Saturday Tech Only Live Stream

0:52 Good morning everybody, I'm gonna unmute my Mac itself...

0:52
Good morning everybody, I'm gonna unmute my Mac itself. Jedi came in and he started the broadcast. I was kinda waiting for him and all of a sudden, it started. I'm like, oh, I wasn't even attaching my computer. What the heck happened? So, Jeddah, there we have I think you are unmuted, welcome to Saturday Livestream.
1:14
Yes. Good morning. to kind of explain why I need my coffee. and I totally understand that.
1:27
I think the second thing that is I've had my two I went for a walk, listened to a little bit of things.
1:37
And, you know, I decided after our conversation yesterday, Jeddah, that this was going to be kind of themed a little bit and it's cloak and dagger because I think it's getting into an area that we haven't really talked that much about You know, we've, we've kind of alluded to a little bit, But some of this stuff that I'm kind of reading through and and doing some research on is really kinda cloak and dagger, and it was rather disturbing.
2:07
As I get into it deeper and deeper, because, I did put out a couple of videos, uh, that were kind of, a conversation that, we're going to have, as, well as other things.
2:20
But it was basically talking about how vulnerable your, your Android is, which is completely vulnerable. Without a doubt, there's, there's nothing to stop your Android phone from being basically clowned or get some forensic information, because they don't have a mechanism to stop that. And the i-phone, where there is a mechanism, and no one tells you how to enable it Unless you're a corporate user.
2:51
And, and that's the mechanism to do it.
2:55
And, you know, as I dug a little bit deeper into all of this, I've found that, let's see, for $1495, you too can steal the data off Anybodies i-phone that you get physical possession of.
3:15
And if you haven't, listen to the two videos that I included it, was, it was basically, you know, I was going to talk a little bit about travel, what we need to do when we travel because it's summer, and everybody seems to be a revenge traveling that, you know, shut down your computer.
3:34
When you go through custom, or TSA, or a fair in other parts of the world. You know, whatever security that you have in place. We don't all fly private, like Jay.
3:48
It would be nice to, but I am not in that camp right now. And so, you know, what can we do to protect ourselves?
3:56
And then I stumbled across, well, the, the forensic side of things, which I knew was available. But I thought, we were a little bit protected when we had a password on our phone.
4:07
And it turns out that if you're an Android user, you have no protection. Like there's nothing you can do, except not bring your phone wherever you go that may run into a some type of security that potentially could clone your data. But with the i-phone, there is something that you can do.
4:30
But it really is designed for people that have a new phone or that are willing to have their phone erased and start from scratch.
4:42
I know the new i-phone 14 is slated for sometime in September. We'll see if that happens with how things work out in this world, nowadays. But I was not going to get an i-phone 14, and I am absolutely going to get an i-phone 14 when it comes out, because I am going to enable this on my phone. I also have, you know, different silos in my life. I have a work silo, and I have a personal silo, and my work phone.
5:11
This next week, I am going to try to go through the process, and basically not allow another computer to connect to my i-phone and get its data, and you might be wondering, well, you know, so they see my pictures, they may get my e-mail passwords. They may get things. And this is the important part. The private keys for your two FA app.
5:43
That is a real, real issue.
5:46
I do have some high net worth clients that I will be talking to them about this, because if you're going to cross border, you know, you really don't have any rights there, good luck.
5:59
And that, I would rather give up my phone for $700 than them get my data on my phone.
6:08
Because one of the things that you may run into, is, if your data is not able to be scraped off your phone, they may just take it, and you know what, fine, they can have it.
6:20
I'll start fresh and new, but I won't be giving out my two factor authentication keys.
6:26
I won't be giving up my private keys for things like Signal and other apps that are on the phone, or some wallets, the only wallet that I currently have on my phone, is Hedera.
6:41
And, that's because I make their own accounts, basically, for people that write in. So, I know I'm going right off the bat and just, you know, hit the ground running, but I was kind of shocked at how easy it was and, frankly, how inexpensive the software is. And I'll get you into this conversation a little bit, Jeddah. But one of the conversations that I had last week with someone was that they invited a family member invited a hitchhiker into their life.
7:14
And this hitchhiker stoled millions of dollars worth of crypto from this person.
7:20
It's relative and had lived in the house, had the ability to have in their possession, computers, phones, that type of thing.
7:32
And so the reason why I kinda labeled this cloak and dagger is that, for any high net worth person, and certainly, any high net worth clients that I have, I am going to have conversations because I thought there was much more security than there.
7:50
Then, there is, and we don't know what we don't know, and that's the big issue.
7:54
But if you give up your phone, and I've only given up my phone twice when I went into a place.
8:03
one was for, oh my gosh, probably a horrible experience that I had was, I went and watched, the taping of Will and Grace there last season.
8:13
And I had a friend on the show, and so you have to give up your phone. I did not give up my phone because I knew what they were going to ask and I just hit it and I turned it off. But they don't want anybody's phone going off.
8:27
So they ask you to leave your phone either at home or in the car or in a little box. And I was not willing to give up my phone there, but I did have to give up my phone for a meeting once.
8:41
And when you give up your phone, you give up the possession of your phone where you could give up all your data, and people are not aware of that.
8:51
And I hope all of these Congress critters that go into read documents and they have to leave their phone outside. We've kind of saw that couple of years ago.
9:03
I hope they have their phones locked down, because if not, I'm sure that someone took it and tried to get as much data as they could of it.
9:10
So possession is nine tenths and I would not leave my phone out knowledge of where it is for very long.
9:22
If I don't have it locked down, So no.
9:26
If you know that you're gonna need to leave your phone someplace out of your possession out of your home. Just leave it at home, leave it locked in a car, hide it in your car but it's it's kinda brings out the cloak.
9:37
And dagger in me that if I knew that someone was high net worth and I could break into their home and I could clone their phone for whoops, with software that's only $1595 and they have millions of dollars.
9:57
That is a good roi For you know, being able to strip someone to have their two FA strips one after whatever they really have on their phone and know a lot more about them. And so this was really kind of concerning to me, because I did not realize what I didn't know, and I am learning it.
10:21
So, that are welcome to the show, and I just had to get that out, because I've been thinking about the last couple days.
10:31
So, if you would like to add anything, more than not, you're more than welcome to.
10:37
Sure, Yeah, no, thanks a lot.
10:41
So, I don't know how many of you know probably a few, but I used to work for a three letter agency, and I was talking to George about, um, why When people get all bent out of shape over KYC, it's all for naught because any three letter agents. Well, out any. But the ones I was associated with, Know who you are and how to get your information and find you and everything else. So, you know, why bother?
11:10
KYC is is just an easier way for regulators to get to your information, but if somebody who's really after you.
11:21
Yeah, there's no hiding, so to speak.
11:23
But, So having said that, we were having conversations and the tool that Apple users has called Apple Configurator.
11:34
And it's been around a long time.
11:36
And basically, it's called and it's an MDM, mobile device management software, and there's a number of different products on the market that do that and allows organizations to manage all of the mobile devices no, within the organization.
11:54
So what George was saying, is that if you can, if you download and install a copy of mobile Configurator are your home, or your personal devices, you can still use it that way, and then, that means any.
12:08
Any changes.
12:09
You can put restrictions on it in terms of what can be downloaded and not. So that's, that's a product that's been around for a long time.
12:19
I've always been a big Apple fan, because I'm unfamiliar with the security architecture they use, and I know it's multi layer security architecture.
12:27
Doesn't mean it can't be hacked because apparently It can.
12:33
But, um, Once again, a lot of this requires physical possession.
12:38
The organization I was with was very concerned about certain employees losing their phones, being obtained by unfriendly state actors, so to speak.
12:52
And in the area where I work, where there's a lot of embassy's, so, you can guess kind of where that was.
12:59
There was always a fear that somebody would be on on Metro and their phone would fall out of their pocket and some, some foreign agent when you would get that. I mean, that's also so coincidental And practically.
13:14
No impossible to happen. But there was always appears. Somebody would find the phone and be able to get into it.
13:21
And in that conservatives more of the information on the phone was on necessarily classified, it couldn't be classified legally.
13:30
But if you got into the e-mail system that was on the phone, then you wouldn't have access to all the e-mail addresses of the employees within the organization to include contractors and and other government agents, agency, employee. So it was a real threat, that hacking into or getting access to just the e-mail addresses of all these people.
13:56
And I think the total number of employees is 35,000, and then you throw in all the contractors and other other government agency people. You had quite a few potential targets.
14:08
So, so that was a real concern there.
14:12
So, I know, I'm kinda long winded running on here, but that's just to put some perspective as to how serious it says work.
14:20
So when you get into your i-phone, it's going to have to really have the resources available to do that. Let me just put it that way.
14:28
But Georgia, and I don't know if you want to get to this S, Y, how many times have we said you know you can keep your coins on a ledger or trays or on a hardware device because that is independent?
14:41
Your i-phone or your Android phone?
14:44
And how many times you say keep your, keep your coins on a hardware device.
14:48
Not on an assault wallet, not on a wallet on your phone.
14:53
The other thing, for those of you who have Coinbase accounts, it might be with other exchanges as well.
14:59
They have several layers of security, one is your password, and then another password to take to transact.
15:09
Then if you want to withdraw, you need to put another password in.
15:12
But even Coinbase as the most secure there's not using two factor authentication like Google Authenticator, but is in fact to use a UB key or you know a hardware key.
15:26
Once again, I think George pointed out if you're using Google authenticator or any of the authenticator tools, those potentially could be those private keys could be hacked into someone, then games, access to to your authenticator application or the content of it.
15:47
So, so yeah, so if you really wanted to get down, I think, I think you, The key even makes something for the i-phone, if you really wanted to go that route, but that means you can work here with you, You know? Yes, and like, they do have one that you can stick in the bottom. That's the lightning, but they do have NFC. Near Field Communication. which, you know, you can tap it on top, and you're right. It is, but if you are, you know, it really brings back the question. If you're traveling overseas. And I know I know three people that have been traveling overseas.
16:30
Um, and, you know, it brings up the point of, you know, that is where there's some potential issues. And the reason why I think I feel so strong about this is this person is not going to be listening to the show.
16:46
But I had I had met with someone in the last two months.
16:54
And they were supposedly a security expert close to it, or claim to be, or they were in IT.
17:03
And, uh, I brought up the fact that I had had conversations with someone who worked at a three letter agency and that the i-phone was much more secure than Android because this person had an Android phone, now, because it wasn't in their wheelhouse, it wasn't in their belief, they kind of dismissed the conversation that I had with you, Jeddah. And it wasn't that they said, oh, really, well, tell me more. Why is the Android not as secure? They, they were very dismissive and at that point, I said to myself, made a mental note that they really don't care about their security.
17:42
That they could do, you know, thinks they think that they know what that is, what they know is the only thing.
17:50
And that's where I feel some people out there, um, just don't take into account everything, and they don't know what they don't know. And I was rather disturbed by how dismissive this person was in the conversation.
18:08
Because I know there, high net worth.
18:12
And I was like, come on, like, you say you're a tech person, get some information in your brain.
18:19
And, know, don't just be so dismissive because you think, you know, you gotta keep up with this stuff, and that's what I've been doing is keeping up with this stuff the last couple of weeks, because, well, crypto suck. And that's what Chad and I keep tax each other back and forth, because it's, it's, it's boring. No one really wants to, to look at things. I mean, it's, it's been really slow for me with, with people in wanting some help, which is fine, but, you know, people are not doing crypto stuff because it just sucks right now and it's understandable.
18:57
So, so, yeah, this is, you know, and it's easy to find some of this data and this is, you know, how you can extract in a bit locker key off Windows.
19:12
And so, you know, I think when people think that they know what they know and they are not looking for what they don't know, this is where people run into problems because, you know, extracting bitlocker keys for, uh, for a Windows machine, where a bit locker is supposed to encrypt your, your data so that it's safe and secure.
19:37
I don't know if that's true anymore, and So, you know, you got a question. A lot of things, and when do you, why are high net worth? if you are a journalist?
19:45
If you are a whistleblower, you've gotta be careful of where you put your data.
19:52
And the safest place is out of anybody else's hands, and it's interesting, because that's the the avenue I've decided to go down because I was just notified that my Apple computer is.
20:08
It's shipped.
20:09
It's shipped from Hong Kong, and it's going to take they say about a week to get here, and I'm going to do things a little bit differently.
20:18
And all my data is not on my computer. It's, it's on a device where I can take it off and I can put it into a safe, I can take it with me. If I decide to go to my hidey hole, it, it's really change things on where data is, how it's backed up. I'd never go up to the cloud because I don't trust that.
20:42
And it really, you know, the more I know and I hate to say this, the more I feel like we have, there's a lot of exposure that we don't know because the next thing kept going down is yeah, we're not going to talk about it on this one because it's a, it's a bigger topic, but VPNs and netflow and how netflow for anybody that knows Cisco, Cisco created netflow back in the nineties, I think 96 somewhere in that, and it was to shape your, your traffic so that you wouldn't get congestion. You'd know where traffic is.
21:20
Well, it appears netflow is being used to see where your traffic is going, even if you're using a VPN, so once again, VPNs, do not protect. You. Do not hide who you are. You're not anonymous. It just makes you appear that you come from a different place than where you really are.
21:43
So, I will post, again, the video that I posted before, where I agree with this guy, about 98% on a VPN is, is basically worthless, unless you want to get into an exchange that does not allow you to have access from the U S.
22:04
And it's the false sense of security that a VPN gives, because with the, the technology and the other things, and now looking at netflow, know, it's like, OK, they really, You're right jetta, they know who you are, what you're doing, and it's the marketing that VPN companies are putting out there.
22:27
And others that, Oh, it's OK. You know, we're going to protect you. You're going to be anonymous and they're just lies.
22:33
It's just like, you know, most of the time when a public official opens their mouth, they seem to be aligned to us all the time. Inflation is not going to be round with us. It's transitory to tell that every time I go fill out my gas tank, it's, you know, five to 10% more a gallon.
22:51
OK, so, I'll get off that, that high horse, and, um, let's go to some questions if people have them.
23:04
Sure.
23:06
And, you know, we do have a very limited number of people here today. I think it's because it's summer. It's also Father's Day. Anybody that is going to be joining us tomorrow for Js stock analysis or chart analysis. That is going to be canceled Because of Father's Day.
23:28
He got to hold me just before the show and so, you know, it's it's slow for the summer.
23:37
We have one question from Elaine. Good morning, George. Good to hear your voice question about.
23:43
Kill them and brown portal. Can they tell if you are in New York, If you enter from the portal?
23:50
That is a good question, and I wouldn't know that, because, it's really, it depends all on the backend.
24:00
On whether or not they care or not, they can tell where you're coming from.
24:06
Buy your IP address.
24:08
So if you're worried about that, come from another place, you can try to gain access and see.
24:16
But here's the issue because we're such a mobile society now because you can take your cell phone from near your home to the grocery store. You switch IP addresses. You switch internet providers.
24:33
No.
24:34
You could be vacationing in New York to go see, um, you know, the New York or the Empire State Building or the Statue of Liberty and you try to connect and oops. You did it and you didn't know that you weren't supposed to be in the state of New York. And if they caught you like that, you could just say, Hey, I was on vacation. Could you please reset that? So just know that.
24:58
As Jay says, you need to be creative, and that we are not all in one spot, and for anybody that wasn't around, or didn't hear this before, I was working with someone who had Hedera Hashgraph, and they couldn't connect to the wallet correctly. Things were just wonky and weird. I couldn't figure it out. I think we were at about 50 minutes into our session, and I finally asked them. I said, Well, where are you from, and they said, New York, like, OK. Let's try something different. So they went on to a VPN and they were able to get into Hedera.
25:35
So, Hedera, I know at some point, they were tracking where you were coming from, and whether or not legally, you could own something in the state of New York, um, and they went onto a VPN, which is a good reason to have an E VPN available to you.
25:56
And they could get a hold of their ... stuff. So, you know, it's weird. If they really wanted to lock it down.
26:04
They could say, no, you can't have a VPN, kind of like, I turn things back up on the data IO site, where if you come from a VPN, um, you're just not going to get in Because, because just some weird things and attacks and other things that had been going on that you have to kind of circumvent.
26:28
And, you know, there's things that you can be that can be put in place for attacks. But, you know, one of the ways to prevent some attacks is not allowing compromised servers in co-location to come in.
26:42
And so there's lots of reasons to block VPNs to know people that are coming from VPNs and, honestly, if someone feels like, you know, where they're coming from, and that their information is truly exposed, they may not say things that they, otherwise, if they felt they were anonymous, that they would say, and I think that's a, that's an issue with social media, and that's an issue with technologies in general.
27:13
People will not say things to your face that they will say behind the keyboard, which is kind of sad and tragic, but it's where we are today.
27:26
OK, this is from E Besides a security course, what's your number one pick for education on the dot net site, this late, in our life, in crypto basically? What should we know before we go, assuming we follow Jay out of crypto? Oh.
27:50
That is a really good question, because it depends on what your interests are.
27:54
I mean, the one of the questions that people have had is no, if, if J when J retires in September, are we going to have access to the data IO site, or we're going to have access to the dot net site? You will absolutely have access to both.
28:15
I've been doing a lot of work on the backend to separate things out and make it less expensive for us to maintain.
28:25
And so, yes, those sites will be up for as long as we need them to be. I mean, in 10 years, we may not want that data because it's all going to be old and gray. Maybe some of Jay stuff on the classes will love, will still be relevant.
28:43
But the data IO site may or may not be relevant, but, you know, that's 10 years out, and we've already been in crypto for quite some time. So, who knows what's going to happen, but that data will still be around.
28:54
But what you need to learn, you know, that, that is a real good question.
29:00
You know, the financial bootcamp is invaluable, whether it's crypto or not, the trading side of things, like, hard a chart. I'm a terrible charter. And I don't, I don't enjoy it, It's not a passion of mine. So, I really like other people to chart things, and then I can see their analysis. So, I don't love charting, so I'm not going to go through those classes again. But having you know the Bootcamp.
29:30
Uh, we'll see, where the 10 year roadmap goes, if, you know, if kryptos are still around, after awhile, So we'll see. But I would say, if anything, it's the bootcamp, because I think Jay teaches some really valuable things, too, that you can take away.
29:49
Georgia, comment on that as well.
29:51
I think we're hitting on a lot of it, is to learn, you know, principles or concepts being expressed.
29:59
Right.
30:00
A lot of this stuff will be dated. Even the security stuff is going to get data into if you get into specific technology that might be available at the time.
30:09
Of course, we're set up, but conceptually, no, just thinking outside the box, being aware of, that, you know, things don't always appear, or are not always as they appear.
30:24
And, you know, just, once again, you know, I was I was trained as an engineer and No.
30:32
So it taught me to think in terms of how to solve problems.
30:36
Even though the problems I'm solving today are nothing like the problems that I was trained in in the past.
30:41
So I think that's really important. And I, you know, I do agree.
30:47
I think the the security courses are really important. Again, just so people are are aware.
30:55
Someone once told me that there's there's no antivirus for stupidity.
31:00
Um.
31:03
So a lot of them.
31:05
But, what I mean by that is, you know, just, the things you want to learn, is that, as we've been talking about, you're either not as protected as you may think you are.
31:15
Now, realistically, a lot of a lot of the vulnerabilities can only be at this point in time, can only be exploited by state actors who have the resources available to do it.
31:28
But, the tool that George put up this morning from ... com sought for 1500 bucks.
31:36
You can do stuff that, you know, 10 years ago was done in the, you know, most sophisticated labs in the country. So, who knows what? five years from now?
31:46
But, don't, don't ignore the technology and stay on top of things Be aware of them.
31:53
And, I think, that's, That'll be good learning for life.
32:03
Yeah. Well, and I think one of the things that Jeddah and I have talked about is I still love this. I'm still going to be around. I mean, right now.
32:15
Black lab dot net will probably be beefed up a little bit more with conversations like this with, with Jeddah. I mean, it's it's still a passion. People are still going to have issues coins are still going to be lost. People will have questions with, with crypto, non crypto.
32:35
It seems like it's more questions, non crypto right now that, that I'm investigating and doing some some background stuff.
32:45
No, it's the thing that I always look at, and that I keep on saying, is, we just don't know what we don't know. And when we know it, hopefully, it's not too late.
32:55
I, I like for people to understand what might be out there so that then they can see what the tricks might be.
33:08
In fact, this happened just this week, and it's someone in the group. It's not someone in the group, but it was their spouse. And if they listened to this, they'll know who I'm talking about. They went to Home Depot, they got something from Home Depot, I think in an e-mail, and it said, you know, if you You can get this piece of hardware, maybe it was a drill And all you have to do is pay for shipping.
33:39
So what did they do? They clicked on the link.
33:43
They put their credit card in because they were the special customer that won this, and all they have to pay for shipping, their spouse found out afterwards and was like, are you kidding? Like, come on, what are, what were you thinking? Well, it was fraud.
34:02
They, they're not gonna get their drill. They had a couple charges on their credit card, and it was one of those where they didn't max out the credit card.
34:13
They didn't do a lot of, a lot of charges they did a little bit of dripping so that you know there was a charge for $85. There might have been a charge for something less. And so they were gonna get as much as they could off this credit card because they weren't going to charge something like six grand. That would set off a bunch of bells and whistles and it's those little things and it's the little things that we don't know about because.
34:42
Going back to the, the, the willing grace, aye.
34:49
The idea is that, you know, I, when I was in California, I had many friends in the industry down there and they had personal assistants and it was great. They needed it. But one of the personal assistance was brighter than I thought because he told my very good friend.
35:09
He's like, look, no, you have to see when you go out to eat and my friend went out to eat two meals out of three.
35:20
You may have a tip that you've put on there, but that can be easily changed, and it happens all the time. And so, as he found out, particular places that he went, the tip might have gone up by two to $3, which no one's going to notice until you compare what you signed and the little draft to what was actually put on your credit card. Because you know tips, go back.
35:46
They have to manually go back and add them to your credit card charge.
35:52
So, it's those little things that we don't know, what we don't know that in my life, it's the little things that can, that can drip you to death and that you have to be aware of as well as as the big thing.
36:05
So it's, it's a whole, it's a portrait that you need to look at and not just a part of the picture.
36:14
So, know, some of you may not have thought about that. I don't go out to eat that much anymore, it's all to go. It's summer. It's lovely to eat my back patio, so, you know? but but it's those things too, to be aware of, because we don't know what we don't know.
36:39
Let's see.
36:40
Jedi may need you on this one too. But it says, What's the best browser for the mango for flamengo, Finance Interactions?
36:48
I've been struggling that once I've used in the past, I think it's pretty necessary to have at least three browsers on your computer.
37:01
Chrome, Brave, brave for me.
37:04
Um, and Firefox, it really depends.
37:09
one of my computers had an issue with Firefox and wouldn't connect.
37:15
And I had to use Brave, and one of them, it was the opposite.
37:20
Depending on my laptop or my desktop, I don't know. I know that they switch things on the back end, occasionally, which breaks things. And we don't have a version number on the different online wallets that we can look at. Whereas, if we have Leger Live, you can see, oh, yeah, we're at 24.3.
37:42
But when you go to an online wallet, it's really, really rare, where they have the online version.
37:50
Because they may have made one little change that had a huge impact on some browsers and not others. So what's really hit and miss?
38:01
And it really just depends on what your, what your local computer it is doing. And it may switch over time. I still have one of my browsers that I can't use. Madam Ask on, why. I don't know. I've tried a bunch of things.
38:21
And, and it doesn't fix it, so, I can't give you a good answer. But I can say, since we're talking about flamingo Finance, that I have a client that I've worked with for quite some time. I know I've mentioned this in Live Streams, but sometimes people miss live streams flamingo Finance, on their first version of their website. Before they rolled the rev, and they went from legacy to the new one.
38:50
He had a lot, a lot of flamengo that he had earned, and he was not able to to claim it. Because he staked a bunch of coins.
39:03
I don't have the list here.
39:05
But I only really staked two coins or two pairs, basically. And so I was always able to get my flamingo. Well, he staked a bunch. I think there was a total of six.
39:17
I didn't know we had to take that many until we kinda sat down and and you know, looked at over.
39:23
And because he stakes so many, he used a ledger and the ledger couldn't handle all those transactions Because it looks like, when you claimed one colon, you claim them all. And there were too many transactions for the ledger to approve and so it broke things on the ledger.
39:43
And so, working with someone, I think it was name was Stephen, over at Flamengo.
39:49
He broke out, Only claiming flamengo on the old site to be able to get those flamengo off, because it was the fault of the ledger.
40:01
And, you know, we don't know what we don't know. And I think it's been over a year that we were kind of working on this, We tried different ledgers. He's on vacation. So, we're going to try it next week to see if you can pull it off. But it looks like from all the analysis that we kind of did back and forth.
40:17
That because he had state so many coins on that old site that they were all being tried to be claimed at the same time, and it broke things on the ledger. And we're not allowed to, to claim. So, if you have little things like that, let us know because it could be something that's locally on yours, or it could be a known issue.
40:39
And it was a known issue, because I know on the new flamingo finance site that they give you the option to claim different pools. Different sticking pairs. Because ledger can only handle so much. And on the technical side on why a ledger can do that, or can't do it. I don't know.
40:59
But that's, That's a limitation that has Yeah. I'll go on.
41:06
Yeah.
41:07
I'll go on to say the best user or the best browser to use is the one that works as you've described, change is a constant, constantly moving target.
41:19
On my max, I have five browsers, I have Safari, Microsoft, Edge, Firefox, Chrome and braid.
41:29
And, know, I try them all until I find one that works.
41:34
Um, I think I think it was Edge that Microsoft Edge, if it wasn't originally and is now, it uses the same underlying code.
41:46
I think that Chrome does, that's why you can You can now use water.
41:52
Yeah, I think maybe the Again, I'm not a coder, but I think the code was open source and so, you know, that's why I'm brave, That's why Brave and Chrome are very similar, and Firefox, Firefox might still be unique, but Microsoft Edge uses that, so that's why you can use a Chrome extension on Microsoft Edge. But the point is that, it changes, there's so many factors.
42:26
There's the website, and the changes that, we, know, the host of the website, might make two there to their interface.
42:38
Um, if you have a third party that you're trying to connect group, like, using O three, or, um, Neon, Neon wallet, you know, they can they could be changing the code there.
42:54
Um, Leger, if you connect your ledger device: two, O three, or Neon, it interact differently with each one.
43:06
No, that's going back again to flamingo.
43:08
So, yeah, Just, you know, think through things you want to solve the problem.
43:16
Because whatever, it's good today may not be the best tomorrow.
43:21
So, that's, just keep that in mind and work through it.
43:26
But do it cautious. Yeah. Don't go crazy.
43:29
Don't go, no, by some third party tool, that promises that's going to solve all your problems, unless it's been thoroughly vetted.
43:37
Because the example you gave before, about the, I get those at Home Depot. We'll see which I did.
43:45
I think Home Depot on a couple of other vendor, you've been selected to receive this free product to try out and it always ends up in my junk files.
43:54
So from the junk mail.
43:57
But it looks very, very authentic and I know this is kind of sidetrack but it doesn't look very authentic.
44:08
The reason they do that is because there will be a lot of people who are unaware and will do exactly what the guy's wife did. Not her, Paul. It's very convincing.
44:17
So, um, I think most of the people out there are going to no, make that mistake.
44:27
Anyhow, I know those 2, 2 topics.
44:29
one, but, It's good to go into the weeds, by the way. It was the man that did it. And not the wife, just, I just wanted to clarify that. So, she was the smart when she was the one that was like, You've got to be kidding. What are you thinking?
44:43
You know, as part of that Internet Explorer was retired this, this week recently.
44:51
You know, I don't remember Yeah, Internet Explorer Way, Way, way back in the day.
44:58
And it was, I think, really the first one that I Maybe It was. I can't remember.
45:08
Yeah, that's great, UN.
45:11
I always like it wasn't that it was Netscape what was their logo? I can't even remember what their logo was, that was something fun.
45:20
Yeah, Internet Explorer is gone the way of the dodo bird and now we have edge. I really haven't used edge and I did not know it was chromium based.
45:28
But one of the things that, uh, to employ research on that and I don't want to bring it up today because I'm not ready to talk about it, but when someone tracking cookies is also kind of going the way of the dodo bird. And that there's really kind of some ingenious ways that ad companies as well as big tech, are tracking us.
45:56
And so just FYI, until I do a little bit more, know, when you look at a URL and I don't have one that I can get off the top of my head. I have, I don't want to docs myself.
46:09
But anything after a question mark, in a URL, so if you saw this URL and, you know, and you had a question mark all the way out to the right. Anything to the right of that question mark is tracking. So if you're gonna send something to a person, and you see, you know, when you do a copy paste.
46:30
And anything, to the right of that question, Mark, just throw it away.
46:35
I did, and I did listen to an interview this morning on my six AM. Walk, and it was with someone from Brave Browser.
46:45
And he was talking about how the new tracking is out there and how there's no longer these little images?
46:54
Well, there are, but one way that they would track, you know, Google Analytics is a prime example. Amazon has their own. But they would put these little blank images on a webpage.
47:08
And that's when someone puts Google Analytics, even on, like our dot IO site or dot net site, We can do that, if we wanted to, to get some analytics on the website. But when you do that, there's like a little clear gift that's placed there.
47:24
And that little clear gifs and information back to Google, even though it's not a Google website, on traffic to your website. And there are ways to block that, like, I have a pie hole, which blocks that URL.
47:39
So it, it does not finish its connection to Google, but now they've moved the tracking to the URL And the majority of web browsers out there allow that tracking to happen.
47:56
They're taking a little bit more serious, but brave, supposedly does not allow that tracking to happen. It kinda throws and dumps that when it's visiting a website so that tracking is not as easy to do. So, you know, it's, it's the cat and mouse game.
48:16
So, the majority of time, I spend on Brave, as you can see from this example.
48:25
And so, you know, when I have issues, my secondary is, is Firefox, and then I'll go to Chrome. Chrome is my least favorite.
48:35
I'll go to Safari, if I need to, but Safari has been lacking in some web three staff, which basically means whatever you want it to mean. Web three. I have not had a, this is what it means, But it, in the crypto space, it means that you can connect your hardware wallet to a web based wallet, or browser based wallet. It has not been as friendly as the others. So, you really gotta, you can't stick with one browser, because one browser may break something where another browser won't. I know.
49:14
For anybody that hasn't or doesn't know about this, I don't know if I click on this, if it's going to show up. Now, it doesn't, but the little lion's head at the end of the URL.
49:26
If you can kind of see it, I can't really blow it up, but it has a two.
49:31
And if I click on that lion said the brave head, it'll show that there are some things that are being blocked.
49:41
Some of that blocking breaks a website. And so I need to turn it off. And some of it is really good because people just don't need to know my data. It's not.
49:54
I don't want to give up anything too big tech because, you know, I guess, one of the things we can talk about Jeddah because people can add some questions.
50:04
We have no more questions but one of the things that Jeddah and I both agree on is that, Well, I'm not going to put words in your mouth.
50:13
I'm not afraid of a hacker, per se.
50:16
I am afraid of some buddy at a company that will do an inside job.
50:22
And that when you have someone that is getting paid, minimum wage, which is a lot higher now than it was when I was getting paid minimum wage back in my high school days.
50:35
That someone could say, hey, you know, I want this data, and I'm willing to pay you a little bit, and OK, you know, let's work out a deal. I know that there was an inside job at Verizon, I know there was an inside job at AT&T, because that was the only way that they could have gotten some data, and so.
50:58
Know, your data is being gathered by people at Google at Apple, not as much as Apple, as Google, for sure.
51:06
And so, no big government agencies, three letter agencies, they don't have to collect it on you that much anymore.
51:16
They can go buy it from these big data companies.
51:20
And, you know, if your data is that sensitive, and you want to find out more, I'm sure that someone can be compromised. And a lot of these big companies that have access to your data and that those people are willing to do anything for money. Whether or not it's the big data company, or it's someone within that data company that just so has access to it, not that I wanna get political at all.
51:51
But, you know, Edward Snowden: Um.
51:54
He had access to things that, he released, because he had access to it, and he thought it was a good idea to release it, to let people know what exactly was going on.
52:06
So, whatever you, you love, him hate him.
52:11
It's, it's someone that has access that, can do things for good or for bad.
52:19
And, I'm glad he, personally released this data. I mean, it may have harmed some things, but it just showed how corrupt.
52:30
And in data gathering and illegal that, our government is doing against us, not just foreign terrorists. By the way, have all the terrorists disappeared. Lately shut up because I don't hear any of that anymore.
52:48
That used to just be the conversation that we hear all the time that we have to do this, because the terrorists because of the terrorists because of the terrorists. And now it's because of some other reason. And I'm sure we haven't defeated terrorism around the world, but they've moved on to something else, because we're tired of hearing the same thing, But they have not changed. They being a government trying to get as much data on us, so. I'd love to hear. Yeah.
53:24
I think the terrorists they got too expensive by me and inflation is hurting Everybody, right? So, probably I'm just kidding. You know, there's, there's too many other things to distract distract people. Right now.
53:42
So, yeah, no, it's, It's really, really kind of interesting. And I think, part of the problem and I don't know a lot about the Snowden case.
53:54
I do notes well, anyhow, you know, it got to the point where certain agencies have certain jurisdictions that they're allowed to operate in.
54:07
However, to the domestic and foreign jurisdiction overlap, then it's kind of like pre parole's open to anybody plus different agencies.
54:19
We'll collect information for different purposes.
54:22
If you look at, you know, the FBI and everything it does has to be able to be used in court, in other words, everything, to go to court to prosecute, because that's our purpose. They do investigations to support prosecution of criminals. They don't prosecute themselves, but they support that prosecution. So the data they provide.
54:48
The prosecutors.
54:51
Yeah.
54:53
The attorneys that are going to, to do the prosecution has to be admissible in court.
55:00
So so they have to, they're constrained by all these other rules that other agencies that have different purposes, like shopping terrorism, you know, they don't care, they're not going to trial. They just have to stop them.
55:13
So, um, when you have the collection of the data, it's probably so easy to get an inner mengele mixed, and it's hard to separate.
55:23
Now, what they do after the end and somebody brought up, Georgia is absolutely true.
55:29
Private entities now, corporations and non-government agencies doing data collection like this.
55:38
However, they collected data, whether it's legitimate or not, um, no.
55:45
Government agencies may just go by the data, so show the harm.
55:50
Oh, that was committed.
55:53
It was by the, the private organization that collected the data, that's why, I think, in Europe, they put all those restrictions on what personal data could be collected.
56:02
Sure.
56:04
Wow.
56:05
But, you know, here in the United States, a law enforcement agency can just go and buy that data.
56:12
Oh.
56:14
Until, until somebody raises a state kind of license plate readers were big. No, that was a big stink a few years back.
56:22
Because that was considered illegal collection of data against invasion of people's privacy.
56:29
So, yeah, no, it's. You know, again the most important thing just be aware. Don't assume anything spill proof.
56:40
Just be aware.
56:41
Don't don't do stupid things.
56:44
Um.
56:48
You're asking a lot hands up.
56:51
Yes, yes.
56:53
Someone once told me that you never put in writing what you don't want the whole world to see. Now this was back when, you know, this was before technology, right? This is, this is going back when writing was actually, literally, pencil and paper.
57:05
But they said, you don't put anything in writing, you don't want the world to see, because somehow someday somebody will find that.
57:14
Share it with the rest of the world. So, again, you know, just just think through what you do.
57:23
I guess, that's it.
57:25
Yeah, it, well, and you bring up, we're kinda going on tangents, and I'm gonna take one here because we don't have any any questions. if people do want questions answered, go ahead and put them in. Otherwise will and this just after 10.
57:38
But I think one of the things that and I don't think anybody here is young because it's just not our target audience but I wish they would understand that when you tweet something out when you post something on Facebook when you put something in Instagram.
57:58
With oud it out and I know this for a fact that when you are applying for any type of employment especially more so at other places than then some your social media is going to be checked.
58:19
See what your views are. See if you're a partier CFU or this, that, and the other. And if I was a hiring manager.
58:29
I know it's illegal to, to not hire based on certain things.
58:34
But if I knew that someone was out till all times of the night, in the middle of the week, and I expected them to be at work early at eight o'clock.
58:50
And there was someone that wasn't doing the same thing, um, you know what my choice would be. And it's not that I'm discriminating, I just know the lifestyle of one person is going to be more responsible than the lifestyle of another person.
59:05
And so as we're putting all of our life out on social media, I don't think people understand how much data is being harvested because it is being harvested. It's being analyzed.
59:19
It's being put in your big file, in the data bank, Wherever, and you are being tagged with that, and I know hiring managers go through and and look at people's social media, without a doubt. And I don't have any social media.
59:40
I have one social media, Twitter, but that's for work, and everything else, I've let go, because I know that I can't be a gray man with it, and I don't.
59:56
In fact, I have someone visiting the summer, and I had to put a guest network on my environment, which is a good topic for one of these times.
1:00:06
Because I've redone my network, the security in my house, and I had to put a guest network.
1:00:13
Because Instagram, Facebook, a lot of the tracking is and access to those websites. I just don't allow they. They go to a black hole because they are just horrible.
1:00:28
Horrible companies. Facebook is sharing data with Amazon, Amazon is sharing data with Facebook.
1:00:36
And there are all these partnerships and data sharing that we just don't know about.
1:00:43
And I know there there's someone that I went to school with and she's like, well, why do you care about all of this?
1:00:53
And a lot of people don't.
1:00:55
And that's OK.
1:00:58
I closed my window shades at night, because I don't want someone pyrenean into my life.
1:01:03
And that, the politics of today, are not the politics of tomorrow and that things change on a dime, and you think that things are OK now. And then they're not.
1:01:17
And if you are, if you want to remain gray, and just mixson with the crowd, that is the easiest way to deal with life.
1:01:29
If you want to step up and have your head above everybody, so that you can be recognized and And seen, you know, That's yours, too. But I just want to be as gray as possible and just blend in because I like the way life is I like to be just a family man, that's in the neighborhood, and I just don't want anything to change. I don't want people to know what I do. I don't want people to think the stat the other. And so, you know, social media puts everything out for anybody to see.
1:02:08
And you will be labeled according to what your beliefs are.
1:02:14
And, you know, when we had Trump and Biden and, you know, anybody I mean, I'm in such a liberal part of where I am. And that, you know, you're looked down upon by your political beliefs. And, I Just Can't frickin believe that that is where we are today. But that's where we are.
1:02:36
And so, if you believe in one thing, you're a bad person, OK?
1:02:42
No, it's no longer just: know that you beat cats or that you are not an animal lover.
1:02:50
It's what you, and who you want to put an office.
1:02:55
And I just, I don't put signs on my lawn, I don't do anything. I don't talk politics, because it just divides people instead of reuniting them and I want unity.
1:03:08
I want love, I don't want hate and fear.
1:03:14
So OK, we got off on that and we have, we do have a question.
1:03:18
Others from J, D M, I George, I'm having a challenge getting my cute them to show up in my ledger. I had a conversation with someone yesterday about this, it shows an explorer as delivered, but still not showing up in ledger. I think Nate spoke with you yesterday about it, yesterday. Any thing?
1:03:38
Any thoughts around this? Yeah. There are some Blockchains.
1:03:45
Kinda nice talk about crypto again. There's some blockchains that I will never ever ever get into QM is one EOS is another wax is another.
1:03:54
I have and those are just on the structural Blockchain side of it. What is happening, I believe.
1:04:04
And I don't know this for sure, but your wallet is not syncing up properly.
1:04:11
With the blockchain, and what has happened to me in the past is that I was using the core wallet and typically on a core wallet which means you download the entire blockchain kinda like litecoin, I used to have in bitcoin. You know there were these big bloated blockchains that you had to store in your computer. What was happening with with QDM. You could send your coins before your wallet was fully sync.
1:04:38
So you'd be like, OK, I sent those coins, They're off and you thought that they were sent? But they were never sent because you are not fully sync with the blockchain. I have not used the ... core wallet And I know you're not using the Kingdom core wallet. But that was one of the issues was that you could send coins on QDM before you were fully think there is an online, let me try something, I did talk tonight.
1:05:08
We had great conversation that Many things.
1:05:14
Hold on, I'm gonna look for this, there isn't online.
1:05:19
Boy. I didn't have it bookmarked.
1:05:23
No.
1:05:26
Maybe it is.
1:05:30
I'm just going to say why you're doing that.
1:05:33
Couple of things. So so there's segmented and there's legacy versions of ....
1:05:38
It is G T M. If you're saying that on the Cute, On Blockchain, you can see the deposit. You can see the coins in the wallet.
1:05:49
Then as George says, it's a matter matter of leger lives, sinking.
1:05:55
Fully and I know, I just Product ledger Live and there's a new update available.
1:05:59
So, it seems like every couple of days, they come out with the new update, so you may want to make sure Ledger Live itself is updated, as well as the QM App on your ledger.
1:06:11
Just Check, Gotta go into Manager, check and see abandons be Updated, and those things are done. You're still having problems.
1:06:17
Um, You check, check the address you send it to you, because what you may need to do, if you worse, cute.
1:06:27
Um, I'm hoping cute, Um, it doesn't matter if your segment or legacy that they're there compatible.
1:06:33
But if you were legacy in the Senate to a segue address or vice versa, and you only have the Segway version installed or added to your ledger live, you may need to ensure that the legacy or whatever.
1:06:49
Just make sure all versions of QDM are are added, leger live because the coins may and ended up there.
1:06:59
These are just general guesses on.
1:07:02
I'll make you, right now, I don't know, specifically, your situation.
1:07:11
Yeah, and one other thing that I did talk tonight about was, I've had issues not with QM, but with other coins and I can't bring it up because I'm gonna dox myself a little bit too much.
1:07:26
But you can clear cache on your ledger live.
1:07:31
And if you go to, from what I remember, got a ledger live, In the upper right-hand corner is a little gear for settings, click on that gear. And then in the tabs, I think there's five across, or four cross, click on the Help tab, and under that is something called clear cache.
1:07:50
If you click clear cache, what it's gonna do is it's going to clear all the blockchains, and they will need to be rebuilt.
1:07:59
So this is where it gets a little technical, and I'll kind of go a little bit broader.
1:08:09
Exodus.
1:08:10
When you stored minero in accidents, they had the entire Blockchain downloaded from an arrow. In Exodus Exodus, do you think is kinda like an online wallet. Oh, no, no, no. They had a couple gigs of monero's Blockchain on this person's computer, because I was like, where is your narrow wallet? And it wasn't it was under exodus. So, I don't know how ledger does it. I haven't dug too much into ledger.
1:08:44
On that regard, but if you clear the cache, you're clearing all the Blockchains. So depending on how many coins you have, how many accounts you have, it may take quite a bit of time to sync up and just also note that sometimes ledger doesn't sync the Blockchains, all that well. And so I'm not a real big fan of Ledger Live. On some of these, there are other online wallets like you should be able to go to.
1:09:16
Cute M wallet dot org.
1:09:18
And you should be able to connect your ledger to that, and be able to see everything under that adress. ...
1:09:27
does do it like Bitcoin, where you have one address and when you create a new receive address, it'll give it a new address, but I'll go back to the main.
1:09:42
Wallet Address looking at it in Something like like this, where you're looking at, a wallet level, but there are other things.
1:09:52
And this is where it gets a little weird, where they're UTA ..., where you could have too many ..., which are basically fragments of coins that are sent, if you have too many ..., that throws some weirdness into their wallet.
1:10:12
And it needs to be consolidated where you basically send everything at once to a new wallet address, could be in the same wallet, but it to a new wallet address. So, it combines all the ... and you don't have as many issues And the ... on cute, um, I don't remember what we're doing.
1:10:36
I think it had to do something with, You know, honestly, I don't remember, But I remember there were some issues with ...
1:10:43
and QDM and we had to eliminate them When we're doing some procedure and there's so many different coins and so many different things that, I don't remember what it was.
1:10:53
But if you go to Q T U M, wallet dot org, And you try to connect to your ledger.
1:11:03
See if that will work, and if it'll show up because, you know, just just try that avenue, and if not, put a support ticket in.
1:11:13
Because I'd love to know if you're having an issue, and I'll just try to my end.
1:11:18
I don't remember if I still have cue them, or if I, uh, move that away into something else.
1:11:27
OK, JVM said, yes, did the cache clear also?
1:11:31
..., have you tried cute them wallet dot org to see if an online wallet will give you a better result than that, then leger and, yeah, I'm not in love with, with cute them.
1:11:49
I don't know what their use case is going to be.
1:11:52
But it's a, like iOS.
1:11:55
It's just, it's just, it's painful. And my feeling, OK, good JVM, says, nope, that will be a next step. Let me know. Either way.
1:12:05
I would love to see if, if that helped.
1:12:09
Because any information you guys have that you share with us, there are no, if it's kind of big, I share it with Jeddah. And he'll share with me just so that we don't do the same thing multiple times. When there's just weirdness with the different blockchains.
1:12:30
Because, you know, there are weird things that happened with the different blockchains that they might fix and it'll just go away.
1:12:37
In fact, I was working on the website yesterday and I was working on the basically VPN blocking and I was adding an ASN number if anybody knows what that is, basically to allow certain things to go through. And it wasn't working. So I contacted them, and I said, Hey, this is not working.
1:13:03
It's still blocking this network range, and they're like, Oh, it's a small bug, OK? We fix it. Thanks for letting us know. So, you know, I basically spent about an hour on trying to get something to work. That was actually a bug.
1:13:17
So, when you, when you run against the wall so many times, stop and ask someone else because it might just be a bug, or it could just be you. The perfect example was the amount of time that I had spent trying to figure out why Flamengo could not be claimed off the legacy flamingo finance site.
1:13:41
Well, it wasn't asked at all, it was ledger. And, you know, until you kind of do some, investigating, you've made, just, you may never figured out because it's not you.
1:13:52
Or, it could be, so, we'll have to see. He said no that OK, we'll keep you updated on the results.
1:13:58
OK, well, it is 10, 14 and that was the the last question. Maybe we'll have more to talk about in the future now, that summers here and Jeddah is retired and you have so much time on your hands, now, genitalia that you're not as busy as she wants to be.
1:14:19
Yeah. The wife discovered that she goes, oh, wait a minute.
1:14:26
I've got these projects for you. It's like, Oh. Yeah, work used to be an excuse, right? Not anymore.
1:14:35
Yeah, I'm staying busy.
1:14:40
OK, well, Thank you for for joining us. It's always so much easier and nicer to talk back and forth. I guess, you know, the next one, we do, maybe, in two weeks, hopefully. I can get some topics that, I'd like to cover kinda like this one, and maybe I will have done my phone.
1:15:01
I will definitely have a new computer. I'm really excited about that. Because, as I've said, I try not to keep a computer longer than 3 to 4 years. Well, my computer was 2017, and so it is way past and it was getting a little bit slow, and I was waiting for something to be released. That was never going to be released, so. I guess, so, You know, I think I would like something a little bit faster. And with the new chip and we'll see, oh, I'll let you know how laugh.
1:15:35
When I think of it again, thank you for joining us and have an amazing rest of your Saturday. It's bright and sunny here. And the birds are out singing, I don't know if you can hear it. And Jeddah, thank you again for joining. Oh, you're welcome. Thanks for asking.
1:15:52
I have a good time on this, OK, everybody, have a great weekend. We'll talk to you soon.

Jetta Red joined me on Saturday’s live stream. 

0 0 votes
Article Rating
Subscribe
Notify of
2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
CryptoRaw
CryptoRaw
1 year ago

It seems to be a daunting task, but here are two fellows that unravel the mysteries of crypto security and make it seem like a hobby. And rather than letting it go to frustration, they email the helpdesk.
They are gentle warriors; they are winners.

Stillwater
Stillwater
1 year ago

really enjoyed the chat. listened on the drive after escaping NY.

2
0
Would love your thoughts, please comment.x
()
x