Archive for March, 2023

GM Will Dump Apple CarPlay For Google In EV Vehicles Simply To Make A Few Extra Bucks

Posted in Commentary with tags , , on March 31, 2023 by itnerd

I have to admit that I was trying to find a non cynical way of speaking to this story from Reuters. But I can’t so I am going to call it out for what it is. Let’s start with this:

General Motors plans to phase out widely-used Apple CarPlay and Android Auto technologies that allow drivers to bypass a vehicle’s infotainment systems, shifting instead to built-in infotainment systems developed with Google for future electric vehicles.

Apple CarPlay and Android Auto systems allow users to mirror their smartphone screens in a vehicle’s dashboard display.

GM’s decision to stop offering those systems in future electric vehicles, starting with the 2024 Chevrolet Blazer, could help the automaker capture more data on how consumers drive and charge EVs.

GM is designing the on-board navigation and infotainment systems for future EVs in partnership with Alphabet Inc’s Google.

This decision doesn’t seem to affect gas powered vehicles. But GM has committed to not making gas powered vehicles in 2035. So read into that what you will.

The question is why would GM go this route. Here’s why:

Buyers of GM EVs with the new systems will get access to Google Maps and Google Assistant, a voice command system, at no extra cost for eight years, GM said. GM said the future infotainment systems will offer applications such as Spotify’s music service, Audible and other services that many drivers now access via smartphones.

“We do believe there are subscription revenue opportunities for us,” Kummer said. GM Chief Executive Mary Barra is aiming for $20 billion to $25 billion in annual revenue from subscriptions by 2030.

That’s right, it’s all about the Benjamins. I am guessing that GM traded having CarPlay in their cars to get Google to help GM to do something that would result in a recurring revenue stream. Because recurring revenue is what all the cool kids want these days.

The thing is GM is going to regret this.

Android Auto and Apple CarPlay are must haves when buying a new car. In my mind, deleting Apple CarPlay is going to make a lot of Apple fans simply say “There’s no Apple CarPlay in this EV? Over to the competition I will go.” But the flip side to that is that they might be counting on being like Tesla where they don’t use Apple CarPlay and Android Auto, but their cars still sell. Though many Tesla owners who want CarPlay have used a hack to get it. Ditto for Android Auto. That implies that these are features that at least some Tesla owners want. Despite what Elon Musk may think.

Don’t be surprised if GM reverses course if their EV sales aren’t what they think they should be relative to the market, and when they dive into why, this decision to dump Apple CarPlay comes up as a factor. It may take a few years to get there. But I am sure that they will regret this decision.

Rogers/Shaw Takeover Approved By Federal Government… And This Will Cost Canadians

Posted in Commentary with tags , on March 31, 2023 by itnerd

Bad news. The news is out that the merger of Rogers and Shaw has been approved by the Canadian government:

Federal Industry Minister Francois-Philippe Champagne is set to make an announcement this morning about Rogers Communications Inc.’s proposed $26-billion purchase of Shaw Communications Inc.

A senior government official, speaking on the condition they not be named in order to discuss matters not yet made public, says the minister will discuss the transfer of wireless licences at a news conference before the stock market opens.

The deal was first announced more than two years ago and has been awaiting regulatory approval since then.

A full-scale purchase of Shaw by Rogers raised competition concerns, and the original deal has been revised to include the sale of Shaw’s Freedom Mobile to Quebec-based Videotron.

The CRTC and Competition Bureau have each given the agreement the green light.

So, if Canadians were hoping that this deal would not be approved and that competition, as little as it is in the Canadian telco space, wouldn’t shrink any further will be disappointed in this news. All this is going to do for Canadians is reduce choice and increase prices because there are less players in the market. I was going to say that I don’t understand why nobody in Ottawa sees that. But instead I will say that I don’t understand why nobody in Ottawa cares because Canada pays some of the highest prices in the world for telco services and this issue gets lip service at best from the Canadian government. And to be honest, I don’t know what it will take to change that.

Today is a very sad day in Canada.

Guest Post – The Looming Threat of Orphaned Data: How Former Employees’ Abandoned Files Could Destroy Your Business

Posted in Commentary on March 31, 2023 by itnerd

By Michael Jack, CRO and Co-Founder, Datadobi

Employees are leaving their jobs in record numbers – both voluntarily and involuntarily.

The amount of employee turnover that occurs each year varies depending on the industry and country. However, layoffs have seemingly become a common occurrence in the business world, with the tech industry being hit particularly hard of late. Layoffs.fyi, a website that has been monitoring tech layoffs since March 2020, has compiled data indicating that approximately 128,202 employees have been laid off by 482 tech companies since the beginning of this year.

However, employees are leaving their jobs on their own accord as well. According to US Bureau of Labor Statistics (BLS), Job Openings and Labor Turnover Survey (JOLTS), in 2022, the number of total separations increased by 3.2 million to reach 72.3 million. Of these separations, quits accounted for 70.0 percent, with 50.6 million workers voluntarily leaving their jobs – the highest annual level of quits recorded in the history of the survey.

In 2023, one could surmise this employee turnover trajectory is likely to continue, driven by several factors including economic conditions, industry trends, and continued changes in work conditions.

Former employees are leaving a lot of dark data behind.

According to a report by IDC and Seagate, the total amount of data created worldwide is expected to reach 175 zettabytes by 2025. While it’s difficult to estimate how much of that data is generated by employees specifically, it’s clear that the amount of data created by individuals within businesses is growing at an unprecedented rate.

Of course, the amount and type of data created by each employee can vary widely depending on the industry, job role, and the specific tasks performed. However, according to various experts, it is estimated that around 80-90% of that data is unstructured data. That is, it ranges from emails, documents, spreadsheets, presentations, and databases to other less innocent files such as movies, music, images, and Torrents. Torrents, which are often used for sharing large files such as movies, music, and software, can also pose risks, such as the spread of viruses or malware, and the distribution of copyrighted material without permission.

It doesn’t take much to do the math – that is a lot of data former employees are leaving behind.

Orphaned data is risky business. 

Orphaned data refers to data that has no clear owner or purpose within an organization. This can occur when data is created or stored and the individual responsible for it leaves the organization without transferring ownership or knowledge of the data to another person or department. This can lead to several significant risks, including:

  • Security risks: Orphaned data can become a ticking time bomb of security threats waiting to explode! If this data contains sensitive or confidential information, it can be a goldmine for cybercriminals who can exploit it for their gain. Once this information falls into the wrong hands, it can lead to devastating consequences such as identity theft, financial fraud, or corporate espionage.
  • Compliance risks: If your business is not managing orphaned data properly, it can accumulate over time and lead to noncompliance with regulations, such as GDPR, SOX, HIPAA, and FISMA. Noncompliance with industry regulations can be a nightmare scenario for businesses. The potential legal and financial penalties can be ruinous, leading to hefty fines, lawsuits, and even business closure.
  • Operational risks: Orphaned data can wreak havoc on your entire operation. As orphaned data accumulates over time, it takes up valuable storage space, leading to degraded system performance and extended backup windows, which can cause operational disruptions. The consequences of these disruptions can be dire, resulting in delays, lost productivity, and decreased customer satisfaction. But that’s not all, the costs associated with storing and maintaining this data can add up quickly, creating a massive financial burden on your organization.
  • Reputational risks: Imagine the horror of your business’s name plastered across the headlines of every major news outlet, exposing the loss of sensitive or confidential data due to orphaned data management negligence. This could be a fatal blow to your reputation and customer trust. The damage from such an incident can be immeasurable, and it can take years to recover from the loss of trust and loyalty from customers. Not to mention the costs associated with potential legal actions and settlements.

To address the issue of orphaned data, organizations may need to implement data governance policies and procedures to ensure that all data is properly documented, stored, and maintained. This may involve conducting regular data audits, assigning clear ownership and responsibility for data, and establishing guidelines for data creation and storage.

StorageMAP enables IT leaders to significantly reduce orphaned data liability and risk.

StorageMAP enables organizations to identify and manage orphaned data by providing visibility into unstructured data stored across the organization’s entire estate. By comparing the list of current employees with the data residing on the storage estate, StorageMAP can identify all data that has no clear owner thereby enabling the company to take immediate and appropriate action. This action can include, but is not limited to deleting, transferring ownership, or moving it to a more suitable environment.  

Bottom line, ignoring the risks of orphaned data is not an option. If you don’t take steps to manage your data effectively, your business’s safety, reputation, and financial stability may be at stake. Don’t wait until it’s too late – act now with StorageMAP.

Today Is World Backup Day

Posted in Commentary with tags , , on March 31, 2023 by itnerd

World Backup Day is today and it was started by a group of concerned internet users and tech enthusiasts in 2011. The initiative was led by Ismail Jadun, a digital strategy consultant from Ohio, and his friends. They were inspired to create World Backup Day after reflecting on the fact that many people were not backing up their data regularly, and as a result, were putting themselves and their organizations at risk. The first World Backup Day was observed on March 31, 2011, and since then, it has become an annual event that encourages people to take action to protect their digital estate.

Data loss can occur due to a number of reasons such as hardware failure, software corruption, malware attacks, natural disasters, and even human error. The amount of money that businesses lose due to data loss can vary depending on various factors such as the size of the business, the industry, and the type of data lost. However, studies suggest that the cost of data loss can be significant, with some estimates ranging from thousands to millions of dollars per incident. And one can imagine the devastating consequences if an organization like a hospital, emergency responders, or military agency lost access to critical data. 

Datadobi’s Carl D’Halluin, DH2i’s Don Boxley, and Folio Photonics’ Steve Santamaria had this to say about this important day and why it affects virtually every corner of the datacenter, across virtually every industry, around the world:

Carl D’Halluin, Chief Technology Officer (CTO), Datadobi:

“Failing to backup your data can have catastrophic consequences, as a single hardware failure, cyber-attack, or natural disaster can wipe out all your valuable information, leaving you with no way to recover it. This means that years of hard work can all be lost in an instant, with no chance of retrieval. Even the cost of losing just a portion of your important data can be immeasurable, with potential financial, legal, and reputational implications that can last for years. 

Identifying the vital data that requires protection should be the first step in the process. But even if you know and can ‘describe’ what data must be protected, finding it has always been another matter – and you cannot backup what you cannot find. To effectively address this enormous and complicated undertaking, users should look for a data management solution that is agnostic to specific vendors and can manage a variety of unstructured data types, such as file and object data, regardless of whether they are stored on-premises, remotely, or in the cloud. The solution should be capable of evaluating and interpreting various data characteristics such as data size, format, creation date, type, level of complexity, access frequency, and other specific factors that are relevant to your organization. Subsequently, the solution should allow the user to organize the data into a structure that is most suitable for the organization’s particular needs and empower the user to take action based on the analyzed data. In this case, backup the necessary data to the appropriate environment(s). And, if necessary, the solution should enable the user to identify data that should be organized into a ‘golden copy’ and move that to a confidential, often air-gapped environment.

To sum it up… Don’t let the nightmare of data loss become your reality – always backup your data.”

Don Boxley, CEO and Co-Founder, DH2i

“World Backup Day is an annual event that is intended to raise awareness of the importance of data backup and protection. It serves as a reminder for individuals and organizations to take proactive measures to safeguard critical data against unexpected incidents that can result in data loss, such as hardware or software failure, cyber-attacks, natural disasters, and human error. And, while the exact cost can vary depending on factors such as the size of the organization, the type and amount of data lost, the cause of the loss, and the duration of the downtime, according to various studies, it can cost organizations upwards of billions of dollars each year.

That’s why, for systems architects and IT executives alike, zero is the ultimate hero. And to achieve it, they are taking a multi-pronged approach to data protection. To achieve zero downtime, zero security holes, and zero wasted resources, they are also layering-on smart high availability (HA) clustering and software-defined perimeter (SDP) technology that enables them to securely connect and failover enterprise applications — from anywhere, to anywhere, anytime.

On World Backup day and all year long, it is critical to remember that businesses that invest in data protection are better equipped to navigate unexpected data loss events, maintain regulatory compliance, and protect their critical assets and reputation. Bottom-line, investing in data protection is not just smart, it’s essential for business success.”

Steven Santamaria, CEO, Folio Photonics

“The world’s most valuable resource is data, and it is of utmost importance to properly store, protect, and preserve this resource. The safekeeping of data is essential because it represents the foundation upon which many modern businesses are built, and its loss can have far-reaching consequences for organizations and individuals alike. As such, ensuring the safety and longevity of data should be a top priority for any entity that relies on this precious resource.

On World Backup Day, we are reminded of this, and the criticality of backup as one of the key safety nets against data loss, whether it’s due to technology failures, cyber-attacks, or human error. 

Today, I would offer that the most effective data protection strategy should also incorporate a data storage platform that can be securely archived in an off-site location, with the added benefit of being taken off-line and air-gapped for even greater security. This means that the storage platform is physically separated from the main network and disconnected from the internet, making it highly resistant to cyber-attacks and other forms of data breaches. In essence, a well-designed data protection strategy should prioritize both physical and digital security to safeguard critical data and ensure business continuity.”

Molly Presley, SVP of Marketing at Hammerspace:

“The coming year will be about automation to help identify and protect data assets.  Human-managed processes are challenging to scale as the number and variety of data-creating devices continually increase.​​ As a result, setting data protection services at a global level that automatically apply policies that meet corporate governance compliance requirements will be increasingly important. 

Automation will include identifying newly created data on any infrastructure in the global data environment, automating controls on data copy creation, and automating data services to ensure global protection on any infrastructure. “ 

 Darren Yablonski, Senior Director of Sales Engineering leading teams in Canada, U.S. and LATAM at Commvault:

“As the sophistication of cybercriminals has changed over the last few years, so too has data protection ­­— significantly. In the past, cybercriminals would typically gain access to an organization’s data and encrypt it so employees could no longer understand it, rendering it useless to the business. This is why ensuring you have a secure copy of your data is so important. With a spare dataset to restore, business can continue as usual. 

Lately, cybercriminals are increasingly moving from encrypting the data, to instead holding it for ransom and threatening to publish it. This has much broader consequences, including reputational damage as well as possible loss of competitive advantage as your customer and company data could be available to the entire industry. As a result, organizations should consider changing their approach to data protection. 

Gone are the days when it was enough to just backup your data. Organizations need to prevent cybercriminals from accessing systems to begin with by leveraging, for example, an early detection system. Cyber deception can give companies the upper hand and put them one step ahead of any potential attackers. Decoys are deployed to throw attackers off course and instead draw them to artificial assets instead of legitimate ones. The minute an attacker enters the decoy IT environment, the organization is notified so it can act immediately and isolate the asset. With response time significantly reduced, cybercriminals are far less likely to get into any real systems. 

Backups will always remain important, because unfortunately the worst can always happen — from a natural disaster that destroys your servers to a cyberattack. However, in the face of the sophisticated cybercriminal, it’s vital to have a proactive approach to data protection in tandem with traditional reactive methods.”

Two Research Reports Show That Phishing Emails Are Not Only Increasing, But They Are More Dangerous Too

Posted in Commentary with tags , on March 30, 2023 by itnerd

According to Cofense researchers, in their latest State of Email Security Report, the volume of phishing emails sent in 2022 is up 569%.

Using artificial and machine learning analysis, researchers analyzed global network data from 35 million users. The email security report revealed five specific trends:

  • Credential phishing emails: + 478%
  • Top malware gangs: Emotet and QakBot
  • Top cybercrime: BEC
  • Web3 use: +341%
  • Use of Telegram bots for exfiltration: +800%

In data compiled by Open Text Cybersecurity in their 2023 Global Threat Report, researchers revealed that phishing sites detected using HTTPS increased nearly 56%, highlighting that domain authorities are becoming less effective at preventing bad actors from obtaining and using legitimate certificates to enhance their phishing success rates.

Translation: None of this is good if you’re responsible for stopping the bad guys from getting in the door. I have two comments on this, the first is from Dave Ratner, CEO, HYAS:

“Either finding credentials on the dark web or stealing credentials via phishing continues to be one of the main entry points into the enterprise for malicious actors. While MFA and other techniques can help secure this entry point, any approach should be complimented with a Protective DNS solution — bad actors will continue to use social engineering and other approaches to obtain proper credentials, but a Protective DNS solution can and will uniquely identify the anomalous communication that bad actors generate once they get inside, as they beacon out to their command-and-control. This layer of visibility ensures that such breaches can be identified and shut down before they progress into major issues.”

The second is from Morten Gammelgaard, EMEA, co-founder, BullWall

    “The growth here is miniscule compared to what will happen in 2023. The rise of natural language AI, like ChatGPT, will EXPLODE the efficacy of phishing overnight. Threat Actors have just two ways to Phish. Firstly, they can write a form email meant for generic people. This is less effective but it’s a numbers game. You may send out 100,000 thousand of these but you only need one to click. Or you can Spear Phish, that is where you research the email recipient, view their boss on LinkedIn, their vendors they interact with, and write a custom email to trick that single user. Maybe 1 out of 100 of those will be successful. 

   “With AI you get the best of both worlds. Mass email campaigns that are highly targeted at a scale that can produce 100,000 custom attacks instantly. This will explode cybercrime, and there is an arms race between the largest companies on the planet, Google, Apple, Microsoft and others throwing billions of dollars to rush their AI apps out, often putting aside safety and use cases in exchange for being first. They have everything at stake if they lose their footholds. But the Russians and Chinese also are secretly funding billions of dollars into AI, but for Cyber Espionage, Ransom and Attacks. You can’t stop it. You must focus on building your defensive stack, including rapid containment tools on your Endpoints, like Endpoint Detection and Response, and on your Critical Infrastructure and File Shares with tools like Ransomware Containment and Critical Infrastructure monitoring.”

What’s clear from these threat reports is that that these phishing attacks are becoming more sophisticated. Which will make them more dangerous and costly if a multi-faceted approach to defending against them isn’t taken. And the time to act on that front is now.

BREAKING: Elon Musk Tried To Meet With FTC Chair And Got Flipped Off

Posted in Commentary with tags on March 30, 2023 by itnerd

The New York Times is reporting that Elon Musk tried to meet with the chair of the FTC Lina Kahn, but he didn’t get that meeting. Here’s the TL:DR:

After Mr. Musk requested to meet with Ms. Khan, she consulted with the enforcement division inside the F.T.C.’s consumer protection bureau, which has been leading the Twitter investigation, according to the email among agency staff members describing the situation. Acting on the enforcement team’s advice, Ms. Khan declined to meet with Mr. Musk at that time.

In Ms. Khan’s Jan. 27 letter to Twitter, she noted that the company was under investigation and had dragged its heels in providing documents to the F.T.C., delaying depositions with witnesses including Mr. Musk. She said she was “troubled by Twitter’s delays and the obstacles that these delays are creating for the F.T.C.’s investigation.”

“I recommend that Twitter appropriately prioritize its legal obligations to provide the requested information,” she wrote. “Once Twitter has fully complied with all F.T.C. requests, I will be happy to consider scheduling a meeting with Mr. Musk.”

What does this tell you. Elon must really think that the FTC is about to lower the boom on him in a serious way, and he wants to head this off before it becomes costly. Be that in fines, forcing him to change how he does business, or most likely both. For all of his bravado, he’s at least smart enough to figure out that getting three letter agencies in the US mad at him is not a smart move. The thing is, I have to believe that he’s way too late on that front and he’s on the cusp of having yet another problem to deal with on top of the many, many other problems he has at the moment.

34% Of Shoppers Rank Data Security As A High Priority: BR-DGE

Posted in Commentary with tags on March 30, 2023 by itnerd

New research from BR-DGE reveals consumers’ concern over payment security, with 34% of shoppers ranking data security and payment encryption as being the most important element in an online shopping experience. A further 83% of the 1,200 UK consumers surveyed stated their concern regarding where their card details are processed and stored during transactions.

Rui Ribeiro, CEO and Cofounder, Jscrambler:

     “The new BR-DGE research shows that consumers recognize the growing need for effective payment security. With every purchase transaction, they offer up their money, their data and their trust. It’s imperative for e-commerce companies to better protect them by securing their payment pages. On average, 70% of the scripts that power components like payment forms come from third-parties. The majority of websites have more than 10 different vendor scripts accessing their payment pages. 

E-commerce companies need to focus on gaining visibility and control over these scripts to prevent data compromise – and protect their revenue, reputation, and ability to comply with regulations. The risk of third-party scripts must be not only understood but minimized in order to protect customers and keep up with the rapidly increasing pace and expectations of the online payment landscape.”

I for one am glad that consumers have awareness about payment security. Hopefully this translates into retailers doing everything they can to ensure that consumers can shop safely online.

My Official Advice For People Stuck In The Rogers Email Fiasco Is As Follows: Abandon Rogers Email

Posted in Commentary with tags on March 30, 2023 by itnerd

What started as a general outage with Rogers Internet offering that happened almost a month ago has evolved into a situation where users of Rogers email service (in other words they have a @Rogers.com address) can’t get their email on any device or application that they choose. And that has dragged on for weeks. This is in part due to the fact that Rogers requires users to create  App Specific Passwords via Rogers Member Center on each program or device that an email address is used on. The creation of new app specific passwords doesn’t work and existing app specific passwords appear to have been deleted in many cases. That pretty much breaks your applications that rely on them. There is a workaround, but that workaround is sub-optimal because viewing mail through a web browser is not the best experience. Especially on a smart phone. And they’re the fact that you might have to call Rogers to get someone to reset your email password if you don’t know what it is. The problem with that is that since this fiasco began, Rogers wait times to speak to someone have gone through the roof. Making that a sub-optimal experience as well for Rogers customers.

Now Rogers knows that this is an issue, but at this point it is crystal clear that if an issue that has affected their users for almost a month hasn’t been fixed, it likely means that Rogers can’t fix it, or isn’t going to fix it. I don’t know which it is but either is on the table. And honestly, which it is doesn’t really matter at this point because it hasn’t been fixed in any timely manner.

Based on the fact that I get daily emails or calls from existing clients of mine asking “is it fixed yet?”, along with referrals who got my name in hopes that I could fix their Rogers email because Rogers can’t, I have come to the conclusion that Rogers customers need to simply find another provider that isn’t Rogers for their email. I say that because there has been zero communication from Rogers on this issue, which means that there is zero insight about if or when this might be fixed.

The workflow that I have been using with clients of mine to get them off Rogers email is as follows:

  1. Create a new email address either with a “free” provider or by hosting your own domain: I have a high level overview of these two options in this article that I wrote about not using your ISP’s email. I personally recommend the latter option, but I know that not everyone is going to go through the time and effort, not to mention money to take that option. Which is why I offer up the former option. Once you have that account set up on all your applications and devices, you can start using it. In case you’re wondering why I have the word “free” in quotes, “free” email services are known to troll your email to show you advertisements that are relevant to you, not to mention use that data for who knows what. Thus “free” in this case mean that you the product.
  2. Broadcast the fact that you have a new email account: You should do a couple of things to make sure that as many people as quickly as possible know that you’re changing email accounts:
    • Send out an email blast saying that your changing email addresses and the old one will not be used past a certain date. That way it incentivizes people to use your new email address as quickly as possible.
    • Set up a vacation alert on Rogers email with the same information. That way every email that hits your Rogers inbox gets the same information. Rogers has info on how to do that here.
  3. Change the emails related to any online service that you use to your new email address: You’ll have to change the email addresses that are used by anything like online shopping, newsletters, Facebook, Instagram, etc. to your new email address. And this is a good time to look at the various mailing lists that you belong to and ask yourself if you really need to be getting that one extra piece of email.

Now you’ll have to check your Rogers email with a web browser periodically to make sure that you don’t miss any emails that you didn’t account for when you went through the above steps. But if the stars align, you should see the emails coming to your Rogers account decrease over time, and increase in your new email inbox. Making this a win. And then whenever Rogers fixes their email issues, you can export all your email so that you have a record of it. I actually have documented how to export not only your email, but your contacts as well here. But that will only work when Rogers sorts out their issues as it requires an App Specific Password, which of course isn’t working at the moment. But once you do that, you then have the freedom to dump Rogers as your ISP if you so choose as you have no practical need to stay with them as your email is no longer locked in with them. And I can tell you that I have a number of customers just waiting to do that the second that Rogers addresses their email issues and they can get their mail exported.

UPDATE: For those who really want to go into the weeds on these ongoing email issues with Rogers, you can feel free to read this.

Judge Grants Twitter’s Request To ID Source Code Leaker Along With People Who Downloaded The Source Code

Posted in Commentary with tags on March 30, 2023 by itnerd

Yesterday a court in California granted Twitter’s request to force GitHub identify who leaked source code onto GitHub and who’s downloaded said source code from GitHub.

Let’s start with the who part. The GitHub user ID associated with the leaked source code is “FreeSpeechEnthusiast” which I am sure is a shot at the fact that Elon Musk claims to be a free speech absolutist, but hasn’t demonstrated that since buying Twitter. It doesn’t take a rocket scientist to figure out that “FreeSpeechEnthusiast” is most likely a disgruntled former Twitter employee who’s decided to take a little revenge on Elon for firing him or her. Whether they can actually track this person down is anyone’s guess as I have to assume that they would have smart enough to have covered their tracks. But I guess we’ll see as that sometimes isn’t the case when people try to take some form or revenge on a former employer.

Now over to the people who downloaded this source code. Chances are they’ll find a bunch of people who downloaded this code for giggles. But those aren’t the people who should concern Elon. Threat actors who downloaded this code, and who really want to take Twitter down or make life miserable for Elon aren’t going to be that easy to find. Thus I believe that the damage to Twitter has only begun as I fully expect attacks on Twitter to begin soon and no amount of legal intervention will change that.

GitHub has until April 3 to produce all of this information. It’s not clear to me if they can or will do that. And it isn’t clear if this code exists elsewhere on GitHub. I suppose Elon could get one of the few people who are left at Twitter to spend their time looking through GitHub trying to find any other copies of Twitter’s source code. But I suspect that Elon will have bigger issues to deal with shortly.

Tune in April 3rd or earlier to see what happens next.

Valve To Gamers: Upgrade Your Microsoft OS To At Least Windows 10 Or You Can’t Play Our Games

Posted in Commentary with tags on March 30, 2023 by itnerd

There’s a lot of gamers out there that have top of the line hardware and are also running Windows 10 or 11. But there’s also a significant camp of gamers who don’t have the latest and greatest hardware, and are also running operating systems like Windows 7. If you’re in the latter camp, Valve who makes the popular Steam game distribution system have a message for you. You need to upgrade to at least Windows 10 by the start of 2024, or else:

As of January 1 2024, Steam will officially stop supporting the Windows 7, Windows 8 and Windows 8.1 operating systems. After that date, the Steam Client will no longer run on those versions of Windows. In order to continue running Steam and any games or other products purchased through Steam, users will need to update to a more recent version of Windows.

This change is required as core features in Steam rely on an embedded version of Google Chrome, which no longer functions on older versions of Windows. In addition, future versions of Steam will require Windows feature and security updates only present in Windows 10 and above.

Now I’ve seen some outrage online about this. But seriously folks, Windows 7, 8 and 8.1 have been deemed end of support in the case of Windows 8.1, and end of life in the case of Windows 7. That means that there’s no technical support, no bug fixes, and no security fixes. The latter is the important part as no security fixes means that your chances of getting pwned by something are way higher than the person running Windows 10 or 11. But beyond that, you’ll be seeing messages from other software companies saying that they can’t support you with new versions of their software, not to mention bug fixes. So as difficult as it may by it’s time to bite the bullet and buy that new gaming rig that you know that you want with Windows 11 or Windows 10 on it. You’ll be better off as a result.