{"id":5634,"date":"2014-09-28T19:37:08","date_gmt":"2014-09-29T02:37:08","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=5634"},"modified":"2024-12-15T19:17:59","modified_gmt":"2024-12-16T03:17:59","slug":"490-verizon-vs-att-radios-backing-up-drobo-to-drobo-mac-mini-monitor-hack-chronosync-shellshock-explained-ttt-search","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2014\/09\/490-verizon-vs-att-radios-backing-up-drobo-to-drobo-mac-mini-monitor-hack-chronosync-shellshock-explained-ttt-search\/","title":{"rendered":"#490 Verizon vs AT&#038;T Radios, Backing up Drobo to Drobo, Mac Mini Monitor Hack, Chronosync, Shellshock Explained, TTT Search"},"content":{"rendered":"<p>I&#8217;m weary of defending Apple and I explain why.  In Dumb Question Corner Steve Davidson asks for an explanation of whether the new iPhones from Verizon and AT&#038;T can actually be moved between the two carriers and I find the answers at <a href=\"https:\/\/www.apple.com\/iphone-6\/specs\/\" target=\"_blank\">https:\/\/www.apple.com\/iphone-6\/specs\/<\/a> and <a href=\"http:\/\/www.techwalls.com\/differences-between-iphone-6-6-plus-models\/\" target=\"_blank\">http:\/\/www.techwalls.com\/differences-between-iphone-6-6-plus-models\/<\/a>. Steve and I continue our adventure figuring out how to back up one Drobo with another. I mention the <a href=\"http:\/\/www.amazon.com\/Belkin-Thunderbolt-Compatible-Technology-Separately\/dp\/B00BQHD4B8\/ref=as_sl_pc_ss_til?tag=httppodfeecom-20&#038;linkCode=w01&#038;linkId=SJIVSLFIF62CITXU&#038;creativeASIN=B00BQHD4B8\" target=\"_blank\">Belkin Thunderbolt dock from Amazon<\/a>, <a href=\"https:\/\/itunes.apple.com\/us\/app\/resistorvision\/id839853035?mt=8\" target=\"_blank\">ResistorVision<\/a> to read resistor values, Chronosync backup software from <a href=\"http:\/\/www.econtechnologies.com\/chronosync\/overview.html\" target=\"_blank\">Econ Technologies<\/a> and a <a href=\"http:\/\/blog.macminicolo.net\/post\/33839671756\/build-a-dummy-dongle-for-a-headless-mac-mini\" target=\"_blank\">hack to convince the Mac Mini that it has a monitor connected when it doesn&#8217;t<\/a>. In Chit Chat Across the Pond Bart breaks down the Shellshock vulnerability, and in Taming the Terminal Part 21 of n, we learn more about searching from the Terminal.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-5634-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_09_28.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_09_28.mp3\">http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_09_28.mp3<\/a><\/audio><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" alt=\"itunes\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_09_28.mp3\" target=\"_blank\">mp3 download<\/a><br \/>\n<!--more--><br \/>\nHi this is Allison Sheridan of the NosillaCast Mac Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Macintosh bias. Today is Sunday September 28, 2014 and this is show number 490. <\/p>\n<h3>Blog Posts<\/h3>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/09\/defend-apple\/\" title=\"Weary of Trying to Defend Apple\" target=\"_blank\">Weary of Trying to Defend Apple<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/09\/dumb-question-corner-can-att-and-verizon-phones-work-on-each-others-network\/\" title=\"Dumb Question Corner \u2013 Can AT&#038;T and Verizon Phones Work on Each Others Network?\">Dumb Question Corner \u2013 Can AT&#038;T and Verizon Phones Work on Each Others Network?<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/09\/backing-up-a-drobo\/\" title=\"Backing up a Drobo \u2013 The Adventure Continues\">Backing up a Drobo \u2013 The Adventure Continues<\/a><\/h4>\n<h3>Clarify<\/h3>\n<p>Hey that sounds like a great segue for an ad for Clarify! Like I said, I didn&#8217;t do the tutorial for anyone but me, but it&#8217;s amazing how often someone else finds one of these tutorials useful so I always share them no matter how arcane they are.  I dropped in links to things like the Apple support article explaining how if you have an Airport device or an Apple TV, either one of them will just magically make your Macs wake up for you if you need them. I put in screenshots, blurred out usernames and passwords, drew boxes around buttons I should push next time and made myself little notes to explain why I set switches a certain way. It&#8217;s not a complex tutorial or even all that complicated to execute but I just hate having to figure out something a second time.  <\/p>\n<p>If you&#8217;re forgetful or even just lazy (I&#8217;m both) grab yourself a copy of Clarify from <a href=\"http:\/\/clarify-it.com\">clarify-it.com<\/a> and save yourself time and energy.  Heck, you don&#8217;t even have to share your tutorials with anyone but yourself to get productivity out of Clarify.<\/p>\n<h3>Chit Chat Across the Pond &#8211; Time 23:24<\/h3>\n<p><strong>Security Medium &#8211; Shellshock<\/strong><\/p>\n<p>This week it emerged that there has been a nasty bug in BASH for years. Initially it was just &#8216;the BASH vulnerability&#8217;, but someone nicknamed it Shellshock, and it stuck, so that&#8217;s how the media are running with it now.<\/p>\n<p>The vulnerability is in how BASH handles environment variables, and the result of exploitation is code execution. While you might think the shell is not very exposed over the network, the problem is that lots of services utilise environment variables, and lots of Linux and Unix servers use BASH to handle environment variables (at least by default), so in reality remote code execution through stuff like web servers is actually as easy as sending a request to the server containing a carefully crafted HTTP header. Researchers have also found that some DHCP implementations (NOT Apple&#8217;s custom one) expose the vulnerability.<\/p>\n<p>A server bug allowing remote code execution is exactly what you need to get an internet worm going, and that&#8217;s exactly what is starting to happen in the wild. Researchers have already found botnets spreading themselves using this vulnerability.<\/p>\n<p>Most Unix and Linux distributions were quick to shift a patch, so sysadmins all around the world spent Wednesday night and Thursday patching like mad.<\/p>\n<p>Then it turned out the first patch didn&#8217;t really fix all of the problem, so a second patch had to be released &#8211; so all those overworked sysadmins got to do it again 24 hours later!<\/p>\n<p>The big problem is that not all things that use BASH have been patched:<\/p>\n<ul>\n<li>There is no patch from Apple yet, but they say they are working on one, and that the vast majority of Mac users are not in danger<\/li>\n<li>There are more embedded devices with BASH on them than you can shake a stick at. In theory we should all be getting lots of firmware updates soon, but of course many older devices will never get patches, and even on devices where there are patches, loads of people will never bother to apply the updates, or even know that they should.<\/li>\n<\/ul>\n<p>Then, on Saturday, we got another sting in the tail &#8211; security researchers are now saying that even the second patch does not actually fully resolve the problem, and that really, BASH needs fundamental changes that will break backwards compatibility in order to really lock this down. Expect sysadmins to be playing bash whack-a-mole for some time to come \ud83d\ude41<\/p>\n<p>People have been saying this is on the same scale as heart bleed, but it&#8217;s actually WORSE &#8211; heart bleed just leaked data, this gives attackers the ability to execute any code of their choice on vulnerable devices!<\/p>\n<p>What should you, as a user, do?<\/p>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">If you run Linux &#8211; patch it<\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">If you run a Mac &#8211; sit tight, Apple is working on a patch, and unless you are running your Mac as an internet-accessible server, you are probably safe anyway. If you do run your Mac as a server, you should consider manually updating BASH<\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">Keep an eye out for firmware updates for routers and IP cameras and other smart devices, and install them as they come out<\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">Buy a sysadmin a coffee &#8211; they could probably do with one \ud83d\ude42<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 13px; line-height: 1.5em;\">Links:<\/span><\/p>\n<ul>\n<li>A nice human-friendly Shellshock FAQ from Naked Security &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/09\/25\/bash-shellshock-vulnerability-what-you-need-to-know\/\">http:\/\/nakedsecurity.sophos.com\/2014\/09\/25\/bash-shellshock-vulnerability-what-you-need-to-know\/<\/a><\/li>\n<li>A good summary by Brian Krebs &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/shellshock-bug-spells-trouble-for-web-security\/\">http:\/\/krebsonsecurity.com\/2014\/09\/shellshock-bug-spells-trouble-for-web-security\/<\/a> <\/li>\n<li>Apple release a statement saying most users are not in danger, but that a patch is on the way &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/apple-working-on-shellshock-fix-says-most-users-not-at-risk\/\">http:\/\/arstechnica.com\/security\/2014\/09\/apple-working-on-shellshock-fix-says-most-users-not-at-risk\/<\/a> <\/li>\n<li>A great summary form a Mac-user point of view from Rich Mogull on TidBits &#8211; <a href=\"http:\/\/tidbits.com\/article\/15105\">http:\/\/tidbits.com\/article\/15105<\/a><\/li>\n<li>Exploits are happening the wild &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/concern-over-bash-vulnerability-grows-as-exploit-reported-in-the-wild\/\">http:\/\/arstechnica.com\/security\/2014\/09\/concern-over-bash-vulnerability-grows-as-exploit-reported-in-the-wild\/<\/a> <\/li>\n<li>There may be even MORE vulnerabilities &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/still-more-vulnerabilities-in-bash-shellshock-becomes-whack-a-mole\/\">http:\/\/arstechnica.com\/security\/2014\/09\/still-more-vulnerabilities-in-bash-shellshock-becomes-whack-a-mole\/<\/a><\/li>\n<\/ul>\n<h4>Security Light<\/h4>\n<p>Important Security Updates:<\/p>\n<ul>\n<li>Apple release iOS 8 Patching many security bugs (this means the iPhone 4 is now dead &#8211; <a href=\"http:\/\/www.intego.com\/mac-security-blog\/if-you-care-about-security-throw-away-your-iphone-4-right-now\/\">http:\/\/www.intego.com\/mac-security-blog\/if-you-care-about-security-throw-away-your-iphone-4-right-now\/<\/a>)<\/li>\n<li><span style=\"line-height: 1.5em;\">Apple release and then very quickly un-release iOS 8.0.1 when it causes problems on some new iPhones &#8211; <\/span><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/www.macrumors.com\/2014\/09\/24\/ios-8-0-1-issues-possible-fix\/\">http:\/\/www.macrumors.com\/2014\/09\/24\/ios-8-0-1-issues-possible-fix\/<\/a><span style=\"line-height: 1.5em;\">, Apple also <\/span>release instructions for down-grading to iOS 8.0 &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6487\">http:\/\/support.apple.com\/kb\/HT6487<\/a><\/li>\n<li><span style=\"line-height: 1.5em;\">Apple release iOS 8.0.2 &#8211; a non-broken version of iOS 8.0.1 &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/ios-8-0-2-released-to-fix-touchid-cell-network-woes-on-newest-iphones\/\">http:\/\/arstechnica.com\/apple\/2014\/09\/ios-8-0-2-released-to-fix-touchid-cell-network-woes-on-newest-iphones\/<\/a><\/span><\/li>\n<li><span style=\"line-height: 1.5em;\">Mozilla fix a bug in their certificate-processing code that made it possible to fake certs &#8211; this fix is in all the products you&#8217;d expect like FireFox and Thunderbird &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/09\/25\/mozilla-fixes-phishing-friendly-cryptographic-bug-in-firefox-and-thunderbird\/\">http:\/\/nakedsecurity.sophos.com\/2014\/09\/25\/mozilla-fixes-phishing-friendly-cryptographic-bug-in-firefox-and-thunderbird\/<\/a>, but <\/span>that same code is also used on many other applications because it is available separately from FireFox &amp; Thunderbird as a certificate validation package called NSS (Netscape Security Services), which is used to validate certificates in many versions of Linux. Thankfully the NSS patch came out about the same time as the first of the BASH patches, so most sysadmins will have caught both patches at the same time &#8211; <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/772676\">http:\/\/www.kb.cert.org\/vuls\/id\/772676<\/a><\/li>\n<li><a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/772676\"><\/a><span style=\"line-height: 1.5em;\">Apple update OS X to 10.9.5, and patch OS X 10.8 &amp; 10.7 as well &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/apple-releases-os-x-10-9-5-with-fixes-new-code-signing-requirements\/\">http:\/\/arstechnica.com\/apple\/2014\/09\/apple-releases-os-x-10-9-5-with-fixes-new-code-signing-requirements\/<\/a><\/span><\/li>\n<li><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/apple-releases-os-x-10-9-5-with-fixes-new-code-signing-requirements\/\"><\/a>Apple updates Apple TV version 7 &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6442\">http:\/\/support.apple.com\/kb\/HT6442<\/a> <\/span><\/li>\n<li><span style=\"line-height: 1.5em;\">Adobe release critical patch to Acrobat &amp; Reader &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/critical-update-for-adobe-reader-acrobat\/\">http:\/\/krebsonsecurity.com\/2014\/09\/critical-update-for-adobe-reader-acrobat\/<\/a> <\/span><\/li>\n<\/ul>\n<p>Important Security News:<\/p>\n<ul>\n<li>Apple expand 2FA to protect iCloud backups &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/apples-two-factor-authentication-now-protects-icloud-backups\/\">http:\/\/arstechnica.com\/security\/2014\/09\/apples-two-factor-authentication-now-protects-icloud-backups\/<\/a> <\/li>\n<li>Google stops a malicious advertising campaign, but not before malware was served in ads placed on big reputable sites including Last.fm, the Times of Israel, and The Jerusalem Post &#8211; yet more proof that you are in danger EVERYWHERE on the web, not just on &#8216;dodgy&#8217; sites &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/google-stops-malicious-advertising-campaign-that-could-have-reached-millions\/\">http:\/\/arstechnica.com\/security\/2014\/09\/google-stops-malicious-advertising-campaign-that-could-have-reached-millions\/<\/a><\/li>\n<li>Apple focuses on their commitment to privacy in a number of ways: iOS 8 will make it impossible for Apple to get data off a locked iOS device, hence making it impossible for them to honour requests from law enforcement &#8211; <a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/apple-expands-data-encryption-under-ios-8-making-handover-to-cops-moot\/\">http:\/\/arstechnica.com\/apple\/2014\/09\/apple-expands-data-encryption-under-ios-8-making-handover-to-cops-moot\/<\/a>, Apple updated their privacy policy &#8211; <a href=\"http:\/\/www.apple.com\/legal\/privacy\/en-ww\/\">http:\/\/www.apple.com\/legal\/privacy\/en-ww\/<\/a>, Tim Cook penned a Steve-Jobs-esque public letter on the topic, which is very human-friendly, and shows Apple have the right idea, so while they may make mistakes, at least they&#8217;re striving for the right thing &#8211; <a href=\"http:\/\/www.apple.com\/privacy\/\">http:\/\/www.apple.com\/privacy\/<\/a>, and Tim Cook did a long interview with Charlie Rose where he explained why it&#8217;s important to follow the money &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/apple-ceo-tim-cook-on-privacy-follow-the-money\">http:\/\/www.macobserver.com\/tmo\/article\/apple-ceo-tim-cook-on-privacy-follow-the-money<\/a> (that argument sounds familiar \ud83d\ude09 &#8211; <a href=\"https:\/\/www.bartbusschots.ie\/s\/2013\/03\/16\/follow-the-money-and-be-ware-of-digital-underpants-gnomes\/\">https:\/\/www.bartbusschots.ie\/s\/2013\/03\/16\/follow-the-money-and-be-ware-of-digital-underpants-gnomes\/<\/a>)<\/li>\n<li>Google have patched a critical flaw that endangered users of all versions of Android before 4.4. The bug affects the built-in browser and HTML renderer in all versions of Android before 4.4. This bug is spectacularly dangerous as it allows attackers to breach the single most important security feature on the web &#8211; the same origin policy. Code on a web page on one domain should not be able to read data on web pages from other domains, i.e. the JavaScript served in an Ad should never be able to read your password from your bank&#8217;s login page, but that safeguard was broken. Google have released a patch, but as ever with Android, uptake of the patch is expected to be very slow &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/android-browser-flaw-a-privacy-disaster-for-half-of-android-users\/\">http:\/\/arstechnica.com\/security\/2014\/09\/android-browser-flaw-a-privacy-disaster-for-half-of-android-users\/<\/a><\/li>\n<\/ul>\n<p>Notable Breaches:<\/p>\n<ul>\n<li>Jimmy Johns confirms breach in 216 stores &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/jimmy-johns-confirms-breach-at-216-stores\/\">http:\/\/krebsonsecurity.com\/2014\/09\/jimmy-johns-confirms-breach-at-216-stores\/<\/a> <\/li>\n<li>Signature Systems, the POS vendor blamed for the Jimmy Johns breach says the breach may be bigger than just Jimmy Johns, and include 100 other independent restaurants &#8211;<a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/signature-systems-breach-expands\/\">http:\/\/krebsonsecurity.com\/2014\/09\/signature-systems-breach-expands\/<\/a>  <\/li>\n<li>Trip Advisor&#8217;s Viator lost 880K Credit Cards &#8211; fraudulent transactions are showing on some of the stolen cards &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/880k-creditcards-stolen-in-tripadvisor-data-breach\">http:\/\/www.macobserver.com\/tmo\/article\/880k-creditcards-stolen-in-tripadvisor-data-breach<\/a> <\/li>\n<li>We continue to learn more about the massive Home Depot breach (56M cards, problem was probably on self-checkout lanes, former employees claim the problems had been highlighted for years, but never fixed): <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/home-depot-56m-cards-impacted-malware-contained\/\">http:\/\/krebsonsecurity.com\/2014\/09\/home-depot-56m-cards-impacted-malware-contained\/<\/a>, <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/in-home-depot-breach-investigation-focuses-on-self-checkout-lanes\/\">http:\/\/krebsonsecurity.com\/2014\/09\/in-home-depot-breach-investigation-focuses-on-self-checkout-lanes\/<\/a>,  <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/home-depots-former-security-architect-had-history-of-techno-sabotage\/\">http:\/\/arstechnica.com\/security\/2014\/09\/home-depots-former-security-architect-had-history-of-techno-sabotage\/<\/a> &amp; <a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/home-depot-ignored-security-warnings-for-years-employees-say\/\">http:\/\/arstechnica.com\/security\/2014\/09\/home-depot-ignored-security-warnings-for-years-employees-say\/<\/a><\/li>\n<\/ul>\n<p>Suggested Reading:<\/p>\n<ul>\n<li>* Just how much data leaks out through the so-called Metadata the NSA etc insist we should not care about them slurping up &#8211; thanks to an experiment by dutch man Ton Siedsma, we now have at least one data point to help us figure that out &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/09\/16\/just-how-much-information-can-be-squeezed-from-one-week-of-your-metadata\/\">http:\/\/nakedsecurity.sophos.com\/2014\/09\/16\/just-how-much-information-can-be-squeezed-from-one-week-of-your-metadata\/<\/a> <span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<li>* Cloudflare announce a great new service allowing HTTPS to be delivered by content delivery networks without the content providers having to give them their SSL private key &#8211; this will make it more efficient and easier to deliver large-scale fast secure content, which is a good thing for the future of the net &#8211; <a href=\"http:\/\/arstechnica.com\/information-technology\/2014\/09\/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key\/\">http:\/\/arstechnica.com\/information-technology\/2014\/09\/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key\/<\/a><\/li>\n<li>* Hacker exposes weakness in many printers by remotely installing a playable version of Doom on printers (who knew you could do so much on those teeny screens!) &#8211;<a href=\"http:\/\/arstechnica.com\/security\/2014\/09\/hacker-exploits-printer-web-interface-to-install-run-doom\/\">http:\/\/arstechnica.com\/security\/2014\/09\/hacker-exploits-printer-web-interface-to-install-run-doom\/<\/a>  &#8211; yet another reminder, DON&#8217;T EXPOSE YOUR PRINTERS TO THE INTERNET, there are a lot of problems with printer firmwares!<\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">LinkedIn are fixing a bug that allowed their system to be used to discover the email addresses of celebrities (that kind of information is very valuable if you want to go on and <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">hack the celebrity further to get, say, nude pics!) &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/linkedin-feature-exposes-email-addresses\/\">http:\/\/krebsonsecurity.com\/2014\/09\/linkedin-feature-exposes-email-addresses\/<\/a> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<li>Facebook meet with LGBT community to discuss some negative side-effects from their real-name policy &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/09\/18\/facebook-meets-with-lgbt-community-over-real-name-policy\/\">http:\/\/nakedsecurity.sophos.com\/2014\/09\/18\/facebook-meets-with-lgbt-community-over-real-name-policy\/<\/a> <\/li>\n<li>Google&#8217;s latest transparency report reveals a hike in government data requests &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/09\/17\/new-google-transparency-report-details-hike-in-government-user-data-requests\/\">http:\/\/nakedsecurity.sophos.com\/2014\/09\/17\/new-google-transparency-report-details-hike-in-government-user-data-requests\/<\/a> <\/li>\n<li>Dropbox also released a new transparency report, and their data shows government requests remaining steady &#8211; <a href=\"https:\/\/www.dropbox.com\/transparency\">https:\/\/www.dropbox.com\/transparency<\/a><\/li>\n<\/ul>\n<h4>Main Topic &#8211; Taming the Terminal Part 21 of n &#8211; More Searching<\/h4>\n<p><a href=\"https:\/\/www.bartbusschots.ie\/s\/2014\/09\/26\/taming-the-terminal-part-21-of-n-more-searching\/\">https:\/\/www.bartbusschots.ie\/s\/2014\/09\/26\/taming-the-terminal-part-21-of-n-more-searching\/<\/a><\/p>\n<p>That&#8217;s going to wind this up for this week, many thanks to our sponsor for helping to pay the bills, Blue Mango Learning at <a href=\"http:\/\/bluemangolearning.com\">bluemangolearning.com<\/a> makers of Clarify. Don&#8217;t forget to send in your Dumb Questions, comments and suggestions by emailing me at <a href=\"mailto:allison@podfeet.com\">allison@podfeet.com<\/a>, follow me on <a href=\"http:\/\/twitter.com\/podfeet\">twitter<\/a> and <a href=\"https:\/\/alpha.app.net\/podfeet\" target=\"_blank\">app.net<\/a> @podfeet.  Check out the <a href=\"https:\/\/plus.google.com\/communities\/117336672755291339814\" target=\"_blank\">NosillaCast Google Plus Community<\/a> too &#8211; lots of fun over there!  If you want to join in the fun of the live show, head on over to <a href=\"https:\/\/podfeet.com\/live\">podfeet.com\/live<\/a> on Sunday nights at 5pm Pacific Time and join the friendly and enthusiastic NosillaCastaways.  Thanks for listening, and stay subscribed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m weary of defending Apple and I explain why. In Dumb Question Corner Steve Davidson asks for an explanation of whether the new iPhones from Verizon and AT&#038;T can actually be moved between the two carriers and I find the answers at https:\/\/www.apple.com\/iphone-6\/specs\/ and http:\/\/www.techwalls.com\/differences-between-iphone-6-6-plus-models\/. Steve and I continue our adventure figuring out how to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1],"tags":[],"class_list":["post-5634","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=5634"}],"version-history":[{"count":7,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5634\/revisions"}],"predecessor-version":[{"id":5644,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5634\/revisions\/5644"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=5634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=5634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=5634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}