Tag Archives: Cisco

Turmoil of doubt

We all have it, at times and some more often we doubt. Whenever I see such doubt I think back to a story that I heard in primary school. It was about Lakshmi and the greedy beggar. You might have guessed it, or perhaps you know the story. The beggar just wants in the end one coin more and ends up with nothing. This is a setting we know where it goes, but now let’s change the premise. I could end up with $3.7 billion over 3-5 years of Google, Amazon or Huawei buys my IP. I could optionally make $250,000 if I publish an idea of intrusion I have. An idea they all overlooked and could give a certain wall street player the insight on certain patents that would be accepted within 30 days. With this method I speculatively could make another 3 million, yet that would also mean that I can no longer rely on the larger amount to ever become mine. What would you do? The small amount now or hoping for the best? I am not breaking any laws, because I am showing a flaw, two actually and the law has close to no chance of finding substantiative evidence. So I am basically in the clear. So what to do?

Well, I am also a story teller, so here goes (it was a simple riddle).

Between a larger technology firm and a patent office is a link, they mail and they take all the precautions. The messages go from router 1 to router 2 via what some might know a router table. Now no matter what the path is, at some point it will go via router N1. That is how the beans take the high or low road. So I got the idea to place a listener to ANY router one jump away from Router N1, so it could be almost anywhere. That place we call Router X0, it was my idea for the Hop+1 solution. There is a second part, this part means we need to get to that router somehow, whether it is internal solutions of intrusion. The idea was to replace the CF card in that router with an identical one, but there is one difference, it might state 64MB, but it has 256GB and one small internal component sets the 64MB apart and the rest is a floating drive. The floating drive has its own dynamic and it installs a small program in the memory of Router N1, that program will copy EVERY packet directed to Router 2 towards Router X0. There is almost no chance to detect it, when someone resets it, the program is gone, the evidence is gone. The memory card will unless dissected not show anything and there too is nothing to show what is going on, the CF card will know when it can forward packets to the end station when it can hide in other traffic, unless a System administrator reads the ENTIRE log, there is nothing to see. The receiver now has a collection of packets of traffic from Router 1 to Router 2, which also includes a message that Patent acceptance was achieved, the Wall Street Firm now has an advantage to place the right options and stock ahead of all the others and when the rest catches on the larger profits are raked in. 

A setting of not so speculative anticipation of profit and when the deed is done, both routers are reset and the evidence is gone forever. There is one remaining part, that is the CF card, yet id that went to an empty mobile station that might not be the problem, the only issue is getting the card back, leave no evidence behind. These System administrators are often underpaid, so that might not be an issue either. 

An idea that I had when I was wondering how Sony was transgressed upon, because there was no way that North Korea had that level of know how. In this setting it was an internal setting, optionally a disgruntled employee, but it was all speculative from my side, it felt more realistic than North Korea with its lack of technology. 

So will I doubt? Yup, I will remain hopeful the three true innovators will take my IP, if not, ah well. Still time to make it all public domain, what Wall Street tends to call pubic domain, not sure why but there you have it. Have a great Monday!

Leave a comment

Filed under Finance, IT, Science

The devil rang

This is too good, I had just finished yesterday’s article and the Guardian gives me ‘Spyware can make your phone your enemy. Journalism is your defence’, in this that I have some troubles accepting that journalism is my defence, they are al about circulation and satisfying their shareholders and stakeholders (optionally advertisers too). But the article came at the right moment, even as this is about Pegasus and the NSO group. Whenever I look back at the title ‘Pegasus’ I think back to Pegasus mail and windows 3.1. It is a reflex, but a nice one. So, the article gives us “The Pegasus project poses urgent questions about the privatisation of the surveillance industry and the lack of safeguards for citizens”, which is nice, but Microsoft, Solarwinds and Cisco made a bigger mess and a much larger mess, so pointing at Pegasus at this point seems a little moot and pointless. (Microsoot’s Exchange anyone?)

Yes, there are questions and it is fair to ask them, so when we see “This surveillance has dramatic, and in some cases even life-threatening, consequences for the ordinary men and women whose numbers appear in the leakbecause of their work exposing the misdeeds of their rulers or defending the rights of their fellow citizens”, yes questions are good, but the fact that millions of records went to the open air via all kinds of methods (including advertiser Microsoft) is just a little too weird. And it is not up to me, it was The Hill who asked the people (5 days ago after the Kaseya hack gone public, the larger question that actually matters ‘Kaseya hack proves we need better cyber metrics’ and they are right, when we see “Once “infected”, your phone becomes your worst enemy. From within your pocket, it instantly betrays your secrets and delivers your private conversations, your personal photos, nearly everything about you” we read this and shrug, but at this point how did a third party operator (NSO group) get the data and the knowhow to make an app that allows for this? Larger question should be handed to both Google and Apple. The fact that the phones are mostly void of protection comes from these two makers. This is a setting of facilitation and a lack of cyber security. The NSO group decided to set a limited commercial application (more likely to facilitate towards the proud girls and boys of Mossad) and they took it one step further to offer it to other governments as well, is that wrong?

So when we see “All of these individuals were selected for possible surveillance by states using the same spyware tool, Pegasus, sold by the NSO Group. Our mission at Forbidden Stories is to pursue – collaboratively – the work of threatened, jailed or assassinated journalists”, if that were true, we would see a lot more articles regarding the 120 Journalists jailed in Turkey, not to mention the 60 journalists that were assassinated (read: targeted killing exercise) there as well. The papers are all about a journalist no one cares about (Jamal Khashoggi) but the other journalists do not really make the front page giving pause and skepticism to “the work of threatened, jailed or assassinated journalists”, my personal view is that the advertisers and stake holders don’t really care about those lives. Then I have issues with “This investigation began with an enormous leak of documents that Forbidden Stories and Amnesty International had access to”, was it really a leak, or did one government take view away from them (by Amnesty International) and handed it towards the NSO group? A list of 50,000 numbers is nothing to sneer at, as such, I doubt it was a leak, it was a tactical move to push the limelight away from them and push it somewhere else. As we consider Kaseya, Solarwinds, Microsoft and Cisco, the weak minded democratic intelligence players from the Unified Spies of America come to mind, but I admit that I have no evidence, it is pure speculation.

And then we see the larger danger “But the scale of this scandal could only be uncovered by journalists around the world working together. By sharing access to this data with the other media organisations in the Forbidden Stories consortium, we were able to develop additional sources, collect hundreds of documents and put together the harrowing evidence of a surveillance apparatus that has been wielded ferociously against swaths of civil society”, who did they share access to? Who reports to another faction that is not journalism or is purely greed driven? In this, the article (at https://www.theguardian.com/world/commentisfree/2021/jul/19/spyware-can-make-your-phone-your-enemy-journalism-is-your-defence) gives us one other gem, it is “not to mention more than 180 journalists from nearly two dozen countries”, as such we see 0.36% of the data is about journalists, so if I was to look at a slice and dice dashboard, how will these 50,000 people distribute? So when we see “If one reporter is threatened or killed, another can take over and ensure that the story is not silenced”, yes, how did that end up for those journo’s in Turkey? What about outliers in data like Dutch journalist Peter R. De Vries? He is not getting the limelight that much in the last three days, you all moved on? You pushed the limelight towards Jamal Khashoggi for well over a year, who achieved less than 0.01% compared to Peter R. De Vries. I reckon that this article, although extremely nice is there to cater to a specific need, a need that the article does not mention (and I can only speculate), but when we see all this holier than though mentions and we see an inaction on Turkey’s actions, as well as a lack of news regarding Peter R. De Vries, I wonder what this article was about, it wasn’t really about the NSO group and Pegasus, they are mentioned 4 and 7 times, the article was to push people towards thinking it is about one thing and it becomes about the 0.36% of journalists in a list of 50,000, all whilst the number is mentioned once in the article without a breakdown. Someone else is calling, when you answer, just make sure the local number is not 666.

Leave a comment

Filed under IT, Military, Science

Your data or your life!

It is not the dream, not this time. I was persecuted by a Construction AI with diminishing reality capacity, but in the humour side there were a few criminals trying to get away with a golden car (like Goldfinger) and they got in the middle, so there. No, today is about Ransomware. Reuters gives us ‘Ransomware breach at Florida IT firm hits 200 businesses’ (at https://www.reuters.com/technology/200-businesses-hit-by-ransomware-following-incident-us-it-firm-huntress-labs-2021-07-02/). Like the solarwinds issue we see “The attackers changed a Kaseya tool called VSA, used by companies that manage technology at smaller businesses. They then encrypted the files of those providers’ customers simultaneously” and no one, most visibly the media is asking the questions that needs asking. The Microsoft Exchange issue, the Solarwinds issue, now Kaseya. We understand that things go wrong, but as I see it the hackers (read: optionally organised crime) have a much better understanding of matters than the lawmakers and police do, we see this with “encrypted the files of those providers’ customers simultaneously” and that is before we consider that ‘an American software company that develops software for managing networks, systems, and information technology infrastructure’ has the kind of security that can be trespassed upon. And why do I think this? It is seen “The attackers changed a Kaseya tool called VSA, used by companies that manage technology at smaller businesses” and contemplate the issue that this had been happening for the last 5 months. A lack of larger systems as well, and all this continues as the law is close to clueless on how to proceed on this. We see statements like “In their advisory and further incident communications, Kaseya said that only a few out of their 36 000 customers were affected”, yet CNet gives us “REvil, the Russia-linked hacking group behind the attack on meat processor JBS, is linked to the Kaseya attack, The Wall Street Journal reported. Security firms Huntress Labs and Sophos Labs have likewise pointed to REvil”, which gives the law the problem that a member must be a proven member of REvil and that is largely not the case, moreover they have no clue how many members are involved. When one player gives us “We are in the process of formulating a staged return to service of our SaaS server farms with restricted functionality and a higher security posture (estimated in the next 24-48 hours but that is subject to change) on a geographic basis”, all whilst one of the victims is the largest grocery store in Sweden (COOP), the setting of “only a few out of their 36 000 customers” becomes debatable and it will affect the retail stage to a much larger degree, especially when you consider that they are cloud based. I stated in the past (based on data seen) that 90% of the cloud can be transgressed upon. And they are all servicing the larger stage of people dealing with IT requirements on a global scale. Now consider that cloud systems remain largely insecure and beyond the fact that ITWire was giving us “SolarWinds FTP credentials were leaking on GitHub in November 2019” and it was a direct results from someone who thought that ‘solarwinds123’ was a good idea. Oh, I remember a situation involving Sony and stated that there might be an issue that someone (I implied the Pentagon) had a router with password ‘cisco123’, I did that in ‘The Scott Pilgrim of Technology’ (at https://lawlordtobe.com/2019/05/23/the-scott-pilgrim-of-technology/) in MAY 2019, and did anyone learn anything yet? It is now 2 years later and still we see these levels of transgressions? Some might say that IT firms are helping REvil get essential revenues, some might say that these IT firms got themselves in this mess. So when we look at some firms relying on ‘Five years of experience for an entry-level job’, or perhaps “Any of the following will be grounds for immediate dismissal during the probationary period: coming in late or leaving early without prior permission; being unavailable at night or on the weekends; failing to meet any goals; giving unsolicited advice about how to run things; taking personal phone calls during work hours; gossiping; misusing company property, including surfing the internet while at work; submission of poorly written materials; creating an atmosphere of complaint or argument; failing to respond to emails in a timely way; not showing an interest in other aspects of publishing beyond editorial; making repeated mistakes; violating company policies. DO NOT APPLY if you have a work history containing any of the above” (source: Forbes). All this in a stage of age discrimination and narrow minded thinking of HR departments. Yes that is the dynamic stage of people that have bad passwords and a stage of transgressions. So whilst we might think it is a stage of ‘Your data or your life’, there is a larger stage where the law has a bigger issue, it has the issue of IT firms cutting cost and having a blasé approach to the safety of their systems, and more important their customers. And whilst ABC New York gives us “The number of victims here is already over a thousand and will likely reach into the tens of thousands,” said cybersecurity expert Dmitri Alperovitch of the Silverado Policy Accelerator think tank. “No other ransomware campaign comes even close in terms of impact” (at https://abc7ny.com/amp/ransomware-attack-4th-of-july-cyberattack-kaseya/10859014/) we see a first stage where the statement ‘only a few out of their 36 000 customers were affected’ is as I personally see it marketing driven panic. And that is a much larger case. I get that the firm hit does not want too much out in the open, but between a few, 2% and optionally a stage that could go beyond 27% is a setting too many are unable and too uneasy to consider. And when we see that 27%, do I still sound too ‘doomsday’ when I state that there is a much larger problem? And when we see the media go with ‘MSPs on alert after Kaseya VSA supply chain ransomware attack’, all whilst I stated a few issues well over 2 years ago, they should have been on the ball already. I am not blaming the MSP’s, but I do have questions on how their systems are so automated that an attack of this kind (the stated 1000+ customers hit) all whilst some sources state 50 MSP’s, there is a stage where triggers would have been there and the alarms were set to silent because some people might have thought that there were too many false alarms. This is a different stage to the larger playing field, yet I believe it needs to be looked at, especially when the damage can be so large. I am not certain what work lies ahead of the hit customers like COOP that had to close down 800 supermarkets, but in all this something will have to give. 

Leave a comment

Filed under IT, Science

Choices and Wisdom

We all have all kinds of wisdom, what we learned in school and that what as further tempered by work and eduction. Then there is the wisdom we get over time, from the things we have enjoyed doing, or loved doing for decades. No this is not some weird way to tell others that we are all well grown gynaecologists (without a medical education we really are not), yet some events, like photography, music, filming, gaming, reading. These are skills that develop over time. Some will never be great writers, but they grow a knowledge that allows them to recognise good and great pieces of writing, some will see great movies and TV series from the early beginnings, some will recognise a really great game. We all grow such skills, some faster and more complete than others. And here is where I am now. With Keno Diastima I am now at an impasse. I completed the thoughts on the cliffhanger on season 3, and as I see it, it will be one that will make jaws drop all over the field, yet what next? Try to get into season 4? Or end the story with a wide open ending? For some reason the second one is appealing to me. I haven’t thought of where to go in season 4, that is true enough, but in all that the setting of an open ending is appealing. It lets the viewer imagine what would be next. I personally never liked the American approach to finalise everything. The setting is that in the first finalisation is overrated, in the second it is that life is never complete, if we finalise we cannot perfect, if we cannot perfect we can grow, we can become better, the finalised people are mediocre or will never know the perfection they could have been headed to. It is like a lot of Ubisoft games, they are below par. 

Am I correct?
Well, the balance of probability states me to be correct, yet in opposition, we see God of War 4, Ratchet and Clank Rifts apart, Miles Morales. The PS5 is showing a whole host of games that ended up close to perfect, all whilst Ubisoft showed us games that were mediocre between 70% and 80%. So we have two stations, one showing me that I am right, one making it debatable and I am in the middle trying to make a choice. In all this I am wondering what to do. Even as I saw another side of some of the settings that I designed, as I see more and more evolutions in the IP I created, I also see that anything can be improved on, Keno Diastima is no exception. And in this yes, there is more to explore, but the appeal of finishing a story on a high is weirdly appealing. I wonder if J. Michael Straczynski faced this at the end of season 4 of Babylon 5? 

So how should I go about it? I am asking this of myself. Perhaps in a few days I see the light and a larger idea opens up, but it is not a guarantee. And within me the struggle continues shall I move forward, or not? It is a stage of wondering, not a stage of fear. Not a stage where we see ‘US lawmakers have introduced five bills aimed at limiting the power held by Big Tech companies’, bills that were designed out of fear, because overhauling the tax laws to fit all was too dangerous, powerful friends would be out in the cold and demonising a few is preferable, not unlike the Nazi’s who demonised the gypsies, the jews and a few others, remember that? How did that end? So when you see “The bills were drafted after a 16-month investigation into the powers of Amazon, Apple, Google and Facebook” consider that a law on 4 is discrimination, an overhauled tax law including the 4 is the right direction. I have said that for the better part of 2 decades, yet we see an investigation of 16 months. How is there any level of equilibrium? How is there balance on al fronts when 4 are demonised? So when will they limit Netflix and Disney plus to give ‘equal’ way to the others? It is the beginning of dead people trying to live a little longer. Soon America will see a larger setting, soon they will claim the union of patents and IP into the economy, because it will be best for all the people, a limitation of 5 is preferable over the denying to nearly all, and the US still has no plan to avoid overspending by trillions on an annual basis. So whilst I look at the optional ending of a great ride, they are merely looking at the continuation of a mediocre ride and there is the rub, there is the flaw. We see it in movies, TV, games, books and software, yet we do not catch on, life is unpredictable. Those who wield choices to their end are all about staying in power, even though they do not contribute and they are scared, China is on their heels to surpass them technological and economical, a twofold loss. So whilst CNBC gives us ‘U.S.-China relations are ‘still deteriorating,’ says former U.S. ambassador’, we need to consider that the US overplayed itself economically in well over a decade and whilst they needed to strap expenses, they refused to do so, they entered a road of iteration, all whilst a nation without true innovation has no place to go, but to become a following sheep and the innovations by Huawei are proof of that, Apple, IBM, Microsoft all iterative, all whilst I designed more original IP by myself then all of them together. And that is separate from the ideas on movies, TV series and games I came up with, and that is besides the additions to existing games. 

I feel happy in some way and sad that several government are so scared and so dependent on the US that it is almost scary that the media (from a multitude of sources) are merely copy and pasting some news. Consider ‘Romanian president signs bill into law to ban Huawei from 5G’, as well as ‘‘No concrete proof’ of espionage: Malaysia on verge of Huawei 5G deal. For me the issue is that the US and others have NEVER EVER shown evidence that Huawei equipment was used for espionage. In opposition the equipment in use (Cisco for example) allows for example allows for all kinds of sneaky acquisition of data. The sources via Solarwinds are proof of other larger flaws, Huawei equipment is not needed. When you consider that and we see the US accusations, as well as copied accusations by others, all whilst no evidence was ever produced. The Verge gave us “There is no hard evidence to support this notion, and some of the reasons put forward for this notion are weak. For example, the background of the chairmen of Huawei. Huawei founder Mr. Ren Zhengfei once served in the People’s Liberation Army. As we know, serving in the army was one way of getting out of poverty for people in the countryside, which is where Mr. Ren is from. His time in the army was a short one and he was not in any important position”, as well as “Any supposedly safe Chinese product is one firmware update away from being an insecure Chinese product”. The second one is optional, but that applies to all American hardware as well, but the media is not giving us that part, are they? The media did (to the largest extent) avoid for the longest time to look into the Cisco flaw(s), even as Cisco informed their customers close to immediately. So what is wisdom? I am not sure if I am the right person to state that, but I do feel that limiting 5 players whilst they were not illegally acting is wrong on several levels and all whilst the IP and patent stage remains open, as such I will make a case for my IP to be placed in either the UK or Canada. They seem the safest place and when other figure out what I have figured out and the IP and patents of the Fortune 500 end up being registered in these two locations over the US, you will see that I am correct and the US will find them self in something close to a Wall Street free fall soon thereafter. 

Leave a comment

Filed under Law, Media, Politics, Science

Feel free to lose control

Yup, we all have that. You, me, pretty much everyone. Even the Catholic cleric in [censored], should you doubt that, ask any choir boy there. So when the BBC gave us ‘Facebook sued for ‘losing control’ of users’ data’, I merely shrugged and went ‘Meh’. You see, it is not about “the case against the technology giant, expected to last for at least three years, will argue a “loss of control” over users’ personal data warrants individual compensation”, which is hypocrite on a few levels, we see people handing over data and fact to complete strangers in Facebook and plenty of other social media paths. We laugh at “Coolum resident Essena O’Neill, 19, said she was paid up to $2,000 for the posts, which show her posing with products and often in revealing positions. With more than 600,000 followers on Instagram and 260,000 on YouTube, Ms O’Neill has deleted many of her original photos and re-captioned others with more honest descriptions” (ABC, 2015). We also get (two weeks ago) ““I accidentally posted a picture on Instagram of my wine glass and I was naked,” she said whilst nervously laughing. Then, she went on to explain that you could actually see her naked body in the reflection of the wine glass”, is anyone buying this? Social media has been used on a huge number of settings revealing ‘accidentally’ facts that normally do not get to see the light of day, and in all this we are given ““loss of control” over users’ personal data”? Go cry me a river! In the mean time, did anyone see Alexander Nix, Julian Wheatland, Rebekah Mercer, or Steve Bannon in the dock of a courtroom in any of the hit countries? In this the quote “harvesting of Facebook users’ personal information by third-party apps was at the centre of the Cambridge Analytica privacy scandal” applies, a third party app, was there any documented agreement, or documented acceptance of the harvesting of personal data? I do not see Microsoft in the dock in court over their exchange failure that had hit 250,000 businesses, so why not? And when we see “Cambridge Analytica’s app on Facebook had harvested the data of people who interacted with it – and that of friends who had not given consent” did anyone consider putting the board of directors of Cambridge Analytica in prison? I wonder how far we have strayed from the flock of convictions to go after the money and not the transgressors. I do get it, it is a rule or Torts, the mere “go where the money is” is not a wrong setting, but in this setting all the blame on Facebook seems wrong. They are not without fault, I get that, but to see a reference to Journalist Peter Jukes giving us “leading the action, claims his data was compromised”, so how was his data compromised? What evidence is there? In turn I have equal issues with “The Information Commissioner’s Office investigation into these issues, which included seizing and interrogating Cambridge Analytica’s servers, found no evidence that any UK or EU users’ data was transferred by [app developer] Dr [Aleksandr] Kogan to Cambridge Analytica”, I wonder how far backup investigation went, in turn the setting of ‘no evidence that any UK or EU users’ data was transferred’ is almost preposterous, the data was collected, as such it went somewhere, the fact that the Information Commissioner’s Office couldn’t find that part is mere icing on the cake of Cambridge Analytica. In addition, when we see “Mr Jukes told BBC News it was not about “where the data went” but rather “that Facebook didn’t care”. “They didn’t look after it,” he said.” Can this be proven? ‘Didn’t care’ is subjective and presumptive, we can agree that security measures failed, yet ‘They didn’t look after it’ is equally unproven, and these people are not going after the people of Cambridge Analytica as THEY transgressed on the data. As such as we look at Eton boy Alexander Nix, in the setting of “Nix agreed to a disqualifying undertaking prohibiting him from running U.K. limited companies for seven years after permitting companies to offer potentially unethical services, while denying any wrongdoing”, he got a mere slap on the hand, with a mandatory 7 year vacation all whilst we are told ‘denying any wrongdoing’, in addition there is “agreeing to delete previously obtained data”, a 2019 agreement, so where was the data all this time? Let’s be clear, Facebook has made blunders, huge ones, yet in light of the fact that Microsoft gets a mere fine and the issues is closed after that, why keep on going after Facebook? When we see ZDNet give us ‘Microsoft Exchange Server attacks: ‘They’re being hacked faster than we can count’, says security company’ two weeks ago (at https://www.zdnet.com/article/microsoft-exchange-server-attacks-theyre-being-hacked-faster-than-we-can-count-says-security-company/), what gives, why are they not being sued for setting a dangerous precedence on corporate information? We go after Huawei without evidence, we ignore alleged criminals and their app transgressions with our data, but it is fine to go after Facebook whilst ignoring the massive flaw that is Microsoft? So what gives?

So yes, we can lose control all we like, but if we hamper the courts with empty cases that are set on emotion, all whilst people like Alexander Nix, Julian Wheatland, Rebekah Mercer, and Steve Bannon are allowed to return to positions and try again? And what about Cambridge Analytica? As it was soon thereafter acquired by? The only reason I see to acquire Cambridge Analytica is because of hardware, because of software and because of data, so who is looking into that, preferably all before we lose time slapping Facebook around? I see very little after 2018, but perhaps Peter Jukes is too busy to see were his alleged compromised data optionally went. 

So whilst we giggle on statements like “I accidentally posted a picture on Instagram of my wine glass and I was naked”, we see a setting where a large group of people are using social media for all kind of things, the limelight most of all and in this we need to separate the real issues from the fictive cash cows. In this, did you wonder if the people are realising that Wired gave us a mere hour ago “collaboration platforms like Discord and Slack have taken up intimate positions in our lives, helping maintain personal ties despite physical isolation. But their increasingly integral role has also made them a powerful avenue for delivering malware to unwitting victims—sometimes in unexpected ways” (at https://www.wired.com/story/malware-discord-slack-links/) and that is a mere tip of the iceberg, a massively large one. How many apps are a gateway to YOUR system? So when we take notice of “hackers have integrated Discord into their malware for remote control of their code running on infected machines, and even to steal data from victims”, as such in that case it is not the nude reflection shot that matters, it is the wineglass porn that some people decided not to post that is out there for everyone to see. Consider the words by Stephen Fry on 2014, when he said “The best way to prevent nude pictures online, is to never pose nude”, or something according to those lines and he is right, the best social media is the boring one, where you just say hi and connect to relatives. But the limelight is for some just too appealing and to give everyone the lowdown on all your needs and that is what players like Cambridge Analytica were banking on. As such, when we add that light, that spotlight, what data of Peter Jukes was transgressed on and in light of the Exchange server issues, the Cisco issues and the larger stage of interconnecting apps, can it even be proven that it was Facebook? 

I’ll buy popcorn for that court case, it should be fun.

Leave a comment

Filed under IT, Law, Media, Science

An almost funny thing

I saw an article at the BBC and I will get to that in a moment, but it reminded me of a situation that happened in 2010. I needed a new laptop and I was looking in a shop at their Collection of laptops. A man came to me and was trying to convince me just how amazing this laptop was. My inner demon was grinning, I get it, the man was enthusiastic, he was giving the numbers, but in all this, did he realise what he was saying? I am not doubting the man’s skills, he was doing a good job, I was however in IT and had been there for 30 years, so I have pretty much seen it all, and there it was, my little demon, on my right shoulder calling me ‘pussy’. So as the man stated ‘this laptop has a one terabyte hard-drive, can you even imagine ho much that is?’, I could not resist and my response was ‘Yup, that would fit roughly 10% of my porn collection’, his jaw dropped to the ground, his eyes almost popped, the demon inside me stated ‘Nice!’ Actually, it was not quite true, it would only fit a rough 0.32114%. It was the impact of the shock factor. You see, there is a hidden agenda there, when you (appropriately) use the technique, you get to see the real salesperson and that was what I needed. He was thrown, but he recomposed and continued giving me the goods on the laptop, I bought that laptop roughly 132 seconds later.

So today I saw ‘The Rise of extortionware’ (at https://www.bbc.com/news/technology-56570862), here I notice “where hackers embarrass victims into paying a ransom”, it is not new, it is not even novel. I will also give you the second game after the people involved get arrested, they will demand anonymity and any bleeding heart judge will comply. I state that these people will be handed the limelight so that the people that faced ransomware attacks can take their frustration out of these people. But that remains wishful thinking. So next we get “Experts say the trend towards ransoming sensitive private information could affect companies not just operationally but through reputation damage. It comes as hackers bragged after discovering an IT Director’s secret porn collection.” I have the question was it a private or a company computer? You see, sone focus on the boobies, just what the advertisers on Twitter hope for, they want the click bitches, it makes them money. It is time that we set the larger stage, you see the entire mess would be smaller if Cisco and Microsoft had done a proper job. OK, I apologise, Cisco does a proper job, but some things slip through and in combination with Microsoft exchange servers it is not slipping through, it is a cyber hole the size an iceberg created on the Titanic and we need to set a much larger stage. So when we see “Thanks God for [named IT Director]. While he was [masturbating] we downloaded several hundred gigabytes of private information about his company’s customers. God bless his hairy palms, Amen!”, it seemingly answers that he might keep it on a corporate computer, or he uses his private computer for company stuff. Yet in that same light the hacker should not be allowed any anonymity, we all get to see who the hacker is. If there is something to be learned it is see with “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts” There are two sides

  1. The station of ALWAYS ONLINE needs to change, there needs to be an evolving gateway of anti hack procedures and a stage of evolving anti hack routers and monitoring software. You think that Zoom is an option?
    Tom’s Guide gave us less than 2 weeks ago “More than a dozen security and privacy problems have been found in Zoom”, as well as “Zoom’s ease of use has made it easy for troublemakers to “bomb” open Zoom meetings. Information-security professionals say Zoom’s security has had a lot of holes, although most have been fixed over the past few year”, so whilst you contemplate ‘most have been fixed’, consider that not all are fixed and that is where the problem goes from somewhat to enormous. Well over 20% of the workforce works at home, has zoom meetings and that is how cyber criminals get the upper hand (as well as through disgruntled employees), a change in mindset is only a first station.
  2. Remember that Australian? (Julian Assange) We were told that soon there would be some leaks on issues on banks (Wall Street) then it suddenly became silent, now some will say that it is a bluff, but in light of the meltdown in 2008, I am not so certain, I reckon that some have ways to show the hackers who they are and they profit by not doing that. Can I prove this? Absolutely not. It is speculation, but when you look at the timeline, my speculation makes sense. 
  3. The third side is optionally the second side as the second side might not be a real side. When we see “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts”, the underlying station is ‘information that can be weaponised’ and the IT sector is helping them.

How did I get there? The cloud is not as secure as some state, and the salespeople need to take notice. Business Insider gave us about 6 months ago “70% of Companies Storing Data With Cloud Companies Hacked or Breached”, see the link we are now slowly getting presented? 

In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of dangers and we need to take notice. And here the dangers become a lot more interesting when we consider the Guardian yesterday when we saw “Intelligence value of SolarWinds hacking of then acting secretary Chad Wolf is not publicly known”, what else is not publicly known? How many media outlets ignored the Cisco matter, how come ZDNet is one of the few giving us “it’s not releasing patches for some of the affected devices that reached end of life” less than 8 weeks ago. Again I say Cisco did the right thing by informing its customers close to immediately, yet when we see “More than 247,000 Microsoft Exchange servers are yet to be patched against the CVE-2020-0688 post-auth remote code execution (RCE) vulnerability impacting all Exchange Server versions under support” (source: bleepingcomputers.com) as far as I can see, a lot of the media ignored it, but they will shout and repeat the dangers of Huawei, without being shown actual evidence, and I state here, that unless we make larger changes, the extortion path will evolve and become a lot larger. With 70% of cloud systems getting hacked or breached, a large chunk of the Fortune 500 will pay too much to keep quiet and who gets to pay for that? There is a rough 99.867765% chance that its board members will not, it might be speculatively, so please prove me wrong.

A stage where the needs of the consumers changes in a stage where the corporations are not ready to adjust and all whilst the IT salespeople have that golden calf that does everything and make you coffee as well. Adjustments are needed, massive adjustments are needed and we need to make them now before the cybercriminals are in control of our IT needs and that is not mere speculation, when you see flaw after flaw and too little is done as too many are the victim of its impact is a serious breach and it has been going on for some time, but now it is seemingly out in the light and too many are doing too little and as we laugh at “God bless his hairy palms, Amen!” Consider that stage, and now consider that they invade a financial institution, these are clever criminals, they do not empty your account, they merely take $1, perhaps $1 every other month, this implies that they are looking at a $16,000,000 every two months. And this is merely one bank, one in a thousand banks, some a lot bigger than the Australian Commonwealth bank and lets face it, the fact that layer 3 to layer 7 is leaky in hundreds of thousands of customers, do you really think that banks are off-limits? Do you really think that this is a simple hick-up or that the scenery is changing this quickly by people claiming that it will be fixed in no-time? 

We need massive changes and we need them a lot sooner than we think.

1 Comment

Filed under IT, Law, Media, Science

The wide net

We all have the idea to go phishing, we want trout, we want salmon and we use the biggest net possible to get at least one. So when AP gave us ‘Casting a wide intrusion net: Dozens burned with single hack’ (at https://apnews.com/article/donald-trump-politics-europe-eastern-europe-new-zealand-f318ba1ffc971eb17371456b015206a5), not only was I not surprised, I had been warning people about this for a few years, that setting is apparently upon us now (or at least some are admitting it now). There we see “Nimble, highly skilled criminal hackers believed to operate out of Eastern Europe hacked dozens of companies and government agencies on at least four continents by breaking into a single product they all used” this does not surprise me, this happened in the late 80’s as well when someone used Aston Tate’s DB3 to introduce a virus, it is simple find something they all use and hamper its function, a basic strategy that an Italian (Julius Caesar) introduced 2000 years ago, there he hampered the roads and not servers but you get the idea, the classics still work.

When we are given “The Accellion casualties have kept piling up, meanwhile, with many being extorted by the Russian-speaking Clop cybercriminal gang, which threat researchers believe may have bought pilfered data from the hackers. Their threat: Pay up or we leak your sensitive data online, be it proprietary documents from Canadian aircraft maker Bombardier or lawyer-client communications from Jones Day.” It might seem rash but the people relied on others to keep their data safe and whilst we see more and more that they cannot contain the bacon the clients are suffering, this is not a simple station and we get it, but package solutions tend to come with flaws and that has been a truth for 20 years, so why are you all crying now? It is the final part that has more bearing “Members of Congress are already dismayed by the supply-chain hack of the Texas network management software company SolarWinds that allowed suspected Russian state-backed hackers to tiptoe unnoticed — apparently intent solely on intelligence-gathering — for more than half a year through the networks of at least nine government agencies and more than 100 companies and think tanks. Only in December was the SolarWinds hacking campaign discovered by the cybersecurity firm FireEye. France suffered a similar hack, blamed by its cybersecurity agency on Russian military operatives, that also gamed the supply chain. They slipped malware into an update of network management software from a firm called Centreon, letting them quietly root around victim networks from 2017 to 2020.” This is important because of what happened in the last two years, remember how ‘stupid’ American people started to blame Huawei for all the bad whilst offering absolutely no supporting evidence? Huawei does not need to bother to aid whichever government there was, silly software developers are doing that for them, we see an abundance of intrusion problems that include SolarWinds, Accellion and Cisco. A stage where thousands of systems are at risk, but no, the ‘silly’ people kept on blaming Huawei. Even I knew better and as Sony gave me the idea for an intrusion method called ‘Plus One’ (a viable way to drive the Pentagon nuts) with an alternative direction that I call ‘Vee One’, but that one has a few hiccups I reckon. Then I got creative and saw a new parameter in play. One that is based on a little part I read in a Cisco manual, the text “When You Add A Hard Disk To A Virtual Machine(VM), you can create a new virtual disk, add an existing virtual disk, or add a mapped Storage Area Network (SAN) Logical UnitNumber (LUN). In most cases, you can accept the default device node. For a hard-disk, a non default device node is useful to control the boot order or have different Small Computer System Interface (SCSI) controller types. For example, you might want to boot from an LSI Logic controller and use a Bus-logic Controller With bus sharing turned onto share a data disk with another VM.” You see that small text indicates that there is a nice workaround in Cisco CMX and it opens up a lot more than they bargained for, that in conjunction with the share issues thy were already facing gives out a whole new meaning to the phrase ‘Copy me I want to travel’, n’est pas? (for the French victims)

It is a much larger stage, most laws aren’t ready for this, prosecuting the guilty parties is close to impossible and any quick fix they make will only make things harder, the setting was and has for always been the makers of software, time constraints and lack of deep testing makes for a lousy solution and in most cases these players have a pushy marketing department (example: Ubisoft), and yes ‘You be soft!’ because the small tidbit that AP gives us with “Attackers are finding it harder and harder to gain access via traditional methods, as vendors like Microsoft and Apple have hardened the security of the operating systems considerably over the last years” yet it is a small stage and not a correct one. Weaknesses in Azure, issues with advertising in apps and a larger stage of programming, we see it clearest in .NET, but it goes way beyond that, for example “The problem of memory leaks is not uncommon in any technology. Simply put, the framework doesn’t release the memory that it no longer needs. .NET is frequently criticised for memory leaks and memory-related issues. Although .NET has a garbage collector for this sort of problem, engineers still have to invest additional efforts into proper resource management. And the leaks keep on growing as the application scales.” (source: Altexsoft) and it shows the smallest part, if there is a leak in one place, there will be in other places too and the leaks are not the real problem, getting it to semi-crash and taking over its right on a network are a quick way into any system, I saw the example with an accounting program (censored name), I got the program to crash (took about 20 seconds) and I ended up with the administrator rights to the entire mainframe from ANY location running that software. I get it, there will always be a bug in any place and the makers were quick to fix it, but for a few weeks there was an entrance point that took minimum efforts and that setting is only increasing with routers and cloud systems, these companies rely on marketeers that are ready to push for the investors sake and leave the client swimming in a swamp, I have seen it more than once and it will happen again, and this setting has been going on since 1989 and over the next 3-4 years it will grow to 150%, the push to billions and to quickly get to billions will be overwhelming for too many players all whilst the law will not be able to protect the victims, they will merely point at torts law, even though that you are the victim, most contracts are offered as an ‘as is’ solution and for the most software makers can avoid prosecution for the longest time, long enough for the hackers to get away with your data and sell it, what a lovely system you bought. Oh and before I forget, organised crime is way ahead of me, so for some it will already be too late.

Leave a comment

Filed under IT, Law, Media, Science

Thanks for the support

We all have to say thanks, I in this case to the BBC, they were just able to give support to two issues that I put out in the open over a year ago (too tired to find these articles, they are at least a year old and it is 33 degrees Celsius at present (at 21:30), The first is the lacking approach to Common Cyber Sense within the US Administration, I found that failing in the Pentagon in 2018, I found Cisco routers still carrying the password Cisco123 in at least two sensitive areas and there was the use and abuse of non secured USB sticks in more than two sensitive places and on top of all that, the US ends up with an idiot in the White House relying on a password like MAGA2020, how bad do things need to get? I agree that the man Victor Gevers did everything right, including alerting the proper players, but this is a much larger problem. So when we see “The president’s account, which has 89 million followers, is now secure. But Twitter has refused to answer direct questions from BBC News, including whether the account had extra security or logs that would have shown an unknown login”, the quote forgets to give a larger part, you see, this was all on the user, when the user is thick as molasses and equally stupid, can we blame Twitter? And this now also reflects back to ‘6 simple questions’, which I released on February 3rd 2020, there we see the simple setting that the Daily Mail, the Daily Mail of all sources that there was a way to infect accounts yet no way to establish by who or how. It gets us back to the original question ‘Where is the evidence that Saudi Arabia infected ANY phones?’, a question that FTI Consulting and the United Nation essay writers can not inform us. It shows a much larger lack of cyber security and proper cyber defences, all whilst these so called investigators are happy to accuse whomever is a political and not a true target, is that too much?

I ended that article with question 6 ‘Why on earth is the UN involved in an alleged Criminal investigation where so much information is missing?’, now we see a new page turned, can any criminal investigation hold any water when the users are that thick? MAGA2020, really?

So when we consider “Mr Gevers also claimed he and other security researchers had logged in to Mr Trump’s Twitter account in 2016 using a password – “yourefired” – linked to another of his social-network accounts in a previous data breach”, in all this the need to employ Common Cyber Sense is a situation that becomes more and more essential and we need to catch on quicker than we are, because it is people like that who will claim things against Russia and China, whilst letting their security services in at their leisure because they cannot be bothered with Common Cyber Sense. 

As I see it, President Trump will optionally get two additional Christmas cards this year, one from 76B Khoroshevskoe Highway, the other from 14 Dongchangan Avenue, Dongcheng District, Beijing. Both will be stating “Thanks for the support”, what a lovely way to end a presidency and probably the first time that a US President gets a Christmas card from both locations.

Leave a comment

Filed under IT, Science

A political stage of nowhere

Less than an hour ago the BBC gave us ‘EU reveals plan to regulate Big Tech’, apart from the discriminatory nature of the stage, are they doing anything else than merely fuelling their own gravy train? Consider the news from last July, there we were given ‘Apple has €13bn Irish tax bill overturned’, a case that started in 2016, had Apple and the government of Ireland in a twist, when you consider “The Irish government – which had also appealed against the ruling – said it had “always been clear” Apple received no special treatment”, I am on the fence, and in this the European Commission wasted 4 years in going nowhere, in the light of that revelation, can we even trust the approach the EU has? When we look at the first option, we see ‘Online harms law to let regulator block apps in UK’, this means an almost immediate blocking of Twitter, Facebook, WhatsApp and a few more. Local laws have been ‘accomodating’ to large corporations for such a long time, that social media is caught in the middle (and yes they benefitted too), so they re now pushing for changes that end privacy, because that is a conclusion. If we hunt down the perpetrators, we need to coat the materials in identity revealing codes, in addition, the EU government will have to adjust laws to make the poster responsible for what they post and that will lead to all kinds of privacy adjustments (that does not worry me), yet when insurance companies will use that setting to see transgressions on social media and they demand adjustment by handing over the posted evidence, how long until people like Margrethe Vestager start realising that they were clueless from the start? The BBC article gives us “The law would give local officials a way to ask Airbnb and other apps to hand over information or remove listings”, which now puts some players on the dark-web and the chaos (and organised crime involvement) merely increases. For example, when we see “not use data gathered via their main service to launch a product that will compete with other established businesses”, how will that be proven and tested? By handing all data over to the government? How many frivolous cases will that grave train launch? How is it impossible to stop advantage seekers a stage where they use Margrethe Vestager and her gang of idiots to do the bidding of (optionally) organised crime?

Even though I spoke of the Accountability Act, a legal direction that could thwart a few issues from the start in June 2012, 8 years later and this group is hardly even on the track of resolving anything, only to get their grubby greedy fingers on data, the new currency. And in this, the tech companies have their own games to play as Facebook shows with “Apple controls an entire ecosystem from device to app store and apps, and uses this power to harm developers and consumers, as well as large platforms like Facebook”, what Apple does, IBM did for decades, what Apple does Microsoft did for decades, so where is that train station? So even as we see “And they may influence other regulators – in the US and elsewhere – which are also planning to introduce new restrictions of their own” we also need to realise that after a decade, the local and EU laws have done little to nothing to hold the poster of information to criminal account, it seems to me a massive oversight. And in all this there is no view that the EU will wisen up any day soon. 

So as I see it, this will soon become a political stage that goes nowhere and in all this these layers merely want their fingers on the data, the currency that they do not have. How is that in any way acceptable?

Oh and when we see the blocking of apps and localisation, how long until people find an alternative? An alternative that the EU, the UK and the US have no insight over? Will they block apps that interact with data centres in China, Saudi Arabia and optionally other locations too? I raised it in other ways in ‘There is more beneath the sand’ in 2019 as well as some issues in 2018, a setting that was almost two years ago, as such is it not amazing that we see a shortsighted approach to this issue, whilst I gave the option EIGHT YEARS AGO and the laws are still not ready? They are ready to get the data from Google, Facebook, Apple, Amazon and Microsoft, as such when the trial goes wrong, hw will these people be compensated for the loss of uniquely owned data, data that they collected over the decades? Will the stupid people (Margrethe Vestager et al) compensate per kilobyte? How about $25,000,000 per kilobyte? Perhaps we should double that? What will be the price and in this, we should demand that Margrethe Vestager and her teams will be criminally liable for those losses, or will the gravy train decide that it is a little too complex to hold one station to order, and let face it, that gravy train has 27 stops to make, all with their own local needs, their local incomes and their local digital wannabe’s.

When a setting like that goes nowhere, you better believe that there is someone behind the curtain pulling strings for their own enriching needs, that is how it always has been, as such, let me give you the smallest example from January 2020, there we see “‘DIGITAL CROSS-BORDER COOPERATION IN CRIMINAL JUSTICE’ CONFERENCE”, with the nice quote “The e-Evidence Project led by the European Commission, DG Justice and Consumers, provides for the e-Evidence Digital Exchange System that manages the European Investigation Order/Mutual Legal Assistance procedures/instruments (e-Forms, business logic, statistics, log, etc.) on European level. The Reference Implementation Portal is the front-end portal of the e-Evidence Digital Exchange System and is also provided by the EC”, yet this is only step one. In all this we can also include the EC (at https://ec.europa.eu/home-affairs/what-we-do/policies/cybercrime/e-evidence_en), where we see: “However, present-day solutions too often prove unsatisfactory, bringing investigations to a halt”, I get it, you will say, will this not resolve it? Well, consider “provide legal certainty for businesses and service providers: whereas today law enforcement authorities often depend on the good will of service providers to hand them the evidence they need, in the future, applying the same rules for access to all service providers will improve legal certainty and clarity”, in this we need to look in detail at ‘provide legal certainty’, which at present under privacy laws is a no-no, and the poster cannot be identified and cannot (and will not) be held to account. As well as ‘applying the same rules for access to all service providers’, still the poster remains out of reach and the local and EU laws have done NOTHING for over a decade to change that, as such, when we consider this, why should Google, Facebook, Apple, Amazon and Microsoft suffer the consequences, in addition we see the absence of IBM, why is that? Does it not have data collection software, it has data centres, it has cloud solutions, so why are they absent?

And in light of earlier this year, as we were told ‘Google starts appeal against £2bn shopping fine’, how will that end? The law remains untested in too many aspects, in this the entire data stage is way too soon and in that the blowback will be enormous, all whilst the EU (UK too) is unable to do anything about data driven organised crime, other than blame state operators Russia and China, consider the Sony Hack of 2011, I was with the point of view by Kurt Stammberger (before I even knew about Kurt Stammberger), North Korea lacks infrastructure and a whole deed of other parts. I also questioned the data, like “former hacker Hector Monsegur, who once hacked into Sony, explained to CBS News that exfiltrating one or one hundred terabytes of data “without anyone noticing” would have taken months or years, not weeks”, I even considered an applied use of the Cisco routers at Sony to do just that, all issues that North Korea just could not do and in that environment, when we see these levels of doubt and when we get “After a private briefing lasting three hours, the FBI formally rejected Norse’s alternative assessment”, which might be valid, but when we see a setting where it takes three hours to get the FBI up to speed, can we even trust the EU to have a clue? Even their own former director of German Intelligence, gave us recently that they did not fully comprehend Huawei 5G equipment, and they will investigate the data owners, al before the posters of the messages are properly dealt with? I think not!

Leave a comment

Filed under IT, Politics, Science

About lights and tunnels

If we take the change of new technology (like 5G), we need to feel to be in charge. We tend to forget that part (I surely did at some point) and whilst I was considering a different form of new IP, I considered the small status that the thought came from a direction where my knowledge is not that great, I am no expert on technological 5G, I never claimed to be that. So when my mind grew towards a new form of mobile security towards 5G+ or even 6G, my mind set an image, yet the stage of routing, ciphering and deciphering waves are not the stages I am an expert in, yet forms of the solution come to me. I am not a mathematician, so I see images, images of clockworks, clockworks of gun cylinders and they intersect. 7, 9 and 11 shooters, cylinders of different properties are intersecting, what do you set when there are n 7 cylinders all with different time settings, n 9 cylinders and n 11 cylinders. Setting a larger stage of frequencies and cut stages that are linked, all set in an algorithm via a new form of routing, the result is a new stage of mobile communication that cannot be hacked, until true AI and true Quantum computing are a fact, the shallow circuits cannot cut through the mesh, a new stage of true privacy and at present Google and Huawei are the only ones even close to setting this up, even as they have the juice, they will need someone like Cisco to pull some of the weight. 

It would also seem a different stage to the mobile phone. I remember the old walkie talkies in the 60’s. The more advanced models had several crystals so that there was a unique signal. I wondered what we could do to emphasise on privacy in today’s mobile setting. In stead of crystals, we have a mobile phone, it is a transmitter, but what happens when it is not set to a band, but it can be set to 7,9, or 11 separate frequencies. A sort of time slice and that is the beginning, the carrier will give you the connection with the slices, their routers will set the connection and unless the hacker has the set, they can never get the entire conversation, unless they have every connection and then they would need to unscramble thousands of phones depending on the hardware whether they used 7,9 or 11 parts. If I get it to work in my mind, it could signal a new age of real privacy for people with a mobile phone.

But in the end, it is merely a sideline towards more interesting IP. The idea hit me when I was looking at a real estate site, which one does not matter. I was merely curious. It all started with a spec pal by Piers Morgan, he made a special on Monte Carlo and I was curious, as I had never been there. So as I got curious, I took a look and I noticed that speed was an interesting flaw, even on a mobile, a place where well over 50% of all searches are done, it took nearly forever. Yet when I took the Google Tester (at https://search.google.com/test/mobile-friendly) the site passed the test, it made perfect sense, yet the delay was real. I do not think it was them, or me. But it got me thinking of a different approach.
Google has had that setting for a long time, they call it the Lightbox ad. I had another use for the ad, or as I would call it, another media container. But the media container would require a different use, it would require the user to use a different approach, not that this would be bad, but it would optionally reduce the bandwidth that they use. If the app links to the toppling on the site, yet when we look, the app gets the link to the media container on the google server, the real estate data needs are not going via the offerer, it goes via the seeker and hey are either really seeking, or merely browsing, the browsers will no longer impede on the business, the seekers will not notice and these media containers can all be used for advertising all over the place, it is up to the realtor which ones are ready for advertising all over the place, and there is the larger kicker, it is a setting that (as far as I can tell) no realtor has considered and that is where the larger stage comes, because when 5G hits, the realtor will see a much larger benefit, they would not need to update (other then optionally an app), they will be ready, and they will push towards both their needs via their site, an app and via Google Ads, three directions instead of one and it will be a larger stage when no one was thinking ahead. 

There is light at the end of the tunnel, I switched on the lights, and no one cares who switched on the lights and that is OK, it is just that no one realised that the lights were not on, that should leave you with the consideration why no one realised that.

 

1 Comment

Filed under IT, Science