Episode Transcript
WEBVTT
1
00:00:03.240 --> 00:00:05.919
Alright, it's time. It's that
time of the hour, time of the
2
00:00:06.000 --> 00:00:08.560
day, time of the year.
Uh. And the man of the year.
3
00:00:08.560 --> 00:00:10.759
I don't know if it's official somewhere, you've got to be the man
4
00:00:10.800 --> 00:00:15.119
of the year for cryptocurrency. Uh, what I'm talking about the Dwayne Heart,
5
00:00:15.160 --> 00:00:18.039
not Dwayne Heart, the Duyne Heart
is joining us in the studio once
6
00:00:18.079 --> 00:00:24.160
again for another conversation about cryptocurrency.
Alright, and today's topics specifically, is
7
00:00:24.199 --> 00:00:29.120
gonna be about all things cryptocurrency.
We talk Actually, we talked about a
8
00:00:29.160 --> 00:00:33.039
lot about cybersecurity right on all levels
from A to Z. This episode is
9
00:00:33.039 --> 00:00:36.600
about cryptocurrency, and here's some of
the hot points we're gonna hit. Um,
10
00:00:36.759 --> 00:00:42.240
the cryptocurrency exchange network, financial scams, account takeovers, mobile scams,
11
00:00:42.240 --> 00:00:45.719
which I think is really interesting.
That's a surface we've never really kind of
12
00:00:45.759 --> 00:00:50.320
delved into. So maybe we're gonna
cuch on touch on it. Maybe an
13
00:00:50.520 --> 00:00:54.560
upcoming episode just on that topic.
Also, um, for businesses, know
14
00:00:54.679 --> 00:00:58.359
your customer is should be on your
short list, and crypto mining. Those
15
00:00:58.359 --> 00:01:00.200
are just a few of the topics
we're gonna hit on. But Dwayne,
16
00:01:00.280 --> 00:01:04.599
before we kick things off, Actually, if you haven't heard of Dwayne Hart
17
00:01:04.640 --> 00:01:08.000
dot Uh he's not dot com,
that's this website, right, But if
18
00:01:08.079 --> 00:01:11.560
you gotta check out Dwayne Harart dot
com for all things about cryptocurrency. He
19
00:01:11.799 --> 00:01:15.280
literally wrote the book on the subject
matter. He's an expert guru if you
20
00:01:15.319 --> 00:01:19.359
will. Um, he has a
podcast as well as this interview, and
21
00:01:19.359 --> 00:01:23.480
as well as you YouTube channel.
So having said that, Dwayne, let's
22
00:01:23.519 --> 00:01:26.719
start before we talk about cryptocurrency,
let's talk about the blockchain itself and how
23
00:01:26.760 --> 00:01:34.319
it works. Shall Okay, blockchain
itself comes from typical crypto background, all
24
00:01:34.400 --> 00:01:38.519
right, Um, it just so
happened that it is starting to be used
25
00:01:38.519 --> 00:01:42.319
in the financial mins. So when
you think of blockchain and then think about
26
00:01:42.400 --> 00:01:49.439
a chain link, and think about
each link representative block, and each one
27
00:01:49.480 --> 00:01:55.359
of those blocks are attached to each
other. So in order for you to
28
00:01:56.519 --> 00:01:59.920
break this syncle some change, then
you've got to break all the blocks apart
29
00:02:00.040 --> 00:02:05.480
from each other. So what's so
interesting, especially by cryptocurrency, is that
30
00:02:05.519 --> 00:02:09.560
it used blockchain and and it's used
hash and algorithms, and so those hash
31
00:02:09.639 --> 00:02:14.960
and algorithms are pretty much attached to
each block. And if you are trying
32
00:02:15.000 --> 00:02:21.439
to break any type of blockchain,
uh, Ledger, Well, I guess
33
00:02:21.439 --> 00:02:25.439
what, you gotta break all of
them apart because they all are connected together.
34
00:02:27.240 --> 00:02:30.479
And see now, you know,
it's always a discussion that that is
35
00:02:30.919 --> 00:02:38.960
that is irreversible, and it is
irreversible. But trust me, UM,
36
00:02:39.080 --> 00:02:44.039
hackers are getting smarter every day in
some way. In the future, I'm
37
00:02:44.039 --> 00:02:49.000
pretty sure they're gonna find find ways
to break through. But by time they
38
00:02:49.039 --> 00:02:53.080
find ways to break through, I
think that the algorithms are going to change.
39
00:02:53.439 --> 00:02:58.000
Cryptocurrency is going to change a lot
one of these. One of the
40
00:02:58.039 --> 00:03:00.759
things I like to bring up here
too, is that when you deal with
41
00:03:00.800 --> 00:03:08.639
cryptocurrency, UM try to understand that
that there is no middleman, you know,
42
00:03:08.879 --> 00:03:14.599
because it's not regulated by the government. It's anonymous. Every transaction is
43
00:03:14.639 --> 00:03:20.520
anonymous. Right. Also to just
keep in mind that there's no gatekeeper,
44
00:03:21.039 --> 00:03:25.080
right, okay, because it's like
in a while, there are no gatekeepers.
45
00:03:25.520 --> 00:03:30.840
When you're working with the dollar system, there is a gatekeeper with which
46
00:03:30.879 --> 00:03:36.680
is the Department of Treasury. Be
careful you don't say much more than that.
47
00:03:37.159 --> 00:03:39.639
Um, So that can be uh, that's a yen and yang thing,
48
00:03:39.719 --> 00:03:44.400
right, So the gatekeeper, no
gatekeeper can be great, But there's
49
00:03:44.599 --> 00:03:49.199
um challenges by not having some any
kind of monitor this, right, yes,
50
00:03:49.400 --> 00:03:54.039
you know, the challenges are that
people have control of the currency,
51
00:03:54.120 --> 00:04:00.400
but also too, there is no
monitoring of the hacking advice it, right
52
00:04:00.000 --> 00:04:08.560
because the government is not watching hackers
that try to infiltrate a crypto system,
53
00:04:08.639 --> 00:04:15.039
uh, pretty much a a cryptocurrency
system, all right. So what happens
54
00:04:15.120 --> 00:04:21.399
is that you're count in a while
and and it's not really um I gotta
55
00:04:21.519 --> 00:04:28.680
say centralized, kind of decentralized,
and it's and it's a virtual way of
56
00:04:28.839 --> 00:04:34.519
doing transactions. Now, blockchain technology
has pretty much been around for a long
57
00:04:34.600 --> 00:04:41.000
time. It's just so happened that
cryptocurrency is trying to take a new leap
58
00:04:41.079 --> 00:04:46.959
now. And I will admit it
sounds really good because you can buy a
59
00:04:46.000 --> 00:04:53.519
coin for only two cents, right
and hopefully in the next couple of years
60
00:04:54.279 --> 00:04:59.759
that you know that coin is worth
five dollars, So that's a completely not
61
00:05:00.199 --> 00:05:03.519
mark up big time. It's a
huge returnal investment. And again the gatekeeper
62
00:05:03.600 --> 00:05:09.920
issue is that it's really the definition
of a true free marketplace right where there's
63
00:05:09.959 --> 00:05:15.759
no um entity, whether government or
private, making any judgment calls decisions of
64
00:05:15.800 --> 00:05:19.360
who can play the game. It's
a really uh it levels a playing field
65
00:05:19.439 --> 00:05:25.600
for all participants involved, right,
yes, yes, yes, you know,
66
00:05:26.839 --> 00:05:30.920
Rich, I just want to say
something for a second. When it
67
00:05:31.000 --> 00:05:36.319
comes to cybersecurity, some of the
same type of issues that we have with
68
00:05:36.360 --> 00:05:44.759
cryptal currency standard all across the industry, all right, because when we look
69
00:05:44.800 --> 00:05:49.120
at hacking and we look at cyber
crime, someone who's trying to infiltrate the
70
00:05:49.120 --> 00:05:55.560
bubble, you know, the bubble
is cybersecurity one of far ways to defeat
71
00:05:55.600 --> 00:06:00.839
cybersecurity, right, and usually with
something like cryptal currency because it's such a
72
00:06:00.879 --> 00:06:05.600
um growing market. I'm pretty sure
a lot of people use their cell phones
73
00:06:05.639 --> 00:06:10.360
because you know, you get that
text and and say that, um,
74
00:06:10.480 --> 00:06:15.160
one of the cryptocurrencies, like bitcoin, it has taken a dip. The
75
00:06:15.240 --> 00:06:16.360
person goes, oh, yeah,
you know, I need to invest in
76
00:06:16.360 --> 00:06:21.800
it now, I need to do
this now. But step back, was
77
00:06:21.879 --> 00:06:29.639
that really from bitcoin? Was it
just that a person was being lured right
78
00:06:29.879 --> 00:06:34.639
into an area of um hackn us, I may add, So let's talk
79
00:06:34.680 --> 00:06:40.399
about the cryptocurrency and cybersecurity connect right, Um, what are some of the
80
00:06:40.439 --> 00:06:45.720
steps or processes involved in you know, connecting these two entities. Well,
81
00:06:45.920 --> 00:06:53.279
the first one is proper authentication because
with authentication, especially with some of the
82
00:06:53.360 --> 00:06:59.720
sites like coin based now and order
for you to log onto your crypto currency
83
00:07:00.759 --> 00:07:05.040
account, you're gonna have to use
one computer, and if you go to
84
00:07:05.079 --> 00:07:11.920
another computer, then you have to
verify that computer, all right. And
85
00:07:11.959 --> 00:07:18.040
then also too, during the authentication
process, you're always gonna be using two
86
00:07:18.079 --> 00:07:25.839
factor authentication. Okay. So so
because you need authentication in place, so
87
00:07:25.920 --> 00:07:30.000
you can verify the identity of the
person that is either logging into the count
88
00:07:30.399 --> 00:07:33.879
or the person that's making the transaction, right to provide those safeguards and those
89
00:07:33.959 --> 00:07:40.279
checks and balances in place, um, which then talk about encryption. Encryption
90
00:07:40.439 --> 00:07:46.000
is about secrecy of information. Okay, this is the bulk of cryptocurrency.
91
00:07:46.199 --> 00:07:50.079
Okay, you want to make it
as secretive as possible. See, there
92
00:07:50.079 --> 00:07:58.360
els something called ciphertexts, and it's
called and also to something called clearer text.
93
00:07:58.959 --> 00:08:03.399
Now, with side protects, you
are encrypted information, all right.
94
00:08:03.319 --> 00:08:09.000
With this plain text, there is
no encryption at all, really just standard
95
00:08:09.120 --> 00:08:16.839
data in the wow. So with
cryptocurrency, it's uses encryption and the information
96
00:08:16.959 --> 00:08:20.959
is put in a cyphertext that is
sent through the blockchains, all right.
97
00:08:22.040 --> 00:08:26.360
So so that's one way of looking
at cryptography. But see, cryptography has
98
00:08:26.399 --> 00:08:31.639
been around for a long time and
with these uh policies in place or that
99
00:08:31.720 --> 00:08:37.279
infrastructure. Uh, there's no guarantee
in life, but that does that um
100
00:08:37.519 --> 00:08:41.840
ward off a lot of the typical
financial scams that could be conducted elsewhere.
101
00:08:41.200 --> 00:08:45.919
No, no, okay, never
never. There's no guarantee, but it
102
00:08:45.919 --> 00:08:48.799
probably does provide you know, a
little bit uh more sense of security.
103
00:08:48.960 --> 00:08:54.519
Yes, yes, yes, you
get a sense of the security. But
104
00:08:54.639 --> 00:08:58.080
cyber chromos are cyber chromals, Yeah, exactly. I mean you can go
105
00:08:58.120 --> 00:09:01.080
back to the old stage coach days
or or the robber you know, train
106
00:09:01.200 --> 00:09:03.919
robberies. Right, the train was
pretty secure, but there's no guarantee.
107
00:09:05.000 --> 00:09:07.679
You know, I don't know how
they really hijacked the train with horses.
108
00:09:07.679 --> 00:09:11.879
I never understood that part, right, But I guess if you have enough
109
00:09:11.919 --> 00:09:16.639
ammunition and can um create a fear
within the engineer, um, that can
110
00:09:16.679 --> 00:09:22.200
happen. So let's move on maybe
to talk about it's about some concerns in
111
00:09:22.320 --> 00:09:26.159
terms we mentioned the financial scams.
Um, you know, what are some
112
00:09:26.200 --> 00:09:31.000
of the electronics you know, crimes
that are more difficult to track. Yes,
113
00:09:31.480 --> 00:09:37.279
when you think about these electronic crimes, people people or like hackers are
114
00:09:37.320 --> 00:09:43.559
sitting behind a computer or that phone
and they carrying out um and and illegal
115
00:09:43.600 --> 00:09:52.039
activity. So what happens is that
that sometimes you may not even be able
116
00:09:52.080 --> 00:09:56.799
to um peeing in on the laptop
or what computer they're using, because they
117
00:09:56.799 --> 00:10:03.519
can log into another network and to
carry it out. So so let's just
118
00:10:03.559 --> 00:10:07.200
imagine, right, if you had
your laptop, and if it was a
119
00:10:07.200 --> 00:10:11.679
building across the screen over here,
right, and let's say that you wanted
120
00:10:11.720 --> 00:10:22.600
to probably hack into a crypto currency
a count you could literally try to hack
121
00:10:22.679 --> 00:10:28.360
into that building over there and use
their network to hack into that system.
122
00:10:28.519 --> 00:10:33.000
Okay, So so what you're doing
now is that you're putting it on this
123
00:10:33.159 --> 00:10:37.639
on the other building over there.
So so that's one of the ways of
124
00:10:37.759 --> 00:10:43.000
looking at this because as an electronic
crime is that there are so many end
125
00:10:43.080 --> 00:10:46.559
points everywhere. See it's see it's
not like a physical crime. You know,
126
00:10:46.759 --> 00:10:52.600
people were walking into a bank saying
give me all your money easy.
127
00:10:52.720 --> 00:10:58.720
It was a body. But today
we have laptops and we have different systems
128
00:10:58.759 --> 00:11:03.320
that people use and they'll call endpoints, and so what you have to do
129
00:11:03.519 --> 00:11:09.240
is to have some type of way
of tracking these end points down and hopefully
130
00:11:09.279 --> 00:11:13.159
your threat logs are doing it.
You know, a threat logs tells you
131
00:11:13.240 --> 00:11:16.600
that that this is an IP address
that has logged onto the system that has
132
00:11:16.600 --> 00:11:20.279
not been authorized or authenticated, like
we talked about it. There you go.
133
00:11:22.399 --> 00:11:26.639
All right, So let's talk about
um, either the American dollar where
134
00:11:26.639 --> 00:11:31.600
where does this? Where does the
American dollar or any currency around the world,
135
00:11:31.039 --> 00:11:37.720
physical currency? Um, what's the
future if you will? Or you
136
00:11:37.759 --> 00:11:41.840
know the risk in terms of versus
cryptocurrency online? Well, you know the
137
00:11:43.159 --> 00:11:46.240
digital dollar if you want. Yeah, well, you know the problem is
138
00:11:46.320 --> 00:11:50.600
that there are a group of people
that want to change all the currency over
139
00:11:50.639 --> 00:11:54.279
to cryptocurrency. Okay, Dan,
It kind of put the American dollar at
140
00:11:54.399 --> 00:12:00.399
risk because nobody wants to use American
dollars anymore. Okay, okay, bro,
141
00:12:01.080 --> 00:12:07.120
But what part of that is that
it's a get rich scheme? Okay?
142
00:12:09.080 --> 00:12:13.799
Christ Cryptocurrencies are very, very volatile, all right, because today you
143
00:12:13.840 --> 00:12:18.679
can have a million dollars. In
tomorrow you can have two dollars. You
144
00:12:18.720 --> 00:12:24.679
know, the dollar is not as
volatile as these cryptocurrencies um are. So
145
00:12:24.679 --> 00:12:31.279
so it's a major, a major, major type of concern but also too,
146
00:12:31.679 --> 00:12:37.799
the reason that it is a concern
is because it's not policed. Nobody
147
00:12:37.840 --> 00:12:41.720
really has a handle on who is
really trying to control the market because these
148
00:12:41.720 --> 00:12:46.120
are peer to peer networks that are
being used. Yeah, that's definitely the
149
00:12:46.120 --> 00:12:50.080
two sides of the coin. No
pen intended, but it basically is where
150
00:12:50.600 --> 00:12:56.960
things have happened. Nefarious players have
come in and who's placing this right and
151
00:12:56.039 --> 00:13:01.080
what's their motive? Um, when
you allow you know, somebody's hand in
152
00:13:01.120 --> 00:13:03.679
the candy jar, so to speak, Uh, there's greed comes into play
153
00:13:03.759 --> 00:13:07.799
and they try to embezzle money and
they had had a YadA right because they
154
00:13:07.799 --> 00:13:11.840
have access to it. If um, any given individual, organization, company,
155
00:13:11.879 --> 00:13:16.720
antony, government doesn't have access to
it, then it should prevent or
156
00:13:16.759 --> 00:13:22.399
it helps provide again that safeguard and
eliminates a lot of this uh because whenever
157
00:13:22.440 --> 00:13:28.200
there's money available to people, you
know, it's almost um you have it's
158
00:13:28.200 --> 00:13:31.240
problematic at the at the front end. Right. So the concept of I,
159
00:13:31.360 --> 00:13:37.120
as I understand a blockchain and cryptocurrency
is with nobody kind of governing this,
160
00:13:39.120 --> 00:13:43.039
um, you eliminate the greed factor
in the in the ability for someone
161
00:13:43.080 --> 00:13:48.240
to uh take advantage of the system. But the hackers are basically the new,
162
00:13:48.840 --> 00:13:52.200
you know, twenty one century version
of somebody trying to break into the
163
00:13:52.240 --> 00:14:00.000
cookie jar. They are the new
form of um currency. Yeah right right,
164
00:14:01.080 --> 00:14:03.320
Okay, So we got lots more
to cover here, but just want
165
00:14:03.320 --> 00:14:07.080
to remind our listeners again. You're
listening to uh Rich casting over here on
166
00:14:07.080 --> 00:14:11.480
this side of the mic in our
Atlanta Global Podcast studios and Dwayne Hart on
167
00:14:11.519 --> 00:14:13.399
the other side. And if some
of these topics of interest to you,
168
00:14:13.960 --> 00:14:18.639
check out Dwayne Heart dot com.
There you'll find access to order a copy
169
00:14:18.639 --> 00:14:22.720
of this book, uh and talk
to us give us your seventeen second best
170
00:14:22.720 --> 00:14:26.039
pitch on the book here in a
second. But on that Dwayne Heart dot
171
00:14:26.120 --> 00:14:30.960
com you'll also find links to his
YouTube channel to the podcast cyber Security Mindset.
172
00:14:31.039 --> 00:14:35.159
Talk to us about the book,
you know, the Soybersecuted mindset UM
173
00:14:35.360 --> 00:14:41.440
simplify cybersecurity. It also the other
streets how to operate cybersecurity, and it
174
00:14:41.600 --> 00:14:46.960
also hit readers understand how to connect
soybersecurity and to form what I called the
175
00:14:48.039 --> 00:14:54.159
cybersecurity blue front because there's a fair
factor about cybersecurity. So what cybersecuity Mindset
176
00:14:54.240 --> 00:15:01.279
does is to take their different pieces
of cybersecurity talk about it, and it
177
00:15:01.559 --> 00:15:05.919
was great to read us how to
connect them together so that they can build
178
00:15:05.960 --> 00:15:11.399
at sobersecurity blueprint. And also I
would say this again, it's it's is
179
00:15:11.440 --> 00:15:16.519
to remove that fear factor. Uh, you know, because people are afraid
180
00:15:16.559 --> 00:15:20.639
of cybersecurity today, so we have
to be moved at fear factor. Well,
181
00:15:20.679 --> 00:15:24.679
and what's interesting about cyber I mean, blockchain and the cryptocurrency is that
182
00:15:24.679 --> 00:15:28.399
people do you have that fear of
the unknown. But and they go,
183
00:15:28.519 --> 00:15:31.039
well, that's kind of weird.
There's no physical money, you know,
184
00:15:31.120 --> 00:15:33.960
my hand, and so I'm not
interested. I'm um, I don't run
185
00:15:33.039 --> 00:15:39.200
a deal with cyber uh, cryptocurrency. But what the reality is if you
186
00:15:39.279 --> 00:15:43.159
go back in history in the very
early days, you know, I had
187
00:15:43.559 --> 00:15:46.879
some goats and you had some coffee
beans, and we were making transaction right
188
00:15:46.960 --> 00:15:52.720
because I didn't have and we would
trade um that that type of currency.
189
00:15:52.960 --> 00:15:56.600
Then it was well, here's a
here's a piece of here's a coin that
190
00:15:56.639 --> 00:15:58.399
has the queen's picture on there.
I'm like, no, I'm not taking
191
00:15:58.399 --> 00:16:00.919
that. Give me your offee beans
or your goat milk, right right?
192
00:16:02.360 --> 00:16:03.559
And then it then it morphed into
like, well, we don't have the
193
00:16:03.600 --> 00:16:07.440
coins because that was cumbersome. Let's
i'll give you a piece of paper that
194
00:16:07.519 --> 00:16:11.320
has a government image on there.
It's like, I'm not taking paper,
195
00:16:11.320 --> 00:16:12.840
give me your coin. Then it
was like here, I'll write you a
196
00:16:12.960 --> 00:16:15.720
check instead of paper. I'm like, I don't know what this is.
197
00:16:15.799 --> 00:16:18.919
It's I owe you, no,
give me a give me your dollar instead
198
00:16:18.919 --> 00:16:23.080
of a check. Then it was
American Express travelers checks. Then it was
199
00:16:23.519 --> 00:16:26.799
here's a piece of plastic. I'm
not going to give you a check,
200
00:16:26.840 --> 00:16:29.120
but I'll give you a piece of
plastic and you can scan it. Credit
201
00:16:29.159 --> 00:16:34.519
card. People weren't adopting all of
those versions of currency exchange until it became
202
00:16:34.519 --> 00:16:37.960
popular, right, So now people
are looking at cryptocurrent digital. No,
203
00:16:38.039 --> 00:16:41.840
I'm not interested, give me your
credit card, but it's good to be
204
00:16:41.840 --> 00:16:45.799
a matter of time and the curve
is gonna shift and potentially this will be
205
00:16:45.440 --> 00:16:51.480
you know all of those other things
I mentioned, nobody's training training, um
206
00:16:51.759 --> 00:16:56.240
coffee for goat milk anymore? Right, or you know old coins right,
207
00:16:56.360 --> 00:17:00.120
so well, you know what it
does, go and help out with bounced
208
00:17:00.200 --> 00:17:04.920
checks exactly right. You know they
don't want to take the check. Is
209
00:17:04.960 --> 00:17:08.039
it's going to clear it out with
cryptocurrency? You know, uh, it's
210
00:17:08.079 --> 00:17:11.200
online. So okay, So a
couple more topics hip before we wrap things
211
00:17:11.279 --> 00:17:15.359
up. So let's talk about some
risk. Um what are someone on your
212
00:17:15.400 --> 00:17:22.880
short list of significant risk? All
right? Account hijack, someone takes over
213
00:17:22.920 --> 00:17:29.839
your account. That's why two factor
authentication is in place for these cryptocurrency account
214
00:17:30.599 --> 00:17:34.240
and normally and normally what happened is
during the registration process. If it's a
215
00:17:34.319 --> 00:17:40.880
lag in time, that's when hackers
can hijack and account. Once it's created,
216
00:17:40.960 --> 00:17:45.039
then it become much more difficult to
hack into those accounts. A second
217
00:17:45.119 --> 00:17:52.480
level is that the identity fraug concept
comes to surface. Here here goes the
218
00:17:52.519 --> 00:17:59.400
way that the identity fraud can actually
um work is that someone will pretend to
219
00:17:59.440 --> 00:18:03.640
be you, or someone will pretend
to be uh someone from coin based and
220
00:18:03.640 --> 00:18:08.400
trying to get information. Okay.
So so when you look at the identity
221
00:18:08.480 --> 00:18:14.680
fraud there all your personal information can
be used for other means as also too
222
00:18:15.039 --> 00:18:21.039
for your own for your own account, because you think about a mobile device
223
00:18:21.400 --> 00:18:25.960
and if someone tries to log into
a coin based account and let's say they
224
00:18:26.119 --> 00:18:32.559
send someone a text and saying that
you need to uh log into this link
225
00:18:32.640 --> 00:18:37.519
on coin base and you need to
update your information whatever, right instead of
226
00:18:37.599 --> 00:18:42.559
person logs into coin base and and
it's not coin based, but it's a
227
00:18:42.599 --> 00:18:47.880
bogus website, right, Okay,
So so that happened. One of the
228
00:18:47.920 --> 00:18:51.000
other ways is fishing. Fishing is
good too. You know, you send
229
00:18:51.000 --> 00:18:53.000
them that email and as I said
before, you know, you send them
230
00:18:53.039 --> 00:18:57.559
to a to a bogus website.
You know, let's even let's even talk
231
00:18:57.559 --> 00:19:03.200
about some ransomware. Okay, you
gotta pay me a thousand dollars to go
232
00:19:03.279 --> 00:19:07.240
get back into your million dollars account
that you have, so exactly, so
233
00:19:07.279 --> 00:19:12.000
what happens A good idea right now, now, this is what a return
234
00:19:12.079 --> 00:19:15.519
on the investment comes to surface.
If I give him a thousand dollars,
235
00:19:15.960 --> 00:19:22.319
I can get back into my million
dollars on coin base. See that's just
236
00:19:22.480 --> 00:19:29.079
the easy way of of how hackers
can uh infiltrate account. What about a
237
00:19:29.119 --> 00:19:33.039
computer glitch, let's say for instant
during the time that someone is registering.
238
00:19:33.559 --> 00:19:40.200
And if there's a computer glitch and
let's say the information install this is this
239
00:19:40.319 --> 00:19:45.599
is very significant here, all right, So so that's one. And let's
240
00:19:45.640 --> 00:19:49.640
talk about minors, because miners they
can disrupt tim and you know, minors
241
00:19:49.680 --> 00:19:56.400
are um they like to review transaction, you know, because when you think
242
00:19:56.400 --> 00:20:00.200
of mining, you're talking taking a
deep dive, and now is and going
243
00:20:00.279 --> 00:20:06.480
in and searching and try to find
information. See it's like coal monus right,
244
00:20:06.720 --> 00:20:11.720
digging right right, Well the tackles
are digging as well too and just
245
00:20:11.799 --> 00:20:17.319
trying to find information. And so
what happened is that that minus are going
246
00:20:17.359 --> 00:20:23.799
to reviewed each transactions and try to
gain control of of your big coin accounts
247
00:20:23.799 --> 00:20:27.200
and so forth. Now one of
the topics that's on the list here,
248
00:20:27.559 --> 00:20:30.519
I really have to put a question
mark next to what is this? This
249
00:20:30.640 --> 00:20:37.079
concept of double spend currency? Yeah, and I caught my attention. I'm
250
00:20:37.119 --> 00:20:41.440
like, what is that? Okay, because minors will go and find out
251
00:20:41.480 --> 00:20:47.640
to your information and try to set
up a second a a second transaction.
252
00:20:48.200 --> 00:20:52.960
Okay, so that something cloned,
so that the MINUS will set it up
253
00:20:53.759 --> 00:20:59.519
because the crypto chain is irreversible.
But what if they can set up another
254
00:21:00.000 --> 00:21:03.359
transaction and double spend your money just
like for instance, you may say,
255
00:21:03.359 --> 00:21:07.000
okay, then I have ten dollars
that I want to pull out. But
256
00:21:07.039 --> 00:21:12.079
if a miners can find that information, then they can set up another transaction
257
00:21:12.359 --> 00:21:18.599
and replicate that transaction. You know
it replicates. So that means that the
258
00:21:18.640 --> 00:21:22.359
ten dollars that you thought that you
were extracting, you know it right?
259
00:21:23.359 --> 00:21:26.319
Okay, that makes sense because then
it doesn't necessarily set up red flags.
260
00:21:26.920 --> 00:21:32.519
Well but yeah, exactly for you, but not for the average Joe.
261
00:21:32.599 --> 00:21:37.640
Yeah, okay, UM, so
I think our last topic on the list
262
00:21:37.680 --> 00:21:41.960
here, let's talk about some we
talked about, you know, defining UM,
263
00:21:41.000 --> 00:21:48.319
the blockchain, defining cryptocurrency UM,
some you know hacker UH tools that
264
00:21:48.359 --> 00:21:52.799
they've been using, and UH financial
risk and problems and some of the frauds.
265
00:21:52.839 --> 00:21:57.319
Let's finish up with what are some
controls to counter all of these uh
266
00:21:57.440 --> 00:22:02.519
some of these topics we've talked about. Let's go talk about email. Email.
267
00:22:02.599 --> 00:22:07.359
The number one that pay close attention
to email and make sure that it's
268
00:22:07.440 --> 00:22:14.160
from a legitimate source, because if
it's anything such as someone sending you a
269
00:22:14.160 --> 00:22:17.160
way up link and telling you to
go to a website so that you can
270
00:22:17.279 --> 00:22:22.680
update your coin based account or something
like that, you you really have to
271
00:22:22.680 --> 00:22:30.079
watch that. UM and just to
make sure that you are stand wise and
272
00:22:30.279 --> 00:22:37.279
also too that you're noticing any type
of unfamiliar activity on your accounts as well.
273
00:22:38.400 --> 00:22:44.039
And I bring up email because that's
probably the most centralized. That's the
274
00:22:44.160 --> 00:22:45.519
entry point, right, it's your
front door. It's your front door,
275
00:22:45.680 --> 00:22:49.400
yes, right, yes, it
is the front door. So so if
276
00:22:49.400 --> 00:22:56.200
someone can find a way to infiltrate
your account to email by actually UM conversing
277
00:22:56.279 --> 00:23:00.400
someone to go to another website that
is I legited it and you know,
278
00:23:00.440 --> 00:23:06.319
the person put information in there,
and and now someone can log into your
279
00:23:06.359 --> 00:23:10.839
coin based account because because it can
be as easy as like coin bases going
280
00:23:10.880 --> 00:23:15.480
through and making sure every user can
reset that passwords and you get the email
281
00:23:15.640 --> 00:23:17.640
and you said you must go to
this link, and you go to that
282
00:23:17.720 --> 00:23:22.079
link and you put your user name
of passwords in there. Okay, game
283
00:23:22.119 --> 00:23:25.720
over, game is over. Yeah. It made a lot of these principles
284
00:23:25.720 --> 00:23:30.039
apply that we're somewhat familiar with UM
in our everyday life in terms of you
285
00:23:30.039 --> 00:23:33.440
don't keep out your pin to the
A T M machine, right, UM.
286
00:23:33.519 --> 00:23:38.039
You don't take a phone call that
UM and they're asking for private information
287
00:23:38.519 --> 00:23:42.279
and it could be from the source, you know, your bank or your
288
00:23:42.279 --> 00:23:48.000
home mortgage or whatever it is.
But instead of completing that conversation, you
289
00:23:48.039 --> 00:23:51.839
go directly to the source and you
contact the bank. Are the I R
290
00:23:51.960 --> 00:23:55.119
S? Who are you know that
entity? So in this case UM,
291
00:23:55.200 --> 00:23:59.160
you might get it. You might
be a legitimate email from a cryptocurrency account
292
00:23:59.160 --> 00:24:02.559
that you've set up that has some
updates, some system updates, some things
293
00:24:02.559 --> 00:24:04.519
you need to correct, But don't
reply that emails. What you're saying,
294
00:24:04.519 --> 00:24:07.599
go go to your log into your
actual accounts, see if there's any alerts
295
00:24:07.640 --> 00:24:11.440
there. I am going to say
that humans are the weakest link in this
296
00:24:11.559 --> 00:24:17.319
process. Let's just to be real
apps because humans are the weak ist linked.
297
00:24:17.400 --> 00:24:22.599
Because humans are very flexible. The
technology as a standard, So why
298
00:24:22.640 --> 00:24:30.240
not deal with the issue of being
flexible because a human can make the wrong
299
00:24:30.359 --> 00:24:36.799
decision, but technology has a standard. If you state in technology that two
300
00:24:36.880 --> 00:24:45.039
factor authentication is the primary type of
UM safeguard, that is that is being
301
00:24:45.160 --> 00:24:48.279
used, guess what is there?
But as a hacker, you want to
302
00:24:48.359 --> 00:24:52.640
defeat that purpose must saying Okay,
if I can get to humans to go
303
00:24:53.039 --> 00:24:57.720
and actually to authenticate to the wrown
source, then I can gain assets.
304
00:25:00.079 --> 00:25:04.160
Some of the other errors here you've
got to safe guard your account passwords.
305
00:25:06.359 --> 00:25:08.039
UM. We talked about it last
time. In real estate, they say
306
00:25:08.079 --> 00:25:12.559
the three principles or location, location, location, UM. In cybersecurity,
307
00:25:12.640 --> 00:25:17.480
it's all about password, password,
password, passway pass way password, you
308
00:25:17.519 --> 00:25:22.519
know. I just I was reading
an article earlier about having a password manager
309
00:25:22.440 --> 00:25:32.359
and versus using two factor authentication,
and two factor authentication is best if you
310
00:25:32.400 --> 00:25:37.119
have a lot of passwords and to
use the passwords manager. I've always thought
311
00:25:37.160 --> 00:25:41.759
that, you know, a password
managers just something that's saving your passwords either
312
00:25:42.000 --> 00:25:45.839
either through the browser, and it
makes it easy. But at the same
313
00:25:45.839 --> 00:25:53.119
time, I prefer to use two
factor authentication. Now. Coin base is
314
00:25:53.319 --> 00:26:00.119
very very strong with making sure that
two factor authentication operates. Any of you
315
00:26:00.119 --> 00:26:04.519
have not logged into your account and
an extremely long time, it's gonna have
316
00:26:04.680 --> 00:26:10.640
you to re authenticate and to reverify
who you are. Another safeguard in place.
317
00:26:10.759 --> 00:26:14.160
Yes, UM. Okay. So
last question is we've teased at the
318
00:26:14.160 --> 00:26:19.839
top of the hour about this crypto
crypto exchange network UM defined or helps determine
319
00:26:19.880 --> 00:26:26.359
what that UH is involved in the
crypto exchange network. Oh okay, then
320
00:26:26.400 --> 00:26:32.400
well let us appear to peer network. Okay, and it's usually usually one
321
00:26:32.480 --> 00:26:37.920
person that is trying to create a
ledger, and so in that blockchain network,
322
00:26:38.880 --> 00:26:45.240
so what you have is that someone
that registers for a transaction and h
323
00:26:45.279 --> 00:26:49.519
then the transaction is represented as a
block and a share ledger. Then then
324
00:26:49.599 --> 00:26:55.799
so after that the block is broadcasted
to all participants and then after that the
325
00:26:55.839 --> 00:27:00.640
participants approved the transaction is valid.
And you know, this is the area
326
00:27:00.720 --> 00:27:07.279
here that is most most important.
Is it valid? Because if it's not
327
00:27:07.440 --> 00:27:11.920
identified as as being valid, that's
when double spin currency comes to place,
328
00:27:12.519 --> 00:27:15.799
all right. And then the next
thing is, you know, the block
329
00:27:17.359 --> 00:27:22.440
is added to the chain because as
you build these block chains and as they
330
00:27:22.480 --> 00:27:27.920
are encrypted, and as they hash
once you once you do a transaction,
331
00:27:27.960 --> 00:27:33.240
which is a record, they are
added onto the chain. So for a
332
00:27:33.279 --> 00:27:40.000
hack or two infiltrate that chain or
to make it irreversible, you're gonna have
333
00:27:40.119 --> 00:27:45.079
to break all of the different blocks, okay, which is increasingly hard to
334
00:27:45.119 --> 00:27:52.440
do. So the easy way that
a hacker can infiltrate a crypto network is
335
00:27:52.519 --> 00:27:56.680
prior to the network being created,
or prior to the peer to peer um
336
00:27:57.240 --> 00:28:03.799
uh connection, right all right,
because once it's created, it's increasingly harder
337
00:28:03.920 --> 00:28:07.599
yeah, it's it's kind of more
locked. Like you said, that's interesting.
338
00:28:07.599 --> 00:28:11.160
Takeaway I had was the concept of, uh, if there's a glitch
339
00:28:11.200 --> 00:28:14.279
while you're setting up the account or
you pause or whatever, that's basically kind
340
00:28:14.279 --> 00:28:17.559
of leaving your go back to the
analogy, it's like you're leaving your front
341
00:28:17.559 --> 00:28:22.039
door cracked open. Right once the
door closed and locked and locked with a
342
00:28:22.079 --> 00:28:25.960
dead bull, it makes it not
impossible, but a whole lot more of
343
00:28:25.960 --> 00:28:27.519
a challenge than just like, oh, the door's open, let me just
344
00:28:27.559 --> 00:28:33.400
walk in that lag time. Yeah, okay, because that makes sense.
345
00:28:33.680 --> 00:28:41.119
This same concept applies to any transaction
and any type of network communication that you
346
00:28:41.160 --> 00:28:48.079
have because the cryptocurrency networks are very
fast. Okay, see that speedy transactions,
347
00:28:48.119 --> 00:28:52.319
So what if you can slow it
down in its lag time? You
348
00:28:52.359 --> 00:28:56.599
know, that's that's when the problem
occurs. Most other people that are familiar
349
00:28:56.680 --> 00:29:03.799
with a handshake over in UM over
in I T T C P I P
350
00:29:04.319 --> 00:29:08.759
okay and shaking okay, this is
this is kind of you know, the
351
00:29:08.799 --> 00:29:15.799
same concept you know between your sink
and your acknowledge concepts. Right, So
352
00:29:15.799 --> 00:29:21.400
so if you have a lapse in
timing, then you kind of open the
353
00:29:21.440 --> 00:29:25.200
door see it's see it's kind of
like a bank, right if you walk
354
00:29:25.279 --> 00:29:27.920
through a bank door, and if
the door closed is really fast, so
355
00:29:29.000 --> 00:29:32.559
that means that the criminals cannot get
in. But what if it's just all
356
00:29:32.640 --> 00:29:37.440
the closes and you know it,
depending on the size of the criminal itself,
357
00:29:38.079 --> 00:29:42.839
you can slip through the door.
So that same concept follows. Um
358
00:29:44.039 --> 00:29:48.079
follows timing and these timing eros well
speaking, the timing our time is about
359
00:29:48.160 --> 00:29:51.480
up here. So that's a great
way to segue. And I'm just looking
360
00:29:51.519 --> 00:29:53.359
at the list of our upcoming topics. We've got a great lineup for this
361
00:29:53.400 --> 00:29:56.799
season coming up, so stay tuned. Uh. Some of the on the
362
00:29:56.799 --> 00:30:03.279
shortlist is, um, what's security
hackers don't want you to know? Um,
363
00:30:03.359 --> 00:30:07.839
you're how to determine your cybersecurity business
capabilities. We're gonna be covering lots
364
00:30:07.880 --> 00:30:12.839
of other UM topics on that on
the line zero trust in terms of US
365
00:30:12.880 --> 00:30:18.279
government agencies, key reasons. They're
so lots lots coming up here. But
366
00:30:18.519 --> 00:30:21.440
Dwayne again, our pleasure to have
you back in the studio here on the
367
00:30:21.480 --> 00:30:26.839
Georgia our global podcast studios here in
our Atlanta, Georgia studio, so rich
368
00:30:26.880 --> 00:30:29.799
casting over here signing off, Duayne
will see you on the other side of
369
00:30:29.799 --> 00:30:30.960
the microphone soon, all right,
and take care.