Bart Busschots did a talk for the Connecticut Macintosh Connection (aka CTMac) at ctmac.org a few weeks ago where he explained how the Internet of Things can be a concern for the security of your home network. Of course he didn’t stop there, he sent on to explain how for a fairly small amount of money, you can keep yourself secure.
Bart and I decided this would make a terrific topic for Chit Chat Across the Pond. He produced a 67 chart Keynote that we do NOT go through in its entirety, in fact we skip the middle 40 or so pages, but they’re there if you have in depth questions about how anything he discusses.
A few years ago I got FiOS and my ISP gave me a combo modem/router. I talked to Bart and he helped me figure out how to basically emasculate the FiOS router so that I could use my Airport Extreme to serve out DHCP addresses and WiFi. I created a tutorial as he explained it to me and he made a terrific graphic showing how it works, and we put it up on podfeet.com/… so others could learn how to do it too.
In an episode of Chit Chat Across the Pond that you will hear next week, (darn that time travel), you’ll hear Bart explain the security problems with Internet of Things devices. His conclusion is that you can secure yourself by using a third router. I don’t want to spoil the episode so I’ll leave it as a teaser for you to learn exactly why you might want to do it and how it all works. I’ll just say that the main idea is to have your Internet of Things devices on one router, while everything else you care about lives on a second router. Continue reading “You NEED This Wicked Cool Router: Netgear X8 5300”
I lost my voice this week so I asked the Text-to-Speech voice named, coincidentally, Allison to step in for me and MC the show. Luckily we’ve got two interviews from the CSUN Person’s With Disabilities Expo. First, we’ll hear about the BlindShell Smartphone for the visually impaired that might also be helpful to the elderly in its simplicity from blindshell.com/. My favorite interview of the show was about the Sesame Smartphone for those with motor Impairment from sesame-enable.com. Next I explain (or I should say Allison explains) how she made fire this week by editing a cron job all by herself without Bart’s help. Speaking of Bart, he’s back with some really interesting Security Bits.
We’ll start with a clarification from Bart on how this two-factor authorization works. Then we’ll have fun with redirects as I explain that there’s a podfeet url for whatever you want. I’ll tell you about our amazing adventure trying to figure out what was killing just our 2.4GHz wifi network. In Security Bits, Bart will bring us up to speed on the latest with the FBI vs. Apple story, and he’ll explain how no users lost data in the first real world Mac Ransomware Attack.
I watched the entire five hours of the Judiciary Committee Hearings in the case of the FBI vs. Apple, so you didn’t have to. I think you’ll like what you hear, it’s actually optimistic about our government officials. Next up I’ll tell you how I did not do a nuke and pave, and why you should do what I say, not what I do. Then we’ll have a monster Security Bits with Bart Busschots.
When Steve told me that they were going to broadcast live the House of Representatives Judiciary Committee Hearing on Apple vs the FBI, my first thought was that watching that would be like volunteering for jury duty. I couldn’t have been more wrong. Steve and I watched all five hours and I was positively glued to my screen.
Before we dig in, let’s make sure we all know what the Judiciary Committee is, what does it have to do with the House of Representatives and what are they doing chatting with the FBI and Apple? I’m not a legal scholar, so I looked it up on Wikipedia:
The U.S. House Committee on the Judiciary, also called the House Judiciary Committee, is a standing committee of the United States House of Representatives. It is charged with overseeing the administration of justice within the federal courts, administrative agencies and Federal law enforcement entities.
In this episode of Chit Chat Across the Pond, we’re joined by Barry Fulk. Barry is known as the nicest guy in the world who specializes in stalking Mac podcasters. He also directs mobile device management at a large, highly regulated company. He joins us to explain what MDM, or Mobile Device Management is, and how it allows two people in his company to manage thousands of iPhones and iPads. His specific expertise is in the MDM tool called Mobile Iron. We wanted to talk about this to help explain what the County of San Bernadino could have, and should have been able to do with Mobile Iron, which they actually had in house but didn’t configure properly. Barry and I talk about encryption and tunneling and data security. It’s a good geek time! You can find Barry on Twitter at @fulkb.
This week’s show is going to be a little bit different. We’ve got three cool gadget interviews, a Dumb Question asked and answered by Mark Pouley of Twin Lakes Images which is pretty standard fun, but then we’re going to switch gears to Security Bits where Bart and I will spend some quality time going over the FBI/Apple iPhone issue in detail. We both thought it was too important to do a quick bit on it. Bart will explain what we know as facts, then what the security experts think about it and finally Bart will explain his view of the situation. I think it’s a great discussion. As always Bart includes links to all of the articles he quotes.
We get to listen to three more CES Interviews: Robo 3D Printers – a company with a social conscience, Ember Smart Mug to keep your liquids hot (or cold) and Hydrao Smart Shower Head that hopes to gamify your water usage. I mix into that an interesting story about how Dorothy almost lost $300 worth of music from iTunes but employing the “if you don’t like what Mom says, ask Dad” strategy she got all of her music back. I also do a review of the awesome MyScript Stylus “keyboard” for iOS that does on-the-fly OCR as you write by hand with a stylus or Apple Pencil. We also have a quick conversation with Bart Busschots from bartb.ie about the bruhaha that broke just recently when Adobe’s Creative Cloud installer broke Backblaze backup software.
Steve and I had far too much fun setting up and testing the Ring Video Doorbell from http://ring.com. Because it was so much fun I have way too much to say about it. I’m going to break this review down into segments that perhaps will help you understand the bits you care about and, if you read long enough, learn why we had to buy a Craftsman wood router. Oddly I’m going to start with the Bottom Line and then back into The Problem To Be Solved followed by Usage, and then by Setup & Troubleshooting. Installation is where I really start to ramble so we’ll do that last.