{"id":6858,"date":"2015-07-19T18:26:07","date_gmt":"2015-07-20T01:26:07","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=6858"},"modified":"2024-12-15T19:30:20","modified_gmt":"2024-12-16T03:30:20","slug":"532","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2015\/07\/532\/","title":{"rendered":"#532 Apple Secures Your Sensitive Data, Teaching a Young Boy About Science, Hackers Getting Hacked, Serenity Caldwell from iMore on Home Automation"},"content":{"rendered":"<p>Live show will be on Saturday at 3pm Pacific Time on 25 July as I&#8217;ll be on vacation on Sunday. There will be no live show on Sunday 2 July.  I was on  the <a href=\"http:\/\/smrpodcast.com\/smrpodast-262-little-community\/\" target=\"_blank\">SMR Podcast on Episode #262 entitled Little Community<\/a> and the <a href=\"http:\/\/www.dailytechnewsshow.com\/dtns-2538-amazon-is-past-its-prime-day\/\" target=\"_blank\">Daily Tech News Show Episode 2538 entitled Amazon is Past Its Prime Day<\/a> this week.  Learn how I lost all my Apple Watch activity data but that it was because Apple really does protect our private data.  I&#8217;ve started teaching a young boy a bit about electricity and magnetism and it&#8217;s making a difference to him and his mom.  Bart joins us but JUST to talk security. He tells about the hackers getting hacked this week, gives us some Security Lite and Important Security News. Then for Chit Chat Across the Pond we&#8217;re be joined by Serenity Caldwell from <a href=\"http:\/\/imore.com\" target=\"_blank\">imore.com<\/a>.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-6858-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_07_19.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_07_19.mp3\">http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_07_19.mp3<\/a><\/audio><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" alt=\"itunes\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2015_07_19.mp3\" target=\"_blank\">mp3 download<\/a><\/p>\n<p><!--more--><br \/>\nHi this is Allison Sheridan of the NosillaCast Mac Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Macintosh bias. Today is Sunday July 19, 2015 and this is show number 532. This week&#8217;s show is going to be formatted a little bit differently. I&#8217;ve got a couple of stories for you, then Bart is going to join us but JUST to talk security with us. He&#8217;s going to talk about the hackers getting hacked this week, give us some Security Lite and Important Security News. Then for Chit Chat Across the Pond we&#8217;ll be joined by Serenity Caldwell from iMore.  Next week Bart will be back to join us along with Steve Sheridan for a special episode of Chit Chat Across the Pond. <\/p>\n<p>Before I forget, next week&#8217;s live show will be on SATURDAY, not Sunday at 3pm Pacific Time.  I&#8217;m going on vacation for a week (I know, &#8220;what&#8217;s vacation when you&#8217;re retired?&#8221; And &#8220;didn&#8217;t you just get back from India?&#8221;) so I wont&#8217; be around on Sunday.  Allister Jenks will be doing the show that will air the weekend of August 2nd so there will be NO live show on August 2nd.  If you&#8217;ve been meaning to do a recording for the show, dust off that microphone and send it in! You can send them to me and I&#8217;ll forward them on to Allister for inclusion in the show. If you buy the NosillaCast App, you will get notifications of these changes!<\/p>\n<p>Before we get started I wanted to tell you about a couple of shows I was on this week. First I was on the <a href=\"http:\/\/smrpodcast.com\/smrpodast-262-little-community\/\" target=\"_blank\">SMR Podcast on Episode #262 entitled Little Community<\/a>. Robb was out so I joined Rod Simmons and Chris Ashley and we had such a blast! If you haven&#8217;t heard the show before go check it out, what a great geek time.  On Thursday I was on the <a href=\"http:\/\/www.dailytechnewsshow.com\/dtns-2538-amazon-is-past-its-prime-day\/\" target=\"_blank\">Daily Tech News Show Episode 2538 entitled Amazon is Past Its Prime Day<\/a>.  Tom and I talked about whether the desktop Office suite is dead, go check it out.  Ok, now let&#8217;s jump into the show!<\/p>\n<h3>Blog Posts<\/h3>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/07\/lost-activity-data\/\" target=\"_blank\">Apple Really Does Protect Your Health Data<\/a><\/h4>\n<h4><a href=\"https:\/\/www.podfeet.com\/blog\/2015\/07\/i-wonder-what-would-happen-if\/\" target=\"_blank\">I Wonder What Would Happen If\u2026<\/a><\/h4>\n<h3>Clarify<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/podfeet.com\/NosillaCast\/NC_2015\/NC_2015_07_19\/image_capture.jpg\" alt=\"image_capture showing the tricky item in the bottom corner\" style=\"float: right; margin: 5px;\"\/>I&#8217;m a member of a local user group in town but I don&#8217;t attend the meetings.  I do like to read people&#8217;s questions that they send in email though mostly because I just enjoy the heck out of knowing the answer to a problem and helping someone along the way.  This week a gentleman named Michael was complaining about Apple Photos and how he HAD to use it and how he couldn&#8217;t use iPhoto any more. I explained in one response that iPhoto is still there and you can still use it. He explained back that his workflow has been stolen by Photos though because Photos keeps opening. I suspected the problem was that his default setting was to open Photos when inserting his memory card, camera, or phone.  I explained that simply changing the behavior in Image Capture would fix his problem.  He wrote back that it didn&#8217;t work.<\/p>\n<p>I finally did what I should have done in the first place. I whipped open Clarify, inserted a memory card, opened Image Capture, took 3 screenshots, put an arrow pointing to the upwards-facing teeny tiny disclosure triangle that lets you see the control of what happens when you insert a device, and showed him that you could indeed still choose iPhoto to open.  I put a couple of words in to explain that you do have to insert the device to be able to get access to these controls.  <\/p>\n<p>This wasn&#8217;t a masterpiece I really needed to post online so I simply went to Edit and chose Copy Document to Clipboard and chose Text and Images, and then pasted it into the email and hit send.  This took far less time than I&#8217;d spent with Michael going back and forth in words!  I wanted to read to you what he wrote back:<\/p>\n<blockquote><p>Ahhhhh, Thank you Allison : ) Yes I did try the Image Capture thing in response to your first email, but I *think* I may have not had the SD card plugged in at the time, and perhaps it sets the options per device? Either way, your illustrations were perfect THANK YOU. How wonderfully kind of you, your patience penetrated my frustration, you&#8217;re awesome. Have I said thank you enough? Just in case: THANK YOU AGAIN!\n<\/p><\/blockquote>\n<p>If that isn&#8217;t a good enough testimonial, I don&#8217;t know what will get you to go over the <a href=\"http:\/\/clarify-it.com\">clarify-it.com<\/a> and download the free trial for Mac or Windows or both. <\/p>\n<h3>Security With Bart<\/h3>\n<h4>Security Medium &#8211; When the Hackers get Hacked<\/h4>\n<p>An Italian security company called Hacking Team were themselves hacked, and 400GB of data exfiltrated. It takes time to analyse that much data, so there has been a steady stream of revelations since the new of the hack broke on the 6th of July, and that stream is still on-going.<\/p>\n<p>Because this is a story that is likely to run and run, Ars Technica have created a &#8220;series&#8221; for the story on their site &#8211; basically, a single page where they continue to list all their stories related to the hack &#8211; <a href=\"http:\/\/arstechnica.com\/series\/hackingteamhacked\/\">http:\/\/arstechnica.com\/series\/hackingteamhacked\/<\/a><\/p>\n<p><strong>Practical Consequences of the Hack &#8211; VULNERABILITIES!<\/strong><\/p>\n<p>So far, four zero-days have been found in the leaked data:<\/p>\n<ul>\n<li>Three separate Flash Zero-days, all now patched by Adobe &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/adobe-flash-exploit-that-was-leaked-by-hacking-team-goes-wild-patch-now\/\">http:\/\/arstechnica.com\/security\/2015\/07\/adobe-flash-exploit-that-was-leaked-by-hacking-team-goes-wild-patch-now\/<\/a> &amp; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/once-again-adobe-releases-emergency-flash-patch-for-hacking-team-0-days\/\">http:\/\/arstechnica.com\/security\/2015\/07\/once-again-adobe-releases-emergency-flash-patch-for-hacking-team-0-days\/<\/a><\/li>\n<li>An IE11 Zero-day, now patched by MS &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/ms-kills-critical-ie-11-bug-after-exploit-was-shopped-to-hacking-team\/\">http:\/\/arstechnica.com\/security\/2015\/07\/ms-kills-critical-ie-11-bug-after-exploit-was-shopped-to-hacking-team\/<\/a> <\/li>\n<\/ul>\n<p>All these Flash problems, hot on the heals of other Flash problems, have had an effect on the IT community as a whole, and re-invigorated the debate on Flash.<\/p>\n<p><span style=\"font-size: 13px; line-height: 1.5em;\">Software makers like Apple and FireFox again blocked vulnerable versions of Flash, protecting users, and highlighting the issue at the same time. The web was full of people describing how easy it is now to live without Flash, and FaceBook&#8217;s new Chief Security Officer went so far as to call on all the browser manufacturers to get together and choose a date on which they will all disable Flash. System76, a PC maker who sell computers running Ubuntu went so far as to announce that they are abandoning Flash because it is just too dangerous.<\/span><\/p>\n<p><strong>Links:<\/strong><\/p>\n<ul>\n<li><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/14\/facebooks-new-cso-comes-out-swinging-death-to-flash\/\">https:\/\/nakedsecurity.sophos.com\/2015\/07\/14\/facebooks-new-cso-comes-out-swinging-death-to-flash\/<\/a><\/li>\n<li><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/14\/facebooks-new-cso-comes-out-swinging-death-to-flash\/\"><\/a><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/www.macobserver.com\/tmo\/article\/apple-blocks-flash-again-fixes-mac-mini-sleep-issue\">http:\/\/www.macobserver.com\/tmo\/article\/apple-blocks-flash-again-fixes-mac-mini-sleep-issue<\/a><\/li>\n<li><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/www.macobserver.com\/tmo\/article\/apple-blocks-flash-again-fixes-mac-mini-sleep-issue\"><\/a><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/arstechnica.com\/security\/2015\/07\/firefox-blacklists-flash-player-due-to-unpatched-0-day-vulnerabilities\/\">http:\/\/arstechnica.com\/security\/2015\/07\/firefox-blacklists-flash-player-due-to-unpatched-0-day-vulnerabilities\/<\/a><\/li>\n<li><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/arstechnica.com\/security\/2015\/07\/firefox-blacklists-flash-player-due-to-unpatched-0-day-vulnerabilities\/\"><\/a><a style=\"font-size: 13px; line-height: 1.5em;\" href=\"http:\/\/arstechnica.com\/information-technology\/2015\/07\/ubuntu-pc-maker-system76-abandons-flash-says-its-too-dangerous\/\">http:\/\/arstechnica.com\/information-technology\/2015\/07\/ubuntu-pc-maker-system76-abandons-flash-says-its-too-dangerous\/<\/a><\/li>\n<\/ul>\n<p>There<span style=\"line-height: 1.5em;\"> has also been an un-related development regarding Flash&#8217;s future &#8211; it has been revealed <\/span>that<span style=\"line-height: 1.5em;\"> Adobe has been working with Google to harden Flash, making it more difficult to turn bugs into usable exploits. There have been two architectural changes made to Flash that would have neutered most of the recent flash <\/span>exploits<span style=\"line-height: 1.5em;\">:<\/span><\/p>\n<ol>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">(only on Chrome today, but coming to all versions of Flash later this summer) heap partitioning &#8211; storing different kinds of data in separate regions of memory provides protection against both buffer-overflow and use-after-free exploits. Both have featured in recent Flash zero-days.<\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">Adobe has also added protections around Vector objects, a part of Flash&#8217;s internals that has been successfully exploited in the recent past<\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: 13px; line-height: 1.5em;\">More details: <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/zero-day-attacks-exploiting-flash-just-got-harder-thanks-to-new-defenses\/\">http:\/\/arstechnica.com\/security\/2015\/07\/zero-day-attacks-exploiting-flash-just-got-harder-thanks-to-new-defenses\/<\/a><\/span><\/p>\n<p><strong><span style=\"font-size: 13px; line-height: 1.5em;\">Political Fallout<\/span><\/strong><\/p>\n<p>Although not nearly as significant as the Snowden revelations, this hack gives us mere citizens a view into the kind of private-sector companies our governments are paying to do their dirty work for them (with our money!). These private companies are normally shrouded in secrecy, though they do of course publicly insist they are very ethical and would never provide services to repressive regimes or terrorists or anything like that.<\/p>\n<p>We now know this private firm was selling hacking tools to all sorts of governments and groups, not just western ones, in places like Egypt, Russia, Saudi Arabia, Bahrain, the United Arab Emirates, Azerbaijan, Kazakhstan, and Uzbekistan.<\/p>\n<p>We can now see how these companies pay hackers big money for zero-day exploits, which they then keep secret from the software vendors, preventing them from getting patched, and ensuring ordinary people like us are vulnerable to their dubious customers for as long as possible.<\/p>\n<p>These revelations raise questions like whether it is appropriate for western governments to use tax payer money to keep citizens intentionally insecure.<\/p>\n<p>It&#8217;s important to note that this company is not some kind of one-off, they are just one example of an entire secretive industry that&#8217;s providing these kinds of services to governments and other groups all around the world.<\/p>\n<p>Some &#8216;highlights&#8217;:<\/p>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">Hacking Team appear to have broken EU law and sold their tools to the Russians: <a href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/07\/hacking-teams-surveillance-software-sold-to-kgb-successor\/\">http:\/\/arstechnica.com\/tech-policy\/2015\/07\/hacking-teams-surveillance-software-sold-to-kgb-successor\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">Hacking Team used BGP hack to hijack IPs they didn&#8217;t own &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-orchestrated-brazen-bgp-hack-to-hijack-ips-it-didnt-own\/\">http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-orchestrated-brazen-bgp-hack-to-hijack-ips-it-didnt-own\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">Hacking Team say the hackers didn&#8217;t get everything, and that they still have better stuff that is still secret &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-remains-defiant-touts-new-version-of-spyware-suite\/\">http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-remains-defiant-touts-new-version-of-spyware-suite\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">Hacking Team broke Bitcoin secrecy &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file\/\">http:\/\/arstechnica.com\/security\/2015\/07\/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file\/<\/a><\/span><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><\/li>\n<\/ul>\n<h4>Security Light<\/h4>\n<p><strong>Important Security Updates:<\/strong><\/p>\n<ul>\n<li>Patch Tuesday has been and gone with a raft of updates from MS, Adobe, and Oracle, including fixes for Windows, Office, Flash, and Java &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/adobe-ms-oracle-push-critical-security-fixes\/\">http:\/\/krebsonsecurity.com\/2015\/07\/adobe-ms-oracle-push-critical-security-fixes\/<\/a> (includes an Office update for Mac users: <a href=\"http:\/\/www.intego.com\/mac-security-blog\/microsoft-office-2011-14-5-3-update-patches-memory-corruption-flaws\/)\">http:\/\/www.intego.com\/mac-security-blog\/microsoft-office-2011-14-5-3-update-patches-memory-corruption-flaws\/)<\/a><\/li>\n<\/ul>\n<p><strong>Important Security News:<\/strong> <\/p>\n<ul>\n<li>Windows 10 home users will not get to control when security and features updates get installed into their OS &#8211; this is a VERY mixed bag, and really quite controversial &#8211; <a href=\"http:\/\/arstechnica.com\/information-technology\/2015\/07\/windows-10-updates-to-be-automatic-and-mandatory-for-home-users\/\">http:\/\/arstechnica.com\/information-technology\/2015\/07\/windows-10-updates-to-be-automatic-and-mandatory-for-home-users\/<\/a><\/li>\n<li>The infamous cybercrime forum Darkode has been wrapped up by a coordinated global law enforcement takedown, resulting in 70 arrests &#8211; <a href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/07\/criminal-hacking-bazaar-darkode-is-dismantled-and-70-members-are-busted\/\">http:\/\/arstechnica.com\/tech-policy\/2015\/07\/criminal-hacking-bazaar-darkode-is-dismantled-and-70-members-are-busted\/<\/a> (Brian Krebs gives a great rundown of Darkode&#8217;s history &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/the-darkode-cybercrime-forum-up-close\/)\">http:\/\/krebsonsecurity.com\/2015\/07\/the-darkode-cybercrime-forum-up-close\/)<\/a><\/li>\n<li>The Guardian are reporting that data accidentally leaked by Google shows that 95% of &#8216;right to be forgotten&#8217; requests are from ordinary members of the public looking to have their personal and private data protected, and not from criminals, politicians, or other public figures looking to hide their past misdeeds &#8211; <a href=\"http:\/\/www.theguardian.com\/technology\/2015\/jul\/14\/google-accidentally-reveals-right-to-be-forgotten-requests\">http:\/\/www.theguardian.com\/technology\/2015\/jul\/14\/google-accidentally-reveals-right-to-be-forgotten-requests<\/a><\/li>\n<li>Security researchers released work showing that theoretical attacks against RC4 are getting close to being practical. (Editorial by Bart &#8211; this is an important message for the industry &#8211; start moving away from RC4 now, it&#8217;s not gonna last, but there is nothing here for regular users to panic about at the moment) &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/once-theoretical-crypto-attack-against-https-now-verges-on-practicality\/\">http:\/\/arstechnica.com\/security\/2015\/07\/once-theoretical-crypto-attack-against-https-now-verges-on-practicality\/<\/a><\/li>\n<li>A new bug has come to light in OpenSSL, but it&#8217;s not likely to cause much of a problem. The bug did not exist long, so it has not made it into many real-world systems, and it only affects clients, not servers, and most of our clients do not use OpenSSL &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/09\/the-openssl-cve-2015-1793-certificate-verification-bug-what-you-need-to-know\/\">https:\/\/nakedsecurity.sophos.com\/2015\/07\/09\/the-openssl-cve-2015-1793-certificate-verification-bug-what-you-need-to-know\/<\/a><\/li>\n<li>RELATED: Amazon have joined the effort to replace the behemoth that is OpenSSL with smaller, and hopefully more robust, implementations of TLS. They have released a new TLS library called s2n, and are using it in their products &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/06\/amazon-releases-low-cholesterol-heartbleed-medicine-s2n\/\">https:\/\/nakedsecurity.sophos.com\/2015\/07\/06\/amazon-releases-low-cholesterol-heartbleed-medicine-s2n\/<\/a><\/li>\n<\/ul>\n<p><strong>Notable Breaches:<\/strong><\/p>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">CVSphoto.com &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/cvs-probes-card-breach-at-online-photo-unit\/\">http:\/\/krebsonsecurity.com\/2015\/07\/cvs-probes-card-breach-at-online-photo-unit\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">After their spectacular breach, the director of the OPM has resigned &#8211; <a href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/07\/opm-director-resigns-after-news-that-hack-affected-21-5-million-people\/\">http:\/\/arstechnica.com\/tech-policy\/2015\/07\/opm-director-resigns-after-news-that-hack-affected-21-5-million-people\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">RELATED: A very good article by one of the many victims of the OPM breach giving a first-person perspective on this mess &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/opm-got-hacked-and-all-i-got-as-a-former-federal-employee-was-a-stupid-e-mail\/\">http:\/\/arstechnica.com\/security\/2015\/07\/opm-got-hacked-and-all-i-got-as-a-former-federal-employee-was-a-stupid-e-mail\/<\/a> <\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">RELATED: Ars Technical have started a series on the OPM breach &#8211; <a href=\"http:\/\/arstechnica.com\/series\/feds-under-attack-opm-breach\/\">http:\/\/arstechnica.com\/series\/feds-under-attack-opm-breach\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 13px; line-height: 1.5em;\">Suggested Reading:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\">Good article explaining FireFox&#8217;s up-coming tracking protection feature &#8211; <a href=\"http:\/\/www.macworld.com\/article\/2945007\/private-i-firefox-and-others-deal-with-unwanted-trackers-whether-ads-or-malicious.html\">http:\/\/www.macworld.com\/article\/2945007\/private-i-firefox-and-others-deal-with-unwanted-trackers-whether-ads-or-malicious.html<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">A controversial bill is making it&#8217;s way through the US legislative process which would force social networking sites to monitor for terrorism keywords and phrases, and report users to the US government &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/new-bill-could-turn-facebook-twitter-into-terrorist-watchdogs\">http:\/\/www.macobserver.com\/tmo\/article\/new-bill-could-turn-facebook-twitter-into-terrorist-watchdogs<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">An interesting article on the gender discrimination in Google ad profile &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/09\/google-ad-profiling-whats-causing-the-gender-discrimination\/\">https:\/\/nakedsecurity.sophos.com\/2015\/07\/09\/google-ad-profiling-whats-causing-the-gender-discrimination\/<\/a><\/span><\/li>\n<li><span style=\"font-size: 13px; line-height: 1.5em;\"> <\/span><span style=\"font-size: 13px; line-height: 1.5em;\">&#8220;It&#8217;s time we stopped calling Millenials &#8216;dumb&#8217; about privacy&#8221; &#8211; <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/07\/08\/its-time-we-stopped-calling-millennials-dumb-about-data-privacy\/\">https:\/\/nakedsecurity.sophos.com\/2015\/07\/08\/its-time-we-stopped-calling-millennials-dumb-about-data-privacy\/<\/a><\/span><\/li>\n<\/ul>\n<h3>Chit Chat Across the Pond<\/h3>\n<p>Serenity Caldwell of iMore joins us to talk Home Automation. Questions I asked Serenity include:<\/p>\n<p>Can you give us a state of the union on Home Automation?<\/p>\n<ul>\n<li> Is there a standard yet? <\/li>\n<li>Is it too soon to get into it? <\/li>\n<li>Still time for only baby steps?<\/li>\n<\/ul>\n<li>Explain HomeKit to me<\/li>\n<li>What did we hope would be announced at WWDC and what really happened?<\/li>\n<li>Can you talk to why Apple requires certification for HomeKit products? <\/li>\n<ul>\n<li> I&#8217;ve heard about end-to-end hardware encryption &#8211; can you explain? And things WEREN&#8217;T encrypted before HomeKit?<\/li>\n<\/ul>\n<li>What devices have you used so far that you recommend?<\/li>\n<li>How do you feel about locks in Home Automation? <\/li>\n<ul>\n<li>Queasy feeling or can be trusted?<\/li>\n<\/ul>\n<p>You&#8217;re a roller derby fanatic, and been disappointed in whether you get credit for your workouts from Apple Watch, why doesn&#8217;t &#8220;other&#8221; work for that?<\/p>\n<p>Plugs: <a href=\"http:\/\/imore.com\" target=\"_blank\">http:\/\/imore.com<\/a>, <a href=\"http:\/\/twitter.com\/settern\" target=\"_blank\">@settern on Twitter<\/a>, <a href=\"https:\/\/instagram.com\/settern\/\" target=\"_blank\">settern on Instagram<\/a> and The Incomparable Podcast with Jason Snell at <a href=\"https:\/\/www.theincomparable.com\" target=\"_blank\">theincomparable.com<\/a><\/p>\n<p>That&#8217;s going to wind this up for this week, many thanks to our sponsor for helping to pay the bills, the makers of Clarify over at <a href=\"clarify-it.com\">clarify-it.com<\/a>. Don&#8217;t forget to send in your Dumb Questions, comments and suggestions by emailing me at <a href=\"mailto:allison@podfeet.com\">allison@podfeet.com<\/a>, follow me on <a href=\"http:\/\/twitter.com\/podfeet\">twitter<\/a> @podfeet.  Check out the <a href=\"https:\/\/plus.google.com\/communities\/117336672755291339814\" target=\"_blank\">NosillaCast Google Plus Community<\/a> too &#8211; lots of fun over there!  If you want to join in the fun of the live show, head on over to <a href=\"https:\/\/podfeet.com\/live\">podfeet.com\/live<\/a> on Sunday nights at 5pm Pacific Time and join the friendly and enthusiastic NosillaCastaways.  Thanks for listening, and stay subscribed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Live show will be on Saturday at 3pm Pacific Time on 25 July as I&#8217;ll be on vacation on Sunday. There will be no live show on Sunday 2 July. I was on the SMR Podcast on Episode #262 entitled Little Community and the Daily Tech News Show Episode 2538 entitled Amazon is Past Its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1],"tags":[],"class_list":["post-6858","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=6858"}],"version-history":[{"count":4,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6858\/revisions"}],"predecessor-version":[{"id":6862,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/6858\/revisions\/6862"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=6858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=6858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=6858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}