now yes, an important remark, this is used from the point of in terms of extracting commercial profit from sales. but the whole idea became worldwide precisely because there is money in this, yes , there is the most important money in the world, there is, that is, all some kind of spy games, these are secondary means, and - spy games, they are usually targeted, that's
12:33 am
where we started today, that there are no such databases in the hands of the special services, not because they can't do it, because they would choke, they don't need so much raw data, they will turn to it at the right moment and get it, they will get what they need, well, on request. the main conclusion from our conversation is that the devil is not as scary as he is painted, that you are certainly not an object and target of intelligence agencies, hackers, spies and so on, that the main reason for the hunt for data is collection, storage in an impersonal form of use by huge corporations for sale, in fact, ultimately to sellers, of anything, goods and services, so that you quality.
12:34 am
in it mushrooms, here are the good ones, there are white aspen mushrooms, suddenly you see a beautiful, unfamiliar mushroom, you know, such a red one on the cap , these same spots, you'll pull it into your mouth, well , in the forest, a real one, no, why, yes, it's
12:35 am
most likely edible, since you don't know it, it's not edible, don't bark, no, don't press, if the button is unfamiliar, don't press, wrote it down, that is, don't press the buttons that seem unnecessary to you here , they came up with an internet phone, that... to call, and not to answer strange calls, you have to call, call, you don't have to call, don't listen to who 's there, hang up, whoever needs to will find you, the second second second rule, do not communicate with unfamiliar subscribers, even if it seems to you that you are head and shoulders above them on the internet, but i really liked your phrase, that remember that according to statistics, the number of hits on the network...
12:36 am
a bear will throw it there, the bear will eat it,
12:37 am
now, unfortunately, they have not been written yet, here is a book by ashmanova kaspirskaya, digital hygiene, read it, i really liked the advice, here is an analogy, how to deal with apuria, you need to pull out their light, then if you are called to perform some actions that are not typical in the digital space, try to bring them into real life as much as possible, i suggest... choose a visit to the office or press a button, go to the office, that is, if it really seems important and dangerous to you, then spend a little of your time, go, so to speak, to the office, make sure that this is really so, make sure that it is a bank or a mobile operator or someone else has come up with something, but as a rule, now everyone says that we do not ask for any data, numbers, etc. over the phone and so on, and already in... in the networks there in retail, grocery stores for grandmothers there are
12:38 am
leaflets, here i just read very detailed, very high-quality texts, calm, in simple words, explaining how to behave, there, that is, the state, not only the state is fighting, large companies, and private ones are also fighting, so in this way, smoothing out the sheets, i suggest you familiarize yourself with these rules, so also, if we continue the analogy of the digital forest, you are there alone, there is no police nearby, personal data is really very a valuable asset, which in the mass with other
12:39 am
personal data of such a huge number of people can become a source of profit, well, actually , some products, services or goods imposed on you, everything is so in principle not difficult, andrey, thank you very much that we have made the first, i believe, step towards this digital literacy towards digital literacy from the point of view, a small step, the most beautiful analogy with a digital forest. where you should not take unfamiliar mushrooms into your mouth and especially not eat them and not share with others, where you should remember, that you are alone, and you should already be armed with knowledge, at least, do not be lazy there elementary things, yes, because it is hygiene, often change passwords at least once a quarter, do not store them in electronic form and do not make one password for the whole device, plus try to replace some small avatar, if this bank. create some digital image there card with a small amount
12:40 am
to protect yourself in case of a bank account, limiting transactions there some elementary amount of 5-10 thousand, everyone has it different, in which only your personal presence at the bank can confirm the legitimacy of this operation. thank you very much, i think that the topic is endless, we will continue to thank you very much. this was the easy money podcast and i am its host mikhail khanov, today we ... figured out how to save your personal data in the new digital reality and we were helped in this by a candidate of physical and mathematical sciences, an expert in cybersecurity with more than forty years of experience, andrey mosalovich. you can find all the episodes of the easy money podcast on channel one website.
12:41 am
hello, this is film historian stanislav dedinsky, and today we have a special edition of cameron 70. we are talking about the birthday of director james cameron, or rather about his work, about his films, today we have two special guests, this is anatoly sagalevich, an oceanographer, a doctor of technical sciences and a person who in many ways directed and inspired.
12:42 am
about how you met james cameron, because any such large-scale project as titanic is sometimes developed for more than one year, or two, or five, or even and 10, how did you first meet this director? well, the question is quite difficult, since the path to our meeting was quite long, in 1987 we built a deep-sea...
12:43 am
12:44 am
and there, you see, i gave a report, after the report two people who were making wide-screen films came up to me, well , they asked me, would we like, well, you see, would i like, so to speak, to participate in the filming of deep-sea films, the result of this, you see, was the film ellings, the first. made a film for the eightieth anniversary of the sinking of the titanic in in 1992, well, linnex made this film, there was a premiere in hollywood, he invited james cameron to the premiere, they had filmed together with james cameron before, james
12:45 am
was, that is, the director, and al giddings was a co-producer, so they were filming the movie the abyss, he was with us. the talk was on, that is, so when the film ended, al giddings, he was commenting on this film for 47 minutes, walter cronkite, so to speak, a famous announcer, i remember when i showed this film to georgy arkadyevich arbatov, the director of the institute united states of america and canada, he says that you... advertise, he says, walter cronkie, i, he says, got up and left, these were arbatov's words, i remember, well, well , this film, you see, jim, you see, and as al giddins already told me, he says, everyone had already left the hall, and we sat for 2.5 hours, he says, talked, so in
12:46 am
general, he says, gene asked many times, asked about me, wanted to meet with me, here is the first meeting in july... very interesting, of course, everyone really liked this thing, so to speak, jim was very puzzled that we, so to speak, like this, so this is what we did to him. it was 5 years before the release of titanic in 1997, if you count 1997, practically yes, 1997, well then 2 years were spent on different things,
12:47 am
well he thought, well and as dzon bruno, his special effects assistant, told me later , says that it is very difficult, since it is a lot of money, it is one thing to shoot in a studio, here we know everything, so to speak, ourselves, so we guarantee success. and here he says, well, who knows, what could be, of course, you made a film there, jim, he really liked it, jim liked this film, so, well, and so, as a result, there was another meeting, i flew, so, in los angeles he invited me, but the thing is that so far nothing ended, i wrote to jim, then, well, a fax, then still electronic. something was missing, well, i wrote him the fact that jim, while we are alive and well, while the parade and the world are in good condition,
12:48 am
let's decide, either we make a film, or we don't make a film, today or never, and then i wrote to him that in the end a person should at least once in his life do something extraordinary, he still remembers this phrase, he says, when i read this phrase... and he tells me in russian, let's go, and the most important thing is that later, when we were diving, and he entered the apparatus, he always before going down , that is, to close the hatch in the apparatus, he always said, let's go, i once asked him, what are you saying, let's go, and so, he says, gagar said, sakhalin, decided to have a cultural rest, were inspired by the works of anton pavych, so roma
12:49 am
walked in the cherry orchard, karen took three sisters, eh, andrey ate some tea, here is kvn, the summer cup, on the last day of summer, on the first, i met a girl, i invited her for a walk. after me, but because of the weather i couldn’t rush to her, the wind knows where to look for me, you are just a flamingo, a child of the sunset , powerfully, brightly i really wanted to dance, good, good, good, you just blew up the hall, your body will be shitty. everything is in unison, everything is great, but you are different, because different generations, this difference is the most valuable, this is your copy, which you should
12:50 am
be proud of, if you dream of seeing one of wonders of the world, then just look at our project, each family duet is amazing in its own way, two stars, fathers and sons. on sunday on the first, this is the cameron 70 podcast, and today we are talking about james cameron with anatoly sagorilovich and maria shteymon. and what impression did he make on you as a person, well , the director is usually that i can just tell you an intelligent person is immediately visible, so here is an extraordinary mind, it is completely obvious, so we, so to speak, immediately somehow found common ground. i suggested that he go for a run along the pier, so we they took him for a run, but after...

10 Views

info Stream Only

Uploaded by TV Archive on