After a couple of weeks with Apple and Google two-factor authentication running, I thought I should give you an update. After the initial huge pain from Google, and the very mild pain from adding two-factor authentication from Apple, they both settled down and I haven’t been challenged for an authorization code in the last couple of weeks. Now that I’m over the hump, I have to admit that Bart was right when he said once you have it set up, it doesn’t bother you very often at all.
Bart also explained something (about 12 times till I grokked it) that helped me understand one vital piece.
I bit the bullet this week and turned on two-factor authentication for both my NosillaCast Google Account and my Apple ID. It was an “interesting” adventure in the same vein as the Chinese curse, “May you have interesting times.” The two experiences were really different and I’m not sure which one was better. In-between those two discussions we’ll cleanse our palettes with a discussion of David Sparks new Hazel Video Field Guide. After we’re done with the two-factor discussion, Bart joins us for Security Bits.
Last week on Chit Chat Across the Pond, Bart worked me over yet again that I should do two-factor authentication on my email accounts. I whined a lot as I’m sure you heard. Some of you were thinking, “Oh Allison, quit your whining. It’s not THAT hard and it’s totally worth it because you’re protecting the crown jewels.” On the other hand, there were those of you who were saying, “It sounds really hard to me too!”
When we were talking about it, I compared it to how things were in the old days when the subject was doing backups. We all knew it was smart to do backups, but it was a nightmare to do it in an automated way. Until it got so easy all you did was plug in a hard drive, many of us procrastinated on doing what was right for a long time.
Happy 11th anniversary to the NosillaCast! You can listen to the first show that aired on Sunday May 15, 2005. I’ll tell you about EasilyDo Email which might just make your life easier, and then I have a review of the new Ricoh Theta S 360 degree camera. Bart is back with Security Bits (spoiler: there’s updates to everything!)
Bart Busschots did a talk for the Connecticut Macintosh Connection (aka CTMac) at ctmac.org a few weeks ago where he explained how the Internet of Things can be a concern for the security of your home network. Of course he didn’t stop there, he sent on to explain how for a fairly small amount of money, you can keep yourself secure.
Bart and I decided this would make a terrific topic for Chit Chat Across the Pond. He produced a 67 chart Keynote that we do NOT go through in its entirety, in fact we skip the middle 40 or so pages, but they’re there if you have in depth questions about how anything he discusses.
A few years ago I got FiOS and my ISP gave me a combo modem/router. I talked to Bart and he helped me figure out how to basically emasculate the FiOS router so that I could use my Airport Extreme to serve out DHCP addresses and WiFi. I created a tutorial as he explained it to me and he made a terrific graphic showing how it works, and we put it up on podfeet.com/… so others could learn how to do it too.
In an episode of Chit Chat Across the Pond that you will hear next week, (darn that time travel), you’ll hear Bart explain the security problems with Internet of Things devices. His conclusion is that you can secure yourself by using a third router. I don’t want to spoil the episode so I’ll leave it as a teaser for you to learn exactly why you might want to do it and how it all works. I’ll just say that the main idea is to have your Internet of Things devices on one router, while everything else you care about lives on a second router. Continue reading “You NEED This Wicked Cool Router: Netgear X8 5300”
I lost my voice this week so I asked the Text-to-Speech voice named, coincidentally, Allison to step in for me and MC the show. Luckily we’ve got two interviews from the CSUN Person’s With Disabilities Expo. First, we’ll hear about the BlindShell Smartphone for the visually impaired that might also be helpful to the elderly in its simplicity from blindshell.com/. My favorite interview of the show was about the Sesame Smartphone for those with motor Impairment from sesame-enable.com. Next I explain (or I should say Allison explains) how she made fire this week by editing a cron job all by herself without Bart’s help. Speaking of Bart, he’s back with some really interesting Security Bits.
We’ll start with a clarification from Bart on how this two-factor authorization works. Then we’ll have fun with redirects as I explain that there’s a podfeet url for whatever you want. I’ll tell you about our amazing adventure trying to figure out what was killing just our 2.4GHz wifi network. In Security Bits, Bart will bring us up to speed on the latest with the FBI vs. Apple story, and he’ll explain how no users lost data in the first real world Mac Ransomware Attack.
I watched the entire five hours of the Judiciary Committee Hearings in the case of the FBI vs. Apple, so you didn’t have to. I think you’ll like what you hear, it’s actually optimistic about our government officials. Next up I’ll tell you how I did not do a nuke and pave, and why you should do what I say, not what I do. Then we’ll have a monster Security Bits with Bart Busschots.
When Steve told me that they were going to broadcast live the House of Representatives Judiciary Committee Hearing on Apple vs the FBI, my first thought was that watching that would be like volunteering for jury duty. I couldn’t have been more wrong. Steve and I watched all five hours and I was positively glued to my screen.
Before we dig in, let’s make sure we all know what the Judiciary Committee is, what does it have to do with the House of Representatives and what are they doing chatting with the FBI and Apple? I’m not a legal scholar, so I looked it up on Wikipedia:
The U.S. House Committee on the Judiciary, also called the House Judiciary Committee, is a standing committee of the United States House of Representatives. It is charged with overseeing the administration of justice within the federal courts, administrative agencies and Federal law enforcement entities.