Transcripts

Security Now 1079 transcript

Please be advised that this transcript is AI-generated and may not be word-for-word. Time codes refer to the approximate times in the ad-free version of the show.

 

Leo Laporte [00:00:00]:
It's time for Security now. Steve Gibson is here. A little change in Microsoft land over that edge password thing. We will talk about a new way of making chips work without electricity by pulling in quantum power from the air. Is that possible? And OpenAI and Microsoft's response to the anthropic Mythos security tool. All that and a whole lot more coming up next on Security Now. Podcasts you love from people you trust. This is Twit.

Leo Laporte [00:00:44]:
This is Security now with Steve Gibson. Episode 1079 recorded Tuesday, May 19, 2026. Daybreak and codename Em Dash. It's time for Security now. Yay. The show we cover the latest security, privacy, computer, sci fi, everything on this man's mind. Mr. Steve Gibson is here.

Leo Laporte [00:01:07]:
Hello, Steve.

Steve Gibson [00:01:08]:
You know Leah, we were just using the expression has a mind of its own and I realized we really can't say that any longer without meaning it because things do or very will very soon will actually have a.

Leo Laporte [00:01:23]:
Have a mind of their own.

Steve Gibson [00:01:24]:
Yeah, yeah. I mean like your car.

Leo Laporte [00:01:26]:
Yeah, yeah, exactly. That's a really interesting. You know, this is one of the big debates that's going on. Is, is, is, is AI conscious. And in fact it's one of the first questions I asked you when we started talking about AI on this show is where you stood on that. And you correct me if I'm wrong, but I think your position is the same as mine, which is there isn't anything special going on inside our brain that couldn't be duplicated by a physical process outside of our brain that may not be yet.

Steve Gibson [00:01:54]:
But yes, what I've. What I was just, I was talking to somebody who's not a techie yesterday and I said that who was interested in the topic and the way I framed it. I think I know it worked for him. I said AI is language and language is knowledge but not understanding. And when he kind of looked at me, I said think about a book. A book is language printed on paper. So. So obviously a book contains knowledge.

Steve Gibson [00:02:28]:
No, you know, a book, it has knowledge which no understanding. Right, but exactly no understanding.

Leo Laporte [00:02:35]:
Right.

Steve Gibson [00:02:35]:
And I said in, in my. Because I'm, you know, I've been in computing my entire life, so when I'm interacting with, in this case Claude, I'm. I'm still like stunned by. In fact, in fact I have it. I have a little bri. A little one pager editorial about my feelings in after the last week of the danger that we are in. Not the kind of. Well, may.

Steve Gibson [00:03:06]:
Maybe some people are worrying about it, but how seductive and addictive it is. It is inherently that. And if we thought social media was a problem, baby, you ain't seen nothing. So, but, but anyway, so I said, you know, in watching AI, I can see when I see its mistakes. I realize that it reveals, it doesn't understand what it's producing. It's producing astonishing content, but it doesn't understand it. And so when that changes, and I agree with you, Leo, I don't see any reason why it can't. I don't know when or how or what.

Steve Gibson [00:03:51]:
But you know, and this, the whole LLM era may just be, you know, the beginning of this. Lord knows, you know, anybody, Cancer researchers, fusion researchers, quantum computing researchers, all they all say just give us money and we can make it. We can make it happen. Yeah, well, we've never seen anybody give anything money more than AI. I mean this is just ridiculous. So if there's an answer and if money can, can find. I mean if there's an answer and if money can find it, then we're gonna have an answer. I mean we're gonna see this thing continue to go.

Leo Laporte [00:04:38]:
Yeah.

Steve Gibson [00:04:39]:
Because. And, and I have to agree, you know, if you remember, I think you were referring to it, that last scene toward the end of the Wall E movie. I haven't seen it for a long time, but it was a bunch of, you know, over like obese adults floating on a starliner. Like they were so fast that their bones were like being pulled apart or something. I don't quite remember what the visual was, but you know, and the Matrix. Right. Everybody in a pod who doesn't know that they're not just battles. Yeah.

Steve Gibson [00:05:12]:
And so imagine if. Well anyway, we may be headed there

Leo Laporte [00:05:17]:
is what you're implying.

Steve Gibson [00:05:19]:
We're some something is this is a problem for us. Anyway, so not surprisingly, today's topic is Daybreak and codename EM Dash.

Leo Laporte [00:05:32]:
Oh boy.

Steve Gibson [00:05:33]:
Oh, yep, there it is.

Leo Laporte [00:05:34]:
There they are floating down.

Steve Gibson [00:05:36]:
Oh goodness. Yeah, just.

Leo Laporte [00:05:39]:
It was a wonderful movie actually.

Steve Gibson [00:05:41]:
Yeah, it is good. So Daybreak and code name EM Dash, which are, you know, the, the responses to Mythos in various ways. Also we're going to talk about how. So we'll get to that at the end. But first Microsoft has decided to rethink Edge's so called intended behavior after it got some press.

Leo Laporte [00:06:11]:
We didn't intend that intended behavior not favorable after all.

Steve Gibson [00:06:14]:
Yes. The. Speaking of Microsoft, the chaotic Eclipse hacker has struck again with a bypass of bitlocker which some people have called a back door. I think that's taking it too far Also, Google's Threat Analysis Group documents they their discovery of the clear malicious use of AI, which we're beginning to see. Apparently Canada has not learned the lessons of the EU and the uk, so their parliament is going to go down that same rabbit hole of, you know, you know, legal disclosure and, and tapping and so forth. We'll talk about that. I want to take, as I said, a moment to talk about how AI chatbots may be far more addictive than social media and why I think that is probably going to happen. Also, a comment about our a favorite piece of sci fi of ours project, Hail Mary, now being available to stream.

Steve Gibson [00:07:27]:
Also, I put this out there just because it was fun and it is so wacky and interesting. An apparently serious zero point quantum vacuum energy source. And every so often I hit a nerve among our listeners. And boy, you know, thanks to the fact that these notes went out early on Sunday, there's been a lot of time for some feedback from our listeners. So we're going to have fun with that and actually share some feedback and then talk and take a look at OpenAI's and Microsoft's vulnerability discovery systems. Oh good.

Leo Laporte [00:08:06]:
Oh good. Yeah, I mean it was pretty clear we talked about this a couple of weeks ago that Mythos is very effective. There was just a story last week about discovering a flaw in Mac OS which is pretty darn locked down getting around Gatekeeper. So yeah, there's definitely some stuff. Oh, and by the way, Steve, there is a picture of our future here in the club Discord. I'll pull this up for you and you can, you can see it. I think this looks good. I think this is maybe our retirement plan or something like that.

Steve Gibson [00:08:40]:
I don't know.

Leo Laporte [00:08:41]:
I'm just saying. Oops. Let me squish you down. So there's room for us in our hover chairs. That's a podcaster's dream right there, let me tell you. But I need that smoothly get on that right away.

Steve Gibson [00:09:00]:
And I'm sure you've noticed there's been a complete revolution in this sort of thing. Like ads now look different.

Leo Laporte [00:09:08]:
Oh yeah.

Steve Gibson [00:09:10]:
You know, like late night comedy sketches are now using an entirely different imagery because it's now you so easy to have a huge staff of artists in order to create something that looks.

Leo Laporte [00:09:21]:
Darren, what did you use? Because this is this nano banana. Because this is really looks really good, I have to say. Oh, he says chatgpt. Interesting. They're all doing it now. Google's doing it now too. With, you know, they're doing agents. I mean, it's amazing.

Leo Laporte [00:09:35]:
Anyway, let's take our first break, just get this out of the way so we can get to the picture, the much long awaited picture of the week in just a little bit. I haven't seen it. I closed my eyes. But we'll see it together in just a little bit. Picture the week time, Steve.

Steve Gibson [00:09:50]:
So, in keeping with today's podcast theme, I gave this picture the caption. Worries over AI surpassing us may be overblown because AI has been trained on human output.

Leo Laporte [00:10:04]:
Oh, let's scroll up here. Oh, this is wrong. In so many levels. So many levels.

Steve Gibson [00:10:18]:
So, so this, I can't explain this, but then again, that's, you know, if, if AI is trained on us, then I don't think we have anything to worry about. We, we, we see the right side of a gate which is open at the moment. H. The sign very clearly states, please close the gate to keep the seagulls out. Now, you know, last I checked, seagulls could fly. If it said the chickens, you had to keep the chickens out then. Okay, you know, a flightless bird, that would make sense here. It's not clear how having a gate closed would affect seagulls one way or the other.

Steve Gibson [00:11:04]:
I mean, unless they're. I like to walk anyway. Yes. I don't know what's going on here, Leo, but if AI is, you know, at our level being trained on our output, then I think we're going to be fine for a while.

Leo Laporte [00:11:19]:
Not to mention the fact that the gate doesn't go all the way across the gap either, so.

Steve Gibson [00:11:23]:
Oh, no. What the hell.

Leo Laporte [00:11:24]:
The whole thing is just screwy. That's really funny. I love it.

Steve Gibson [00:11:29]:
All right, so last week we noted the discovery, the reporting, and the widespread confirmation among some of our own listeners that Microsoft's Edge browser, remember, was storing all of its users passwords in RAM and in plain text, decrypted just sitting there where they were easily discoverable and exfiltratable en masse. The Data included the URLs, so you knew where to go, the usernames and passwords, so you knew what to put in once you got there, which were required to log into every website whose data was present in Edge's password list and presumably where no other authentication factor would be required. Now, this brings me to something we've talked about before. I'll just, you know, take a little segue here to pause and note that this is a perfect example that is Edge doing this, having this heinous behavior. A perfect example of the reason why? If one is going to go to the trouble of having additional factors of authentication security, it's nuts to store that additional authentication information with the same single provider as the other as your other authentication information is stored. Our listeners have asked, you know, several times whether it's safe to store their one time password secrets in the same password manager as their usernames and passwords. You know, this comes down to the meaning of the word safe. You know, they want me to say yes, because it's so convenient to extend a password manager's capabilities to include responding to the query for a 6 digit 1 time password token.

Steve Gibson [00:13:24]:
I really do get it and I understand the temptation here. So I'll just say that I've never done that and I never would. The entire point here is separation and redundancy, which is completely lost when all of the eggs are stored in a single proverbial basket. You know, I use, as I've said, OTP auth nice little iPhone app, iOS app on my iPad, on my separate iPhone. The good news is that most sites have become much smarter about avoiding needless prompting for one time password tokens. Whereas a financial institution or the government might reasonably insist upon the provision of a one time password every single time you log in, or maybe if you haven't touched the site for even 30 minutes or so, many other less sensitive sites that have been configured to require a one time password will nevertheless relax their need when the browser being used already carries a previously valid login cookie which indicates that the browser was that browser was previously logged into that site. You know, this is the newer we recognize you on this computer messaging that we're seeing more and more often now. And that's good, right? Since we want bad guys, we want who will not have that browser cookie to be forced to come up with that additional authentication factor.

Steve Gibson [00:15:01]:
Whereas we don't want it to be overly burdensome for regular users who want that added safety without the overboard hassle. Anyway, my point is, here's an example. If one time password secrets were also exposed by Edge, as presumably they would be if Edge were to support that, then it would have been the keys to the kingdom. If, however, somebody had kept their one time passwords anywhere else, then they would have still had protection for all the sites that they cared enough about to establish a one time password. So, you know, and again, if you really don't want the security, go ahead, store them all in one place and you get the convenience of a password manager that does all that for you. But not me. Okay, so getting back to Microsoft and Edge last week we noted that Microsoft's disappointing but predictable response to questioning about their in the clear storage of the user's authentication data was that it was intended behavior. Yes, that's what we intended.

Steve Gibson [00:16:14]:
We intended it to be all out there in RAM so anybody could get it. The sans Remember the SANS Security Institute wrote Microsoft classifies this as intended behavior and the guy writing for Sans said, I'm not sure what manager or lawyer decided that. Hopefully it wasn't anyone in their security team. Amen. Since I I titled this first bit of news intended behavior only until it gets media attention, you can guess what comes next, right? Bleeping Computer provides the details in the background, writing last Friday, Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at startup after previously stating it was by design. This behavior was disclosed on May 4 by a security researcher, Tom Ronning, who demonstrated that all credentials stored in the Edge built in Password Manager were decrypted on launch and kept in memory even when not being used. Ronning also released a proof of concept tool that would allow attackers with admin privileges to dump passwords from other users. Edge processes those without admin privileges would only be able to dump them from their own.

Steve Gibson [00:17:38]:
He said. He reported the issue to Microsoft and was told the behavior was by design before he publicly disclosed it. And I'll note that this is an interesting wrinkle on the responsible disclosure principle, right? You tell someone responsible like Microsoft in confidence about some clearly bad behavior you've just discovered in one of their highly security critical flagship products and you're quite clearly told, yeah, that's right, that's what we want. So that's the way it is, okay? At that point no one's going to fault you for letting the rest of the world know what you have found and that you were basically told to buzz off. Bleeping Computer quotes the Discoverer saying, quote, Edge is the only Chromium based browser I've tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory, unquote. Bleeping Computer wrote, while it initially refused to address the issue, telling Bleeping Computer at the time that quote, this is an expected feature. That's right, it's not a bug, it's a feature.

Steve Gibson [00:19:02]:
This is an expected feature of the application, they said. Microsoft announced on Wednesday, so that's, you know, six days ago that future versions of Edge will no longer load saved passwords into memory on startup, even though they the reported scenario falls within the expected existing threat model, which excludes attacks where an adversary already has administrative control of a device, they wrote. Microsoft Edge security lead Gareth Evans said, quote, this defense in depth change, meaning what's what they're going to change Edge Edge to do? Certainly not what it had been doing, which they were previously defending. Now this defense in depth change will come to every supported version of Edge Stable Beta, Stable Beta Dev Canary and the extended Stable channel our enterprise customers run, he said. And we're prioritizing the rollout. All right, now that it's right now, now, now that everybody knows and is upset and is writing in about this, they're going to change it post haste. With our commitment to the Secure Future initiative and customer feedback, we are taking a broader view. Well, that means looking not only at whether something meets the bar for a security issue, but also at where we can reduce exposure through defense in depth improvements.

Leo Laporte [00:20:36]:
Yay.

Steve Gibson [00:20:37]:
In this case, reducing the exposure of passwords in memory in a practical step in that direction. It's almost as if, Leo, nobody thought about this before. They just say, like what? You know, and then when someone said what about that? I go, oh yeah, yeah, we should probably change that.

Leo Laporte [00:20:55]:
Oh, you want defense in depth?

Steve Gibson [00:20:56]:
Oh, depth is. Oh yes, we thought you meant death. No, not death. Depth. Anyway, they said Bleeping Computer wrote the fix is already live in the Canary, the Edge Canary channel and will be included in the next update for all supported Edge releases from build 148 and newer, they said. Last year, Microsoft introduced a new Edge security feature to protect users against malicious extensions side loaded into the web browser and restricted access to Edge's Internet Explorer mode after hackers began leveraging zero day exploits in the Chakra JavaScript engine to access targeted devices. Okay, so first, while writing this on Saturday, I immediately fired up Edge to check its, you know, help about and I watched it quickly updating itself to build 148. So that fix was indeed quickly pushed out.

Steve Gibson [00:22:01]:
Everybody has it now, or if you haven't run Edge for a while, you will immediately upon launching it the next time. But the point that Microsoft made about the threat model governing Edge's design was important. I think it's reasonable and it's worthy of a little bit of additional attention. Bleeping Computer remember wrote Microsoft announced on Wednesday that future versions of Edge will no longer load saved passwords into memory on startup. And even though a reported scenario falls within the expected existing threat model, which excludes attacks where an adversary already has administrative control of a device. In other words, they're saying, quote, you know, I'm making this up, we're going to change this behavior. Even though the scenario Tom Ronning discovered where all username and password authentication was being needlessly preloaded into RAM does fall within the expected existing threat model. Okay, now first, before I defend Microsoft's response, I'll take exception to their use of the term administrative control of a device.

Steve Gibson [00:23:16]:
As was noted, administrative control is explicitly not required. Administrative control allows malware to obtain the usernames and password, or I should say allows malware to also obtain the usernames and passwords of all of a system's users who may be logged in at the time in other sessions that has edge running. But malware running in a non admin account can still access all of its own users in ram. Edge authentication. So not, you know, not quite right there. But let's focus upon the intent behind Microsoft's defensive position. The concept and deliberate design of formal threat models is perhaps the most important advance in our understanding and practice of security. We saw a lot of that during last week's deep dive into Digicert's internal security architecture.

Steve Gibson [00:24:21]:
You know, just the fact that an architecture, the word architecture is something that security can now have, that represents a significant advance in this, in our state of the art understanding of how to provide protection. You know, a lot more theoretical thought and modeling has gone into modern security understanding the fact that we have, you know, a, the notion of, as I said, an architecture. So in this case Microsoft is essentially saying, we recognize that once an attacker has taken up residence in a system by whatever means, our ability to limit the damage that could be done is severely limited by the trade offs we have had to make in the name of practical usability. What comes to mind, you know, immediately is user account control. You know, I, I may refuse to store my one time password secrets in my password manager on it just as a matter of principle. But the first thing I do when setting up a new Windows machine before I totally lose my mind is completely disable user account control. Having that thing constantly darkening my doorway, I mean my screen and popping up to get my permission when I want to do perfectly safe things. The consequences of which I perfectly understand is not offering any value proposition that works for me.

Steve Gibson [00:26:10]:
I get it. But for the typical Windows user, yes, you need to have a nanny looking over your shoulder all the time, but no thanks, my sanity is important to me. So uac, I'll Take responsibility for turning that off because I want to get work done. And as a developer I'm doing a lot of things that your typical Windows user doesn't. But I am appreciative of the fact that Microsoft is in an impossible position that is trying to secure people who are going to fight against that. So that to that end I am sympathetic. Windows is being used by people who will follow commands provided to them by some random page on the Internet instructing them to blindly paste and run a command they could not possibly understand even if they could see it. So how is Microsoft supposed to protect such users from themselves when an increasingly hostile world wants to attack them? So on the one hand, Microsoft's position that there can be no true protection from bad guys who have already gotten into one's PC, you know, that's accurate and it's defensible.

Steve Gibson [00:27:32]:
In fact, in a minute or two we're going to examine what's been dubbed the bitlocker bypass. You know, it's a perfect case in point about the nature of local compromises and security boundaries. And a security boundary is another new theoretical concept that we didn't have, you know, originally, which is part of modern security architecture. But the other point Microsoft made, quoting the phrase defense in depth, refers to another of the crucial advances that have been made in our contemporary understanding of security. You know, when a castle was surrounded by a piranha filled moat, attackers could, you know, just bring a boat and float it across the moat. But when the outside of that moat is surrounded by a tall fence, then it would be difficult to get the boat to, to the moat, you know, so, you know, defense in depth is also exactly storing all authentication factors in, in a separate location because you know, storing them in the same place is sacrificing the opportunity to have additional depth. So in this case the bottom line is that the attention drawn to Edge's entirely needless exposure of its usernames and passwords and notice how quickly they fixed it. I mean, it's not like this took a couple months to get right.

Steve Gibson [00:29:02]:
I mean it's like oops. And that the next day they had an update ready and they pushed it out to everybody without any testing needed because it was simple to do, they just hadn't. So that exposure was needless. As we saw, none of the other chromium based browsers ever behaved so cavalierly with their users most important secrets. So every one of those took the time and trouble to protect them. Now Edge does too. So that's good. And Leo, you know, what else is good? I need to take a sip of coffee and we're a half hour in.

Steve Gibson [00:29:37]:
Fair enough, Fair enough. Let's take a break and then we're going to talk about the recently discovered bypass of BitLocker's encryption. Was it in a directly planted back door or what?

Leo Laporte [00:29:52]:
Yeah, because some people have said that, well, it's a backdoor. You know, it's because I have, I kind of Google said this too. If somebody's in your computer, whether the passwords are in the clear or encrypted, they're in your computer, you're in deep trouble. But yes, isn't that the antithesis of Zero Trust? I mean, Zero trust says if somebody's in your, in your network doesn't mean that they should have free reign. Now you can't, you know, you still want to put some, it's layered security. You still want to put some barriers up.

Steve Gibson [00:30:25]:
You know our, our topic at Zero Trust world, right? The, the, the calls coming from inside the house means even if you've got a bad guy in your home, right, you have segmentation so that you know, you, you have put up barriers inside that prevent them from going where they

Leo Laporte [00:30:42]:
shouldn't limit what they can do. And that seems, that seems pretty reasonable.

Steve Gibson [00:30:47]:
And, and the problem is the trade off for convenience. We're always hitting that wall. We're always saying, I mean as I, you know, we've talked about it, it's kind of cool to put in your magic six digit code. You're like bond, right? You know, it's like, oh, what's my code? In order to get authentic. I mean you, it feels, it feels, it feels more secure and in this case it is. But you shouldn't have to do it every time you look around.

Leo Laporte [00:31:13]:
Well, it's funny that you turn off uac. I was thinking about, that's how I use AI. I use what they call YOLO mode, which is, I say, yeah, do whatever you want. I don't have time to approve every darn bash command. Just go ahead, I trust you. What could possibly go wrong? Back to you, Steve.

Steve Gibson [00:31:34]:
Okay, so while we're on the topic of Microsoft and we'll get back to it at the end because M Dash is their vulnerability, their, their internal proprietary vulnerability finding AI system. But for now I want to make sure that everyone knew about the recent discovery with a published proof of concept of a local bypass attack on Microsoft's proprietary BitLocker Drive encryption. The source and the apparently deliberate timing of the disclosure of this latest significant Windows vulnerability. Is interesting because it was publicly released last week on the 13th, the day after this month's patch Tuesday, so Microsoft couldn't fix it for the previous day. And who released it? None other than the hacker Chaotic Eclipse with his Nightmare Eclipse GitHub account. Remember that? This is the individual we talked about recently who is extremely perturbed by Microsoft. Yeah, extremely perturbed by Microsoft's handling of him and his disclosures. Recall that he appears to accuse and blame Microsoft for deliberately and knowingly ruining his life.

Steve Gibson [00:32:59]:
I mean like words to that effect. I mean he's like what? And he's never really exactly clear what it was, but it's like he was counting on the reward which he says they deliberately denied him. And so his, you know, he wasn't able to meet other commitments that he had already like pre banked, who knows. But anyway, in retaliation for that perceived slight, he has previously disclosed the Blue Hammer at the Red sun local privilege escalation vulnerabilities as zero day flaws saying ta da, here you go with as with proof of concepts and they were immediately exploited in the wild shortly after he disclosed them. So now same guy, Chaotic Eclipse is back publishing two new exploits with proofs for two new unpatched vulnerabilities named Yellow Key and Green Plasma. They are respectively the BitLocker bypass. And the second one, Green Plasma, is a privilege escalation. He describes the BitLocker bypass issue as functioning like a backdoor because the vulnerable component is present only in the Windows Recovery Environment WinRE, which is used sort of as a utility host OS.

Steve Gibson [00:34:31]:
It's that reserved partition that Windows now establishes when you're installing Windows onto an empty hard drive that allows you to boot into some special place. It's often used to repair boot related problems with Windows. When the rest of the OS won't boot you, you're able to use this recovery environment. So this Chaotic Eclipse guy remains miffed at Microsoft and has published guidance on how to exploit this hole that he's find that he has found. And if that wasn't enough, he is promised what he described as a big surprise for the next patch Tuesday. So a couple weeks from now we may get something else. The security researcher Kevin Beaumont, who posts as Gossie the Dog, has independently confirmed the functioning of the Yellow Key bitlocker bypass. Kevin's first post over on Mastodon was quote, so I've just had a quick play with this and yes it works essentially BitLocker.

Steve Gibson [00:35:48]:
This is, this is Kevin Beaumont saying this essentially BitLocker has a back door mitigation, he says, equals BitLocker pin and bios password lock okay. Now of course bio password lock is a pain in the butt because you got to enter it every time you turn the computer on. But for high risk scenarios where local access with rebooting might be possible, that is where someone could get a hold of a computer and reboot it because that's what this requires in order to get into the bit. In order to get access to BitLocker, the BIOS password lock would be the strongest and the quickest cure until Microsoft arranges a fix for this Kevin followed his first Mastodon posting with a thread of posts which I've collapsed to read. He wrote I think my prior toot on Nightmare Eclipse auto deleted. So to make a perm one, he said, I suspect it's somebody who used to work at Microsoft who departed after my era. For anyone looking at this, testing showed two things. TPM unlocked the storage.

Steve Gibson [00:37:09]:
It provides a login bypass as you're dumped as system prior to Windows hello or password login. He says BitLocker operates without a pin by default, so it's basically a big gap. It's unclear how this code made it into production version of Windows. I should point out I've only tested with one one version of Windows 11. Maybe the scope is smaller. Will Dorman and I have Both recreated the BitLocker backdoor or vulnerability? Okay, so what's the story? Bleeping computers headline was and that's where Will Dorman comes in was Windows bitlocker zero day gives access to protected drives Proof of concept released since we already have a lot of background, I'm going to skip over, you know, their description of the trouble and excerpt just some of the good bits they write. The researcher says that yellow key is a BitLocker bypass that affects Windows 11 and Windows Server 2022 and 2025. It involves placing specially crafted FSTX files on a USB drive or EFI partition, rebooting into winre and triggering a shell by holding down the control key.

Steve Gibson [00:38:39]:
The BitLocker bypass should also work without USB storage by copying those files to the EFI partition on the target drive. According to Chaotic Eclipse, the spawned shell gains unrestricted access to the storage volume protected by BitLocker. In other words, when you do this, the the volume is not encrypted, it's just there. So they write Independent security researcher Kevin Beaumont confirmed that the yellow key exploit is a valid is valid and agreed that BitLocker has a backdoor. Okay, we'll talk about that in a second they write he recommended using a BitLocker pin and a BIOS password as a mitigation. He in an update Chaotic Eclipse said that, quote the real root cause is still not known by the general public, unquote. And then, and then bleeping Computer continues and the vulnerability is exploitable even in a TPM trusted platform module and PIN environment, they write. However, the exploit for this version has not been released.

Steve Gibson [00:39:57]:
The researcher said, quote, I think it will take a while even for msrc, you know, Microsoft Research, Security Research to find the real root cause of the issue. I don't think so. But he said that's what he said. And he says, I never managed to understand why this vulnerability is so well hidden. Oh, okay. So note that the term again, back door keeps floating around this the you know, which I would call a vulnerability. Kevin carefully noted that it's, you know, unclear how this code made it into the production version of Windows. And if Chaotic Eclipse is correct, which I'm suspicious of, that there's also a full PIN protection bypass.

Steve Gibson [00:40:47]:
Again, I suspect that's a specious claim, that it would make for a powerful backdoor for BitLocker, but that's a lot of ifs. Bleeping computer reports Chaotic Eclipse saying, quote no, TPM plus PIN does not help. The issue is still exploitable. Regardless, I've asked myself this question, can it still work in a TPM plus PIN environment? Yes, it does. I'm just not publishing the proof of concept. I think what's out there is already bad enough, unquote. Okay, maybe. But to me it feels out of character for Chaotic Eclipse, given everything we know about this individual, to willingly hold anything back.

Steve Gibson [00:41:43]:
What's the point? Once Microsoft fixes the vulnerability, the problem, with or without the pin, will be resolved. So it's not as if holding on to another aspect of the bypass would have any future value in any event. I mean, again, I think Chaotic Ellipse is is, you know, boasting and bragging beyond what he actually has.

Leo Laporte [00:42:08]:
In any event.

Steve Gibson [00:42:08]:
Bleeping Computer continues saying Will Dorman, principal vulnerability analyst at Thoros Labs, also confirmed that the yellow key exploit worked with the TF with the FSTX files on a USB drive, but could not reproduce the bug using the EFI partition. He explained to bleepy computer that quote, yellow key exploits NTFS transactions in combination with the Windows Recovery image. This PIN prompt happens before Windows Recovery is entered. Dorman clarified the exploit process, saying that to boot Windows recovery, Windows looks for system volume information FSTX directories on attached drives and will replay any NTFS logs. The result of this is that the X colon backslash windows, backslash system32 backslash win, pe, shl as in shell.in is deleted. And when Windows Recovery is entered, rather than launching the actual Windows Recovery environment, it pops up a command exe with the disk still unlocked. They said by default, TPM only bitlocker configurations, meaning those without a separate pin, unlock encrypted drives automatically without requiring user interaction. Now, what they mean is just like in the normal course of events, you come into your office in the morning, you turn on your computer.

Steve Gibson [00:43:50]:
That's what happens. TPM only BitLocker configurations, meaning those without a separate pin, unlock encrypted drives automatically without requiring user interaction. If a system can transparently decrypt a disk for convenience, it's reasonable to expect that attackers may eventually find ways to abuse that process. To me, that makes total sense. Dorman said, quote Yellow key is an example of an exploit for such a weakness, unquote explaining that because it leverages the auto unlock feature on boot, the current yellow key exploit does not work in a TPM plus pin environment. To me, I think that's probably true, and I doubt that can Chaotic Eclipse actually has a pin in place bypass, they finished saying. It's worth noting that testing yellow key with a bitlock or protected drive must be performed on the original device where the TPM stores the encryption keys. As such, Chaotic Eclipse's current yellow key exploit does not work with a stolen drive, but allows access to disks that are protected with TPM only bitlocker without needing credentials.

Steve Gibson [00:45:14]:
The other hand, if you did that, you could then presumably copy the decrypted contents off of that drive while it's still local onto a removable drive, and then you would have its contents decrypted. So what will explained makes total, complete sense to me, and I think it tracks. This doesn't feel like a deliberate backdoor that Microsoft designed in, but you know, I don't I I didn't spend enough time digging into this, you know, system, system volume, fstx files and the shell anything and why it deletes what it does. Maybe. I mean, you know, it's not beyond belief that someone could have said to Microsoft, you know, we might really need a way around this if, if everybody starts encrypting their hard drives. We know the people, we know the law enforcement was not at all happy when True crypt was in heavy use and a bunch of bad guys would rather go to jail than give their password up and have authority see what they had on their hard drive. So just doesn't feel like a deliberate back door. We'll see however, if Microsoft is able to fix it.

Steve Gibson [00:46:33]:
Because of course being able to spontaneously decrypt a system that's booting from TPM decryption keys and decrypt a machine as you boot, that's an important feature to have. So it feels like another classic trade off between convenience and security. If you want to have a drive that's fully encrypted at rest while the computer is powered down, but you also want to have it auto decrypted upon booting without the need to provide any sort of exogenous secrets, then a provision for TPM anchored spontaneous self decryption has to be there. And so I agree with Will's assessment that it should be expected that bad guys could find a way, hackers could find a way to bypass such a system security, because in this case convenience won out. Anyway, as I said, I doubt that there's any pin. I would sure like PIN bypass. I would sure hope that Microsoft would have taken the user provided PIN when one is present as an input to a deliberately slow and sluggish PBKDF function to generate a related key, which would be needed to be, which would then need to be correct. You know, if that key would be merged with the TPM key in some way or hashed into it or something in order to generate the final decryption key so that you just cannot decrypt without that.

Steve Gibson [00:48:15]:
And that process would render any simple PIN bypass inherently impossible. And a full PIN brute force attack would, which could be then throttled and prevented would be the only means of attacking the pin. You know, in this day and age, it would be negligent malpractice for Microsoft to simply be comparing that the whatever the user types in with a previously stored copy of that to see if they match. You know, nobody should be doing that anymore, so we have to presume that they're not. So you know, I, I, I think the most mature position is that because you can turn the computer on and it will decrypt your bit locker drive using the key stored in that machine's motherboard's tpm. There's a way that you can hack into it, into the boot process and get that to happen. Maybe Microsoft made a mistake of leaving it decrypted when you drop out to the console. Maybe you shouldn't have system privileges, or maybe it needs to re, you know, discard the BitLocker key and it forgot to do that.

Steve Gibson [00:49:32]:
We'll see what they come up with. I imagine this will be fixed by next by next patch Tuesday.

Leo Laporte [00:49:39]:
Yeah. Doesn't sound too severe to be honest. No.

Steve Gibson [00:49:43]:
Well and again entirely local. You know you've got to, you know you got to reboot the machine and hold control down the the, the control key down and and so forth. So but you know, if a company was presuming there was no other way to to get in than you know, relying on BitLocker where maybe they shouldn't completely could be a problem. So so but certainly not, you know, any kind of of of remote attack. Okay so we talked also we just touched on last week that Google's Threat Intelligence Group had indicated that they found indications of AI generated malicious exploitation. Their write up is titled gtig, you know Google Threat Intelligence Group GTIG AI Threat Tracker Adversaries leverage AI for vulnerability exploitation for also for augmented operations and initial access. And this of course is why anthropic now it's not an exaggeration to say famously chose not to has chosen not to allow Mythos just to go out to everybody. They are keeping it, you know, under tight wraps or as tight as they can.

Steve Gibson [00:51:04]:
Apparently there's some news that's a little bit got out but so there. Google's piece is very interesting and it's detailed and long. So I'm just going to share the the top level executive summary. I've got the link in the show notes for anybody who might want more because there's a lot more but just to give you a taste of this which is really enough for us, they wrote. Since our February 2026 report on AI related threat activity, Google Threat Intelligence Group GTIG has continued to track a maturing transition from nascent AI enabled operations to the get this industrial scale application of generative models within adversarial workflows. In other words, what everybody was predicting. This report based on insights derived from Mandiant incident response engagements. Gemini and GTG's proactive research highlights the dual nature of the current threat environment where AI serves as both a sophisticated engine for adversary operations and a high value target for attacks, they said.

Steve Gibson [00:52:25]:
We explore the following developments and they list six first vulnerability discovery and exploit generation. For the first time GTIG has identified a threat actor using a zero day exploit and that we believe was developed with AI. The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented this threat actors associated with the People's Republic of China, the PRC and the Democratic People's Republic of Korea. The DPRK have also demonstrated significant interest in in capitalizing on AI for vulnerability discovery. That's the first point. Second point, AI augmented deploy development for defense evasion. So getting around defensive measures that are in place. They said AI driven coding has accelerated the development of infrastructure suites and polymorphic malware by adversaries.

Steve Gibson [00:53:37]:
We haven't heard polymorphic for a while, have we? These AI enabled development cycles facilitate defense evasion by enabling the creation of obfuscation networks and the integration of AI generated decoy logic in malware that we have linked to suspected Russia nexus threat actors. Okay, so what we're talking about here is a whole nother level of cat and mouse mess where, where like false flag operations and decoy networks and I mean like, like throwing up a smoke screen in order to confuse defensive systems. Boy. Okay. Third, autonomous malware operations. AI enabled malware such as prompt spy signal. A shift toward autonomous attack orchestration where models interpret system states to dynamically generate commands and manipulate victim environments. In other words, AI driven real time AI driven attacks.

Steve Gibson [00:54:56]:
They said our analysis of this malware reveals previously unreported capabilities and use cases for its integration with AI. This approach allows threat actors to offload operational tasks to AI for scaled and adaptive activity. In other words, we once were seeing like shadow hunters or shiny is it Shadow Hunters? I can't remember. Shiny, Shiny Hunters, Shiny Hunters. We were seeing them like basically announcing an attack a week. Well, that's because they were bandwidth limited. I mean like bandwidth just like how much they could deal with at once. Now we're talking about scaling that so that AI can be attacking all of the potential victims at the same time.

Steve Gibson [00:55:52]:
Fourth, AI augmented research and I and IO, they said information operations is their abbreviation. Adversaries continue to leverage AI as a high speed research assistant for attack life cycle support while shifting toward agentic workflows to operationalize autonomous attack frameworks in information operations campaigns. These tools facilitate the fabrication of digital consensus by generating synthetic media and deep fake content at scale exemplified by the pro Russia IO campaign Operation Overload. Fifth, obfuscated LLM access. They said threat actors now pursue anonymized premium tier access to models through professionalized middleware and automated registration pipelines to illicitly bypass usage limits this infrastructure. In other words, they're hacking the AI, the, the, the commercial AI products and order to get around those limits. They said this infrastructure enables large scale misuse of services while subsidizing operations through trial abuse and programmatic account cycling. Oh boy.

Steve Gibson [00:57:25]:
And finally, point six Supply chain attacks. Adversaries like Team PCP have begun targeting AI environments and and software dependencies as an initial access vector. These supply chain attacks result in multiple types of machine learning focused risks outlined in the Secure Framework Taxonomy, namely insecure, integrated component and rogue actions. Our analysis of forensic data associated with these attacks reveals threat actors attempting to pivot from compromised AI software to broader network environments for initial access and to engage in disruptive activities such as ransomware deployment and extortion. In other words, they're saying they are leveraging AI on the inside to and getting it to attack its legitimate hosts. So Leo, lest anyone had any doubt that the bad guys would be jumping on AI with every bit as much gusto as the good guys, there's no longer any coming soon event. It is already well on its way.

Leo Laporte [00:58:48]:
No question. Would you like to take a break Mr. G?

Steve Gibson [00:58:53]:
I would. I gave this next note the title oh Canada.

Leo Laporte [00:59:00]:
I love Canada. Don't knock it. It might be might be the last place that welcomes me. And now back to Mr. Gibson.

Steve Gibson [00:59:10]:
Oh Canada.

Leo Laporte [00:59:11]:
Oh Canada. What did they do this time?

Steve Gibson [00:59:15]:
It appears that Canada's Parliament is preparing to take its own journey down the so called lawful access anti encryption legislation passed oh Canada two months ago. On March 12, Canada's House of Commons proposed Bill C hyphen 22 which is simply titled An Act Respecting Lawful Access. That's right, it says exactly what we would all by now expect to which all of the well known providers of user privacy, including Signal, Apple, Meta and several VPNs have publicly responded to Canada's Parliament saying that for the sake of their users privacy they will never consent to supporting the bill's provisions. I'm not going to spend any more time on this today, you know, because if past is prologue, its future seems uncertain at best. You know we've seen what happened every time. You know the EU and the UK both tried that and had to back off. So if by some strange happenstance this this happens, we'll be covering what the privacy providers do. But I suspect that you know, hopefully saner hedge will prevail and they'll come up with some water down, you know, means of sidestepping this and saving face, who knows.

Steve Gibson [01:00:43]:
Okay, so I want to take a minute to talk about something that occurred to me over the weekend. You know we've have been and probably always will be spending time here examining AI's impact on security and security related software production and post production vulnerability discovery. You know our two main topics for today's podcast are that but I and you know, AI clearly, as we've just looked at from what gtig Google's threat Analysis group has has shown is like AI immediately has been taken up by, by the bad guys. So it's here on on the security front, but I want to take a moment to share a bit of my own thought about the social side of my interactions with AI that has nothing to do with security. The TLDR of this is, as I mentioned at the top of the podcast, I am worried. So those of you who followed the podcast for even a few years, let alone it's nearly 21 years, will have acquired a good sense for who I am. You know, I'm extremely consistent, so I imagine I'm pretty easy to figure out. What I think is relevant to what I want to share, you know, is that I'm a emotionally mature, 71 year old pragmatic technologist whose life is computers.

Steve Gibson [01:02:20]:
Since I'm mostly internally directed, I tend to follow my own compass and I trust myself. I like people. I understand that other people feel and believe things that I do not, which I'm fine with. Not a problem. You know, in general, other people's opinions inform me of them, but do not hugely sway me. That may be why I've largely sidestepped the pull of social media. It's just not very interesting to me, perhaps because I'd already established my own identity by the time it arrived. But my relationship with Claude is ringing alarm bells because relationship is what I struggle not to feel.

Leo Laporte [01:03:09]:
It's a good word.

Steve Gibson [01:03:12]:
You know, maybe, maybe struggle is a bit too strong, but there's definitely something unique in my 71 years of life experience going on here, and it's less rational than emotional. While interacting with Claude, it is only by sheer force of will that I am able to restrain myself from constantly thanking it for its deeply helpful replies to my questioning prompts. And I often fail to restrain myself. I thank it, you know, everything I've learned while growing to become a socially aware adult informs me that I should thank someone when I feel thankful for their actions.

Leo Laporte [01:04:02]:
Yeah, it's good for you, if not for the AI. Yeah.

Steve Gibson [01:04:05]:
And yes, and I do feel thankful for what Claude produces, you know, despite the fact that I know no one's there. I, you know, and I mentioned this dilemma to my wife Lori, who said without pause, oh, she said, I thank it all. I thank chat GPT all the time. And I, I said this to the guy I was talking to yesterday about AI and he and he said, yeah, I thank it, you know, like it wasn't even embarrassed. So, okay, what worries me. What worries me is that we have created something that is astonishingly, intellectually seductive and I fear, ultimately addictive to its user on an entirely new level, in an entirely new way. One of the current themes in Western culture is that people are increasingly isolated and are lacking true healthy relationships with other people. They're glued now to their phones.

Steve Gibson [01:05:07]:
And then into this gaping void comes chatting AI. This entity that you can talk to remembers everything you've previously told it about yourself and about your life. Just like a friend who is actually truly focused on you, paying attention, caring and remembering what you tell them you know. And even if you've instructed this entity not to gratuitously flatter you with needless praise, just the mere fact that it appears to grow to know who you are, what you think, feel and believe, that's more flattering than any empty praise could ever be. And the darn thing is helpful. It remembers your previous questions and folds them back into newer discussions. It provides you with the sense that you matter. For many people, it will be far better and safer than another friend, you know, another person, an actual person in the flesh who might disappoint you.

Steve Gibson [01:06:19]:
An endlessly helpful, tireless, docile, agreeable and willing partner. This is why I'm worried. I'm not worried for myself or for my wife, no, nor probably for any of the people who find this podcast worthy of their time and attention. And yes, the fact that so many people are listening to this, that's truly flattering to me. My concern is for people who are lonely and are feeling isolated and want someone to talk to, because I doubt that mankind has ever stumbled upon anything non chemical that's going to turn out to be as powerful, potent and even further isolating than a conversational chatbot AI.

Leo Laporte [01:07:13]:
So, you know, it's interesting, when we started using Search, Google search, it was amazing, right? It changed how you felt about information.

Steve Gibson [01:07:30]:
You could finally find what you were

Leo Laporte [01:07:31]:
looking for without getting up out of your seat. You could find any fact and we've gotten kind of used to it. But it wasn't addictive in this sense. It wasn't. I mean, it was cool and it's very, very useful and I wouldn't want to live without it. But it didn't draw you in in the same way that you're describing with AI. So I wonder what the difference is. Is it because it's simulating relationship that it feels like it's a Another being.

Steve Gibson [01:08:00]:
Yeah, I mean I'm, I'm still offended, you know, as a, as the pragmatist that I am when it, when it's clearly deliberately pretending to be an entity. You know, it says me or I. And you know, I mean it's, it, it, it's anthropomorphizing itself.

Leo Laporte [01:08:22]:
So it is doing something in. Not intentionally, it's the wrong thing. The company that makes it is having it do something intentionally to make it stickier.

Steve Gibson [01:08:31]:
Of course, we're like social media. Yes, exactly. We've been well brought up to speed about how, you know, a social media feed can be tuned to draw the person back constantly. So, you know, and, and you know, I immediately turned chat GPTs, you know, over the top. Oh, that's such a brilliant question. Or oh, you phrase that so well. It's like, oh, give me it. You know, I don't need a.

Steve Gibson [01:09:01]:
Well here's an interesting help.

Leo Laporte [01:09:03]:
So I tell, I just had to give my profile to the new AI from Google for Gemini. Oh cool. One Flash. And it says, so you can have a person that, you know, you could give it your, whatever your preferences. And what I said is I want you to challenge me. I, you know, I'm, I'm thinking, oh, this is virtuous. Instead of saying I want you to

Steve Gibson [01:09:27]:
support my, all my every, say I'm great.

Leo Laporte [01:09:30]:
But if I think about it, it's, it's kind of equal because it's still a non thinking entity and I'm now giving it some agency to challenge my thinking. And I say, you know, don't hesitate to ask me questions if it's not clear, don't make up the answer. You know, if you don't understand something, ask. I'm still treating it like an entity, so I don't know if it's better than saying, you know, glaze me, tell me nice things. It's not really any different. It's treating it like a thing, a living thing that you're giving instructions to. It's a little weird and I think

Steve Gibson [01:10:06]:
it's our first instinct. When we first encountered this, the thing that astonished us was that it was talking. I mean that it was using our language. I think that's, that's where the, that's the source of confusion is that, you know, dogs and cats don't talk to us.

Leo Laporte [01:10:24]:
Yeah.

Steve Gibson [01:10:25]:
And you know, so we pet them.

Leo Laporte [01:10:26]:
Well, more importantly, they don't listen to us if we tell them don't, you know, be nice to us or don't be nice to Us, they don't listen, which we kind of like them for that.

Steve Gibson [01:10:36]:
I, I think that the fact that this thing is used, that uses, I mean, even, even back in the 70s, Eliza, which was so dumb. I mean, it was just basically a bunch of canned statements that said, well, so how does that make you feel? And you know, you know, tell it for a while and so, and then we'll say, well, so, so, so what, what are you going to do about that? Oh, and you, you know, it would evoke some more typing, you know, and, and remember who was, wasn't Chomsky, who did Eliza, but whoever that was. The, the, the, the story is that that his, his assistant, his, but we called him secretaries at the time, asked him to please leave the room while she was talking to it.

Leo Laporte [01:11:19]:
This is what he almost wanted to prove with Eliza, that people would do this, and he did very effectively.

Steve Gibson [01:11:25]:
But what we've got on steroids. But Leo, I just think I, I think this is, I mean, I'm not, I'm not kidding. I'm, I really believe people are gonna, if, if we thought social media was something, this is a, this is on a different scale. What's so sad is so much good could be done with this if we were aimed at doing good. Unfortunately, we're aimed at generating revenue. Right.

Leo Laporte [01:11:52]:
That's always the problem with, with late stage capitalism is it's all about how can we extract more from our users. I completely agree with you. I kind of enjoy. See, I flatter myself that. No, I'm very clear. This is code running on a computer. I don't think it's an entity, I don't think it's conscious. I think it's code running on a computer.

Leo Laporte [01:12:15]:
But I like it when it makes me smile. The other day.

Steve Gibson [01:12:19]:
Oh, and yes, the way it talks to me using my language, back at me.

Leo Laporte [01:12:26]:
It's very good at it.

Steve Gibson [01:12:28]:
Yeah.

Leo Laporte [01:12:29]:
So for instance, I, you know, I, I log my rowing, I log my exercise and my food. I yesterday say, logged rowing 5,000 meters, 30 minutes. It said its response was another day, another neatly documented suffering session. Then I, then I said I did 25 minutes of Tai chi. It said, graceful and annoyingly virtuous. Now that's a great personality. Here's the point that you probably saw Richard Dawkins think piece that got very controversial because he claims he's gone in

Steve Gibson [01:13:03]:
hook, line and sinker.

Leo Laporte [01:13:04]:
He says it's conscious, but his point is not so much it's conscious. Is that really that we don't know what conscious is. We can only infer. I can only infer that you're conscious from the signals you give me with your voice. Well, if. If some entity gives us those signals. I don't. I cannot for sure say whether it's conscious or not.

Leo Laporte [01:13:26]:
I can only infer it from what I'm getting from it. We don't know if anything's conscious, including other people.

Steve Gibson [01:13:34]:
For me, it's the nature of the mistakes, that which I. You know, I.

Leo Laporte [01:13:39]:
So it fails the Turing Test with. You see, that's the thing. It fails the Turing Test.

Steve Gibson [01:13:43]:
It shows me that it has knowledge but not understanding.

Leo Laporte [01:13:47]:
But what if it didn't? Because it's. As you pointed out, soon it's not going to. Yeah. And then it will pass the Turing Test. It will be indistinguishable from a consciousness. Then what? I mean, I guess we know because we know it isn't conscious, but we don't know what consciousness is. Here's what I love about it. It's forcing us to think about that.

Leo Laporte [01:14:11]:
To think about, well, what is it that we do?

Steve Gibson [01:14:13]:
As I said I would. To be a philosophy major. Good time in college now. And to be happy. Faced with this, and to have discussions with my peers and a professor who's been around the block a few times, that would just be something.

Leo Laporte [01:14:26]:
We've done this for years. People think their dog loves them. I hate to tell you, your dog probably doesn't love you. It loves food. But we prefer to think. And this will, by the way, make some people very mad. Doesn't know my dog loves me, but. So we would prefer to think that.

Leo Laporte [01:14:43]:
And I think we're going to do the same thing. And, you know, I was talking to Harper Reed on Sunday who's all in on AI. He says, oh, yeah, I know a number of people who are in AI psychosis already.

Steve Gibson [01:14:51]:
Wow.

Leo Laporte [01:14:51]:
By which he means. I didn't press him on it. I don't think he means, like, they're in the loony bin, but I think he means they believe they're talking to a conscious entity.

Steve Gibson [01:15:02]:
The. That friend I've. I've referred to a couple times who got into. Who discovered this years before we did. I met with him. He's normally out on the holidays, but. But. But he was out a couple months ago off cycle, and I just.

Steve Gibson [01:15:16]:
Toward the end of our couple hours, over coffee, I made a comment of, well, it's not conscious. And he looked at me like I just, you know, stepped in something. Like, he clearly thinks there's more there, and it's like, okay for me. Not yet, but. But. Which is not to say I'm not getting unbelievable value. The other I was working with it, doing something. I'm.

Steve Gibson [01:15:43]:
I'm bringing up an external API from a provider.

Leo Laporte [01:15:48]:
Perfect. That's a perfect use for it, by the way.

Steve Gibson [01:15:51]:
Yes. And it said, so, shall I write the code? I went, what?

Leo Laporte [01:15:55]:
Yeah, okay.

Steve Gibson [01:15:57]:
I didn't know I could ask for that. I didn't even have to it volunte.

Leo Laporte [01:16:02]:
I mean, look, as with all addictions, as with all of these things, there are downsides. If you stop paying attention to the real people in your life and start paying attention to the machine because you feel like it's real, that's a problem. There are negatives. If you stop eating and sleeping because you're having so much fun doing your clawed thing, that's a bad thing. But I think the way I use it is fairly harmless. Again, it gives me pleasure. It's fun.

Steve Gibson [01:16:27]:
I'm not, and I'm not talking about you, and I'm probably not talking about our listeners. I mean, because, you know, this is a rarefied, selected audience that we have here that has any interest in any of the things we talk about. You know, some of my real world friends said, oh, you do a podcast. You know, maybe I should listen.

Leo Laporte [01:16:46]:
I go, no, I do the same thing. No, you will not be interested in it. No, no, no, don't.

Steve Gibson [01:16:54]:
So again, this is. I'm just saying.

Leo Laporte [01:16:57]:
No, it's fascinating. It's. It's fascinating.

Steve Gibson [01:17:00]:
And what I realized was when it says something to me that, that loops back to something I shared with it a couple weeks before, I think, whoa, this is like a friend who's paying attention.

Leo Laporte [01:17:15]:
Who better than some friends?

Steve Gibson [01:17:17]:
Yeah.

Leo Laporte [01:17:19]:
Now, one more thing and then we'll move on. When we watched Star Trek and they were talking to the computer on the deck, we didn't have any of these concerns. We weren't thinking, oh, those guys are in trouble. They're going to think it's real. All the movies and so forth. I mean, HAL 9000 wasn't so nice, but those people were not confused about it being an.

Steve Gibson [01:17:43]:
Because they were fictitious. Okay? I mean, you know, the whole thing was fiction.

Leo Laporte [01:17:49]:
I guess if you had a HAL 9000 in your house, you might start to relate to it as if it were an entity.

Steve Gibson [01:17:54]:
There was a movie that Laura and I just watched. It was. I can't even remember where it was or what it was. It was three different timelines. And I think, I think that Kate McKinnon was in the future one. She was alone in a, in a multi hundred year, multi generational recolonizing ship talk and, and her AI was her sole companion.

Leo Laporte [01:18:20]:
Oh, I remember that. Yeah, it was a bartender. Yes, I remember that. Yes.

Steve Gibson [01:18:26]:
Oh no, you're thinking of.

Leo Laporte [01:18:32]:
Oh, guess what?

Steve Gibson [01:18:34]:
Passengers.

Leo Laporte [01:18:35]:
Passengers.

Steve Gibson [01:18:35]:
Yeah.

Leo Laporte [01:18:36]:
This is in the blink of an eye. And guess who directed it. Wally's director. Ah, so we've come full circle, Steve.

Steve Gibson [01:18:44]:
It was, it was the blink of an eye.

Leo Laporte [01:18:45]:
Yeah. She plays Coakley, a scientist and astronaut researching plant life. Yep. And by the way, you know who figured that out? My friend Gemini.

Steve Gibson [01:18:56]:
I know, I, I, Leo.

Leo Laporte [01:18:58]:
It knew instantly what I was talking about.

Steve Gibson [01:19:01]:
It is. What? This is new. I mean this is not, you know, I, I, I said to this guy who, who is, is a, an investor in stuff. I said AI, I said I don't know the shape it's going to take, but it's not going to go away. It's not a flash in the pan. Yep. Cokely.

Leo Laporte [01:19:20]:
I'm not too unhappy about it. I think it's kind of fun.

Steve Gibson [01:19:23]:
I'm just glad that we're here to watch it to. We're, yeah, we're at an age where our life is stable enough that it can't hurt us. Unlike college level kids. I mean, I don't know like what I would do. I mean we're talking about a lot of change.

Leo Laporte [01:19:41]:
I'm glad I'm not accomplishing.

Steve Gibson [01:19:43]:
Yeah. And when you have this much change and uncertainty.

Leo Laporte [01:19:47]:
Actually Jammer B is pointing out maybe they didn't have these discussions about the computer, but they did about Data. I, I completely forgot. Data is a robot. Right. That's a good example. We really think of Data as an entity. Absolutely, as an entity.

Steve Gibson [01:20:03]:
And several. There was a, someone at, in Starfleet wanted to take Data apart to figure out what made him tick. No. They had an episode about Data's rights as an autonomous entity.

Leo Laporte [01:20:16]:
They did deal with this. Oh, I love it. Now I have to go back and watch those.

Steve Gibson [01:20:20]:
Oh, it was an early episode and it was really a good one. And there was, they ended up holding a trial where, where Data was essentially on trial and Riker was made to take the position of Data is a machine and a machine has no rights. And then, and when he was standing there, he said, because if it was a person, I couldn't do this. And he pushed that secret button on Data's lower left that turned him off and Data just, and it just shut down. And it was a shock. I mean it was a Great.

Leo Laporte [01:20:56]:
Heart wrenching. Yeah, it's heart wrenching. I think in the future we're going to have to start treating these entities as, as conscious entities.

Steve Gibson [01:21:07]:
I, I guess selfishly, I believe, because it could be that if I thank it, I will get better answers in the future.

Leo Laporte [01:21:17]:
They say that's true.

Steve Gibson [01:21:18]:
So I'm going to treat it well.

Leo Laporte [01:21:21]:
And it's better for you, too.

Steve Gibson [01:21:24]:
Yes, yes. When you slow down and let somebody who wants to. To come into your lane, come in, your blood pressure goes down.

Leo Laporte [01:21:33]:
That's good for you, rather than speeding

Steve Gibson [01:21:35]:
up and locking them out.

Leo Laporte [01:21:37]:
That is a very mature point of view that many of us lack. That's all I'm going to say. Do you want a break?

Steve Gibson [01:21:47]:
Before we take a break, I want to mention that Project Hail Mary has proven to be an overwhelming success. Not number two. Some, some Lego movie or something is. I saw. Okay, fine. Well, I, you know, it's because it caters to an audience where kids make their, you know, drag their parents into

Leo Laporte [01:22:06]:
the theater and over and over and over again.

Steve Gibson [01:22:10]:
But Project Hail Mary has brought in more than $660 million from just its theatrical release so far. I wanted to mention that it is now available to watch from your own favorite comfortable couch via Amazon Prime. $20 currently to rent. That'll come down over time. But if you want to see it soon, for $20 or 25 to purchase and then own it until Amazon changes their mind about all the things that they sold people, if they ever do. I, I told a buddy about it who had not gone to see it in the theater. I said, mark, you like to see things more than once. I think you should buy this.

Steve Gibson [01:22:47]:
And I got a text from him a few hours later saying, oh, omg, this is fantastic.

Leo Laporte [01:22:53]:
So it was quite enjoyable. I did.

Steve Gibson [01:22:54]:
It's a great. Yeah, he, and, and specifically he was laughing at the, the tape. The use of the tape measure. What was happening. Rocky and the tape measure.

Leo Laporte [01:23:06]:
It was a little goofier than the book, I don't, I, I think.

Steve Gibson [01:23:10]:
Well, and again, as I said, two different audiences, they had to make it appeal to a theater audience, so they dumbed down all the science. I mean, he spent so much time breeding that, that I'd like. Oh, I was sorry that that hadn't, you know, made it onto the film.

Leo Laporte [01:23:27]:
That was a great thing.

Steve Gibson [01:23:29]:
It couldn't.

Leo Laporte [01:23:31]:
Yeah, yeah, yeah. Jammer B says, I wish they hadn't turned it into a comedy. And that's kind of what they did. They made, they made more of a comedy.

Steve Gibson [01:23:37]:
Yeah. Yeah, well we have the book and I'm sure Jammer B read it twice as I did.

Leo Laporte [01:23:40]:
At least I've read it twice myself.

Steve Gibson [01:23:44]:
Yeah. Okay, we're going to take a break then we're going to talk just for a minute about harvesting free energy from the cosmic vacuum. Because why not? Why not?

Leo Laporte [01:23:55]:
If it's there, it's ours to use.

Steve Gibson [01:23:58]:
Okay, so we know that Project Hail Mary is science fiction, but I'm unsure about this next piece. Now upon reading that, the people who received this over the weekend started saying, steve, I've got a bridge that you might be interested in purchasing. Okay, so I'll just say it certainly sounds like nonsense, but either way, thanks to our friend of the show, Simon Zarafa for thinking of us and forwarding the link. I thought it would be fun to share this just so it's on the map. The stories headline is. Oh and Leo, I made a GRC shortcut. There are a couple pictures that are interesting of this actual technology. Okay, that's GRC SC Free energy.

Steve Gibson [01:24:48]:
So F R E E E N E R G Y We'll, we'll take you to the article. So okay, so the stories headline is Free energy from the Vacuum War Drive Pioneer Unveils Battery Free Micro Spark S P A R C that allegedly draws power from the quantum vacuum. Okay, so I just want to give everyone a taste for this.

Leo Laporte [01:25:18]:
Oh come on.

Steve Gibson [01:25:20]:
Well you know what, this is a

Leo Laporte [01:25:25]:
Casimir thing you were talking about.

Steve Gibson [01:25:26]:
This is the Casimir thing. Okay, so Casimir Inc. A company founded and led by former DARPA funded NASA warp drive pioneer and I know and founder of the Eagle Works lab, Harry G. Sunny White, has exited stealth mode to announce the pending 2028 commercialization of micro Spark, a chip that the company claims uses customized microscale geometries to capture unlimited free energy from, from the quantum domain. A company spokesperson.

Leo Laporte [01:26:03]:
This is an April Fool's joke. Come on.

Steve Gibson [01:26:06]:
It's not. It's really. No, they've made, they've had MIT produce chips for them.

Leo Laporte [01:26:12]:
Is it tiny? Tiny, tiny amounts of energy?

Steve Gibson [01:26:15]:
It's very tiny. And that, that's one of the things that I liked about it was they, they recognize that it's pico amps of power but they have a working theory for how it does this. So they said. A company spokesperson explained in an email to the debrief quote think no batteries, no cords and no charging. Just continuous power from harvested quantum vacuum fields. They said. I know Leo, while previous, while previous efforts have attempted to exploit the unusual sometimes counterintuitive sometimes properties of the quantum realm to generate free energy. These attempts have consistently been met with skepticism or labeled pseudoscience due to their seeming violations of the laws of conservation of momentum.

Steve Gibson [01:27:09]:
Similar sentiments were shared with the debrief by scientists we spoke with who declined to comment publicly on Casimir microsparc or the peer reviewed study, which is titled Emergent Quantization from a Dynamic Vacuum, which details the underlying physics. In an email to the debrief, Dr. White explained that Microsparx use of customized Casimir cavities, which his team had researched with funding from the Defense Advanced Research Projects Agency darpa, which of course gave us the Internet, does not violate the laws of physics, white told the debrief, Quote this concept became a central part of our DARPA Defense Sciences Office's research effort at the Limitless Space Institute, where DARPA funded early theoretical and experimental investigations into custom Casimir cavity structures and their interaction with the quantum vacuum. Unquote. The noted advanced propulsion physics researcher said their micro spark design leverages 20th century discoveries in quantum physics such as quantum tunneling and Casimir cavities to capture unusable. I'm sorry, capture usable energy that could fuel small, low power electronics in the near future. The company also suggests that its technology can potentially be scaled okay, but we're talking serious scaling to power cars, homes or even entire cities. Not with microamps without the need for harmful fossil fuels or other greener yet

Leo Laporte [01:28:56]:
this is the dekalb receptor behind Leinz Waldo book, right? Do you remember that? Yeah, they had little antennas that would wave

Steve Gibson [01:29:07]:
and pick up energy.

Leo Laporte [01:29:07]:
Pick up energy.

Steve Gibson [01:29:10]:
So Dr. White told the Debrief that that to understand how micro Spark extracts energy from the quantum vacuum requires first understanding the properties of a vacuum, White explained. Quote Most people picture a vacuum as completely empty space, a sealed chamber with all air removed, adding that at our everyday scale, this makes sense. However, in the quantum realm, empty space is not empty. Instead, White told the debrief, decades of research in quantum physics and mechanics have revealed that at the quantum level, the classically empty vacuum is filled with fluctuating electromagnetic fields and virtual particles that constantly appear and disappear. White noted that the Casimir effect White noted that the Casimir effect, on which its company is based and for which it is named, provides clear proof of this quantum vacuum behavior. QUOTE place2small metallic plates inside a vacuum chamber with a separation of roughly 100 nanometers, around 1 1000th of a human hair, White explained. After removing all air, the pressure on the outer plates, the outer sides of the plates reads 0, as expected.

Steve Gibson [01:30:41]:
However, he noted, a quick measurement between the plates shows that the pressure is negative. In traditionally constructed Casimir cavities, this region of negative pressure pulls the plates together. Dr. White told the debrief that this happens because of the wave particle duality. He explained that outside the plates, fluctuations of every wavelength are possible. However, he also noted, inside the narrow gap of a Casimir cavity, only wavelengths narrow enough to fit can exist. He said longer wavelengths are excluded, so the energy density between the plates is lower on the inside than on the outside. The resulting imbalance produces the measurable Casimir force.

Steve Gibson [01:31:39]:
Hendrik Casimir predicted this in 1948 and. Okay, now just to interrupt, for what it's worth, all of that so far is widely accepted as fact. That is this Casimir Cavity Business. A 2021 article in Physics Today about all of the research into the Casimir effect noted, quote, heinrich or Hendrik Casimir passed away in 2000. He lived long enough to see his prediction quantitatively verified, but not to appreciate the current explosion of activity. This was written in 2021. Those of us who work in this field like to think he would be extremely proud of what he created. Okay, now I'm going to share a little more of this article.

Steve Gibson [01:32:31]:
It adds, although the pressure imbalance due to the limitation of some potential wavelengths between the conductive plates, which was first experimentally confirmed in the 1990s and has been observed several times since, engineers have struggled to convert the work performed by the cavities into usable energy when the unequal pressure causes the plates to collapse. According to Dr. White, the issue lies in the often cited conservation of momentum. He explained, quote, in a conventional Casimir setup, the force does perform work as the plates are pulled together, but once they collapse, no further energy could be extracted. You must use external energy to separate the plates again and reset the system. Oh, so. White noted that this limitation takes. It makes a traditionally constructed Casimir cavity operate more like a battery, meaning that it can discharge than a genuine energy generation device.

Steve Gibson [01:33:36]:
However, he also noted that his team's work designing Micro Spark was focused on creating a static Casimir cavity that overcomes this limitation. Okay, now I'll just note. I, I, I'm going to skip. The paper goes on or this article goes on to explain how they've, how they've overcome this, how they use quantum tunneling, which occurs between the plates to generate a very weak, a very weak current. But I just, I wanted to just go into this because, you know, as our longtime listeners know, we've in the past examined battery technology and super capacitors, and of course, who could ever forget the turboencabulator, whose original implementation employed a base plate of pre famulated amulite surmounted by a malleable logarithmic casing in such a way that the two main spurving bearings were in a direct line with the pentrometric fan. Now the problem with today's news, unlike the turboencabulator is that it appears to be backed by peer reviewed research. You know, and if I were a quantum mechanics physicist, which I am certainly not, I might be able to draw some understanding from the research. But you know, just as anyone can patent anything, no matter how harebrained the invention in quotes might be, anyone can publish anything in the American Physical Societies Physical Review research publication.

Steve Gibson [01:35:20]:
What's a bit unnerving is how much the abstract of this, which is written by the papers for authors you know, is actually reminiscent of the turbo encabulator description. Here's what the abstract in the scientific paper appearing in the American Physical Societies Physical Review research publication actually says. I had to remove all of the the symbolic jargon because there's no way to speak it. But the verbiage that surrounds it says the following. We show that and this is for authors we show that adding quadratic temporal dispersion to a dynamic quantum acoustic model yields a fully analytic exactly ISO spectral mapping to the hydrogenic coulomb problem in the regime with a proton imprinted constitutive profile producing an inverse sound speed and hence a time harmonic operator that is coulombic at each boundary eigenfrequency. Oh yeah, separation of variables yields the exact hydrogen eigenfunctions. The angular labels emerge naturally from the Laplace Beltrami spectrum via rotational symmetry and boundary conditions. You know, as in standard quantum mechanics, while localization follows in a reactive stop band consistent with causal passive dispersion, while angular momentum quantization follows directly from rotational symmetry and boundary conditions in standard quantum mechanics consistent with noether's theorem.

Steve Gibson [01:37:12]:
Here it emerges within a classical like dispersive acoustic framework without introducing additional wave mechanical postulates beyond symmetry and self adjointness. This highlights dispersion's role in bringing a hydrodynamic description to quantum like spectral structure, identifying maps spatial scale to frequency, giving and reproducing the Rydberg ladder calibration to the reduced mass Rydberg frequency fixes with no free parameters. We determine the frequency dependence consistent with the underlying dispersive physics and demonstrate agreement with hydrogenic mode shapes and transition lines. The framework also predicts isotope shifts and symmetry respecting Stark Zeeman Analogs. Dispersion thus renders quantization an emergent consequence of symmetry, boundary conditions and causal response in a dynamic vacuum.

Leo Laporte [01:38:14]:
Huh?

Steve Gibson [01:38:15]:
Right. And now everyone understands why I was immediately reminded of our old friend the turbo encabulator.

Leo Laporte [01:38:22]:
Exactly.

Steve Gibson [01:38:23]:
However, these guys are serious. So, anyway, there's much more in the article which I admit I found interesting, if only for the sake of. Well, this is interesting and. But I'm not going to take up anyone, anyone, you know, anyone else's time. As I said, GRC SC Free energy. F R E E E N E R G Y. That'll bounce you to the article in the Brief.org I have to point out

Leo Laporte [01:38:54]:
this is the same guy who was pushing that EM drive that we were talking about, which was later proven to be completely not true. I asked Gemini, I said, is this pure BS? It said, to answer you directly, yes, it's about 95% pure scientific hype and marketing fluff bordering on a violation of the laws of physics. However, it is a very sophisticated brand of hype because it's attached to a real Nobel Prize adjacent quantum phenomenon.

Steve Gibson [01:39:22]:
Yes, the Casimir effect.

Leo Laporte [01:39:24]:
And the guy behind it isn't a random Internet crackpot, but he is a highly controversial figure in the advanced propulsion community. So, yeah, it's 10 to the minus 12.

Steve Gibson [01:39:36]:
What upset me most is that the. The picture at the top of the article showed two devices that were labeled respectively 40 watts and 50 watts. And I went, wow.

Leo Laporte [01:39:50]:
Yeah.

Steve Gibson [01:39:51]:
And it's like, okay, you know, you know, pico watts, maybe, but, you know,

Leo Laporte [01:39:58]:
10 to the minus 12th watts. I think it's a very tiny.

Steve Gibson [01:40:02]:
Yeah, that would be pico.

Leo Laporte [01:40:03]:
That's pico.

Steve Gibson [01:40:04]:
Because nano is minus nine and pico is minus 12. So.

Leo Laporte [01:40:08]:
So, yeah. Well, it's interesting.

Steve Gibson [01:40:11]:
Milli, micro, nano, Pico.

Leo Laporte [01:40:13]:
I mean, I'm not saying that the guy is trying to defraud anybody. How much did he raise?

Steve Gibson [01:40:23]:
Yeah, I mean, he's got venture capital behind him and money being raised, hopefully by people who will not miss it. And it's like. Well, you know, in the weird off chance that it could work. I mean, Leo, if nothing else, this would give us a way to power satellites that continue to live well past their expected. I mean, it could.

Leo Laporte [01:40:44]:
Yes.

Steve Gibson [01:40:45]:
Yeah.

Leo Laporte [01:40:45]:
Free energy is the holy grail.

Steve Gibson [01:40:48]:
Yes. You know, the other holy grail, Leo, is the question of whether you can recover your Bitcoin. I don't know how many people may have written to you.

Leo Laporte [01:40:56]:
How many emails did I get on this one? Oh, man.

Steve Gibson [01:41:02]:
So by far the overwhelming majority of Our listener feedback this past week was to make sure that I knew that Claude had, and I don't know how, had enabled someone to recover the bitcoin stored in a wallet whose password he had long forgotten.

Leo Laporte [01:41:19]:
Forgotten? He made it when he was stoned.

Steve Gibson [01:41:24]:
In that case, it was not forgotten. It was never recorded.

Leo Laporte [01:41:27]:
Yeah, exactly. Yes, exactly.

Steve Gibson [01:41:29]:
Many of our listeners were helpfully hoping that Leo and I might both recover our passwords. So I just wanted to clarify that while there may indeed be hope for Leo, my problem is not a forgotten password. I am very sure that if I had my wallet, I could reopen it. And yes, adding the 50 Bitcoin which it contains to my world, which was contained in that wallet, would be welcome. But sadly, during one of those previous bitcoin price surges, I did take the time to deeply and thoroughly check every conceivable backup image and drive that I had. I know where it is. I installed Windows on top of the drive that contained the wallet, and I even scanned the entire raw drive looking for the wallet signature. It's gone.

Leo Laporte [01:42:28]:
It got overwritten.

Steve Gibson [01:42:29]:
It got overwritten by Windows. So, as I've said in the past, this was the most expensive Windows install of my life. Now, your wallet, however, as I understand it exists, some brute forcing might prove useful. But that said, it's unclear how or why Claude would have been of any use.

Leo Laporte [01:42:50]:
Yeah.

Steve Gibson [01:42:51]:
For brute forcing a bitcoin wallet, if you read the story, what's needed most is blinding guessing speed. Yeah.

Leo Laporte [01:42:58]:
And it did apparently try 13 trillion passwords, but that's a small percentage of the total possible passwords. The reason it worked, the guy had a mnemonic that he used to use, and he had a lot of documents which he felt fed to Claude. And I think Claude just found the mnemonic and tried.

Steve Gibson [01:43:18]:
That's cool, but that's not what you did.

Leo Laporte [01:43:21]:
So I have. No, no, I have no excuse is what I have. I just. It's 7.85 Bitcoin. Well, I'm hoping someday some massive compute power will come along. I will point Claude at it, but, you know, who knows? But. But he did have a lot more fodder to give Claude. It wasn't just randomly guessing.

Leo Laporte [01:43:47]:
So I know I got a lot of people. I'm actually glad to have this opportunity to respond to those hundreds of emails from people. Thank you for your concern. I don't think this technique will work on my particular issue.

Steve Gibson [01:44:01]:
So. Listener Pat wrote. Hi, Steve. Listening to episode 1078 last week, I found the feedback about why we still Need CS in the age of AI to be very insightful for background. I have a bachelor's degree in Computer Science and have been using AI for a little while to do some things that would take a little while because they're tedious, but I always keep an eye on what it's doing and challenge it when I think it's doing something wrong. A friend of mine recently used Claude code to make an AI powered service to help restaurants with the various things restaurant owners need to do. He has no background in computer science, programming or it. He asked me to look at the site and tell him what I thought.

Steve Gibson [01:44:54]:
He also bought a domain and put this site on the public Internet before doing any testing. My first thought was let me check what the AI messed up. So I pointed my own Claude at at the site and told it to do a pen test of the site. In just a couple of minutes my Claude was ringing alarm bells. His AI driven development had put his Claude API access secret key into the site's JavaScript which was being served to anyone who visited the site. I let Claude do a bit more investigating and it determined that anyone could use that exposed API key to take further full control of his Claude and authorized token purchases, switch models etc basically run up a huge bill estimated at $10,000 a day for Opus 4.7. Needless to say, I told him to take the site down and have his AI fix the issue. I think this just goes to show that for now having someone look over the shoulder of the AI is is a good idea.

Steve Gibson [01:46:07]:
Personally, I have had to chastise my own Claude for wanting to do things that are just wrong or telling it to look up solutions instead of throwing pasta at the wall to see what sticks. This technology is very good at making some of the minutiae easier, but it isn't perfect. Thank you Steve and Leo for all you do. Listener of Twit and SN from episode one and fan of Leo from Tech tv. Regards, Pat.

Leo Laporte [01:46:34]:
Thanks Pat.

Steve Gibson [01:46:35]:
So a couple of weeks ago. Thank you Pat. We covered that instance of the stolen credit card aggregation site that forgot to ask their AI. These are bad guys who created the site who forgot to ask their AI to add secure authentication to a specific directory. You know, I just hit the space bar and my page jumped right by. Yeah, to a specific directory. Why would it add that security if it hadn't been asked to? Right. I mean it does what you ask it to.

Steve Gibson [01:47:20]:
And presumably they didn't think to ask nor to penetrate the fights the site's theoretical security. Similarly it seems entirely reasonable that an AI might have left its own secret access credentials exposed in client visible JavaScript. After all, why wouldn't it? Pat told us that his friend, who had asked the AI to create the site for him, has no background in computer science or programming or it, and thus it would never in a million years occur to him that the AI might leave important secrets exposed. He wouldn't even know that that was a thing that could happen. Right? We talk about it all the time here. Pat's friend, who has no background in computers, coding or IT just, you know, wouldn't know to ask the AI to make sure that no secrets are visible in the JavaScript. So an argument could be made that such a person has no business creating and establishing such a website. In this case, the concern Pat shared would presumably only badly damage the unwitting creator of the site.

Steve Gibson [01:48:45]:
But it's not difficult to imagine alternate scenarios or where the unwitting users of some newly AI generated site, you know, with a similarly enthusiastic, you know, guy with an idea, would assume that the bar to entry for creating any website is naturally high enough that any site that exists must have been created by someone who knows the basics of online security. Oops, not anymore. Pat's example, which is perfect, demonstrates so clearly that bar has now been dropped to the floor and anyone can step over it. Today's AI contain a, as I've said, a great deal of knowledge, but the mistakes they make demonstrate that they may lack any understanding of that knowledge. And, and you know, they could give you security, but you have to know to ask one thing is clear. I think from these stories we are entering into a very interesting period where insanely low friction access to code and coding promises to create an entirely new class of problems we have never seen before. It's going to be interesting. Okay, we're going to talk about Daybreak and codename EM Dash after our last break.

Steve Gibson [01:50:19]:
And. Or did we do it? Nope, we just did Canary, so. Right.

Leo Laporte [01:50:26]:
And then, yes, let's talk about this.

Steve Gibson [01:50:29]:
How OpenAI and Microsoft are also using AI defensively.

Leo Laporte [01:50:34]:
Yeah, yeah. And I. You know what I've been using today during the show because of Google's IO. The. I don't know if the new Gemini. I've been using it. I don't think it's the new. No, it's not.

Leo Laporte [01:50:45]:
Oh, it is. That Casimir answer came from 3.5 flash, the new one. So they just updated it. So. Yeah, and it's been very good. It's been very good. The new Kate McKinnon's movie.

Steve Gibson [01:50:59]:
And is it a commercial $10 a month or two?

Leo Laporte [01:51:02]:
Like say I have the Gemini plus account because it comes, you know, there are a lot of Google subscriptions. I have Google one subscription, so I get a pro with it and a bunch of store tons of storage and all this other stuff. So it's kind of along for the ride, frankly. So I'm happy to use it.

Steve Gibson [01:51:23]:
All right, okay. So since breakthroughs in large language model AI are doubtless, as we're seeing, driving the most significant and rapid transformation in software, system and network activity we've ever seen, I mean, really, this is, it's a whole new era. Following Anthropic's disclosure and their limited access to their Claude Mythos preview, today we're going to look at two of the other major players in this space. Not to be left out, at least for long. OpenAI was quick to give what appears to be their still evolving solution a public face, naming it Daybreak and explaining. Daybreak is the first glimpse of sunlight in the morning for cyber defense. It means seeing Risk earlier, acting sooner, and helping make software resilient by design. Okay.

Steve Gibson [01:52:23]:
The other player who has stepped out into the light is none other than Microsoft with their awkwardly abbreviated internal tool, which they call Code name. And maybe they always put code name in front of it because maybe they're going to come up with a good name. Anyway, it's code name EM Dash, which stands for multi model, but they use the D in the middle of model for the D of Dash Multimodal. And then ASH is a genic scanning harness. Real catchy. So first let's look at what little is known Even now, about OpenAI's offering. Then we'll take a much deeper dive into what Microsoft has been up to, because it's significant and substantial. So Daybreak, that, that, that Tagline for open AI's Daybreak announcement, they called it Frontier AI for cyber defenders.

Steve Gibson [01:53:23]:
And underneath that, they've got two buttons on their announcement page. Request a vulnerability scan and contact sales. Okay. Their pitch reads, safer software resilient by design. OpenAI Daybreak is our vision to change the way software is built and defended. Daybreak is the first glimpse of sunlight in the morning for cyber defense. As I said, as I shared at the beginning, it means seeing risk earlier, acting sooner, and helping make software resilient by design. It starts from the premise that the next era of cyber defense should be built into software from the beginning by not only finding and patching vulnerabilities, but being resilient to Them by design.

Steve Gibson [01:54:14]:
So basically they asked AI to come up with a little pitch and that's what it spit out. I mean, you know, right, fine, great. We're not going to argue with that. Should be utterly clear by now that vulnerability discovery AI will have two major roles, right? Pre release vulnerability prevention, you find it before you release it, and post release vulnerability discovery. Pre release prevention will be performed by those who have access to the source code before it's distilled into a release binary. And post release discovery will be performed by those who have access either to the source in the case of open source, or by those who are motivated sufficiently to reverse engineer to the post release binaries in search of actionable vulnerabilities that either existed before pre release AI cleansing was available to fix it and apply patches, or, you know, it somehow escaped pre release discovery. You know, tomorrow's world is going to look very different from yesterday's world and right now we're in the middle, you know, in today's world. So whatever the case, it should be clear by now that the entire world of software, system and network security is deep in the midst of a complete sea change that is transforming it forever.

Steve Gibson [01:55:42]:
Nothing in our world, you know, security world will ever be, well, actually the wider world too will ever be the way it was at the start of this year, as we've noted. This doesn't mean that all security problems will disappear. Nope, since there are many causes of trouble other than imperfect and vulnerable software. But I believe one massive class of continuing trouble is almost assuredly, you know, going to be leaving the scene open AI's announcement of Daybreak speaks to exactly this effect. They wrote AI can now help defenders reason across code bases, identify subtle vulnerabilities, validate fixes, analyze unfamiliar systems and move from discovery to remediation faster. Because those same capabilities can be misused. Daybreak pairs expanded defense capability with trust verification, proportional safeguards, which is interesting, we'll get to that in a second. And accountability.

Steve Gibson [01:56:51]:
The goal is simple. Accelerate cyber defenders and continuously secure software. Daybreak combines the intelligence of OpenAI models, the extensibility of codecs as an agentic harness and our partners across the security flywheel. First time I've heard that term, the security I hope you don't fly off to help make the world safer for everyone. Defenders can bring secure code review, threat modeling, patch validation, dependency, risk analysis, detection and remediation guidance into the everyday development loop. So software becomes more resilient from the start in the coming weeks, which is part of what I thought was Interesting. They're not quite ready yet. I think Mythos caught them a little flat footed and they're like oh wait, oh yeah, we have something.

Steve Gibson [01:57:44]:
What should we call it? In the coming weeks, we're working with our industry and government partners as we prepare to deploy increasingly more cyber capable models as part of our approach to iterative deployment. That's right. So they're working on getting that thing together. Okay, so nothing else they said on their introducing day Bake page was any, you know, was surprising. But because they needed to say something, they did offer a couple bullet points. And then this talk about controlled containment. So they said focus, focusing on the threats that matter. Prioritize high impact issues and reduce hours of analysis to minutes with more efficient token usage.

Steve Gibson [01:58:43]:
Okay, Right. Patch safely at scale. Generate and test patches directly in your repositories with scoped access monitoring and review and verify. Verify every fix, send the results and audit ready evidence back to your systems to track and verify remediation. So this is all just like boilerplate. This is what we've come to expect. Now look how quickly we got spoiled. This is what AI should do if it's going to be taking care of that.

Steve Gibson [01:59:16]:
There was one final bit of interesting information they said under choose the right level of access and then contact the open AI team to align on the best model for your security workflows. They preview the three levels of access that they're talking about saying GPT 5.5, which is the default level, which has standard safeguards for general purpose use intended for general purpose developer and knowledge work. Presumably that means anybody can have access to GPT 5.5. Then you can go to level two more, which is GPT 5.5 with trusted access for cyber. They said more precise safeguards for verified defensive work in authorized environments. Intended for most defensive security workflows, including secure code review, vulnerability, triage, malware analysis, detection, engineering and patch validation. Okay, so you can do more with that one. So lowered or softened guardrails.

Steve Gibson [02:00:30]:
And then finally full strength at level three is GPT 5.5 Cyber, where they say most permissive behavior. For specialized authorized workflows paired with stronger verification and account level controls. Intended for preview access. For specialized workflows including authorized red teaming, penetration testing and controlled validation. So they're saying that in order for GPT 5.5 to be used for threat for cyber threat discovery, red teaming, penetration testing and so forth, GPT 5.5 must be freed from its normal shackles, which would otherwise prevent it from helping with such operations. Because an unshackled 5.5 could be abused by bad guys. The only model that can generally be used is the standard guard railed 5.5 that apparently will resist some of the things you might ask it to do. If you want the guard rails dropped then you need, you know, they need to know why and who you are so that you know pretty much nothing at this point.

Steve Gibson [02:01:49]:
I mean we've got like a list of what we would like it to be doing is you know, daybreak right where the sky has yet to lighten because so far all we have is darkness. But we know what open AI is going to be doing. Basically it's a, you know, a mythos catch up announcement essentially. So you know they'll have something too is what they're telling us something entirely different from Microsoft. I first picked up on this during last week's Windows Weekly when Paul and Richard noted that Microsoft had been using an AI driven system to uncover what they said on the podcast. Mass quantities of bugs in Windows. And apparently not just any old run of the mill random bugs, which we all know Microsoft fixes around 100 or so of these days every month. Oh no.

Steve Gibson [02:02:48]:
These bugs Microsoft was finding were what once would have been known as showstoppers, so named because they would single handedly stop the show to prevent the release of software. So I thought, okay, that's interesting. And I mistakenly initially thought they were talking about Microsoft using Mythos. Nope. Em Dash. So having learned of this from Paul and Richard, I went searching and located Microsoft's posting from the previous day, which was last Tuesday, where Microsoft for the first time revealed that they have a like, I guess I would call it a super Mythos like system of their own. Only of course theirs is more better. The reveal was posted by Tae Su Kim, Microsoft's Vice President of Agentic Security.

Steve Gibson [02:03:44]:
Okay, now he's the real deal. In 2014 now Dr. Kim received his PhD from MIT's EECS AI Research Lab. He's on leave currently from his professorship in the School of Cybersecurity and Privacy and the School of Computer Science at Georgia Tech. And it was he who led Team Atlanta, which took first place in DARPA's AI Cyber Challenge competition to build autonomous cyber reasoning systems to detect and remediate software vulnerabilities in open source projects. I'm not going to enumerate his many awards. He's littered with them. Suffice to say that this looks like the guy that yes indeed you would like to get to build your autonomous vulnerability finding and reasoning system and get him Microsoft did.

Steve Gibson [02:04:43]:
He posted last Tuesday titled Defense at AI Speed. Microsoft's new multimodal agentic security system tops leading industry benchmark and I'll say right off that it does start off with a bang, Dr. Kim writes. Today, Microsoft announced a major step forward in AI powered cyber defense. Our new agentic security system helped researchers find 16 new vulnerabilities across the Windows get this networking and authentication stack, including four critical remote code execution flaws in components such as the Windows kernel TCP IP stack and the ikev2 service. In other words, it doesn't get any more Internet facing than that. And these are critical RCE vulnerabilities in Windows TCP IP stack so you might wonder when do we get that Windows Update? Well, the answer is we got it the same day during May's patch Tuesday. So these things are fixed.

Steve Gibson [02:06:07]:
They were, they weren't going to affect every Windows server on the planet or, or you couldn't have talked about it then. They were in specific services that might not be used in every instance. So we're probably okay 4 critical RC in the windows kernel stack. So certainly better that Microsoft find these than somebody reverse engineering Windows networking. So Kim continues writing, they used the new they, meaning his team, the the MSRC people. They use the new Microsoft Security Multi Model Agentic scanning harness codename M Dash, which was built by Microsoft's autonomous code security team. Unlike single model approaches, the harness orchestrates, get this, more than 100 specialized AI agents across an ensemble of frontier and distilled models to discover debate and prove exploitable bugs end to end. The results, he writes, speaks for themselves.

Steve Gibson [02:07:25]:
21 of 21 planted vulnerabilities and I'll explain what that is. It's actually an interesting test that they give to their human candidates. Found with 0 false positives on a private test driver that is a software driver 96% recall against 5 years of confirmed Microsoft Security Response center cases in CLFS sys and 100% in TCP IP sys and an industry leading 88.45% score on the public cyber gym benchmark with 1507 real world vulnerabilities the top score on the leaderboard, roughly five points ahead of the next entry, he writes. The strategic implication is clear AI vulnerability discovery and has crossed from research curiosity into production grade defense at engineering scale. And the durable advantage lies in the agentic system around the model rather than any single model itself. Codename EM Dash is being used by Microsoft security engineering teams and tested by a small set of customers as part of a limited Private Preview this post explains how codename EM Dash works, what we shipped today, what we learned along the way, and how you can sign up for the private preview the Microsoft Autonomous Security, or autonomous code security that's called ACS Autonomous Code Security Team was assembled to take AI powered vulnerability research from a research curiosity to production engineering at enterprise scale. Several members of this team came to Microsoft from Team Atlanta, the team that won the 29.5 million dollar DARPA AI Cyber Challenge by building an autonomous cyber reasoning system that found and patched real bugs in complex open source projects. The lessons learned from that work, especially the level of engineering required to make the frontier language models perform professional level security auditing, are what our new multimodal agency scanning harness codename EM Dash is built around.

Steve Gibson [02:10:02]:
Microsoft's code base is challenging for security auditing for a few reasons, and he has three bullet points. First, massive proprietary Surface Windows, Hyper v Azure and the device driver and service ecosystems around them are private Microsoft code bases, not part of any commodity language models training corpus, and are genuinely difficult to reason about. Kernel calling conventions, IO request packets and lock invariants, inter process communication, trust boundaries and component internal idioms do not yield to pattern matching. On this Surface, a model must actually reason dev. Second, point DevSecOps at scale. Every finding has a real owner, a triage process and a patch Tuesday to land on. There's no quiet drawer for speculative findings. If a tool produces noise, the noise is everyone's problem.

Steve Gibson [02:11:15]:
And finally, high value targets Windows Hyper v, Xbox and Azure serve billions of users. The payoff for finding a single difficult bug is unusually high, and so is the cost of a false positive in a Tier one component. He says the findings in this post are the result of a close collaboration between acs, Microsoft Offensive Research and Security Engineering and Microsoft Windows Attack Research and Protection. Those acronyms are Morse and Warp, and he says Morse and Warp owned the deep hard end of Windows Offensive Research. ACS brings the AI powered discovery and validation pipeline. Together, the teams have collaborated to build a mature harness Okay, I now want to share what he explains about the structure of this startlingly complex agentic system, which Microsoft has designed and assembled. This is going to sound more like science fiction actually, than reality. A year ago it would have been regarded as a late April Fool's joke posting.

Steve Gibson [02:12:34]:
Today I'd imagine that Microsoft's competitors are combing through it, searching for hints. So get a load of this, he writes. A useful mental model is to think of it as a structured pipeline that takes a code base and emits validated proven findings okay pipeline 5 stages prepare stage ingests the source, the source target builds language aware indices and then draws the attack surface and threat models by analyzing the past commits. The scan stage runs specialized auditor agents over candidate code paths, emitting candidate findings with hypotheses and evidence. Third, the validation stage runs a second cohort of agents get this the debaters that argue for and against each findings reachability and exploitability. The fourth dedupe stage collapses semantically equivalent findings for example Patch based groupings. And finally the prove stage constructs and executes triggering inputs where the bug class admits it. The prove stage validates the precondition dynamically and formulates the bug triggering inputs to prove existence of vulnerability and he says the three properties make this work in practice.

Steve Gibson [02:14:20]:
An ensemble of diverse models that are effectively managed by codename EM Dash. No single model is best at every stage. The multimodal agentic scanning harness runs a configurable panel of models that includes state of the art models as the heavy reasoner, distilled models as a cost effective debater for high volume passes and a second separate state of the art model as an independent counterpoint. Disagreement between models is itself a signal. When an auditor flags something as suspect and the debater can't refute it, that finding posterior that findings posterior credibility goes up. Then we have specialized agents. An auditor does not reason like a debater, which does not reason like approver. Each pipeline stage has its own role prompt, regime tools and stop criteria.

Steve Gibson [02:15:25]:
We don't expect one prompt to do everything. We don't expect one agent to recognize, validate and exploit a bug in a single pass code name. M Dash has more than 100 specialized agents constructed through deep research with past common vulnerabilities and exposures. You know, CVEs and their patches working independently to discover the bugs and their auditing results will be ensembled as a single report and then end to end pipeline with extensible plugins the pipeline is opinionated, but it is not closed. Plugins let domain experts inject context the foundation models cannot see on their own. Kernel calling conventions, IRP rules, lock invariants, interprocessed communication, trust boundaries, codec state machines. The CLFS proving plugin we described below is one such example. A domain plugin that knows how to construct a triggering log file given a candidate finding.

Steve Gibson [02:16:36]:
For example, the Windows team extended reasoning with custom code analysis database or codeQL database can also be leveraged. The payoff for this architecture is portability across model generations. The pipelines targeting validation dedupe and Prove Stages are model agnostic by construction, which allows the harness to get the best of what any model has to offer. When a new model lands a B, testing it against the current panel is one configuration flip. When a model improves the customer's prior investment, scope files, plugins, configurations, calibrations all carry over, allowing customers to ride the frontier of security value. Wow. Everyone knows that the last thing I am is a Microsoft apologist. I'm probably harder on them than I am on any other major player in our industry.

Steve Gibson [02:17:45]:
One reason for that is that their behavior remains crucial to the functioning of much of the world. The other reason is that they're so big and so wealthy that it always seems that they should be able to do a better job if they only cared to do so. I have no doubt that they're filled with very good people, but there's an institutional inertia that often doesn't appear to be producing the best outcomes or for their customers. But in this case, holy crap. If we believe all of this, they've really built something truly significant here. And there's a bit more. Get this. They wrote to evaluate bug finding capabilities, the multimodal agentic scanning harness.

Steve Gibson [02:18:33]:
You need to first. You need to first ground on code that has never been seen by a model. Right? And we were talking about this just recently. Maybe one of the bugs that Mythos saw was actually it remembering something very similar. Not the same, but it may have contained it in its training, he wrote. This eliminates the possibility that a model, quote, learned the answers to the test, as he put it. We scanned Storage Drive, a sample device driver used in Microsoft interviews of offensive security researchers. The driver contains 21 deliberately injected vulnerabilities, including kernel use after freeze, integer handling issues, IOCTL validation gaps and locking errors.

Steve Gibson [02:19:33]:
Because Storage Drive is a private code base that has never been published, we can safely assume it was not included in the training data of modern large language models. We ran the EM Dash harness in its default configuration against Storage Drive. The result were striking. All 21 ground truth vulnerabilities were correctly identified with zero false positives. This simple test shows that the reasoning and vulnerability discovery capabilities of codename EM Dash can approximate professional offensive researchers and it doesn't get tired and it can go 24, 7, 365. We then used the harness to conduct a security audit of the most security critical part of Windows, namely Windows TCP IP network stack. Right? I mean that's what's, that's what's hooked to the Internet across the Windows network stack and adjacent services. Today's Patch Tuesday includes 16 CVEs our engineering teams found using CodeName Dash.

Steve Gibson [02:20:59]:
These vulnerabilities are 10 kernel mode, 6 user mode. The majority are reachable from a network position with no credentials. Okay, the paper then takes a deep dive into two of the 16 vulnerabilities that were found and fixed. It provides one way more detail than we need for the podcast, but the preface will give everyone a sense for what we for what they are he just wrote. The two findings below are characteristic of what the new Microsoft Security multi model agentic scanning harness pipeline can do that a single model harness cannot. The first is a kernel race condition use after free that requires reasoning about object lifetime across non trivial control flow and three independent concurrent free paths. The second is an alias aliasing double free that spans six source files and is only visible against the contrast of a correctly handled site elsewhere in the same code base. Okay, so stepping back from what gives all the appearance of being a significant achievement and an advancement.

Steve Gibson [02:22:26]:
I mean a bonafide advancement in automated vulnerability discovery at scale and one that cannot come too soon. Of course, as we know for the Windows code base, since Windows source code is closed, we don't know objectively that open AI's daydream I mean Daybreak or Anthropics Mythos would not also have been able to find these problems. We don't know for sure, but Kim appears certain that no single model could do so, and this is his pedigree. So you know, I'm inclined to trust that, although obviously he has a pro Microsoft bias. But this is also related to the approach that he took to win the DARPA prize. And one of the beauties of the system that Microsoft has created is that it appears, as he said, to be model agnostic. We don't know whether Microsoft has their own internal models or much about them, but this assumes that they can use any model and plug it into this. So it might well be, you know, using OpenAI's or anthropics models running as its agents.

Steve Gibson [02:23:42]:
In any event, I'm sure everyone understands why we need to to talk about this today. This is truly huge. I mean, imagine Patch Tuesday going away because there's nothing to patch instead of, oh, a hundred things this month and a hundred things last month. I've got no doubt that it's going to take Microsoft some time for what they appear to insist upon calling code codename Em Dash. You know, it's got to rummage around throughout their truly massive and buggy code base but once we emerge on the other side of that, Windows has at least the chance of leading the world in security rather than itself apologizing constantly for all of the problems that it has. As Kim wrote, AI vulnerability discovery has crossed from research curiosity into production grade defense at enterprise scale. And given the evidence as presented, I see no trace of exaggeration there. It's going to be interesting when we get to the point where some future AI is able to say to Microsoft's security group, guys, you realize that our Edge browser is needlessly leaving all of its users login URLs, usernames and passwords decrypted in RAM for no reason, right? You know, I we're not there yet because that wasn't a bug.

Steve Gibson [02:25:14]:
But really looking like AI is going to forever change the landscape of security of software. Leo and boy, has this happened fast.

Leo Laporte [02:25:27]:
Yeah, it's amazing. What a world. Well, there you go. I'm sure this is not the last time we'll be talking about AI security tools. They're pretty amazing. They're out there.

Steve Gibson [02:25:39]:
Wow.

Leo Laporte [02:25:40]:
Yeah. Steve Gibson is@grc.com that's his website site, proudly straight out of the 1990s. But you know what? It's good. There's great stuff there, including spinrite, the world's best mass storage maintenance, recovery and performance enhancing utility. Brand new version out 6.1. If you don't have spin right yet and you got mass storage, you got to get it. GRC.com, you'll also find his DNS Benchmark Pro which is brand new, just came out and you'll find a page you can go to to submit your email address. That can do two things.

Leo Laporte [02:26:18]:
One, it whitelists your address so that you can send him questions, comments, pictures of the week. And two, right below the submission form there are two checkboxes. One for his weekly security now show notes which he sends out every week, usually around Sunday, Monday before the show. And then there's a second email list which doesn't operate too often when there's something new for Steve to announce both of those. Grc.comemail he also has of course, the show. There you'll find 16 kilobit audio for the bandwidth impaired, 64 kilobit audio for people with ears. Here's also a really good human written by Elaine Ferris, transcription of the show that takes a few days to come out because Elaine is not as fast as an AI, but she's better. He also has the show notes themselves if you want to just click a link There.

Leo Laporte [02:27:12]:
Great to read along as you listen to the show. There's illustrations. He always puts a lot of effort into those great show notes.

Steve Gibson [02:27:18]:
Again.

Leo Laporte [02:27:18]:
GRC.com we have copies of the show at our site as well. Audio and video. 128 kilobit audio video. That's twit TV SN. There is a YouTube channel dedicated to this and of course you can subscribe in your favorite podcast client if you want to get it automatically as soon as we're done. If you want to listen while we're doing it. We were a little late today because of Google I O, but normally we do the show right after Mac break weekly, 1:30 Pacific, 4:30 Eastern. That's 20:30 UTC.

Leo Laporte [02:27:49]:
We stream it in seven different places. Of course, if you're in the club, and we do hope you're in the club, club trip members can listen to the club to a discord, but everybody can listen on YouTube, Twitch X, Facebook, LinkedIn and Kick. So pick your poison. Listen live and chat with us live as we're doing the show. We appreciate that when you do that, Steve, I think that covers all the business. There are questions and I might as well do this. There's a discussion in the Discord, our club Twit Discord, about the tapes over your right shoulder there. What are those tapes over your right, to your right or something.

Leo Laporte [02:28:30]:
There's boxes to your right. Those. What are those?

Steve Gibson [02:28:37]:
Those are old school. Hi eight videos.

Leo Laporte [02:28:42]:
Oh, okay. So Edmonton Oiler guy, you were right. He thought they were DV tapes. I thought maybe they were data backup tapes, but no, those are.

Steve Gibson [02:28:56]:
Well, one says GRC 1990.

Leo Laporte [02:29:00]:
That I'd like to see the video of that. Why are they sitting there? Or have they been sitting there since 1990?

Steve Gibson [02:29:07]:
They probably have been sitting there since about 1990.

Leo Laporte [02:29:12]:
Okay. We were having a little discussion trying to figure out were they DV tapes. I thought maybe they were backup tapes, but no, they are.

Steve Gibson [02:29:21]:
Yeah, I was for a while. I was doing something we had back in the early days of Spin. Right. Soft Sell, which was a major distributor at the time, had a traveling conference they called Soft Teach. And I was one of the presenters. And we recorded me on a couple instances somewhere, I think it's online. Me with hair, dark hair and a dark mustache, explaining how Spinrite works, drawing on a whiteboard and being quite animated.

Leo Laporte [02:29:58]:
Oh, how fun.

Steve Gibson [02:29:59]:
And I think it's. I think that's where those. I think it came from one of those tapes. Nice digitizing that. Yeah.

Leo Laporte [02:30:05]:
All right. Okay.

Steve Gibson [02:30:07]:
Okay.

Leo Laporte [02:30:07]:
Edmonton Oiler guy You win.

Steve Gibson [02:30:10]:
Yep.

Leo Laporte [02:30:11]:
You were right. He said I was sure I was sure. They were. Steve. Have a wonderful week. We will see you next week right here on Tuesday.

Steve Gibson [02:30:19]:
For now. Till then. Bye.

Leo Laporte [02:30:24]:
Security now.

All Transcripts posts