2 Followers
4 Following
22 Posts

At the intersection of protecting and projecting my identity.

AKA: Cybersecurity professional and stage actor.

Bloghttps://bobgalley.blog/2023/06/13/we-got-one-a-title/
Linktreehttps://linktr.ee/midgarn

Volunteering day 2 at HOU.SEC.CON . Hosting Track 4 in ballroom salon F, now with the juice table outside our door!.

#houseccon2023 #cybersecurity #securityawareness #ethicalhackers #ics #ciso #houseccon #community #criticalinfrastructure #cyberwarriors

@houseccon

Time for some identity projection.

"Theres nothing illegal about any of this!"

I'm on stage this time in a stage play based on the iconic 1985 movie. Tickets are through Ovation (first link), with info on the production at the historic Crighton Theatre's site (link 2) and soon on the Stage-Right of Texas production company site (link 3)

https://ci.ovationtix.com/36076/production/1158156

https://www.crightontheatre.org/

https://www.stage-right.org/

#theatre #stageactor #dualcareer #clue

AudienceView Professional

My takeaways here are:
1) This is an example of a campaign trying to influence people's opinions. They create accounts, pages, and groups, then build up (self-)promotion to try to get individual posts to go viral.
2) The social networks are working to remove these.
3) Luckily in this case, the group did not seem to get outside its own set of bot accounts.

#socialengineering #securityawareness #socialnetworks #disinformation

https://techcrunch.com/2023/08/29/meta-shut-down-a-disinformation-campaign-tied-to-chinese-law-enforcement/

TechCrunch is part of the Yahoo family of brands

Right after LinkedIn reported a piece on fake LinkedIn profiles, I received an invitation from a person who might have been one. The company he was offering a job for certainly was fake. See the clues here and get some history on the situation.

http://bobgalley.blog/2023/08/28/fake-offer-via-linkedin-invite/

Fake Offer via LinkedIn Invite

Right after LinkedIn reported a piece on fake LinkedIn profiles, I received an invitation from a person who might have been one. The company he was offering a job for certainly was fake. See the cl…

Next On Stage: Off Phishing

Something I'm not seeing in a lot of these news articles about events in the news is "how does it affect me?" and "How can they use that information".

So, I explored exactly that. Is this useful? Please let me know.

http://bobgalley.blog/2023/08/24/news-duolingo-user-data-available/

News: DuoLingo User Data Available

News came this errk that some of DuoLingo’s user data made it out to a hacker site. Most of the articles don’t detail what this means for you – how could they use the data. I expl…

Next On Stage: Off Phishing

Help for Non-Consent Images

After seeing several posts about a new tool for removing non-consentual intimate images, I looked into it. The charity and tool are real, and I have looked further into what it can (and can't) do to help. I also give my understanding of how hashing works, aiming for a non-technical crowd. I'd really appreciate feedback on how well that part worked, please.

http://bobgalley.blog/2023/08/11/help-for-non-consent-images/

Help for Non-Consent Images

After seeing several posts about a new tool for removing non-consentual intimate images, I looked into it. The charity and tool are real, and I have looked further into what it can (and can’t…

Next On Stage: Off Phishing

I dissect a pair of "fake renewal" scams: an email for credit card fraud, and a web ad for phishing, credit card, or downloaded malware.

http://bobgalley.blog/2023/08/08/more-fake-renewals/

More Fake Renewals

Another example of a credit card email came in – this time a fake renewal for a Norton product. And then Microsoft Start served up a fake McAfee ad. Let’s dissect these to see how they&…

Next On Stage: Off Phishing

Security folks with behavior-based alerts: How do you approach the subject of vacations? Presuming you allow your employees to log in from vacation, the employee actually doing so would trigger an abnormal login.

In your company, is the onus on the security admin to call the employee and confirm, or is there some arrangement with HR or Payroll? Though to me, the latter feels like too much personal info - we DON'T need to know someone's on vacation UNLESS there is an out-of-state or out-of-country login.

Thoughts please:

As a cybersecurity professional as well as an actor I try to be careful about protecting my identity while projecting my identity.

So, the recent explosion of my acting peers using Prisma Labs' Lensa (and the free app Prisma before it) have me and others worried. Particularly the User Content (5) area of the Terms of Service, and whether that license applies to Prisma Labs using your face to profit (examples: as an AI generated extra in a movie crowd scene, or a deep fake to defeat a "who you are" MFA)

Below are links to the Terms of Use and the Privacy Agreement. (#CiteYourSources) The paragraphs before and after look like they are protecting themselves against lawsuits from photographers. The terms of use identifies your user content as part of your personal data. The privacy agreement confirms that should you request personal data removal, they will ask to confirm why but also comply. The PA also confirms all original media is wiped of Metadata (geotags, etc) before saving and the media itself removed after 24 hours.

The action of the app - asking an AI to draw a new picture based on that input - needs the consent to manipulate, etc.

Now, "perpetual" is scary, and could lead into deep fakes where Prisma Labs, Inc profits from our countenance without asking us. But to me it feels more protecting them from someone sending in a clip from say Ghostbusters and getting the AI to insert their face.

I'll copy this out now that I've written it, and crosspost to my LinkedIn and my @infosec.exchange Mastadon to see what my cybersec peers say.

https://lensa-ai.com/terms-nov-16-2022#:~:text=USER%20CONTENT,as%20between%20you%20and%20us.

https://lensa-ai.com/privacy#:~:text=If%20you%20share%20your%20Personal,inquiries%20in%20relation%20to%20Lensa.

Terms of Use

Lensa AI Terms of Use