One Piece Episode 912
Leo Laporte / Steve Gibson (00:00:34):This is twit. This is Security Now with Steve Gibson, episode 912, recorded Tuesday, February 28th, 2023. The NSA at Home Security now is brought to you by Kolide. Kolide is a device trust solution and ensures that if a device isn't secure, it can't access your apps, it's zero trust for Okta. Visit kolide.com/securitynow and book a demo today.
One Piece Episode 912
Download File: https://www.google.com/url?q=https%3A%2F%2Fvittuv.com%2F2ugfRT&sa=D&sntz=1&usg=AOvVaw2CpKq-YFIOPKq7qgIlAtW9
(00:01:09):Thanks for listening to this show. As an ad supported network, we are always looking for new partners with products and services that will benefit our qualified audience. Are you ready to grow your business? Reach out to advertise at twit tv and launch your campaign. Now it's time for security. Now, the show we cover the latest in security with the most important guy in this building right now. Mr. Steve Gibson, and he's not even in the building. Hey, hey. Grc.Com again. Yes, it's good to see you. Yeah. Time once again to talk about how bad the world is. Oh, we squeaked One more episode in on this last day of February. Of course February ended early, so, you know, that's what made it squeaky tight. . So we've got a bunch of questions in our new style that we're going to answer, and I really do wish that our audience had ha had heard you encounter our picture of the week for the first time.
(00:02:12):Oh, it's a belly laugh. Wow. It is. Every time I look at it, it cracks me up again. But we're first gonna answer some questions. What mistake did Windows update make last week? What if you don't want a paste with formatting? What browser is building in a limited bandwidth vpn? N huh. What more did we just learn about Last passes second breach. What did Signal have to say to the UK about scanning its user's messages? What was just discovered hiding inside the Python package Index repository. What proactive move has qap finally taken? Ah, what disastrous bug did spin rights testers uncover last weekend in motherboard bios? What amazingly useful best practices advice has the NSA just published for home users? Answers to all those questions and some additional thoughts will be yours Before you know it. on this week's 912th episode, still going strong of security now titled the NSA at home.
(00:24:26): The other piece of interesting news is that this is being done in affiliation with our friends at CloudFlare. Microsoft wrote, Microsoft Edge Secure Network is a service provided in partnership with CloudFlare. Cloudflare is committed to privacy and collects a limited amount of diagnostic and support data acting as Microsoft's data sub-process in order to provide the services. Cloudflare permanently deletes the diagnostic and support data collected every 25 hours. Now, they didn't say that Microsoft doesn't collect it and de and Holt retain it, we don't know, but there's, but they are saying Cloudflare's not keeping it. And presumably Microsoft is not either. They said to provide access, we store minimal support data and access tokens, which are only retained for the duration of the required service window. A Microsoft account is required to access Microsoft Edge Secure Network and is retained to keep track of the amount of Microsoft Edge Secure Network data that is used each month.
(01:22:30):Only the, the, these, these three points are actually pulled out of the, of, of the larger piece, but, you know, clearly keep your stuff up to date, do secure things and do not open anything to remote administration. They also said, and I thought this was interesting, I OT devices on a home network are often overlooked, but also require updates, enable automatic update functionality when available if automatic updates are available. Download and install patches and updates from a trusted vendor on a monthly basis. So it's interesting that the nsa, you know, they too see the threat posed by our out of date or defective IOT devices. Of course, the question is often, who are you gonna call to update some random i o t light switch or wall plug? But moving forward, it would be good to see future devices based on open standards and platforms and for there to be some sort of certification systems in place.
(01:34:59):Help close holes that may enable an actor or an actor to compromise your network. And Leo, I do kind of wonder maybe if they listen to the podcast and there was one piece of advice that makes sense, but I have never recommended, they said schedule frequent device reboots. They wrote to minimize the threat of non-persistent malicious code on your personally owned device. Reboot the device. Periodically malicious implants have been reported to infect home routers without persistence. At a minimum you should schedule weekly reboots of your routing device. Well, that seems a little often, but okay. Smartphones and computers, regular reboots help to remove implants and ensure security. I mean, it's true, they do. What's interesting about this advice is that as we know, many forms of malware are ram resident only. They never write anything to Nonvolatile media. Some routers are ever nev, almost never rebooted.
(01:37:15):I think that was a great point and it's one I've never talked about before. So, okay. Those were just some of the highlights that I thought were the more interesting, a little bit surprising in some cases and insightful, but there is much more than those in the nine page document than you know, what I've just shared. And the entire document is so good that I think everyone listening would benefit from it, you know, from at least scanning and probably also by recommending it to others, it has the additional pedigree of bearing the official seal of the National Security Agency, you know, which might help e everyone's non-security now listening friends sit up a little bit and take it seriously. And as we've seen, it's far from being the typical useless piece of, you know, say nothing bureaucratic nonsense as friendly and useful as the document is.
(01:38:12):It's line and a half wrapping around r l is not nearly as friendly. So this week's GRC shortcut is that you can find it at GRC sc slash nine 12 since this is episode 912, you know, and big props to the NSA for assembling something so useful and largely so actionable. If nothing else, the nature of the recommendations would help someone who doesn't live in the security realm to realize the way security conscious professionals think. And that would, you know, probably be surprising to many people. It's like, wow, you're really that paranoid . I'm sorry. Yeah. Yeah. I'm gonna share this on ask the tech guys. This is really really good. It is a great, it is a great document. Yeah. Yeah. And I, yeah, I can't think of anything I would disagree with. There's some things that maybe are not easy to implement.
Amy has lost her ability to speak. She writes on a piece of paper "SHOP" when Chris asks her what is wrong. Julia shows up at the cottage and tries to help Amy, while Chris goes to the antique shop to talk to David about what happened. Amy becomes increasingly terrified when Julia mentions the name "Alexander." Before the conversation gets any further, Barnabas walks in, looking for Chris. Amy regains her speaking capabilities and asks for water. Julia forces Barnabas to get the water. Barnabas puts his hand over Amy, which relaxes her and she then falls asleep. Barnabas says "she will be much better when she awakes, I'm sure."
Episode 911: It has been over... *checks Wiki* three hundred episodes since One Piece began to trickle its samurai characters into the main story, starting with the Straw Hats fatefully meeting Kin'emon on Punk Hazard, back when he was looking for his missing son Momonosuke (it turns out they weren't really father and son), which resulted in the two of them hopping aboard the Thousand Sunny. The "traveling companions" are a unique trope to One Piece, where we're often introduced to secondary characters like Vivi and Trafalgar Law who serve as temporary crew members nearly on par with the main cast in terms of importance. The full shape of their journey with Luffy isn't something you can really sense in the present, but when you look back you can see that a fully orchestrated saga had been in the works from day one.
So after about three episodes of sitting around and catching our heroes up to speed, it sounds like we finally have a concrete plan for moving forward with the Wano arc. Kaido, who is revered as a deity in the country, is planning to hold a Fire Festival in two weeks. The goal is to discreetly spread the word around town about the rebellion in the meantime, and put an army together to attack on the night of the party. This feels important because after several massive arcs talking about the alliance's desire to fight Kaido, we finally have a specific date locked down that the rest of the story can revolve around. It's a little discouraging that there's still time to kill before the final battle commences, but "two weeks" sounds like just enough time for another full moon to hit, so I'm excited to see some sulong mink action in the near future.
What really sets an episode like 912 apart is how dedicated it is to simply capturing the audiences' imagination. Eiichiro Oda's manga is really good at cranking out tightly constructed mystery boxes, but sometimes the suspense obfuscates the moment-to-moment pace and texture. This episode pulls you into the world and asks you to think about what it would be like to live there, and how it would feel to be among all these larger than life characters. Just when the plot establishes the heroes' plan to raid the bad guys in two weeks, the stakes escalate unexpectedly, and the episode ends with Luffy and Kaido making eye contact. It's clear a fight will have to happen sooner than later, but to what end? More than most episodes of recent One Piece, this feels like the kind of episode I'd reach at the end of a late night marathon, and I'd have no choice to be continue on to see what happens next, no matter how tired I am. That's my metric of a good episode. 041b061a72