Security Now 1060 transcript
Please be advised this transcript is AI-generated and may not be word for word. Time codes refer to the approximate times in the ad-supported version of the show.
Leo Laporte [00:00:00]:
It's time for Security now. Steve Gibson is here. We're going to take a look at code signing crazy. We're going to find out what Whatabad, Idaho has going for it. Steve's going to talk about these three day code signing certificates and I'm going to give you a little demo of Claude code. I've been using it to write applications. All of that coming up next on Security Now.
TWiT.tv [00:00:26]:
Podcasts you love from people you trust.
Leo Laporte [00:00:30]:
This is tw. This is Security now with Steve Gibson. Episode 1060 recorded Tuesday, January 13, 2026. Three day certificates. It's time for Security now, the show where we cover the latest in security news. We attempt to protect you and your loved ones from bad guys in the outside world. We even talk a little bit about TV shows, books and vitamins with this guy. It's whatever Steve's into, frankly.
Leo Laporte [00:01:05]:
Mr. Steve Gibson, hello from GRC.com great.
Steve Gibson [00:01:08]:
To be with you again for. Well, I'm not superstitious so the fact that this is the 13th is just fine with me. It's not a Friday Tuesday.
Leo Laporte [00:01:17]:
That would be worse. Yeah, that's not a bad. I, I did have bad luck yesterday. Did you hear me talking about this on Mac Break Weekly? I got fished yesterday.
Steve Gibson [00:01:25]:
No, and it's funny because I forgot to mention it. It's not in the show notes, but I saw if I got a phishing text which said that. What was it? The Amazon. It was supposedly from Amazon saying that the quality of something that I'd ordered did not meet their standards and so they were giving me a refund. Click here. And it was a plus nine one something something, you know, phone number. So I was like, what? It's not. But I mean again I was like, I, they kind of had me almost.
Leo Laporte [00:02:03]:
Well, I got had. And the, and, and, and I, I got some insight from it. So it was, it wasn't a complete waste of three credit cards. I got a text from T Mobile saying your points are about to expire. If you'd like to use them, click this link. What? I really didn't pay attention because for two reasons. One, I'm a T Mobile customer and I get a lot of promotional texts from them. And this is.
Leo Laporte [00:02:27]:
Companies got to knock this off because they're setting their users up. Oh yeah, I, this is, I see this all the time.
Steve Gibson [00:02:35]:
Oh, you mean the legitimate companies need to stop this.
Leo Laporte [00:02:39]:
T Mobile should not be texting me with promotional stuff legitimately because it sets me up for phishing. That looks exactly the same. Now if I notice the link was to L U O S a CC T mobile dot L U O S a C C. I probably would have been smart enough not to click on it. I clicked on it, it said, hey, look, you got, boy, you got a lot of points. You could get an iPad, you could get some headphones. What would you like? I said, well, I don't really need any of this, but these headphones I could do give as a, as a gift. Click the link, all look very legitimate.
Leo Laporte [00:03:14]:
It said, well, okay, we need your credit card. It's free, but there's $0.99 shipping charge. So we need your credit card for that. That should have been. Then I clicked the link and it took a long time. That was the real giveaway. So I'm waiting, put in my credit card information and said, okay, they're going to send you a text. Got the text, Took a long time because there's a man in the middle, right, waiting for that text so that they can get the credit card number in the text and authenticate it.
Leo Laporte [00:03:42]:
And what they did, which is really interesting, the text said to add this credit card to your Apple Wallet, enter the number. And I should. I mean, there was so many red flags again.
Steve Gibson [00:03:54]:
I mean, I'm sure everybody listening understands that, you know, our guard is down briefly. Maybe you're distracted.
Leo Laporte [00:04:03]:
It was, it was early morning. I wasn't paying attention and there was urgency. Right. These are going to expire.
Steve Gibson [00:04:08]:
Yep.
Leo Laporte [00:04:09]:
And it was a nice, you know, nice set of Sony headphones. I thought, well, that's pretty good. So I entered the first credit card. I said, no, this one didn't work. Oh, and the second credit card, no, this didn't work.
Steve Gibson [00:04:20]:
And they'll just suck them out until.
Leo Laporte [00:04:21]:
You find three credit cards. Before I went, wait a minute, hold on there, buddy. Fortunately, the first credit card was an Apple credit card, which Apple. It's great. You go in and you say, make that number no good, give me a new one. And that's it. It's done. The other two, I had to say the bank, I need a new credit card.
Leo Laporte [00:04:45]:
I had to say to American Express, I need a new credit card. There'd be a little pain in between reconnecting stuff, which I deserve fully. And in fact, shortly after, you know, as soon as I realized.
Steve Gibson [00:04:57]:
But you're indemnified from any charges.
Leo Laporte [00:04:59]:
Well, yeah. And as soon as I realized it, I immediately stopped all those credit cards so I was not going to get bit. They don't. They're quick. So that was the interesting thing I thought was Smart of them to put it into a wallet. So they put it into a Apple wallet because that's anonymous. You can then use it anonymously at a store and the store doesn't know who you are. And Lisa called down to me about an hour later saying, did you just charge some 500 bucks worth of stuff at Lowe's? I said, no.
Leo Laporte [00:05:26]:
She said, well, America's plus blocked it. I said, well, good. And so I haven't seen any others because they're all blocked. Yeah, they. Less than an hour for them to get the credit card numbers, authenticate it, add it to a phony Apple wallet, which they own.
Steve Gibson [00:05:42]:
And Leo, just imagine how many people are being caught. I mean, you're as aware. You're as aware as could be, but still. And, and, and again, even I, like, I looked at that text and I thought, huh, that's interesting. You know, and, but I mean, it, it. Whereas normally nothing would have happened. And, and I just, I, but then I look at the phone numbers plus 9:1. I thought, I don't know where that is, but it's not Amazon.
Leo Laporte [00:06:12]:
So I feel so dumb.
Steve Gibson [00:06:15]:
Well, I had, I've told the story before. I had a, My main credit card, I could not buy. I could not purchase gas. It was so frustrating because. And it would stop, it would kill the card it. If it approached a gas tank, a, A gas pump. Because it turns out that's what they.
Leo Laporte [00:06:34]:
Use to validate it.
Steve Gibson [00:06:36]:
Yeah, exactly. When, when they get hold of a card. Yep.
Leo Laporte [00:06:41]:
Anyway, I, I, I, I, you know, I'm tempted to never tell anybody that this happened, but I think on this show especially, I think it's important to say this because we're all vulnerable.
Steve Gibson [00:06:51]:
These are not hypothetical issues that we face. I mean, and, and this actually will be what you and I will. At our presentation at Threat Locker at the beginning of March is I titled our talk the call is coming from inside the house. True, because that is the threat now. And it is the messiest, least easy to deal with. Most pushback from your own employees and staff are all the things you have to keep them from doing in order to protect themselves, protect your organization from, you know, inside. So anyway, we have a great podcast today. Maybe it is the 13th.
Steve Gibson [00:07:43]:
This didn't happen this morning, did it?
Leo Laporte [00:07:45]:
No, it was yesterday. Fortunately, it was on a day off, so I had time to fix everything.
Steve Gibson [00:07:49]:
So we've got security now. Episode number 1061, which I titled Three Day Certificates, after which was inspired by a blog post that my continuing poking around in the code Signing world led me to that I'm going to share. So we're going to take a look at Microsoft's Azure cloud code signing a topic we opened last week. Boy, turns out Leo, bunch of our listeners are in enterprises where they need to be signing code and so last week's topic had extremely high resonance and relevance for them. We're going to talk about that some more. Also California's implementation of drop to provide global data broker opt out is interesting. I've got some details about that actually I did it also. I don't know, don't know if you have.
Steve Gibson [00:08:46]:
I did also where's the town? What a bod, Idaho. We're going to look into that also I discovered What a bod. IOS's built in map app worked itself out of a job for me. I'm going to explain the backstory there. We've got a. I found a 30 minute tutorial for non coders about how to get into how to get started in AI coding. Like how to ask the questions. Right.
Steve Gibson [00:09:20]:
Which I want to share with our listeners. Also the fact that Claude Code appears to be winning over the AI coding world. I'm going to share share two pieces of information about that and then have you tell us about your own recent experiences which I which I have a I got some sense for. We've got a bunch of listener musings on code signing, a little bit of magnesium feedback and then we're going to take a look at what use could there possibly be to three day certificates. I mean it's like it barely gets off the ground and it's landed. So yeah. And of course we've got a great picture of the week for everybody. So I think another great podcast.
Leo Laporte [00:10:00]:
Love it. For this second of the before we get to the picture of the week because I have it already all queued up here. Maybe I can tell you about our sponsor for this segment on Security now and it's kind of, kind of appropriate. This episode of Security now is brought to you by Material, the cloud workspace security platform built for lean security teams and man I wish I didn't. This, this, this text came over my Apple messages, not my Google mail. If it had I wouldn't have had to worry. Managing security in the cloud workspace as you know is tricky. We are a Google workspace company.
Leo Laporte [00:10:42]:
A lot of you use workspace, maybe use Microsoft 365 but it's hard to do security in those clouds. Phishing is not the only way in by the way, what I got but today's Email security basically stops at the perimeter. New attacks are hard to detect with siloed email data and identity security tools, but that's why you need material. Material protects the email, protects the files, protects all the accounts that live in your Google workspace or Microsoft 365. Honestly, effective email security today needs to do more than just block phishing and other inbound attacks. It needs to provide visibility and defense across the entire workspace. Threat Surface Material ingests your settings, your contents, your logs, churns them up and provides holistic visibility single pane that looks into the threats and risks across the workspace. It also gives you the tools when you see something to automatically remediate it.
Leo Laporte [00:11:43]:
Material delivers comprehensive workplace security by correlating signals and driving automated remediations across the entire environment. You get phishing protection, you get email security. It combines advanced AI detections with threat research so you've got a lot of data points. You also have user report automation so your users can say hey, something happened. You also get detection and protection of sensitive data. This is really important across inboxes and shared files. You know in a soon you're going to be mailing your tax info out to your accountant. That's sensitive data, isn't it? There's all sorts of stuff going through the over the transom into the inbox account threat detection and response with comprehensive control over access and authentication of people and third party apps.
Leo Laporte [00:12:31]:
You get all this with material. Material. It empowers organizations to rapidly mature their ability to detect and stop breaches with step up authentication for sensitive content, blast radius visualization for accounts and the ability to detect and respond to threats and risk across the cloud. Workspace Material enables organizations to scale their security without scaling their team. Material drives operational efficiency with its simple API based implementation and flexible automated and one click remediations for email file and account issues. So you don't have to spend a lot of time fixing stuff, you just go fix it. This includes an AI agent that automates user report triaging and response. It's such a big help.
Leo Laporte [00:13:17]:
Material protects the entire workspace for just the cost of email security with a simple and transparent pricing model. But it's so much more than just email security. Secure your inbox and your entire cloud workspace without adding more toil to your day or costs to your balance sheet. See Material Security to learn more or book a demo. That's Material Security. What a great solution. You need to check this out. Material.security we thank them so much for our their support of security.
Leo Laporte [00:13:50]:
Now and Mr. G. Okay, let me, let me tee up the picture of the week.
Steve Gibson [00:13:56]:
I gave the. This picture of the week the caption. It would be funnier if it didn't ring so true.
Leo Laporte [00:14:02]:
Oh dear.
Steve Gibson [00:14:03]:
Instead it's rather sad.
Leo Laporte [00:14:05]:
Yes. Okay. This is a free range comic. I'm looking at it right now. Let me show it full screen so you can read the entire caption.
Steve Gibson [00:14:19]:
So, so we, so we have a, a neat looking couple of hikers. She's got her little fanny pack and he's got a walking stick. And they're on a path clearly in some park. And they've come to a arranger who's stepped out of his booth. The, the arm is down on the gate preventing them from moving through. And he's holding up his hand saying, hold on, stop. Pointing to a kind of a billboard sized screen which is off to the side of the path. And on the screen we say we, we see it says content loading with the little spinning thing.
Steve Gibson [00:15:02]:
Right? And he is seen to be saying, hold it right there, folks. Before you can view any more scenery, you'll have to watch these ads and take a brief survey. So as I said, yes, it would be funnier if it's true. Didn't ring so true. The. You know, even nature is being commercialized and you're needing to be made into the product yourself if you're wanting to do any communing.
Leo Laporte [00:15:33]:
No. No communing allowed.
Steve Gibson [00:15:35]:
No communing here. Okay. So based upon the feedback I've received, as I said over the past week, we appear to have hit it out of the park with our first podcast last week of 2026. I received a bunch of feedback about each of the major topics we covered. And no one complained about my spending time sharing what I learned firsthand about magnesium. In fact, many of our listeners want more. So from time to time, you know, again, this is not going to be the nutrition podcast, but again, we're all together, all what, 100 or 100,000 plus of US aging as a group. And we've been at this for 21 years.
Steve Gibson [00:16:22]:
So we're getting there. I was gratified to find a great deal of unity over what's going on in our industry regarding the shortening of certificate lifetimes coupled with the concomitant rising costs of code signing since last week's three hour podcast, which, you know, couldn't have handled any more content. I stumbled upon a terrific blog post that was so on point that I want to begin with it this week. Much as I began with this same topic last week by looking at, in this case a a different aspect of code signing. The guy's name is Rick Straw. His post was this past Summer on July 20th and he made a he. He he tweeted a few days before that. I'll share that in a second.
Steve Gibson [00:17:17]:
But He he posted July 20, 2025 from Hood River, Oregon. He gave his posting fighting through setting up Microsoft Trusted Signing. And while I share what Rick wrote, please keep in mind that no matter how much this guy may sound like me and may be echoing my recently expressed sentiments, this is really his own original writing. So you know, he's further evidence, I guess, that, you know, I and our many listeners who have expressed an opinion are not alone and are not off base in raising an extremely skeptical eyebrow at the recent changes that have been occurring and which will be adversely affecting everyone who wishes to author code going forward. So here's what Rick wrote He said so it's that time of year, actually the time of several years to renew my code signing certificate. I always dread this because it's a manual process and invariably if you're not intimately familiar with the complexities of public key cryptography, the terminology is enough to drive you batty. It's gotten easier since I made some decent notes the last few times I went through this, but all that's out the window this time around because the code signing rules have changed drastically. It actually happened a few years ago, but I was lucky and got my local still exportable certificate just before the rules changed.
Steve Gibson [00:19:07]:
So I was able to freeload for at least nearly three years on the old certificate plan. The new rules don't allow for locally stored exportable certificates. Instead certificates have to be served from one of a few certified online authorities or the certs must be stored in a FIPS142 Level 2/compliant hardware security module. The keys cannot be exportable so they effectively cannot be copied and stored or used elsewhere. So you got the option of a server provided keys or hardware keys. The idea behind this is to stop keys getting jacked and being used by the non originating organization so the new keys are one time generated and non exportable so that they are much more restricted. Online services issue certificates that are good for only a few days when you can use them to sign with and then automatically roll over to a new certificate. What all this means the complexity of getting a certificate has gotten exponentially worse and along with that prices have gone up significantly.
Steve Gibson [00:20:31]:
Base non EV certs run in the 350 to 500 range with fully verified EV certificates starting around $500 per year. What used to cost me $180 for three years the same provider now wants nearly $1,000 for, he says. Yikes. It all seems like a huge grift. Okay now in his posting Rick, as I mentioned, then posts he quotes a separate tweet which he had posted two days prior to this blog posting. On July 18, Rick posted to X He said as it is the whole code signing thing has turned into another scam of X and ification of a captured audience. If you're publishing software or even packages on nouget now you pretty much have to have a code signing certificate. Certificates that used to be 100 to 150 or less for multi year certs per year a few years ago now cost 300 to 400.
Steve Gibson [00:21:46]:
For basic certs the EV certs start at 500 and go up from there. The validation rules for businesses have not changed and you would think most of the expense is all in that. But this isn't about security, it's about gatekeeping and just one more hurdle for a small business to have to jump over. So that was his his tweet then. He continues turning his attention to Microsoft's Azure Cloud Signing solution. He writes, Microsoft is in the game too. Microsoft, who requires these code signing rules in the first place for Windows Smart Screen validation and also for other things like NuGet packages, is also providing an Azure service called Trusted Signing to provide code signing services. So they're on both sides of that transaction.
Steve Gibson [00:22:47]:
Create the problem, provide the solution. To their credit, their pricing is much better than what most traditional SSL cert providers are now charging Azure Trusted Code Signing is still in preview, but then again it's been in preview for well over two years. But it looks like what you see and what and what can sign up for now is in the final stages before going to a proper release as a service. One reason to look at Microsoft solution despite the potential pain and suffering, he writes, is that the pricing is quite good as of the time of this post. So and then he has a little chart. The base price monthly is $9.99. The premium as opposed to basic per month is 99.99. The quota as in maximum number of signatures per month for the basic 9.99 cents is 5,000 signatures per month.
Steve Gibson [00:23:55]:
Then an over quota is half a cent per signature. So $0.005, you know, half a penny per signature once you've gone over 5,000 per month for the premium plan, which is that, that the hundred basically $100 99.99. You get 100,000 signatures per month and then the same half a penny for each of the signatures over that. So he said these are non EV base certificates. Oh, so that means the, the basic, the, the difference between basic and premium is not signature quality, which makes sense, right? Because we know you don't get any benefit anymore for EV from Microsoft, so why charge more for it? But it's, it's quantity of signatures. So for 5,000 signatures, for $10 a month, basically for 10 times that fee, a hundred dollars a month, you get 20 times the maximum number of signatures. Before you start having to pay per signature, you get a hundred thousand signatures. So he says these are non EV base certificates that only do basic vetting.
Steve Gibson [00:25:09]:
For fully vetted EV certificates you'll need to look elsewhere. This pricing, which ends up at a hundred and about $120 per year for the single cert, is cheap compared to most of the SSL vendors, most of which start at around $300 for certificates with mailed hardware keys, meaning they, you know, postal mail, they, they send the key to you, then you plug it in and you're, you're good to go, he says. So you got to give Microsoft credit here for keeping costs down and providing reasonable pricing. The certificates issued by Microsoft are very short lived with expirations that last only three days to aggressively thwart invalid signing attacks in case a certificate certificate is compromised. Thus the title of today's podcast, three day certificates. We're going to look at the mechanisms behind that, he says, doing a bit of research. Out of all the bad options out there, Microsoft's trusted signing seems like the least bad solution that's also cheaper than traditional certs from various SSL vendors. The good news is that it works and pricing is reasonable.
Steve Gibson [00:26:31]:
The bad news, I wasted nearly an entire day trying to get it to work. Hopefully this post will help you. Reading will help you reading this not to wait will help. So he means those of you reading this not to waste quite so much time. And he then his next section he titled Navigating the Azure Jungle. I'm not going to go through it all, but I'm going to touch on the beginning of this. He said if you end up going the Azure trusted signing route, plan on having to wade through the Azure dependency jungle of of setting up several resources and trying to understand what all the mumbo jumbo Azure jargon amounts to. If you're doing Azure all day, then much of this infrastructure dance will be familiar to you, but as someone me, he wrote, who only occasionally jumps in for some very specific services like Trusted Signing, it's incredibly painful to deal with Azure security and the resource dependencies and the endless nesting of services with badly defined and overlapping naming boundaries.
Steve Gibson [00:27:50]:
For trusted signing, finding documentation via search engines was hit or miss. The docs for this are buried behind deeply nested links, perhaps because it's still in or just out of preview, he says. Parens even that's hard to tell since some prompts show preview. None of the headlines do, he said, and also because previous releases of this technology used a completely different publishing pipeline through the Azure key vault, he says there's official documentation, although it took me a bit to discover it, and he put a link in the blog posting and I copied that link into the show notes, so that's there, he says. This has everything you need, but the instructions require some interpretation. The tools are terrible and the docs don't make working with them a lot easier by making you figure out where to find files and dependencies and how to install tools. Don't believe your lying AIs, he wrote. In this day and age of AI assistants and chatbots, you would think that that things like Azure configuration instructions for setting up an Azure task would be readily available.
Steve Gibson [00:29:09]:
Heck, there's even an Azure specific copilot model that you can use from the VS Code Copilot integration. But that actually yielded surprisingly bad results and did not work well with Trusted Signing either for setup or for the signing part. Part of this might be because Trusted Signing is still in preview or because the documentation for this is almost non discoverable and because things have changed so much with the tooling. Long story short, after a very pissed off day of going down many wrong paths, I managed to get Trusted Signing to work for my projects and I'll try my best to provide the details how I have this set up, hopefully sparing a few of you all the pain I ran into. Okay, and that at this point I'm going to stop almost, he said. So so this is about the first 10% of Rick's entire blog posting. Throughout the next 90% of his posting, he painstakingly and charitably details the entire process of setting up Microsoft Azure Cloud Code signing. I've got a link to his detailed instructional posting in the Show Notes and I also gave it a GRC shortcut just to make it easy for everybody to find GRC SC Code sign all one word GRC SC codesign will bounce you over to to this blog posting of Rick's where you'll see the first 10% is what I just shared and the other 90 are like how he solved the problem.
Steve Gibson [00:30:57]:
He finally wraps up this terrific setup walkthrough with a summary that's also worth sharing here. As you'll hear, Some of this assumes that by now, by the time you've gotten to here, you've managed to slog through everything that he wrote which preceded it. So he sums it up by saying the process to set up trusted Signing was way harder than it should have been. In fact, the entire process took me the better part of an entire workday. The server process is complicated, primarily because the nomenclature is so crazy confusing and the dependency management on Azure is such a pain in the ass. The missing rights from the account to create an identity is particularly maddening, and how you fix it is even more so. But I wouldn't be but it wouldn't be Azure if you weren't cursing the thing every step of the way. The signing process is also a pain in the ass with three different tool chains required.
Steve Gibson [00:32:00]:
The fact that an Azure Trusted Signing command line interface add in exists but doesn't actually support signing is just ridiculous. With all the resources that are thrown in Azure, it seems petty to not support the one feature that everybody is going to need without having to jump through hoops of managing several tool installation instructions. But somewhat grudgingly, I have to say that at the end of the day, the process works, warts and all. Microsoft's comparatively lower pricing for the service compared to others maybe makes it worth it. And frankly, the fact that I have my cert running as a service that hopefully doesn't ever need to be updated unless I quit the service is enticing. Yeah, it costs more than it did last time around. I'm now paying almost as much every year as I used to pay for three years, but given the circumstances and the insidification that now surrounds the entire code signing process, this is the best we can do for now. I'm hoping writing this up is helpful to some and that these instructions won't be obsolete in a few short months because Microsoft changed their designs again, as is so often the case.
Steve Gibson [00:33:30]:
Despite that I finally got it to form, one would hope they fix its performance. Maybe he meant to perform one May oh yeah. Despite that I finally got it to perform, one would hope they fix its performance and he said 5 to 8 seconds per file to sign with no parallelism for multiple submissions is bad.
Leo Laporte [00:33:57]:
That's pain.
Steve Gibson [00:33:57]:
And could we yes, like you just sit here waiting for eight seconds for this thing to sign a file. And apparently lots of companies are signing. They have like heavy signing burdens, he said, with no parallelism for multiple submissions. And could we please have self contained tooling for signing for heaven's sake, he wrote. Provide one one tool that can handle the signing process in one pass without having to install 50 other things. Or better yet, have it built in to the Azure command line interface with the trusted signing add in that's already there. One could hope some of this is due to the relative newness of Azure Trusted Signing, but we shall see. So Rick's blog system supports reader comments, and that posting back in July generated a bunch of feedback.
Steve Gibson [00:34:56]:
I'll share just the first one of many, which followed up and posted I'd just like to say that I've been reading your blog for probably 12 years now and I also went through this. I've learned to parse Microsoft documentation as if I were a machine and it's nice to know that someone else is turning in to the cranky old man of developers. I feel like something has been lost. From the time we were excited it all worked. Meaning, you know, computing. This guy wrote the days where you could slow down the genie effect on Mac with the shift key just to stare at it when when connecting to a system seemed like magic. Now we deal with artificial gatekeeping, auditing, roadblocks, deprecations for seemingly no productive reason. What happened to the joy of being excited that it all worked? He finished Keep on trucking but also get off my lawn.
Steve Gibson [00:36:06]:
So yeah, it's not just me and many of our listeners who who have sensed that what's happening here is not for the benefit of the world, but for the enrichment of a very few large gatekeeping bureaucracies. Yeah. Now I should say that after last week's podcast I did some additional scouting around and I found that the fast SSL brand offers a standard like Microsoft non EV code signing certificate if you buy three years for 129 per year. So and and now we're talking hardware. So since it's still possible before March 1st to obtain a 3 year plus 3 month remember 39 month certificate. That's what I plan to do. Fast SSL certificates are available for from the sip from from the site cheapssl security.com Ch SSL S C U R I T O I you know, no hyphens or anything. Cheap SSL Security.com As I said, that's what I'm going to do.
Steve Gibson [00:37:21]:
There's no longer any apparent benefit from obtaining and wielding extended validation certific certification. Microsoft doesn't even offer it because they, they, they don't care. And since obtaining it means paying a lot more, that is EV paying a lot more. After first being subjected to basically a full body cavity search in order to qualify for ev, My next code signing certificate will be the bottom of the barrel Fast SS brand. You know that, that one will take me from when I get it, which will be late next month, late February of 2026 through to late May of 2029. And at that point, and that means, you know, installed in, in my little hardware USB dongle so I can sign as much as I want to. Actually my server will be signing as. Everybody who buys a GRC product has code signing on the fly of their own executable.
Steve Gibson [00:38:25]:
That's stuff I all got worked out when I talked about it a couple years ago. So three years from now, May 2029, we don't know what shape the world's going to be in. We don't know what else will have changed. They may have further shortened certificate lifetimes. There may be more pressure in the cloud. Maybe some competition will have stepped up to offer a better deal. We don't know. So anyway, I've got a link to, for anyone who cares, the Fast SSL code signing certificate.
Steve Gibson [00:38:55]:
It's $387 for the three years. So 129 per year you get to, you get to install it into, you know, an, an existing dongle you probably already have if, if you've already been doing code signing for the last two and a half years because that was all already dongle ized and that's what I know. Leo.
Leo Laporte [00:39:20]:
Unbelievable. I actually, it's funny because we're going to talk about it a little bit later, but as you know, over the weekend I wrote some of my own code and I just moved it over onto this machine so I can show you and the Apple operating system. So you can't open that. It's not signed.
Steve Gibson [00:39:41]:
Yeah, I, I, it is, it is. I mean it really, it's astonishing essentially. I mean you, you, you can, you can understand what they're trying to do, right?
Leo Laporte [00:39:55]:
Oh yeah, I get it.
Steve Gibson [00:39:57]:
Yeah.
Leo Laporte [00:39:57]:
Yeah.
Steve Gibson [00:39:57]:
Except that bad guys are signing their bad code because they're able to pretend. I mean we're, we're hiring North Koreans. We, we obviously aren't good at figuring out who people are.
Leo Laporte [00:40:12]:
It's an imperfect system, so why enforce it is what you're saying.
Steve Gibson [00:40:15]:
Yes, and that's you know, that's what I'm beginning. And I guess this is the old man, get off my lawn thing. I'm seeing more and more examples of where trying to fix the last 5% is creating 95% overhead. You know, again, it's like we need to protect some endangered, some endangered rodent somewhere in Sacramento. So we can't run light rail through the, you know, through that area without all kinds of environmental exceptions and permits and things. And as a consequence, we don't have, you know, any good transportation in California. It's, again, I get the, I get the intent, but sometimes you end up, it's like case of being your own worst enemy. And, and in this effort to, to, to squeeze, to, to try to use technology to go all the way to 100% no malware, first of all, you're going to fail.
Steve Gibson [00:41:21]:
You know, even goodware has bugs. As the point that I made. The fact that it's signed doesn't mean that it's not. That doesn't have remote code execution vulnerabilities. It just means, you know, who made it. Well, you pretty much know anyway. Oh.
Leo Laporte [00:41:38]:
It'S very.
Steve Gibson [00:41:39]:
Okay, I need to, I need to take a breath, have some coffee. Then we will, we'll talk. We'll share some optimistic news about California.
Leo Laporte [00:41:48]:
Good. And while Steve is rehydrating and rejuvenating, let me talk about our sponsor for this segment of Security now, zscaler. This episode of Security now brought to you by Zscaler. It's the world's largest cloud security platform. You know, the potential rewards of AI are obviously too great to ignore, especially for businesses. But businesses also has to recognize there are risks also too great to ignore. Right? Loss of sensitive data, attacks against enterprise managed AI. Generative AI increases opportunities for threat actors.
Leo Laporte [00:42:27]:
It lets them quickly create very realistic phishing lures, as I know well. Write malicious code, automate data extraction. I mean, there's script kiddies out there now who have the best skills of all because they are able to use AI. And then there's also this issue of legitimate users of AI in your business accidentally exfiltrating vital information, proprietary information. There are, there were 1.3 million instances, for example, of Social Security Numbers leaked to AI applications last year. 1.3 million. Chat, GPT and Microsoft Copilot, they saw nearly 3.2 million data violations. 3.2 million.
Leo Laporte [00:43:12]:
It's time to rethink your organization's safe use of public and private, private AI. Chad Pallet, who's the acting CISO at BioIVT says Zscaler helped BioIVT reduce their cyber premiums by 50% and at the same time doubling their coverage and improving their controls. Take a look. Chad's got this to say with Zscaler.
Steve Gibson [00:43:39]:
As long as you've got Internet, you're good to go.
Leo Laporte [00:43:41]:
A big part of the reason that.
Steve Gibson [00:43:43]:
We moved to a consolidated solution away from sd, WAN and VPN is to eliminate that lateral opportunity that people had and that opportunity for misdirection or open access to the network. It also was an opportunity for us to maintain and provide our remote users with a cafe style environment.
Leo Laporte [00:44:03]:
With Zscaler Zero Trust plus AI, you can safely adopt generative AI and private AI to boost productivity across the business. Their Zero Trust architecture plus AI helps you reduce the risks of AI related data loss and protects against AI attacks to guarantee greater productivity and compliance. Learn more@zscaler.com security that's zscaler.com security thank you so much for supporting the important work, the good work Steve's doing here at Security Now. Now back to the crazy world we all live in.
Steve Gibson [00:44:41]:
Some good news and a nice acronym. The acronym is drop, which stands for Delete, Request and Opt Out Platform. Ars Technica's headline was the Nation's Strictest Privacy Law just took effect to data brokers chagrin with the subhead, Californians can now submit demands requiring 500 brokers I don't know where 5 where Dan got 500, I got 170, but still 170 to delete their data. So this was written by Dan Guden, Ars Technica's security guy and and technical guy. He wrote, californians are getting a new supercharged way to stop data brokers from hoarding and selling their personal information. As a recently enacted law that's among the strictest in the nation took effect at the beginning of the year, according to the California Privacy Protection Agency, which is short as Cal Privacy, more than 500 companies actively scour all sorts of sources for scraps of information about individuals, then package and store it to sell to marketers, private investigators and others. The nonprofit consumer watchdog said that in 2024, brokers trawl automakers, tech companies, junk food restaurants, device makers and others for financial info purchases, family situations, eating, exercising, travel, entertainment habits, and just about any other imaginable information belonging to millions of people. So, so the, the interesting takeaway for, for, for, for me so far is and for us is to appreciate that this is not passive eavesdropping.
Steve Gibson [00:46:42]:
Right? I mean the these guys are proactively Assembling portfolios on individuals mean the more data they get on us by person, the more valuable it is they are turning it into a cash flow. So Dan said Two years ago, California's Delete act took effect. It required data brokers to provide residents with a means to to obtain a copy of all data pertaining to them and to demand that such information be deleted. Unfortunately, Consumer Watchdog found that only 1% of Californians exercised these rights in the first 12 months after the law went into effect, a chief reason? Residents were required to file a separate demand for each broker. Yeah, okay, what 500 I or even 170 that I'm aware of. So wow. With hundreds, he writes of companies selling data, the burden was too onerous for most residents to take on on January 1st, meaning 2026. A couple weeks ago, a new law known as Drop Delete Request and Opt out Platform took effect.
Steve Gibson [00:48:09]:
Drop allows California residents to register a single demand for their data to be deleted and no longer collected in the future. CAL Privacy then forwards it to all brokers starting in August, meaning this coming August, brokers will have 45 days after receiving the notice to report the the status of each deletion request. So it's not just going out into the blue and you never hear anything back. It's got to be a proactive report of what action they took, dan said. If any of the broker's records match the information in the demand, all associated data, including inferences, must be deleted unless legal exemptions such as information provided during onetoone interactions between the individual and the broker apply. To use Drop, individuals must first prove they're a California resident, Dan wrote. I used the Drop website and found the flow flawless and the interface intuitive. And I'll I'll just add here I did too and I'll report on that in a second, he said.
Steve Gibson [00:49:31]:
After I provided proof of residency, the site prompted me to enter personal information, such as any names and email addresses I use, and specific information such as VIN vehicle information, numbers and advertising IDs from phones, TVs and other devices. It required about 15 minutes to complete the form, but most of that time was spent pulling that data from disparate locations, many buried in system settings. He says it initially felt counterintuitive to provide such a wealth of personal information to ensure that data is no longer tracked. As I thought about it more, I realized that all that data is already compromised as it sits in online databases, which are often easily hacked and of course, readily available for sale. What's more, Cal Privacy promises to use the data solely for data deletion. Under the circumstances, enrolling was a no brainer. It's unfortunate that the law is binding only in California. As the scourge of data broker information hoarding and hacks on their databases continues, it would not be surprising to see other states follow California's lead.
Steve Gibson [00:50:50]:
My okay, so I thought that I ought to take this out for a spin also. Why not? As Dan wrote, and as Leo and I both discovered, it's all out there already anyway. And trusting one more entity who is only asking for my information for the purpose of preventing its warehousing and resale. Well, that makes sense to me. So I went over to the new drop site@consumer.drop.privacy.ca.gov Again consumer.privacy sorry, consumer.drop.privacy.ca.gov they appear to be behind Cloudflare since I first encountered that increasingly familiar let's verify your human intercept page with the little spinning icon doing whatever it's doing. After a few seconds it finished and and I was taken to the Delete Request and Opt out platform Parens drop site, which identified itself with that webpage title. One of the first things I noted was a drop status menu item. Clicking that out of curiosity, I was taken to a short page that said enter your drop ID to check the status of of your drop deletion request.
Steve Gibson [00:52:15]:
Your ID contains 8 to 10 characters, letters and numbers. Okay, so that seems sort of cool. You receive a drop ID which you can use to check back at any time in the future. So, you know, I'm thinking that I'll store that in Bit Warden safe and also alongside my credit bureau credit freeze info. You know, just as a collection of stuff I want to hold on to. Since this was serious business, I decided that I ought to actually read the terms of use fine print. And I'm glad I did.
Leo Laporte [00:52:48]:
I just skipped over them completely.
Steve Gibson [00:52:51]:
I don't blame you.
Leo Laporte [00:52:52]:
What'd you find?
Steve Gibson [00:52:54]:
It explains that everything I provide will be forwarded to data brokers and the more I provide the better job they'll be able to do of scrubbing me from their systems.
Leo Laporte [00:53:07]:
That's nervous in making I know you.
Steve Gibson [00:53:10]:
Know and it it, it does make you know it you. You know you it gives you a big gulp. But anyway, so, so the, the the relevant parts here it says by using the Delete request and opt out platform drop you agree to the following Terms of use terms provided by the California Privacy Protection Agency Cal Privacy referred to herein as we us and our they said use of drop by submitting a deletion request through Drop, you consent to disclosure of your personal information to data brokers for purposes of processing your deletion request pursuant to Civil Code section Blah blah blah. Unless or until you cancel your deletion request. Additionally, you acknowledge that data brokers receiving your deletion request will delete any non exempt personal information as defined in another Civil Code which pertains to you and was collected from third parties or from you in a non first party capacity. In other words, through an interaction where you did not intend or expect to interact with with that data broker. Before submitting a deletion request, you'll be required to verify your California resident as defined in Section Blah Blah of the California Code of Regulations. As that section read, blah blah.
Steve Gibson [00:54:40]:
Verification is made with assistance from state contracted third party vendors including so cure and login.gov through the California Identity Gateway. If you're unable to confirm your California residency through these verification service providers.
Leo Laporte [00:54:59]:
You.
Steve Gibson [00:54:59]:
May request review of your residency classification pursuant to section Blah of the California Code of Regulations. You may contact CAL Privacy by visiting this webpage and there's a link in the Show Notes for anyone who doesn't want to find it in the Terms and Conditions. In addition, you will be prompted to provide personal information such as name, date of birth and email address. Certain information is required to verify your residency, otherwise the type of information and how much you provide is up to you. However, you must only provide true and accurate information about yourself through drop. Adding personal information about multiple people in the same request is prohibited and probably screws things up at the other end too. Information received will be used and disclosed to facilitate your request to delete and opt out of the sale slash Sharing of your personal information maintained by data brokers registered with CAL Privacy. The more personal information you provide, the greater the likelihood of registered data brokers finding the personal information they maintain about you and deleting that information.
Steve Gibson [00:56:18]:
Yikes. Okay. But you know, it makes sense if if I choose to volunteer the size of my underwear. On the one hand, everyone whose business it is to collect and resell such information will have that authoritatively directly from me. You know the the juiciest and 100 verified information directly from the source that they could ever hope to have. But because this disclosure came through CAL Privacy, its very existence means that disclose or sell it, they must not and that in fact they must use it so that information solely for the purpose of identifying me and having done so, delete it and everything else they may have previously aggregated over time about Me the Terms of Use continues. Data brokers are required to process deletion requests at least once every 45 days beginning August 1, 2026. Your submission of personal information through Drop is governed by by Cal Privacy's Privacy Policy, which is incorporated into these terms by reference and so under Prohibited Uses, they say while using Drop, you agree you will not use Drop for any fraudulent, unlawful or prohibited purpose, impersonate any person or entity or misrepresent your affiliation with any person or entity, interfere with or disrupt the operation of Drop or or the servers or networks used to make Drop available, including threatening the integrity or security of Drop, restrict, disrupt, interfere or inhibit any other person from using Drop and finally reproduce duplicate copy, sell, resell or otherwise exploit for any commercial purposes any portion of, use of or access to Drop.
Steve Gibson [00:58:22]:
Violating these Terms may, on a case by case basis, result in restriction of your ability to access and use Drop. And then they did add aiding another person with their request, which you know could be necessary. They said you are only permitted to aid another consumer with their deletion request if that person has authorized you to do so and you meet the requirements described in some section. In addition, the consumer must first have their residency verified as described in the Use of Drop section above. When aiding a consumer with their request, you or the consumer must disclose your full name, email address and business name, if applicable, through Drop when prompted in submitting because you are asked is this for you or for someone else that you're doing it on their behalf? In submitting information on behalf of another person person, you certify that you have authorization to do so and that the information you provide is true and correct. Adding personal information about a person who has not authorized you to submit a deletion request on their behalf is prohibited. And then finally anyway there's a little bit more but we we've got enough of this. Everyone has a sense for that.
Steve Gibson [00:59:37]:
They do talk about third party vendors involvement and just and they're disclaiming their liability or over third party conduct which is not very comforting. But you know that's what you get anytime attorneys are asked to review and revise, you know, anything like this. So the term ends with something titled notice at collection of personal information which says your data. When you use Drop, the California Privacy Protection Agency collects personal information you enter such as names, emails, phone numbers, dates of birth, zip codes, mobile advertising IDs, connected TVs, vehicle information numbers. We also collect usage time, device ID and IP address. We use the data to provide your deletion request to registered data brokers, enhance the product, respond to questions and ensure safety. Providing information and using the service as voluntary. Do not provide unrequested personal information and and finally, your rights.
Steve Gibson [01:00:40]:
You may access records with your personal information collection is subject to the Information Practices act and state, private and state policy. If you have any questions or concerns about this policy, contact us. Blah, blah, blah. Okay, so I did what Dan did and it did take about 15 minutes. I chose to use login.gov since I already have an account set up there. I don't recall why, but the email address they have.
Leo Laporte [01:01:08]:
Global Entry.
Steve Gibson [01:01:09]:
Yeah. Oh that, that could be easy.
Leo Laporte [01:01:11]:
Global Entry uses.
Steve Gibson [01:01:12]:
Yeah. Although for me, the email. The email address they have for me is the one that I was using in 2018. So it may have been set up for my Social Security stuff in advance of my turning.
Leo Laporte [01:01:27]:
It's for Social Security. That's right. Yeah.
Steve Gibson [01:01:29]:
Yeah. So in any event, after providing my phone number to login.gov, the site used SMS to send my phone a link. Clicking that link took me to a page which requested access to my camera so that it could manage capturing the front and back of my California driver's license. It did that with a cool Arnold Schwarzenegger Terminator green grid overlay kind of thing. And for each of the two. Exactly. And for each of the two captures, it asked my permission to send it for verification, which took a few seconds each time. After that I was returned to the drop page where I provided both Steve and Steven.
Steve Gibson [01:02:21]:
And as my first names, I, I, I avoided Leo, adding the Tiberius as my middle name.
Leo Laporte [01:02:28]:
Probably a good idea.
Steve Gibson [01:02:30]:
I didn't want to get, I didn't, Yeah, I didn't want to confuse anything. Then I provided my.
Leo Laporte [01:02:35]:
There's a lot of verification going on here. I got a, I've round tripping a bunch of times with this.
Steve Gibson [01:02:40]:
Yeah.
Leo Laporte [01:02:41]:
And you have to verify your email and.
Steve Gibson [01:02:43]:
Right, right. I gave him my last name, my date of birth, my Social Security number, my residence address, my vehicle identification number. There were places to add a mobile advertising identification number and a smart TV ID until Apple refreshes their Apple TV hardware, which I'm just holding my breath for. I'm using Roku and while Roku does have an advertising identifier, that number is not user displayable without side loading a Roku channel for displaying such internal stuff. And that was more than I was interested in doing. And I also.
Leo Laporte [01:03:24]:
Most people wouldn't know that kind of thing at all.
Steve Gibson [01:03:27]:
Exactly. And I, I do have app tracking turned off in my iPhone, so There was nothing to share there either. Once that was all complete, I was taken to the deletion request submitted success page and there I received my promised 8K. Well, I was gonna say eight character, but it's actually two sets of four characters hyphenated, so I guess that's nine characters. That's that drop ID which I can then use to check back on my drop status at any time in the future. Although nothing's going to happen until late August or actually, I guess maybe even early September.
Leo Laporte [01:04:11]:
Seriously, so much easier to get a delete me account. I'll be honest with you. Okay.
Steve Gibson [01:04:15]:
It did occur to me that, that. Yes, but then delete me must be asking the same things, right?
Leo Laporte [01:04:21]:
Yeah.
Steve Gibson [01:04:21]:
Anybody who's going to be at is.
Leo Laporte [01:04:23]:
Wanting the more you give them, the better data. That's right. Yeah.
Steve Gibson [01:04:25]:
Yeah. Anyway, so one cool thing is that having done this, the drop pages menu, the main menu on the drop page added two new page links. One was for my data profile, which was that form that I filled out which was all then viewable with a whole bunch of asterisks. You know, blanking out most of the information but letting me know like what the last four digits of things were. And the other was the data broker list pages.
Leo Laporte [01:04:58]:
Delete me is a sponsor. I should mention he does saying you got, you got to disclose. Okay.
Steve Gibson [01:05:04]:
So the my data profile page shows a ring chart which is, you know, like a pie chart but with the. With the center hollowed out where we are informed that a total of 170 named individual data brokers are registered with the state of California and are thus subject to this new law which, which as I said went into effect on January 1st with an 8 monon grace period. But what's most cool is that once this happens, the ring chart has categories, you know, that'll be like a pie chart for deleted, opted out, exempted record not found and pending. So I'm going to be very g to have. We have to all wait, you know, eight months. But I'll be very interested in seeing both the deleted and the record not found counts. Currently all of this stuff is 0/170, you know, 0 out of 170. So what will they be in September? It's going to be interesting to see how that goes.
Steve Gibson [01:06:17]:
The data broker list, that second new page actually displays the current status of, of each of those 170 individual data brokers. At the moment, they're all currently shown as N A and the filter option, which is a column in the table Contains the same itemizations as the ring chart, deleted, opted out, exempted record not found and pending. So you'll be able to select by those or sort by those, which again I think will be very interesting to see. And I'll just say, and we've sort of touched on this several times already, but looking at all of this, I was reminded of what Dan wrote. You know, he said it initially felt counterintuitive to provide such a wealth of personal information to ensure that data is no longer tracked. As I thought about it more, I realized that all that data is already compromised as it sits in online databases which are often easily hacked and of course readily available for sale. So again, yes, it's somewhat creepy to be volunteering all that information, you know, providing it to the, you know, like, like indirectly to the trackers who have been doing all of this. Whose business is it, you know, it is to do this.
Steve Gibson [01:07:43]:
But we can presume that only a tiny fraction of Californians are actually going to even know about this or take the time. It would be nice if it were, you know, a big ground swell, but I doubt that's going to happen. And, and as we said, Leo, you know, even using our sponsor delete me, you got to tell them all this in order for them to tell the bad guys what they have to delete.
Leo Laporte [01:08:07]:
Right.
Steve Gibson [01:08:07]:
So.
Leo Laporte [01:08:08]:
Exactly. Yeah, way. So you saw how many data brokers. Because I'm only seeing 89.
Steve Gibson [01:08:14]:
Oh, I got 170.
Leo Laporte [01:08:15]:
Well, you are a lucky man.
Steve Gibson [01:08:17]:
I don't know why.
Leo Laporte [01:08:20]:
Maybe, yeah.
Steve Gibson [01:08:21]:
Sure enough.
Leo Laporte [01:08:22]:
Isn't that weird?
Steve Gibson [01:08:23]:
H, Yeah. I wonder. Let me go, let me go click on mine.
Leo Laporte [01:08:27]:
Maybe they're going to add more over time. We know there are more than 500 in the real world. So I, you know, I, I just feel like, I don't know, I feel like it's not going to happen for till August.
Steve Gibson [01:08:46]:
Yeah.
Leo Laporte [01:08:46]:
Not that gives the data brokers lots of time to lobby.
Steve Gibson [01:08:49]:
On August 1st, the 45 day beginner starts. Yes.
Leo Laporte [01:08:55]:
Which gives the data brokers a lot of time to lobby our state legislators to change their mind.
Steve Gibson [01:09:01]:
I clicked on, I accepted it made me scroll down, down to the bottom of the terms of service. Even though, even though I already said, oh, now I got to log in and okay, I'm not, I'm not going to do that.
Leo Laporte [01:09:12]:
I think carefully engineered to discourage the maximum number of users. To be honest, I, I, I feel like, see this there's, this is the first state to ever do this and we certainly have no federal law doing this and I feel like that the reason is law enforcement doesn't want it. They love this information. Marketers have big checkbooks to write to.
Steve Gibson [01:09:34]:
And it's what runs the Internet. Unfortunately, it's what finances the Internet. Yes.
Leo Laporte [01:09:40]:
You know, the FCC just said, hey, by the way, Verizon, you don't have to unlock phones. You can leave them locked. This. We live in a world now where the people with the pocketbooks dictate the laws, not the consumers. So I just, I feel like go through this is probably worth it. We'll see. I'll watch with interest, but I don't have high hopes. Why do you have 159 data brokers and I only get 89? Yeah.
Steve Gibson [01:10:07]:
How's that all I got 170. Yeah. In fact, you, you can see in the show notes, that is a picture of my status screen on 110 20.
Leo Laporte [01:10:16]:
I got robbed. Do you think it did it? It was 189 right out of the box, huh? No, it's 170 or 170 right out of the box.
Steve Gibson [01:10:27]:
It was what you see there at the top of page 10 of the show notes.
Leo Laporte [01:10:30]:
Yeah.
Steve Gibson [01:10:30]:
And, and we compare it to yours and sure enough, maybe Southern California has got an extra crawling around. I don't know.
Leo Laporte [01:10:39]:
The whole thing feels a little, I don't know, suspect. We'll see. We'll get back to you in August.
Steve Gibson [01:10:47]:
Yes, September, actually, because August, the one, the fourth 45 day timer starts. So it won't be until a little past the, the middle of September that we're going to actually get some. They have 40. Well, it could be sooner. They, they have a maximum of 45 days. So this all lands on them.
Leo Laporte [01:11:06]:
You think they're gonna rush to do this? It's gonna happen on day 44, 23 hours, 59 minutes and 59 seconds. And right up to that very second, they're gonna sell it like crazy.
Steve Gibson [01:11:19]:
And it does feel like, you know, it's like there are those of us who have set our browsers to say, do not track. And, and my, my global privacy. My GPC or whatever it is, My global privacy control. You know, it, it, it's saying no. Every so often I come to a site that, that says, oh, we're gonna honor your global privacy control wishes. And I'm thinking, oh, yeah, well, that's good. Thank you.
Leo Laporte [01:11:44]:
You're the one.
Steve Gibson [01:11:47]:
Okay, break time and then we're going to find out. Leo, where is what a bod?
Leo Laporte [01:11:56]:
Not whataburger. No, because I know where that is. It's just down the street.
Steve Gibson [01:12:00]:
Two words. It's in Idaho. It's two words. W H A T A and then. And then. What about word is bod. B O D. What a bod.
Leo Laporte [01:12:09]:
What a bod.
Steve Gibson [01:12:09]:
What about what a bode.
Leo Laporte [01:12:12]:
That's what Lisa says whenever Reacher's on. But that's another story entirely. Our show.
Steve Gibson [01:12:18]:
And boy, he does like to take his shirt off.
Leo Laporte [01:12:21]:
He's got. Yes. Every episode. Yeah, you know, This one, I. I really think I needed to take this training. This episode of Security now is brought to you by Hawks Hunt. If you're running a company, you get paid to protect your company as a security leader, right? Against cyber attacks. It's not easy, is it? It's getting harder with more cyber attacks than ever.
Leo Laporte [01:12:51]:
And the phishing emails are better than ever generated with AI. They look exactly like those T mobile texts. Legacy one size fits all awareness programs, which by the way, I was forced to take at iheartradio and obviously this, that didn't sink in. They don't stand a chance. They Send at most 4 generic trainings per year. Most employees ignore them. And then, you know, and they did this that I heard all the time. They send out those fake phishing things and when somebody actually clicks on them, oh, then you're forced into an embarrassing training program that really feels more like punishment.
Leo Laporte [01:13:29]:
Like, you dummy. That's not the way to teach your team not to click on phishing links. That's why more and more organizations are trying Hawkshunt. H O X H U N T Hawks Hunt goes beyond security awareness and and changes behaviors. And they do it the way you know your favorite iPhone game does by rewarding good clicks and coaching away the bad. They gamify it. They make it fun. Whenever an employee suspects an email might be a scam, Hawkshunt will tell them instantly with a gold star and yay, you found it.
Leo Laporte [01:14:08]:
It's not a punishment, it's a reward. Dude, they get a dopamine rush. This gets your people to click it also, and we know this from research, gets them to learn. You can only learn when you're positively reinforced, not not negatively reinforced. It also ultimately protects your company. And you're going to love it if you're administering this. Because Hocksen makes it easy to automatically deliver phishing simulations across email, across slack, across teams. It uses AI to mimic the latest real world attacks.
Leo Laporte [01:14:39]:
Simulations are personalized to each employee based on department location and more. All while instant micro training solidify understanding and drive lasting, safe behaviors. You as the Administrator can trigger gamified security awareness training and that awards employees with stars and badges. It boosts the completion rate, it ensures compliance.
Steve Gibson [01:14:59]:
And you know what?
Leo Laporte [01:15:00]:
It's fun. Your employees will love it. You could choose from a huge library of customizable training packages or use the AI to generate your own that are just as brilliantly persuasive as the ones the bad guys are doing. Hawkson has everything you need to run effective security training. It's all in one platform, meaning it's easy to measurably reduce your human cyber risk at scale. And you gotta do that. Don't take my word for it. Over 3,000 user reviews on G2 make Hoxhunt the top rated security training platform for the enterprise.
Leo Laporte [01:15:34]:
Easiest to use, best results. It's also recognized as customers choice by Gartner and thousands of companies like Qualcomm, AES and Nokia use it to train millions of employees all over the globe. You need this. I need this. Visit Hawkshunt.com SecurityNow today to learn why modern secure companies are making the switch to Hawkshunt. That's hawkshunt.com security now. We thank him so much for supporting the good work Steve's doing here at Security. Now I'm just gonna, you can spank me, just, I'll give you a paddle.
Leo Laporte [01:16:11]:
Just, just whack me.
Steve Gibson [01:16:13]:
It's, you know, the. We are the weakest link in the chain and when all the lower hanging fruit has been plucked, when all of the, you know, obvious ways of, of compromising networks and systems have been, you know, technology has, has squeezed we, that's.
Leo Laporte [01:16:32]:
The truth of it. Right? That's how it works, you know, and that's why your num. Your biggest issue right now is, and we're going to talk about this at Zero Trust World, is your users the human factor. The human factor, yeah.
Steve Gibson [01:16:47]:
Okay, so I wanted to share a wonderful bit of AI hallucination news from this past weekend. The US National Weather Service has withdrawn a wind forecast from its social media platforms after its new AI powered system generated a map of Idaho which included two fictitious town names.
Leo Laporte [01:17:12]:
Oh my God.
Steve Gibson [01:17:14]:
Orange O tilled and what a bod.
Leo Laporte [01:17:21]:
Oh my God.
Steve Gibson [01:17:22]:
The wind weather forecast map, which was initially shared on social media by the weather office in Missoula, Montana on Saturday, depicted those two non existent towns occupying Idaho's Camas Prairie region. The forecast posting helpfully encouraged residents to quote, hold on to your hats indicating that orange o tilled at least a 10% chance of high winds while what a bad to the south would experience calmer conditions.
Leo Laporte [01:17:58]:
Well, hold on to your bod.
Steve Gibson [01:18:00]:
Hold on to your bod. That's right. Beyond. Beyond the gratuitous synthesis of those two prominently featured towns. The National Weather Service's map also contained multiple spelling errors and geographical inaccuracies. The Weather Service was quick to blame these mistakes on the use of generative AI technology. That's right, blame the AI.
Leo Laporte [01:18:23]:
And nobody looked at it.
Steve Gibson [01:18:27]:
No, no, no, Leo, because we, you know, they've all been really. They've all been let go.
Leo Laporte [01:18:33]:
Well, that's the thing. That's what happens when you fire everybody.
Steve Gibson [01:18:36]:
Yeah. I have an interesting adventure to share. Several months ago I began noticing that my beloved email, my EM client email client that I've talked about that I discovered and talked about on on the show had stopped notifying me of incoming email in a timely fashion. Someone would say, you know, that they just sent something, but you know, after waiting a reasonable length of time, nothing arrived. I discovered that by completely closing and then restarting EM client, then it would again for a while be reliably notifying me of newly arriving mail. I haven't mentioned this until now because I hadn't been able to affirmatively verify that EM client was the problem, though it certainly seemed to be. And I mean, I was upset. This has been going on for months.
Steve Gibson [01:19:33]:
But then a few weeks ago, something, I don't remember now what it was, but something caused me to look at the logs of GRC's H mail server. What I discovered was that the server had been crashing and restarting, leaving a trail of of mini dump crash log dumps behind. And before the server would crash, it would log the source of its pain. It appeared to be something about IMAP and the retrieval of large file attachments and they were the IPs of my two locations. So that made sense too. So I spent a few hours having a heart to heart with chat GPT to see what it might have absorbed and and chasing down the various leads that it was generating. For me, there really didn't appear to be any reason to suspect that EM client was behind the trouble. And the H mail server discussion boards, you know, they were not of any help.
Steve Gibson [01:20:39]:
They were filled with the typical threads of people commenting without actually knowing what they were talking about. So, okay, look elsewhere for a solution. What I did realize was that if EM client or for that matter any email IMAP agent that, you know, m that by nature of the way IMAP works, maintains an open TCP IMAP connection where it was expecting to be proactively notified of newly arriving email, which is one of the things that IMAP is able to do. You're able to put a connection into an idle status when the other end of that connection would crash and restart. As the server was, that TCP connection would be left hanging. So EM client would never receive the news of no new email, nor would it know that the connection had gone down if it wasn't like, you know, proactively pinging for like some life at the other end. So my Environment contains both EM client and a collection of iOS devices, iPhones and iPads. And as I was correlating the times of the server crashes with with my own actions, it appeared to be more connected to iOS than to my use of EM client, which I have on desktops.
Steve Gibson [01:22:13]:
Some googling revealed that to my surprise, iOS has historically had a surprising degree of trouble getting the IMAP protocol correct. And this has been a source of great annoyance to to those tending IMAP servers before me. The moment I deleted the troublesome account from all my iOS devices, all server crashing stopped. This was about a week ago, and the server has never crashed since. And I even checked LEO just during our last break. My EM client on the desktop has resumed its previous perfect behavior of immediately notifying me of any new incoming email. So the reason for my having dragged everyone through this sordid tale is that my strong, in fact overriding proclivity is to live off the land, right wherever possible. You know, since every One of my iOS devices came with a built in iOS email client, the last thing I would ever consider doing would be installing a second redundant email client.
Steve Gibson [01:23:32]:
But yes, indeed, things had come to that. I remembered that the EM Client folks offered their mobile clients at no charge, so I thought, okay, let's give it a try. I downloaded EM Client from the Apple App Store download. Naturally, although I specified exactly the client name I wanted, EM Client was not first in line. No, it was preceded by sponsored apps that were paying to have my search results contaminated for their benefit. Like many others, I'm beginning to feel that the shine is fading from the Apple, which is truly sad. Hmm. Nevertheless, I was able to find, download and run EM Client.
Steve Gibson [01:24:21]:
The first thing it asked upon running was whether I would like to import my existing world from a desktop instance. I thought, what? Yes please. So it told me to open any already configured desktop instance of EM client in its menu under Tools I would discover QR Export. Sure enough, my Windows desktop EM client displayed a massive QR code which my mobile instance saw, and it was Immediately set up with all my accounts, logins, passwords, tweaks, preferences, everything. So it's now been about seven days since I made that switch across all five of my iOS devices. You know, I'm still, I'm still not accustomed to how much better the mobile version of EM Client is compared to Apple's built in, but uninspired mail client. EM Client even runs on my oldest iPad, which I now have to keep plugged in. It's so old that chat GPT's client refuses to install, scolding me that I need to Update to an iOS version from sometime this century.
Steve Gibson [01:25:46]:
But, but you know, I'm, I'm running the latest one that will run on that hardware, so I don't, I just use, I use Chat GPT from the browser when, when I'm on that little iPad. And I am also. Not only am I waiting for new Apple TV hardware, I'm dying for and hoping for an oled, you know, new iPad, hard.
Leo Laporte [01:26:06]:
Yeah, me too. Although that's going to be end of this year. You're going to be waiting a while or maybe.
Steve Gibson [01:26:10]:
Okay, in that case, I'm going to, I'm going to have to make the, I'm going to have to, you know, I can't wait.
Leo Laporte [01:26:15]:
The bullet. You know, when I bought that, I, because I didn't want to wait either. And I'm very happy with it. The new Lenovo. Well, this isn't the new one, actually. This is January's Lenovo X1 carbon with an OLED screen. And it's. Yes, it's super light.
Leo Laporte [01:26:30]:
It's really great. I just, I'm madly in love with it.
Steve Gibson [01:26:34]:
I, I get it now. I did something different. I bought a Lenovo little, you know, the, the small form factor block because.
Leo Laporte [01:26:44]:
Yeah, yeah. Oh, we talked about this. That's right. You bought the desktop.
Steve Gibson [01:26:47]:
Yeah, yeah, I bought the desktop because it can drive three screens.
Leo Laporte [01:26:50]:
Right.
Steve Gibson [01:26:51]:
But, and then I, I remember hearing you talk about your laptop, looking at it, thinking, you know, that's gorgeous and everything. I was almost gonna pull the trigger when I sweat. Wait a minute. No, I don't ever go anywhere.
Leo Laporte [01:27:07]:
You don't need a laptop.
Steve Gibson [01:27:09]:
I, Well, I want to be able to be downstairs, you know, and be socializing with, with Lori. Not hiding up in my cave for like in the.
Leo Laporte [01:27:18]:
That's why I have a laptop. I don't go anywhere either, but I move around the house.
Steve Gibson [01:27:22]:
I spent $400. I bought the cheapest terminal. Yes, it is. It's the largest screen, dumbest Windows Laptop available. Terminal it is. Well, because remote desktop. I, I remote desktop to GRC servers. I can remote desktop upstairs.
Leo Laporte [01:27:44]:
Exactly.
Steve Gibson [01:27:45]:
To my machine.
Leo Laporte [01:27:46]:
Yeah.
Steve Gibson [01:27:46]:
So I get all the speed and performance. I don't have to worry about synchronizing everything and, and all that. I just, I have a, A, a mouse screen and keyboard that I can have out on the patio, you know, in the family room, wherever I am talking to the computer that I left running upstairs. So I think that was, for me, it was the right solution because again, I don't, I, I, you know, if I travel, I, I just take a pad with me and I'm fine because I'm not actually doing any work.
Leo Laporte [01:28:13]:
Right. Yeah, actually. And then I did buy this. And at CES they announced the next generation, 14th generation, which has some major improvements, but the OLED is very nice. That's the thing I really wanted was the OLED. And I think you're right to wait for the MacBook, but it's going to be a wait, so maybe as long as a year Wait.
Steve Gibson [01:28:35]:
Not MacBook. IPad.
Leo Laporte [01:28:38]:
Oh, you wanted an iPad. Oh, they have an OLED iPad. Yeah, the iPad Pro is fantastic. I have the OLED iPad Pro.
Steve Gibson [01:28:44]:
No, I'm sorry, I want a Mini. I like the Mini. It's the right form factor for me.
Leo Laporte [01:28:47]:
I mean, well, you can have any OLED screen you want with a mini. The Mini is great. I love the mini.
Steve Gibson [01:28:53]:
The none. No mini is oled.
Leo Laporte [01:28:55]:
Oh, you're talking about imac. Imac has a screen. The mini has no screen. It's just a nuc.
Steve Gibson [01:29:02]:
I'm sorry, I'm talking about the iPad mini. I'm.
Leo Laporte [01:29:05]:
Oh, the iPad mini. But who's on first? That's what I want to know. Oh, the iPad mini. No, they don't have an OLED that's going to come out, but that'll come out sooner than that.
Steve Gibson [01:29:16]:
Yeah, I was thinking.
Leo Laporte [01:29:17]:
Yeah, that'll probably be out this spring.
Steve Gibson [01:29:19]:
Yeah, I, Okay.
Leo Laporte [01:29:20]:
Yeah, they try to get those out for the school year, so certainly by June. Yeah.
Steve Gibson [01:29:25]:
Okay. So I just wanted to say that EM client for the. The is. Is a, is free. GRC server never crashed. Not that everybody else is going to have that problem, but I was. And I just wanted to give everyone a heads up that whether or not you are running EM client on your desktop, the 100% free EM client for iOS or Android is truly lovely. And if you are one of our many listeners who switched to the desktop EM client after my discovery of it, or if you're one of our other listeners who wrote to me rhetorically asking what took me so long to find the EM client for the desktop.
Steve Gibson [01:30:07]:
Both groups will get the additional joy of instantaneous account setup by cloning via a QR code from your from your desktop to your mobile device. Anyway, I you know, before I close the topic, I do want to acknowledge that I know someone's going to write to me. There's no excuse for anything some report remote email client might do to cause the email server that I'm running to crash. I'm 100% in alignment with that sentiment. But I love Hmail server. It is everything I want in a Windows hosted open source email server. In addition to many great features that many that I use, it publishes a comm interface that that's allowed me to automate parts of its operation to integrate it into GRC's email system. Because it's open source, you know, I was able to engineer its operation to get it to do exactly what I needed, but since I'm not in the position to spend, lordly knows how long it would take to fix its actual problem.
Steve Gibson [01:31:20]:
I am treating the symptoms, yes, and in this case that worked to my advantage since it allowed me to stumble upon EM client, which, you know, doesn't induce those crashes because it's not iOS, which does. And then it turned out to be a much more pleasant user experience than Apple's own native mail app, which I would otherwise have never discovered. I would I'd be using Apple until the end. So now I'm glad I am not. I have two pieces that I want to share next and then, Leo, I want, as I mentioned you, to share a little bit of your recent Claude code revelations.
Leo Laporte [01:32:00]:
Certainly.
Steve Gibson [01:32:01]:
One of the AI newsletters that I keep an eye on is called the Batch. It's published by DeepLearning AI and last Friday an issue of the Batch arrived that caught my eye because I was pretty certain it would appeal to many of the non coders who follow this podcast. The issue of the newsletter opened with Dear friends, we just launched a course that shows people who have never coded before in less than 30 minutes how to describe an idea for an app.
Leo Laporte [01:32:39]:
Wow.
Steve Gibson [01:32:39]:
And build it using AI. They wrote. It's now time for everyone. Marketers, product professionals, operations specialists, analysts, students to build software applications with AI. And I know, Leo, that this is singing from from from from your hymn book. They they said I've often spoken about why everyone should learn to code. I'm seeing a rapidly growing productivity gap between people who know how to code and and those who don't. For many job roles I hire for, I now require at least basic coding knowledge.
Steve Gibson [01:33:20]:
Many times after I speak with a non technical audience about the importance of building software using AI, people ask me how to get started. In the past I didn't have a great answer that motivated the Deep Learning AI team to build to to create quote build with Andrew. It's the best way for someone who wants to try Vibe coding to get started. This course requires no prior knowledge of AI or coding and it's vendor agnostic. Specifically, learners can use these techniques with whatever tool they're most comfortable with, like Chat, GPT, Gemini, Claude, or the chatbot built into the Deep Learning AI platform. Okay, so the Andrew cited here is Andrew in the founder of Deep Learning AI. Yes, Leo, the website that's hosting this free course. For those who don't know, Andrew also co founded Google Brain and Coursera.
Steve Gibson [01:34:28]:
Yeah, and led AI at Baidu. He's an adjunct professor at Stanford University, former associate professor and director of Stanford's AI Lab Sail. So Andrew is certainly not some random YouTube influencer trying to get likes. To help everyone find this free 30 minute course, I've created a GRC shortcut using Andrew's first name. So GRC SC Andrew. So just to be clear, I cannot vouch for this myself since I did not take the time to explore it, but Andrew is obviously the real deal and it would certainly seem worthwhile for anyone who might have been wondering how to take the first step toward AI driven coding. So GRC SC Andrew and that bounces you over to Build with Andrew under courses eeeplearning AI and the second piece I wanted to share is from a listener, Al Liebel, who said hi Steve, I've listened to the podcast for years and have thoroughly enjoyed it. I currently work in cloud security and find your content informative.
Steve Gibson [01:35:41]:
Keep up the great work. I'm writing to you because of an open source project I've been working on. I should tell you I'm a terrible programmer. I'm 54, wear progressive glasses, hunt and peck, and likely have mild add. And he has a little grin there in his note. Having said that, I've been around computers since my dad built a Heath Kit H89 in our basement and I learned to use it. And as an adult I've worked for software and security companies in various roles. So I know what looks like.
Steve Gibson [01:36:15]:
I know what looks like. And with my current role in cloud security, I understand what gets attacked and how. I've grown tired of the lack of security, privacy and trust online and decided to start Vet id. I've spent a bunch of time creating the design and then tried to figure out how to find people to help me get it built. That failed spectacularly. So I dusted myself off and decided to go with plan B AI a few months ago in my free time, he says I work full time. I went through some online classes for using AI for coding. They were helpful in teaching me the basics and I started using Chat GPT.
Steve Gibson [01:37:04]:
It worked kinda I I could prompt for what I wanted and Chat GPT would spit out the code and I would have to paste it into VS code and and do the things build, commit, push, deploy etc in this situation I was still the clumsy bottleneck. So I did a quick search and found Claude code and it has been life changing exclamation point he says. I pointed it at my repo and the rest is history. I trained Claude code on my design and and refined it. I had Claude code develop a plan to implement it leveraging multiple Claude code instances. One for iOS development, one for Android development, the main instance as the back end, front end lead and a Raspberry PI as a tester. The plans were broken into issues assigned to each repo and the different instances could communicate via issues for troubleshooting. Working part time over the last few months I'm close to having the first version done.
Steve Gibson [01:38:16]:
All the best al. So what occurred to me was when I read that and also that this really cool, you know Build it by Andrew is that Leo. You had just been saying something similar in in the pre show on Sunday so I thought I would, you know, give our listeners a chance to get caught up with what you have found apparently.
Leo Laporte [01:38:44]:
Well get ready because you're good. It's not just going to be me you're going to be hearing from or Andrew or anybody else. This is I think going to be a drumbeat. I really feel like that we have turned a corner in AI in general but a lot what people mostly experience is Chat GPT, you know a chat interface and that kind of thing or maybe image generation. The people who are really in my mind Most impressed with AI at this point are coders who are using AIs to doing code and I think the we've universally coalesced. There've been a lot of choices for a while. Chat GPT's Codex was the best one out there. You know there there are coding models from China as well, QN and others.
Leo Laporte [01:39:31]:
In fact Deep Sea got a new coding model coming out sometime soon that people say this thing is amazing. But I think most of us have kind of, at least for the time being, centered on Claude code. Anthropics, Claude. They did a big update November 24th with Opus 4.5 and they've been adding a lot of features since. But they've also been really focused on code and making Claude code be better and better. And the thing that's really accelerated the development is lately they've been using Claude code to improve Claude code. And I've seen a number of people who work at Anthropic say, yeah, most of the stuff we've released has been written by Claude itself, not by us. And that's a big change.
Leo Laporte [01:40:13]:
So I, you know, I, I've been using Claude code with the $20. I have $20 subscriptions. You're the cheap ones for everybody. Perplexity Open AI everybody, including Grok, because I get it for free, because Elon's given me an unconsensual blue check. So I've, I've tried them all. But I was, when I got this, this new ThinkPad, I started, I set up Linux and I started configuring it using Claude code. And instead of me looking up, oh, what's the syntax for this? Because the. I'm using Sway, which is a very text based, you could probably use Nix or other things, very text based configuration as opposed to a GUI configuration.
Leo Laporte [01:40:51]:
And CLAUDE was great, it knew everything. So, yeah, let me, I said, can I put an icon up there? Can I make that wider? Can I? And it was doing all that. I thought, this is pretty good. I've used it so much, I would start getting to the point where I would say, okay, well, you've used all your credits. You have to wait for a couple hours now. And it's usually just a. Kind of like you have to wait till 2. It's usually just a couple hours.
Leo Laporte [01:41:12]:
But I thought, all right, I'm going to bite the bullet. There's a $200 plan and there's a $250 plan. The $250 plan is 20 times the number of tokens. The context window is huge. It's 200,000k. The bigger the context window that the more it can hold in its head. 200,000 tokens is about 150,000 pages of stuff that it can hold in its head while it's doing stuff. The bigger the context window.
Leo Laporte [01:41:41]:
I don't want to say more effective because it can maybe be less effective, but it's, but the more it can know about. At the same time, it's kind of like our own brains, right? In fact, that's one of the problems I had with coding always, even when I was younger, my brain was more adept is the complexity got rapidly got out of my context window, got too big. So, and this is how coders handle it, you know, this is you divide it into smaller pieces that you can readily solve and then they become black boxes. And so you reduce the complexity and you add to it.
Steve Gibson [01:42:13]:
Modularity.
Leo Laporte [01:42:13]:
Yeah, modularity builds a complex system. Anyway, I, I spent some money and then I thought well, now that I've spent the money on Claude code, maybe I should do something with it. So one, I was trying to think what do I need? And I'm on just to do something simple. I, I wrote an RSS reader, a text based RSS reader. And this is by the way the discussion I had during the show. I said I can't run this. And then it said oh, that's because of Gatekeeper. So I've removed the quarantine attribute from your RSS reader binary.
Leo Laporte [01:42:49]:
Now you can run it without macOS blocking it.
Steve Gibson [01:42:52]:
Wow, thank you.
Leo Laporte [01:42:54]:
Claude code. It also, I found some little other issues. For instance, I didn't realize this, but on Linux the configuration file, which is a TOML file file, is kept in a different directory on the, on the Mac. So I said what's going on? So it did this is, it's debugging. It went through a whole debugging process. It wrote a debugger, it said what, what's the error message you're getting? I pasted it in and said oh doy. I've fixed the config location issue. I've added your API keys to the correct config location on the Mac it's in the application support folder.
Leo Laporte [01:43:28]:
I should have known that eventually this is the point. I would have probably figured that out, but I didn't have to.
Steve Gibson [01:43:35]:
And that has been exactly my experience. Leo. It is really an accelerant.
Leo Laporte [01:43:39]:
Yes.
Steve Gibson [01:43:40]:
I mean it, it allows an expert to just run much more quickly by, by, you know, I don't have to.
Leo Laporte [01:43:47]:
Go through manuals, I don't have to.
Steve Gibson [01:43:49]:
And, and do Google searching and dig through a bunch of nonsense links of people guessing what the problem is. It's like, no, okay, let's try.
Leo Laporte [01:43:57]:
So this is the GitHub and I, it's public on GitHub if you want to look at it. My GitHub handle is Leo Laporte and it's the RSS reader, but the Point is, this is not for the general public. I didn't write a general program. I wrote a program that's specifically for what I wanted. It's terminal based, it's very fast. It does AI article summaries, it bookmarks it to Raindrop IO. It does a lot of things. That's just what I wanted.
Leo Laporte [01:44:24]:
Now it built it in Rust. It said, you want Python or Rust? I said, oh, well, if you can do it in Rust, go ahead. This is all the Rust code. There's quite a bit of code. It built this in a morning with very little interaction. I interacted with it a little bit, but not a whole lot of interaction. I did some, you know, there was some back and forth. There's some things I didn't like.
Leo Laporte [01:44:50]:
It didn't work. So I said, can you do this? As it built it, it used GitHub Actions to create binaries that work on Linux and Mac, intel and Apple Silicon. I didn't even ask it to do that. But it did. It has. It added a help. It's got a help feature, it's got a bunch of single key strokes. It automatically made.
Leo Laporte [01:45:11]:
I said, hey, is there a way that I could automatically update these RSS feeds every hour? I said, sure, let me just set that up for you. So let me show you the, the app because it's, it's, it's. First of all, I like it out of it. In fact, let me make my. Well, I'll do the screen bigger in a second. So this is it. It's RSS reader. It's loaded in a series of RSS oops.
Leo Laporte [01:45:36]:
Didn't want to print RSS things that I had. Make it bigger so you can, you can see it. Which is not the best UI because as you can see now the headlines go off the side of the page. But so I am on this is stories. If I, if I say no, I never want to have actually that one. I won't delete. I don't need this in my, you know, any of our shows. So I'm going to delete it.
Leo Laporte [01:45:58]:
Delete this. Going to delete this. Governor clears path for Robo taxis in New York. So let me hit Enter and it's going to generate. It goes out to Claude and generates an AI summary. If I want to, I can just hit oh and it will open it in the browser so I can, I can read it in the browser. It added that all by itself. I didn't even ask it for that.
Leo Laporte [01:46:20]:
The navigation is single key VIM style navigation. I can Refresh the feed. Once I look at a fee, a summary. Oops, I forgot to hit enter. Once I. Oh, and you see it. I said, hey, I don't know what's going on. When you're generating.
Leo Laporte [01:46:34]:
Could you put a little. So I said, let me put a little hourglass there. Then you'll know this is the AI generated. Now this is the thing that was specific to me. I save all the articles I want to use to raindrop. So capital S saves it to raindrop. It says, what's the tag? I'm going to say, that's for twit. And I am.
Leo Laporte [01:46:52]:
And hit return. And now it's bookmarked on raindrop. See it even put a little raindrop at the bottom. So these are the. So this makes me a very. What I wanted was a very quick way to scan through hundreds of stories. I do this every single day, look at the headline and then say, yeah, tell me more about that. Yeah, bookmark that.
Leo Laporte [01:47:11]:
No, delete that. It wrote it, it's done. And, and it's easy for me to. To fix it so that I, you know, if I add. Want a new feature, I can easily do that. In fact, I'll show you. We'll go. Go back to a Claude code and I could say, can you add a key for, I don't know, emailing the story? By the way, it's pretty good on misspellings.
Leo Laporte [01:47:39]:
And so this is what Claude code looks like. Let me get rid of the lower third here so you can see it. Because it's kind of. It uses a lot of fun verbs. It says fermenting. You can go into. And then it will ask you questions. You can go into plan mode or coding mode.
Leo Laporte [01:47:57]:
So how would you like to send it? Do you want to open the email app? Default email app you want to send by smtp. Do you want to use an email? I think I'm just going to have it open the app. So I'm going to hit one and it will do that. I'm not here. Okay, and then what content should be included? Oops, I'm sorry, too many buttons. I need Claude to help me switch the show. Don't worry, Benito. Your job is safe.
Leo Laporte [01:48:27]:
Trust me. What do I want? I want article, title, ua, AI summary, full article, content. I think I just want. I did it again, sorry. And just want one here. So we'll just hit one. Oh, I guess I can check. Oh, it's check boxes.
Leo Laporte [01:48:49]:
Oh, that's. Yeah, let's do it all. Okay. Wow. Submit. Thank you. How Would you like to send emails? What content? Okay, now submit those answers. So it did a little back and.
Steve Gibson [01:49:02]:
Forth thing and it's crafting right now.
Leo Laporte [01:49:05]:
It's doing it in Rust by the way which I don't know and I've wanted to write Rust now it could probably do assembly language, it could certainly do common Lisp, it knows a variety of languages. It's probably best at Python I would imagine. Python seems to be the native language of a lot of AI but I thought well let's try it with Rust because it'll be memory safe, type, type safe anyway, we don't have to go on. But you see it's coding right now. It's doing the actual work of implementing email functionality which I didn't have built in. So now I, now I will.
Steve Gibson [01:49:44]:
So something turned a corner and yes, as a consequence that, I mean this suddenly got Claude code got very real and we have build with Andrew from you know, GRC SC Andrew, which is a 30 minute YouTube video basically from an, from an AI founder who is explaining how to talk to AI, how to explain what, what you, what you're, what you want from an application that you want it want the AI to write for you. So anyway, I would also suggest interesting gap bridging.
Leo Laporte [01:50:22]:
You can, you can do quite a bit with the free plan. The 20 buck plan will be enough for almost everybody. Play with it is the best way because one of the things that I've noticed is this stuff is moving so fast that stuff gets out of date right away. I'm sure Andrews is not out of date. It's brand new so you know, stick with stuff that's brand new. And, and, but, but I think experimenting is often the best thing. There's something else Darren was telling me about that I was not aware of. Google also has something called Opal which is designed to use Gemini to do mini AI apps for people who are not tech technical.
Leo Laporte [01:51:01]:
It's a no code version of doing this and this is free. So there's other ways to get into this even if you're not a coder. I think it's probably the case that even as good as Claude is, it's good if you know a little bit about technology. Oh by the way it's done. The email will include the summary if you generated other. Just the title. Okay, try it out. So, so that's how fast it did it.
Leo Laporte [01:51:34]:
And now if I run RSS reader it'll have a new capability. See at the bottom it says E for email. And I'll Just let's, let's generate a summary for this. The summary is a little slow. I could probably use a different model. That would be a little bit faster. I'm using the most, the heaviest model right now, Opus. But let's email that.
Leo Laporte [01:51:56]:
Let's see if email works. Should it? Yeah, yeah. There you go. And I'll just mail this to you, Steve. How about that? How about that? And that's not his address. That's an old address. Wow. So how about that? Pretty cool, huh? Very cool.
Leo Laporte [01:52:12]:
I just, I just added a massive feature that I could never have added in five minutes.
Steve Gibson [01:52:17]:
Yep. And oh, look at that. I just got your email.
Leo Laporte [01:52:21]:
Isn't that wild?
Steve Gibson [01:52:22]:
Because em client is now working.
Leo Laporte [01:52:24]:
Yes. Now I think there's still going to be lots of room for hand coded stuff like you do or even stuff like em client. But I think what's changing is a lot of the little stuff, you know that great Jonathan Colton song code monkey, going to write a login. A lot of the stuff that's just kind of wrote. You don't need a code monkey for anymore. You just have Claude do it. And then you get the higher level thinking, the overall planning, the architecting and maybe if you want some fine tuning or refinement, you do that. So there's still a human in the loop.
Leo Laporte [01:53:02]:
But I think increasingly bullet boilerplate code will be written by AI. It's just too easy. And by the way, it writes pretty good code. I mean everything I've looked at the code is pretty good. Yeah. Very cool. Thanks for asking. I've been wanting to tell somebody about this.
Steve Gibson [01:53:17]:
Well, and now you've let our listeners know that. Well, well. And I love it because it works perfectly with this build by Andrew to get started and then this sense that something like is really getting better. It's doing a much better job.
Leo Laporte [01:53:33]:
It's massively better. And that's the other thing is so many people are now into this. There is a lot of resources. There's a wonderful GitHub page called awesome Claude that has hundreds of resources for using Claude because Claude uses skills, it uses a lot of extra tools. There's a tool called Ralph Wiggum that's a hysterical. I know that's a Simpsons character. It's a hysterical tool that you turn on and you say what the parameter is like. Don't come back until there's no more errors.
Leo Laporte [01:54:08]:
And then you also, if you want optionally can say, but only try 20 times. You can limit the iterations but it will keep iterating until it reaches the goal that you set it. So it can, it will, it can. You know, instead of you interacting with it, it'll just. You just set it off and it goes. And a lot of people are doing that Now. They're running 20 different versions of Claude code all at the same time and.
Steve Gibson [01:54:34]:
Okay, time for a break.
Leo Laporte [01:54:36]:
Yeah, sorry, Burke. Burke says, good point, Leo. You could tell you've been wanting to talk about this. I apologize. You can edit this out if you want. You're watching Security now with Steve Gibson. We're so glad you're here. And a special thanks to our club members that make this possible.
Leo Laporte [01:54:53]:
If you're not a club member, we'd love to have you Twit TV Club Twit ad free versions of all the shows, Access to the discord where Burke yells at me. You can also get special programming, including our great AI user group. We talk about a lot of stuff like this. Twit TV Club Twit. Let's continue on with Security now, Steve.
Steve Gibson [01:55:16]:
So we have listener feedback, although I already shared some little bits that have dribbled in over the last week already. But TJ Asher wrote. Steve, I'm all too familiar with the current state of the move to pure revenue generation by certificate authorities around code signing. We were first hit by this we with the change to HSM storage, meaning got a store in hardware right. Two and a half years ago. He said our corporate policies prohibit allowing multiple users to access a computer under a common id. Which makes sense then because one of our development environments installs some aspects per user under the HKEY current user tree of the registry. Our current licensing of certain add ons would require an additional license for every possible user on that computer.
Steve Gibson [01:56:12]:
So we're unable to implement an HSM solution to hold our code signing cert. As a result, we have no option but to store the key in the cloud. Msazure has an option to allow this, but I was informed by our IT group that this costs a minimum of $30,000 to set up. Yes, that's the number we were told. Okay, now I'll just interrupt TJ's note to mention that that Rick Straws detailed. You know how to set up Ms. Azure code signing blog posting which we shared at the top of the show might be something that, that. That TJ would like to show his IT group.
Steve Gibson [01:56:57]:
They may have some other situation that imposes a $30,000 cost, but it's difficult to imagine what that might be. Maybe there's a way around that. In any event, TJ's note continues writing the other option is for our certificate authority to host it, but then we need to pay for each and every signature that happens. We have dozens and dozens of files that need to be signed frequently because we release updates every month. This quickly adds up and you have to prepay for the signatures in blocks of a thousand. That fee just went up and is now 26.4 cents per signature. So $264 per 1,000 and no refunds bought. Too many.
Steve Gibson [01:57:51]:
Too bad. So sad. We go through enough signatures that we now buy in blocks of 5,000. Okay, so let me just pause here to remind everyone just how absolutely and utterly insane this has all become. TJ's enterprise that needs to be performing lots of code signing is stuck paying for the privilege of of signing its own code on a per file basis. It should all be a non issue. They should be able to sign their code just as readily as they compile the code to be signed. But no.
Steve Gibson [01:58:34]:
By making it increasingly difficult to sign code for no good reason other than because they can, and by shortening certificate lifetimes. Again, because the cabal of certificate authorities vote their own self interests, the industry's certificate authorities are able to force everyone into a cloud based service model where our use of our own signing key will be monitored and we will be charged essentially a fee per signing. TJ finishes the Certificate Authority group has the entire software industry over a barrel and there is not we can do about it.
Leo Laporte [01:59:20]:
Whoa.
Steve Gibson [01:59:21]:
Help you if you have a problem like we're experiencing now. Need good support? Buy a business account. It's no wonder this change to yearly expiration is happening because they're going to lose out to free TLS certificates from let's encrypt. They need to recoup that revenue somewhere. I can't imagine being a small or solo developer. Regards, TJ Asher and then Jay Thompson wrote, Are you interested in starting a service to issue certs? I put grccerts.com and grccodeserts.com on hold just in case. Sign J so first of all Jay, I very much appreciate your consideration. There are many considerations, but addressing the name of such a service first if and it's not going to happen.
Steve Gibson [02:00:21]:
But if I were to start a certificate authority, I wouldn't tie it to GRC in any way. It would need to have some sort of long lived new neutral name, you know like DigiCert or Identrust or VeriSign. You know those are good names for a certificate issuing authority. And I said first of all because, you know there's more. You know the saying everyone has their own version of hell. In my case, having anything whatsoever to do with running or in any way managing a certificate authority would definitely be right up there near the top of the most hellacious ways I can imagine me spending the remainder of my life. So thank you, but no thank you. I know that I bitch and moan and carry on about the annoying cabal that has been allowed to form, but at the same time I deeply appreciate that there are people who are able to do what is completely beyond me.
Steve Gibson [02:01:23]:
In the early days of grc, I ran a larger organization because I thought I was supposed to. And while my employees may have been happy, I was mostly miserable. You know, thanks to one rough Monday morning of firings during which I reduced the company size in half, followed by a great deal of welcome attrition. I wound up with sue to deal with operational stuff and Greg to run interference for me with tech support, which leaves me mostly completely free to sit in a quiet corner by myself with elevator music, a PC, mouse, screens and keyboard. That's my bliss. But Jay's note brings up the interesting question of the contemporary creation of a new certificate authority. It's not a simple thing, and it would require a concerted effort. But that said, I would imagine that the apparent greediness that is overtaking parts of the certificate authority business might be creating an opening for a well financed newcomer.
Steve Gibson [02:02:31]:
The first problem any newcomer would encounter would be the establishment of their own root certificates into the heart of every single system where their signed certificates would need to be trusted. You know, this might seem like a classic chicken and egg problem since you cannot sell any certificate whose signature will not be trusted. Not not even one. And it'll be difficult to convince the various root store programs to accept any new and unproven and currently unnet new necessary root certificate without good cause. Let's Encrypt solve this chicken and egg problem by borrowing the trust relationship which IDEN Trust had already long established at let's Encrypt Launch, which was 11 which was now 11 years ago in 2015, its own root certificate was was not present in a single trust store. So in order to bootstrap trust, let's Encrypt certificates were cross signed by identrust's well trusted root certificate. The way this worked was slick. Let's Encrypt first created its own new intermediate certificate.
Steve Gibson [02:03:56]:
This intermediate certificate is what was used to sign or all of let's Encrypt TLS web Certificates which it was issuing. But the signatures made by this intermediate certificate needed to be trusted by all of the world's web clients. To make that happen, let's Encrypts new intermediate certificate was co signed. Technically it's the term is cross signed by let's Encrypts new newly minted and not yet trusted root certificate and also by Iden Trust's own already well trusted root certificate. So two different root certificates trusted. You know, they signed and therefore demonstrated their trust of the intermediate certificate which let's Encrypt was then able to use to sign the end certificates, the TLS web certificates. The use of ident root certificate to anchor the certificate chain meant that the signatures let's Encrypts intermediate certificate was placing on TLS certificates would be trusted from day one by all web clients. Since those TLS web certificates chained up through let's Encrypt intermediate certificate to a root certificate everyone already trusted.
Steve Gibson [02:05:24]:
For three years from 2015 to 2018, let's Encrypt certificate trust chain relied solely upon Identrust's root cross signing. And then finally, after three years in 2018, which I suppose finally after let's Encrypt had demonstrated the success of their concept, their own operational integrity and the feasibility of their new Acme automation technology. And I imagine the existing CAs were not happy. But their own root certificate, which was named ISRG Root X1, was added to all of the major trust root stores. And then finally in 2021, three years after let's Encrypt root had been added to everyone's root stores, the root certificate that IDENTRUST had originally used to cross sign let's Encrypt intermediate certificate itself expired, ending the cross sign phase and leaving all modern systems trusting let's Encrypt's own root and the intermediate certificate it had signed. So the lesson taught by this bit of history is that creating a new trusted certificate issuing authority is neither quick nor easy, nor should it be. It would require an entity to first demonstrate both their strict commitment to rule following and their ability to rigorously follow the rules that they set. They need to demonstrate that imbuing their their signatures with widespread global trust would not in any way endanger the current status quo.
Steve Gibson [02:07:20]:
If someone really wished to do so, they could arrange to bootstrap themselves into business the same way let's Encrypt did. And I doubt that the members of the CA browser forum could prevent that from happening, much as they might not wish to have a powerful new lower price, easy to use certificate authority undercutting their well established cash printing business and taking the opposite view for a moment. We should all definitely require any upstart newcomer to prove themselves worthy of our trust. There's big money to be made in the certificate issuing business. The bigger the big guys get, the more deadweight overhead they accrue and need to carry, and the costlier their certificates become, the more tantalizing will be the opportunity for newcomers to attempt to get in for a piece of that action. Anyone should have the ability to become a certificate authority in good standing. But as we've often noted, along with the right to print money comes the burden of being very careful whose certificates are signed and thus trusted. So interesting question Jay.
Steve Gibson [02:08:35]:
Being a CA is not for me. I like the way my life is right now, but I really, I can see, you know, let's encrypt manage to start and they were, you know, that was 11 years ago. So I could see an entity deciding that they want in and and see an opportunity. Because I think the the flip side of all the grumbling and grousing we're doing is demonstrating that there's some opportunity here for somebody who is, you know, serious about it in the long term. But it's not something that you do easily or quickly. Scott wrote Steve, I've listened to you for years for your comments and sage advice about security matters and general comments about it. Do I want he said do want to say I appreciate your thoughts on oh on vitamins and after the last podcast have increased my intake of magnesium, please continue to include the occasional thoughts about how vitamins might prolong our lives. Definitely not a bad diversion from the usual themes.
Steve Gibson [02:09:36]:
Thanks Scott. And I just wanted to mention I put that in here as a placeholder to say that as I had said earlier, I I received similar sentiments from our listeners and a couple young listeners. One in particular said, hey, supplementary nutrition is not just for older folks. So I appreciate that and I will share what I find from time to time. To that end, I wanted to update a little bit of the news from last week. Steve Penfold said hi Steve, thank you for the info on magnesium last week. I found your previous leads on vitamin 3 and now K2 as well, plus the ketogenic way of eating. But I wasn't aware of any of the magnesium stuff.
Steve Gibson [02:10:20]:
He said. Your book recommendation caused me to take a look at it on Amazon's site here in the uk. It seems that there have been two updates to and he has in Quotes the Magnesium Miracle book by Carolyn Dean that you said you read in 2009. A quick summary of these updates. He said, first of all, in 2009, the version you read must have been the original 2003 version. I think that's probably likely. He said there was an updated version released in 2017 with the same title. And he said, additionally, there is a now even newer book from 2023, billed as, quote, an upto date summary that includes the advances in clinical magnesium research and therapy from the past five years.
Steve Gibson [02:11:09]:
He said, this is the version that I bought in Kindle format for only 3.92 pounds. He says equates to just over $5. Note that he. He said, note that the word miracle has been dropped from the title. He remembers me grumbling, you know, it's like, it's not a miracle. Stop saying that. Yeah. This book is just titled Magnesium, the Missing Link to Total Health.
Leo Laporte [02:11:35]:
So anyway, I'm taking my gram of magnesium now. I gotta say. Good, it's working. It's working.
Steve Gibson [02:11:43]:
Good, good, good, good.
Leo Laporte [02:11:45]:
My sleep's been better too, which is nice.
Steve Gibson [02:11:47]:
Yeah, it does that. And be aware that after some length of time.
Leo Laporte [02:11:52]:
No, it's already. That's already happened. Yeah.
Steve Gibson [02:11:54]:
Okay.
Leo Laporte [02:11:55]:
That's what I was looking for for that, actually, because. Yep, it's helpful.
Steve Gibson [02:11:59]:
Yes, it is. Exactly. It is.
Leo Laporte [02:12:01]:
Yeah.
Steve Gibson [02:12:01]:
Laurie and I both love it.
Leo Laporte [02:12:02]:
I'll back off a little bit if I need to, but so far, so good.
Steve Gibson [02:12:06]:
Nice. So, anyway, that was Steve Penfold, Spin Right Owner and club Twit member Joey Albert said, thank you, Steve. You started me on the Lazarus Project series yesterday and it is outstanding. He said, Rotten tomatoes meter is 100% fresh. Just bummed it's leaving Netflix this month, the 27th. I have to binge now. Sign. Joey and Mr.
Steve Gibson [02:12:31]:
Ron said, thanks for the tip about the Lazarus Project. I had never heard of it. I just finished attentively binging it, which really is the only way to follow the plot. It's the most outstanding time travel story I've ever seen. So I just wanted to mention that Joey and Mr. Ron's opinion was widely echoed among those who wrote one Lister reminded me of Apple TVs for all mankind, saying that he thought it was fabulous. For those who don't know, it's an interesting speculative fiction that extrapolates an alternative history where Russia wins the early stages of the space race by beating the US to the moon. I didn't watch the entire series, so I'm unable to offer my own opinion.
Steve Gibson [02:13:19]:
Lori and I watched I think like maybe the first four or five episodes until we had until we had caught up, but it seemed to kind of just be lumbering along and not really much. So I don't really recall it being amazing, but maybe I didn't give it a chance. It does rate an 8.1 on IMDb, which is a good score, but I've also seen like, you know, anime things rate highly, so it's a matter of who's rating them, right? And that's not me, so Philip said hi Steve, Many thanks for the valuable lowdown on reduction in the lifetime of code signing certs. Does this mean that eventually all software will need to be updated every two years? What does that mean for software for which I've bought a perpetual license or freeware? What if it's no longer maintained? And I guess that you and I, probably the last two users are probably the last two users of Paint Shop Pro?
Leo Laporte [02:14:25]:
No, Paul Thurat loves it too.
Steve Gibson [02:14:26]:
Okay, good. He says it might have to find something else at last. Best regards, Philip okay, so Philip's quandary about this was echoed by a number of our listeners, many of whom wrote wondering how shorter certificate code signing certificates would affect the long term verifiable legitimacy of the code those certificates were used to sign. And right on cue, Bleeping Computer posted a story last Wednesday with The headline Logitech Options+G Hub Mac OS Apps Break after Certificate Expires yeah, Whoops. So Bleeping Computer. They fix that, by the way, yes. Bleeping Computer began their coverage by writing Logitech's Options plus and G Hub apps on Mac OS stopped working after their code signing certificate expired, leaving users unable to launch them on Apple systems. Options plus is Logitech's Input device configuration app, while G Hub is a similar app focused on customizing compatible Logitech G gaming peripherals.
Steve Gibson [02:15:42]:
Both allow setting app profiles, button remapping, lighting options, scroll wheel, and sensor sensitivity. Multiple users reported that Logitech apps on macOS did not load, making custom gestures, mapping scroll settings unavailable, and for forcing them oh the horror. To use basic input functions. Impacted users expressed their frustration with the sudden loss of productivity enhancing customizations, while many wasted time reinstalling the Logitech apps, trying out Safe mode, or wiping their configuration files. Eventually, Logitech published a statement on its support portal admitting that that the issue was caused by a certificate that had expired. Okay, at the same time, I signed GRC's Never 10 Windows executable program on Sunday, April 21, 2019 and the code signing certificate I used to do that then expired on April 4, 2022. Yet a check on the validity of Never 10's code signing certificate today reels reveals that it remains valid. So what's going on? This brings us to this week's topic.
Steve Gibson [02:17:10]:
An examination of code signing certificate expiration and the answer to the question how could Microsoft be issuing three day code signing certs?
Leo Laporte [02:17:26]:
I do not know and I'm going.
Steve Gibson [02:17:27]:
To have a cup of coffee or.
Leo Laporte [02:17:29]:
I just want to say one thing. I'm very proud. While you were talking, I just submitted two pull requests and did a rebuild on GitHub. Version 0.2.2 of the RSS reader is now out including email functionality. And I sped up the AI summaries by switching models plus better error messages. So thank you very much, you have.
Steve Gibson [02:17:51]:
Had a productive day coding. Leo, I feel like while co hosting.
Leo Laporte [02:17:57]:
A Security now podcast, it's pretty amazing. It even uses GitHub Actions to build the software to put the binaries up there so people can download it. I think open source software is going to really see a revolution. And what's even more interesting to me is that this means you people can write their own custom personal stuff. This was always kind of the goal. Right.
Steve Gibson [02:18:20]:
And Apple was. What was the card deck thing that Apple had?
Leo Laporte [02:18:25]:
That was the idea. People were trying to do this for decades.
Steve Gibson [02:18:30]:
Yes.
Leo Laporte [02:18:30]:
In fact, I remember John C. Dvorak telling me what was the. What's his name? Morris? The guy who. Morrow. George Morrow, who did little. Remember the Morrow computers that were a little bit like the, the Osbornes. They were suitcase computers. George Morrow told Dvorak, he said, you know, everybody should be writing their own software.
Leo Laporte [02:18:50]:
Nobody should be using off the shelf software. Which was hysterical at the time because, you know, not everybody's listening to.
Steve Gibson [02:18:56]:
It was impossible.
Leo Laporte [02:18:57]:
It was impossible. But I mean, look, you're not going to write your own word processor, a video editor, but you might write a lot of little tools. I have been that make your life better.
Steve Gibson [02:19:07]:
Everybody's needs are different.
Leo Laporte [02:19:09]:
I mean, and they could specifically be your needs. Yeah.
Steve Gibson [02:19:12]:
And the brilliance of Bricklin's spreadsheet was that it was a programming language. It was, you know, VisiCalc allowed you to, to put numbers in and do with them what you wanted. And you know, so it was a type of programming language and you know, and there are some databases that have been like that through, through the years where they were really. They really helped you get the job done.
Leo Laporte [02:19:42]:
Yeah, well, and the other thing that has always been the Holy grail is natural language interfaces to computers. You know, and this was, you know, hello, computer, use the keyboard.
Steve Gibson [02:19:52]:
Keyboard.
Leo Laporte [02:19:53]:
How queen. We've, we've, we've known that this is really the natural way to interact with a computer. Let it do the computer stuff, you do the human stuff. But we haven't had that capability.
Steve Gibson [02:20:03]:
Well, and imagine Leo, when we can put the AI loose on co on existing repositories and have that find the bugs.
Leo Laporte [02:20:13]:
Yeah, you mentioned this a couple of weeks ago. There's already tools to do that. I think that's going to be a revolution as well. And as we were saying, I mean, yeah, there's security issues that come up, but you can pretty much be sure that Claude is not going to use STR copy instead of STRN copy. When it's writing. You're not going to see buffer overflows as much because it's, it's smart, it's, it knows that's a bad idea. Humans forget.
Steve Gibson [02:20:40]:
Yeah, and as I said last week, I even had chat GPT when I asked it what was the port number for the Mongo DB right. Gave it to me and said, and by the way, you should not expose that to the public Internet.
Leo Laporte [02:20:54]:
Isn't that great? I think we're in a brave new world. It's certainly an interesting world. There's no question about that. You're watching security now. This is Steve Gibson. We're so glad you're here. Thanks for watching and let's go on with the show. Steve.
Steve Gibson [02:21:08]:
Okay, so the title for today's podcast was inspired by the sentence that Rick Strahl casually dropped into his blog posting. In passing, he noted, quote, the certificates issued by Microsoft are very short lived with expirations that last only three days to aggressively thwart invalid signing attacks in case a certificate is compromised. Okay, now this raises the obvious question, how can it possibly be that Microsoft would be using code signing certificates that only last for, for three days before they expire? The answer to that question brings us to a fundamental difference between the traditional web server authentication TLS certificates, which we're all by now intimately familiar with, and code signing certificates, which we've spent considerably less time exploring in the past. So exactly what are the differences between these two in the case of a web server's TLS certificate? Our goal, the purpose, is to validate and authenticate the identity of a remote web server during a real time transaction. Right now we need to be assured that the remote server we have just this moment in connected to using its DNS provided IP address is in fact the server we expect DNS could have been compromised to lead us astray, or our Internet packet traffic could have been intercepted and diverted to a malicious web server. So to do this, we need to verify that the certificate we've just received over the connection we've just established matches the domain we intend to connect to, and that the certificate is valid, not expired, in good standing, not revoked, and was signed by a certificate authority whose signatures we trust. If all of those things are true, we would have very we would have every reason to believe that we're connecting to a web server serving the domain we intend. So now look, it's code signing.
Steve Gibson [02:23:35]:
What about code signing? The assurances we seek from signed code are obviously very different from the application of TLS web certificates. We want to ascertain two things from the signature of of any signed code. We want to determine the verifiable identity of the entity that signed the code, and we want to verify that not a single bit of the code that was signed has been altered since its signing. And that's it. That's the entire purpose of signed code. Who signed it, and nothing has changed since. We understand the general reason why certificates have expiration dates. While I complain a lot about certificate lifetimes being so short that their renewal becomes burdensome, at the same time, it would be somewhat unnerving to be issued a trust and certificate that never expired.
Steve Gibson [02:24:46]:
Yikes. If that certificate were to ever get loose at any time, ever, bad guys could abuse its trust, potentially forever. GRC has a code signing certificate stored as they must all be now, in a safe net 5110 USBE token. And it's actually sort of comforting to know that it comes with a drop dead date, after which it will become useless to anyone. If it didn't have that, I would need to wipe its contents and then probably still smash it into tiny bits to make absolutely sure that it could never be reused once I was finally finished with ever needing it again. You know, I mean, it has to be completely destroyed. But what about the code that it was used to sign? Let's take the never 10 for Windows executable I mentioned before. If you're curious, you can go to GRC and download that executable right now.
Steve Gibson [02:25:55]:
Never 10exe to see for yourself. I signed that executable on Sunday, April 2nd or April 21st, 2019, using a code signing certificate that still had very nearly three years of life left on it, since it would expire on April 4, 2022. Signed on April 21, 2019 certificate with a certificate that's expiring on April 4, 2022, that did expire. Had to on April 4, 2022. At the time I signed that code, the certificate was in good standing. It was issued by my company, Gibson Research Corporation. I'm sorry. Issued to my company, Gibson Research Corporation, by DigiCert.
Steve Gibson [02:26:47]:
The signing process meant that. The signing process meant that an unsprufable cryptographic hash was taken of the code, the Never Ten code, whereupon the private key I was in possession of, because at this time and still today I own my own code signing private key, it would be used to sign the hash. And GRC certificate that was issued by DigiCert containing the matching public key was affixed to the end of the code. From that moment on, anyone who obtained that never 10 code could check its certificate to see that the certificate was validly issued by DigiCert, a certificate authority that has carefully earned everyone's trust. The signature of the code's original hash could be verified using the public key contained in GRC's certificate. And that validly signed hash could be compared with a fresh hash of the code taken right then to verify that not a single bit of the original code had been changed after it was signed. Remember the two assertions that are made through code signing? The identity of the certificate that performed the signing, in this case Gibson Research Corporation, and that since the time of the signing, not a single bit has changed. Okay, now jump forward to 2026.
Steve Gibson [02:28:30]:
There's still a never10 executable program that can be downloaded from GRC, and not a single bit of that code has been changed since the day it was signed in. In April of 2019. Yes. The certificate that was used to perform the signing expired three years after the signing, which is almost four years ago, in April of 2022. But do we care? The signature accompanying the code, the signature accompanying the code remains valid. The certificate that's attached still contains a public key that can be used to verify that not a single bit has changed since the moment it was originally signed. And Gibson Research Corporation's name is carried in the attached certificate, all of which was signed by DigiCert. Here's what's common between TLS and code signing certificates.
Steve Gibson [02:29:38]:
In both cases, the only requirement is that the certificate is valid at the time of its use. So in the case of tls, that means it must be valid and remain valid every time a web browser initiates a new connection and that certificate is offered up as proof of the remote server's identity connecting to the server is the time of the certificate's use. But in the case of code signing, the only requirement is that the certificate used to sign the code be valid at the time the code is signed. Since the only thing code signing is asserting is the identity of the signer and that nothing has changed since, requiring that the certificate be valid at the instant of the signing is sufficient. And now we can see why and how. Microsoft's Azure code signing uses certificates having a very short life of three days. Technically it could be as short as an hour. But creating certificates is not without overhead.
Steve Gibson [02:30:57]:
So I imagine they probably cash any certificates they've created for a couple of days in case the same signer returns with more signatures that they need signed or more code they need signatures signed for. But there's an exploit we haven't addressed. What's to keep a bad guy who manages to get their mitts on someone else's expired code signing certificate from using that certificate to sign their malicious code? The signing certificate may have expired, but what's the enforcement mechanism for its expiration? We might suggest that the PC used to perform the signing would examine the certificate and see that it had expired. Okay, the bad guys know that their stolen certificate has expired, so they simply turn back the clock on the signing PC that they're using to a point where the certificate is valid. Now, the PC believes that the certificate is valid and in good standing. It has no way of knowing what day it is. The obvious answer to this dilemma is for anyone who might be relying upon that certificate to examine for themselves the signing certificates expiration date and time, just as they would for a real time TLS certificate and refuse to trust anything signed by any certificate that that has expired. Okay, but then we have a new problem.
Steve Gibson [02:32:41]:
As we've seen, what we really intend for code signing is for any code that's signed by a certificate that is valid at the time of the signing to forever hence be judged as validly signed. So how do we accomplish that? Introducing the the tsa. A different kind of tsa. This is the time stamp authority. A timestamp authority is a trusted third party. It's typically a certificate authority and is often but not necessarily the same CA who provided the signing certificate in the first place. It is a service that CAs offer during the code signing process. Once the code has been signed, the signature the the the after it's been signed, that signed signature is itself hashed and forwarded to a timestamp authority.
Steve Gibson [02:33:46]:
The hash is forwarded and it's bundled with a UTC format timestamp, and that package is signed with the timestamp authority's private key. They then returned this signature along with their own TSA certificate containing their public key. The result is a counter signature containing a verifiable timestamp. The result of all these machinations is that the final signed code actually contains two certificates. The code signer's own certificate indicating their identity and the validity time window of their certificate, and a signing timestamp that can be verified using the timestamp authority certificate, which is also attached. So now we have exactly what we want. The signing certificates validity window, from the not valid before to the not valid after times is enforced by an unspoofable timestamp provided in real time on the fly at the moment of signing by a third party timestamping service whose certificate, whose own certificate their public certificate is also attached to allow their time stamp to be verified. It's because GRC has always signed its code with the aid of a time stamping service that the validity of our apps never expires, even long after the certificate that was used to sign them is long gone.
Steve Gibson [02:35:40]:
So what happened with Logitech? The truth is we don't know because we can't tell from what they've said. They said that a certificate expired, but we don't definitively know what certificate expired. Adding a timestamp to executable code and to libraries and whatever you need code signed is now so routine that I'm a little skeptical that, that they could have actually somehow failed to do that. I mean, it's built in timestamping. Everything ought to be just, I mean, like completely in the core of whatever signed their executable code. I suspect it's more likely that they have some sort Logitech being who they are, some sort of their own installer or patcher or updater or who knows what where they were using their own certificates internally in some fancy system of their own design, and they tripped over their own tail. To me, that seems more likely. It's important to appreciate that it's only commercial certificate authorities who, who arbitrarily enforce short expiration policies.
Steve Gibson [02:37:05]:
When you're creating your own certificates for your own internal purposes, you can set whatever expiration date you like. So someone may have. Someone at Logitech may have created a 25 year certificate back in 2001, figuring that the system they're using it for, for, you know, would be replaced long before that certificate could expire. But we all know how that goes, right? So After a few years, everyone completely forgot about it and never thought about it again until whoopsie, 25 years had flown past and that long lived certificate surprised everyone by reaching its end of life date and expiring. To me, that seems the most plausible explanation, but again, until more is known from Logitech, there's no way to tell. In any event, now everyone knows exactly what goes on with code signing certificates and how the static assertions they're designed to make differ from the real time assertions made by TLS web certificates. And it should be clear how Micro Microsoft's Azure cloud code signing service is able to sign with three day lifetime certificates. Those signatures are immediately timestamped, while that short lived code signing certificate is valid.
Steve Gibson [02:38:35]:
After that the certificate's expiration doesn't matter. It can expire and no one cares. Security now.