[ad_1]
With Doug Aamoth and Paul Ducklin.
DOUG AAMOTH. Tech scams, unhealthy guys arrested, and 2FA – what might probably go incorrect?
All that, and extra, on the Bare Safety Podcast.
[MUSICAL MODEM]
Welcome to the podcast, everyone.
I’m Doug; he be Paul…
…and Paul, I’m going to be the primary to want you content tax rip-off season, my buddy.
PAUL DUCKLIN. Oh, expensive.
I suppose it’s significantly related to the US excellent now, isn’t it?
DOUG. Sure: we’re girding our monetary loins, collectively on the point of file our taxes.
DUCK. In fact, any time of the 12 months form of works for a tax rip-off, doesn’t it?
Should you’re within the UK, the tax 12 months is April to March; South Africa, it’s March to February; Australia it’s July to June.
So in every single place there’s *one thing* occurring.
However within the US, it in all probability suits in fairly nicely now – so do be on the alert!
DOUG. Sure: we’ll speak about our first of probably many tax rip-off tales shortly.
However first, we like to start the present with a Enjoyable Reality, and I discovered this truth to be very enjoyable.
The etymology of the phrase helicopter is probably not what you suppose.
It isn’t a mixture of heli- and -copter, however of helico-, the derivation of helix, on this case that means spiral, and -pter, from the Greek “pteron”, that means wings or feathers, generally used to explain flying creatures such because the pteranodon and pterodactyl.
So it’s helico- plus -pter!
How do you want that?
DUCK. That’s nice, Doug!
Like helicobacter. That’s the screw-shaped bacterium that two Aussies… whose names I neglect; they acquired the Nobel Prize after being laughed at for a few years after they found that ulcers are attributable to micro organism.
As a result of no person believed that micro organism might stay within the intestine: “Too acidic.”
And everybody laughed at them and stated, “It’s not a bacterium. Neglect it!”
And so they discovered helicobacter pylori…
DOUG. Wow!
DUCK. ..the “screw-shaped bacterium of the abdomen”. And I’d by no means related that again with helico…pter!
DOUG. A free and attention-grabbing bonus Enjoyable Reality – it’s all the time welcome on the Bare Safety Podcast.
DUCK. Love your work, Doug!
DOUG. Love your work.. and let’s speak about another person attending to work.
You bought your first tax rip-off of the 12 months, and it’s an odd tax rip-off that doesn’t actually ask for a lot….
DUCK. That’s appropriate, Doug.
I assumed I might write about it simply because, as you say, it’s that point of 12 months for individuals within the US.
In earlier years, after we’ve written about tax scams, they’ve all the time been both excessive strain – “one thing unhealthy will occur; should you don’t click on this hyperlink login and repair this, you could possibly get audited”, and who desires that? – or just like the one which I acquired personally final 12 months, apparently from the UK Tax Workplace, Her Majesty’s Income and Customs: “a tax rebate of £278.44 has been issued to you; click on right here”.
We spoke about this on the podcast; it was an ideal facsimile of the HMRC login web page, or an virtually excellent facsimile.
Now this one, this 12 months, this was clearly US primarily based as a result of it talked about W-2. (Within the UK, the equal kind is the P60: that’s the factor you get out of your employer that claims, “That is how a lot we paid you, and that is how a lot tax we’ve already taken away and paid to the Income.”)
And it simply says, “2021 new shopper fillings”… they imply *filings*, clearly… “I intend to alter CPA.” (For individuals outdoors the US, CPA is a CA, a Chartered Accountant.)
“I intend to alter CPA for 2021. Wish to know should you’re taking new purchasers. I’ve acquired all of the paperwork. I simply haven’t fairly acquired my W-2 but.”
In different phrases, I’m practically there. Then it says, “Kindly advise on find out how to proceed, and if I can ship forth all of the obtainable paperwork. And what are your charges for particular person returns? Thanks.” After which the particular person claims to be a Managing Director.
So it’s mainly fishing for slightly little bit of enterprise friendship, I suppose, Doug.
DOUG. It’s odd, as a result of I’m fairly certain you aren’t an accountant.
So this looks as if a spray-and-pray, despatched to who is aware of how many individuals within the hope that a few of them are accountants.
And of these which are responding and saying, “Oh sure, I can assist you out. Let’s speak enterprise.”
DUCK. I’m certain that one other a part of this, Doug, is that it simply seems like any individual who mainly emailed the incorrect businessperson.
So you possibly can think about individuals going, “Oh, you could have made a mistake. I’m not a CPA. You’ve acquired the incorrect particular person.”
In different phrases, though it’s spray-and-pray, the pray will not be, “If the particular person doesn’t click on the hyperlink, then the rip-off isn’t going to work.”
It feels to me like a form of romance rip-off – it’s an attention-grabbing solution to begin a dialog that will get individuals to establish their willingness to speak.
DOUG. We’ve acquired some recommendation, the primary of which is – you touched on this slightly bit – “Bear in mind earlier than you share.”
DUCK. Sure, as a result of each little bit that you simply give away about your self – it may not really feel that it issues individually, however it does assist any individual who has your worst pursuits at coronary heart to construct a backstory that gels with you and maintains your curiosity, in simply the identical method that romance scammers do.
Should you come alongside and say, “I like the flicks of XYZ director”, they don’t say, “Hh, no, I hate that particular person!”
The romance scammer simply adapts their habits, their backstory, their made up life to match the issues that may preserve you on the hook.
DOUG. As we’ve stated earlier than many occasions, “If doubtful, don’t give it out.”
DUCK. Sure!
Merely put, it if it appears like a rip-off, perhaps simply again your self: assume that it’s!
DOUG. And, “No reply is usually a great reply.”
DUCK. Sure, I feel lots of people, maybe older individuals extra – though with youthful individuals, there’s all the time that FOMO, isn’t there: Concern of Lacking Out?
Maybe, for older individuals, there’s a way that the concept you’d simply “present somebody the hand” and simply not reply… that’s seen as being a bit tough or perhaps a bit pretentious.
If that’s the best way you are feeling in actual life, you then’re in all probability a pleasant particular person to satisfy and know!
However on-line, it simply signifies that you’re in all probability a bit too possible to offer away stuff that you simply shouldn’t.
DOUG. I did study this week that the alternative of FOMO is JOMO, the Pleasure of Lacking Out, which is ideal for an introvert like me.
I do like lacking out on issues – so it’s the alternative of FOMO!
DUCK. I’m going to undertake that!
I feel it could possibly be very uplifting – thanks for that, Douglas!
DOUG. You’re welcome.
And eventually, “Hearken to family and friends.”
DUCK. If family and friends – we stated this final week – are advising you that perhaps you might be in over your head, Perhaps you might be speaking to any individual who’s out to fleece you, bear in mind: JOMO!
In the event that they’re proper and also you hearken to them, you’ll be a lot, a lot happier!
DOUG. Okay, nice suggestions.
Particularly in mild of this being Information Privateness Week, and Information Privateness Day on Friday.
DUCK. Sure. It’s what we all the time say with these days.
It’s like Stop Smoking Day: it’s the day you begin not smoking anymore. It’s not simply sooner or later within the 12 months the place you give it a break, after which the remainder of it you stick with it as regular.
And I do know you will get uninterested in all these particular days, however knowledge privateness is essential, as a result of when you’ve let it out, it’s form of arduous, and takes loads of time, to recapture what you didn’t need to leak.
Okay, so, sure: neglect the FOMO. Love the JOMO!
DOUG. Superb.
That’s: Tax rip-off emails are alive and nicely as US tax season begins, on nakedsecurity.sophos.com.
And now, allow us to speak about this alleged carder gang mastermind, and three acolytes, below arrest in Russia.
What occurred?
That is like chopping off a number of heads of a Hydra after which they develop again, I’m guessing?
DUCK. Definitely appears so, Doug.
This can be a gang referred to as the Infraud Organisation.
That was their identify, and their motto was “In Fraud We Belief”, which I presume is a poor-taste joke on… what does it say on the $1 invoice? “In God We Belief”, isn’t it?
DOUG. It’s.
DUCK. And 36 individuals have been alleged to belong to this gang by getting themselves listed in an indictment within the US again in 2018.
Sadly, they have been solely in a position to arrest 13 of these individuals, and so they have been unfold throughout seven totally different international locations.
As we’ve usually stated earlier than, it’s as if “cybercrime abhors a vacuum”.
The remainder of the gang, it appears, fashioned again up, as you say, like a Hydra rising again heads, and the entire thing carried on.
Anyway, one of many individuals talked about in that indictment three years in the past was a chap by the identify of Andrey Novak.
UniCC was one in all his handles; Faxxx-withthree-Xs; Faxtrod: these have been his on-line handles.
Apparently, he has now been busted in Russia, together with three different individuals.
I don’t have their names useful, however they weren’t on the unique cost sheet – appears like both they weren’t recognized earlier than, or they’re individuals who have come to fill the vacuum left by the departure of others.
So, it’s an attention-grabbing reminder, as you say, that cybercrime does have this Hydra-like property.
Typically, you possibly can chop off even numerous heads, and so they’ll sort-of develop again or reappear with different names, different faces, different locations, and stick with it.
And even again in 2018, the US DOJ (Division of Justice) was claiming that that they had $500 million value of fraud, an quantity that they might primarily show as what they name “precise losses”. Then that they had one other $2 billion that have been known as “supposed losses”.
So that provides you an concept of the size of this operation.
It’s as massive as, or larger than, trendy ransomware gangs that we hear about.
However nonetheless, three years in the past, they have been already apparently 500 million to the nice. Thus, “In Fraud We Belief.”
Perhaps that motto simply acquired slightly bit extra tarnished with this bust in Russia…
DOUG. All proper, that’s: Alleged carder gang mastermind and three acolytes below arrest</sturdy> on bare safety.sophos.com.
And it’s time for This Week in Tech Historical past.
This week, on 26 January 1983, Lotus 1-2-3 was launched: the spreadsheet plus database plus graphical charting program – therefore the “1-2-3” – was believed to play a big position within the success of IBM PC suitable computer systems all through the Nineteen Eighties, rapidly surpassing the Apple-centric Visicalc in gross sales.
Lotus was gradual to answer the Home windows 3.0 graphical consumer interface, and was successfully killed off by Microsoft Excel within the early 90s.
And Paul, please inform me you’ve got some tales in regards to the glory days of Lotus 1-2-3…
DUCK. The one one I can consider off the highest of my head – going again, I suppose, to the Nineties – was a joke that my spouse advised me.
She was going by the newspaper… bear in mind them?
DOUG. [LAUGHS]. Barely!
DUCK. And she or he acquired to the categorised advertisements, the place any individual was searching for assist with their computer systems.
This particular person clearly had a deep misunderstanding of what they’re after, as a result of they have been searching for somebody who knew dBase, should you keep in mind that…
DOUG. Mmmmmm.
DUCK. …but in addition they needed somebody who knew Lotus One, Lotus Two *and* Lotus Three.
DOUG. [LAUGHS]
DUCK. So I presume they figured, “I don’t know which model we’ve acquired. You’d higher know all of them.”
BOTH. [LAUGHTER]
DUCK. That was one in all our family jokes for fairly a while.
DOUG. Pretty.
All proper,let’s speak about Crypto.com.
So, this was a 2FA bypass – and I assumed 2FA was presupposed to be impenetrable.
Let’s speak about what occurred, after which we’ll undergo the myriad ways in which 2FA can truly go incorrect.
So, what occurred on this theft?
DUCK. [IRONIC] Properly, “Cryptocurrency firm suffers surprising behaviour of web site”, Doug.
DOUG. Ummm…
DUCK. That doesn’t occur usually, does it?
DOUG. [IRONIC] Uh-uh
DUCK. Anyway, it is a firm, it’s truly, I imagine, referred to as Foris DAX MT Ltd, of Malta, however they’re higher recognized by Crypto.com, which is the area they personal: they’re a cryptocurrency buying and selling firm.
And evidently earlier in January 2022, 483 clients of thiers skilled what I suppose you could possibly name “phantom withdrawals”, or “ghost withdrawals”.
In different phrases, it wasn’t only one or two individuals: there was a sudden spate of withdrawals the place individuals stated,”No, I positively didn’t try this.”
In fact, “That’s straightforward so that you can say”, however, apparently after they investigated, they realised that these withdrawals have been very uncommon certainly.
And in the end. anybody who misplaced cash on this method, Crypto.com is claiming they’ve been reimbursed, or they are going to be reimbursed.
However the essential factor is that they put out a safety breach report.
Good on them!
Sadly, in lots of circumstances, if it’s a cryptocurrency rip-off the place individuals put in cash after which there’s a breach and everybody disappears, the one report you get is everybody else saying, “Oh expensive, they did a rug-pull; they took the cash and ran off.”
So, on this case, they did give you a safety report that defined what I simply stated.
They stated, “All accounts sound to be affected have been totally restored.” In addition they stated transactions have been being authorised with out the 2FA authentication code being inputted by the consumer.
And that was all they stated – they didn’t say how or why.
So I discovered that knowledge breach notification very underwhelming.
Go and browse it – it’s a great instance of what *not* to say, as a result of it simply raises 20 extra questions.
Importantly, what *did* go incorrect with the 2FA on this case?
And that left me considering, what sort of issues might go incorrect, should you’re somebody studying this story and considering, “Yey, I’ve acquired a 2FA resolution; the place ought to I be focusing my consideration?”
DOUG. Properly, let’s speak in regards to the ways in which 2FA might go incorrect.
You’ve got 5 methods right here.
The primary being: a basic flaw within the underlying 2FA system.
DUCK. That’s a technique that it might go incorrect: the system simply doesn’t work.
And a technique that it may not work is that this: let’s say you’re utilizing SMS-based 2FA, and the code that comes up is random.
However let’s say there’s truly a flaw within the code, and it’s attainable – say from the time of day, or the nation you’re in or another background circumstance… let’s say you can also make a jolly good guess of what the subsequent random quantity developing goes to be.
It’s nicely value having a go at somebody’s account.
You’ll be able to solely actually repair this by going and patching the 2FA code itself, however that’s not commensurate with “the 2FA didn’t require anyone to enter a code.”
In order that’s a technique that it could go incorrect: visibly it’s working; any individual’s getting into a code; all the pieces within the logs will look proper… however it wasn’t the proper particular person getting into the code, as a result of any individual was in a position to guess.
DOUG. Okay, then we’ve acquired: a breach of the 2FA authentication database.
DUCK. Sure, that’s one other method that 2FA might go incorrect.
Let’s say you’re not utilizing SMS 2FA; you’re utilizing one which’s primarily based on a type of TOTP authenticator apps.
You seed them by scanning in a QR code, or typing in some bizarre Base32 mixture of letters and numbers, if you arrange an account.
That’s saved securely in your cellphone, or so that you hope.
That sounds nice, besides that it signifies that, on the different finish, it’s not like storing a traditional password.
We’ve spoken about this on the podcast; written about it on Bare Safety many occasions – we’ve acquired a implausible article from a number of years in the past about Retailer Passwords Securely…
While you’re coping with somebody typing in a password, you don’t must retailer the true password: ou can retailer a hash – a salted-and-stretched hash of the password.
However with 2FA primarily based on code sequences, each the shopper and the server must have entry to the plaintext “beginning seed” – that QR code you scanned in initially.
And so, if the server will get breached and somebody will get maintain of these beginning seeds for a complete load of accounts, mainly they will then arrange their very own cellphone to generate precisely the identical sequence as any individual else’s.
And that might be an entire bypass of the 2FA.
However the 2FA would nonetheless be apparently doing its job within the logs.
*Someone* can be inputting the code, and it could present up that *any individual* inputted the code; it simply wouldn’t be the proper particular person.
DOUG. Okay. Subsequent method: poor coding within the on-line login course of.
DUCK. Principally, in your login course of, there are usually some ways you are able to do it, even when you’ve got 2FA and even when it’s necessary.
Most accounts have some form of password reset system, or they’ve some form of “I don’t have my cellphone, I need to use one of many backup codes that I printed out and put in my secure.”
In order that they have usually a variety of other ways through which the entrance finish of the authentication system can work together with the again finish, together with the half that does 2FA.
And it’s attainable that the 2FA system itself could possibly be working completely; that the SMS codes have completely random numbers; that the generator sequence seeds haven’t been stolen… however that there’s a way – say from the web site: some bizarre header you possibly can add to an internet request, or some further secret parameter you possibly can add to the request – that in some way signifies, “I need to skip that half.”
And it’s as much as the again finish whether or not it truly calls on the 2FA or not.
The 2FA system itself doesn’t shield the system that it’s supposed to guard if it’s by no means referred to as upon to take action, resulting from some form of mistake!
DUCK. Okay. After which this one is all the time a problem: weak inner controls to detect dangerous habits by help or IT employees.
The so-called “insider assault”, because it have been.
DUCK. Reminiscences of the Twitter assault of 2020, should you keep in mind that one.
What was it? Elon Musk, Joe Biden, Barack Obama, Invoice Gates, Apple Laptop: about 40-something very excessive profile accounts all acquired compromised on the similar time.
And evidently the final word cause is that some particular person or individuals unknown inside Twitter.., it didn’t look as if they have been corrupt, or they did something incorrect.
They have been simply too useful, and so they gave the crooks sufficient info that the crooks have been in a position to do password resets on these accounts and are available in with or with out 2FA.
So you possibly can preserve 2FA going, however truly lock out the true consumer and lock your self in as an alternative, through which case you’d nonetheless be inputting the code, however as soon as once more it could be the incorrect particular person.
And, as you stated, it is a very, very arduous factor to defend in opposition to, significantly – and maybe Mockingly – should you genuinely *do* have a very useful help division.
Sadly, any individual might get into the *spirit* of that inside your organisation with out complying with the *letter* of it, and so they might let the aspect down, despite the fact that their motivation was the perfect.
They weren’t corrupt, they weren’t crooked, they weren’t lazy; they’re truly virtually attempting *too* arduous.
DOUG. A pleasant segue to our last level, and an attention-grabbing one: fail open habits within the authentication course of.
DUCK. I suppose that’s the technological model of somebody in help being, should you like, too useful.
When you concentrate on safety techniques (cybersecurity techniques or bodily safety techniques), they’re typically anticipated to fail cleanly in one in all two methods.
Fail open: issues like electrical circuits.
When your mains journeys, it fails *open*, so the present is *off*.
And there are different issues, like financial institution vaults: you’d usually count on them to fail closed.
In any other case, if there was an influence failure, somebody might sneak in and steal all of your gold bars!
And, typically, it’s arduous to know which is the proper one for which circumstance.
For instance, in case your 2FA again finish is counting on some cloud primarily based service and it utterly breaks… would you like *no person* to have the ability to log in , and also you simply say, “We’re actually sorry; logins are suppressed till we repair this”?
Or do you truly suppose, “Properly, we’re solely treating 2FA as an add-on further, to to keep away from individuals getting too antsy, we’ll simply not ask for the quantity. Till we repair the backend, we’ll fail again to 1FA.”
And meaning, when you’ve got 2FA your self and also you need to go and evaluate, “Hey, am I doing it proper?”, it’s not simply sufficient to go, “Did I purchase the proper product? Did I set up it accurately?”
You’ll be able to’t simply to a trial login and say, “Sure, it’s fantastic”… as a result of there are all of the ancillary issues about the way you combine it into what you are promoting, into your expertise, into your buyer workflow, that might allow you to down as nicely.
And there’s nothing worse than one thing that provides you an inflated sense of safety…
…when in actual fact you don’t have something in any respect.
DOUG. Okay, nicely, as Crypto.com says, they’ve migrated to a very new 2FA infrastructure.
[SUSPICIOUS] And so they did this, Paul, out of “an abundance of warning”, wouldn’t you realize?
So…
DUCK. I’ve by no means acquired on with these phrases.
DOUG. [LAUGHS]
DUCK. I do know that they’re a must have in trendy knowledge breach notifications.
But when somebody’s telling me a couple of knowledge breach they’ve had, I don’t need to suppose they’re immediately having “an abundance of warning”, as a result of it implies they’re simply doing issues within the hope that they could add some safety magic.
That’s the way it sounds to me.
And on this case, in the event that they go, “Hey, don’t fear, we’ve acquired a very new 2FA backend”…
Making that change on this case, as a result of they’re not saying how the bypass occurred, it’s not clear whether or not altering the underlying expertise will make *any* distinction in any respect.
I would like, in an information breach notification, when it talks about what you’ve got completed, that you’ve got taken *acceptable* precautions – ones that you realize work – and that you simply aren’t losing your time doing issues that aren’t going to assist however sound good.
Not that I really feel strongly about it.
DOUG. [LAUGHS] And we’ve some recommendation, and it is a good one: should you’re taking a look at including 2FA to your individual on-line providers, don’t simply take a look at the plain elements of the system.
DUCK. Sure, as I stated (I hope it wasn’t an overreaction to the phrases “abundance of warning”), “Hey, we had 2FA issues, so we ripped out the entire 2FA system and put in a model new one.”
That looks as if an apparent repair, however that’s like saying, “ what: my flat [apartment] acquired burgled, so I’ve had a brand new entrance door put in.”
After which later you came upon that truly the particular person climbed in over the balcony, and it’s your balcony doorways – that you simply go away open on a regular basis – the place the issue was.
If in case you have had an information breach of this kind, then: repair what you’ve acquired; take acceptable precautions to cope with what occurred this time; after which go and evaluate all the pieces, together with the issues that you simply may not have considered earlier than.
As a result of the one factor worse than struggling one knowledge breach is struggling one other knowledge breach shortly afterwards.
DOUG. Aaaaargh!
DUCK. If belief in what you are promoting was dented earlier than, you may say that it’s had a gap punched in it the second time.
DOUG. And it is a nice one: should you’re in PR or advertising and marketing, ensure that the entire firm practises the way it will react if a breach ought to happen.
Have a breach response plan, in different phrases…
DUCK. Sure!
Within the outdated days, we used to say to individuals: in the case of constructing your anti-virus coverage (when it was all about malware and self spreading viruses), you could take into consideration what you’re going to say if it seems that *you’re* the corporate that’s been massively spreading the subsequent LoveBug…
DOUG. [LAUGHS]
DUCK. …and all of the fingers are pointing again at you, and also you look very unhealthy.
As a result of that was an extra-super-bad look, if you have been the Typhoid Mary: what you are promoting was okay, however everybody else is getting hammered by you.
And naturally, if that have been to occur, even again then, it was a lot too late to go and suppose, “I ponder how we should always cope with this.”
And it’s much more essential now that knowledge breach notifications have each an ethical necessity in your clients and a authorized necessity from the regulator.
You’ll be able to’t afford to have time eaten up – when your techies are literally attempting to cope with a breach that has simply occurred – determining: who you could contact; what you’re going to say; who’s going to say it; the way you’re going to say it.
So, planning what you’d say if there have been an assault… will not be an admission that you simply count on an assault to happen”
It’s simply being sensible, and recognising that preparation is by definition, *solely ever one thing that you are able to do prematurely*.
DOUG. All proper, that’s: Cryptocoin dealer crypto.com says 2FA bypass led to $35 million theft.
And, because the solar begins to set on our present for the week, we go away you with the Oh! No! from Reddit consumer CityGentry, who writes:
“One from a colleague of mine who takes care of help for our phone and convention gear.
Consumer calls and says they will’t dial right into a cellphone convention as a result of their cellphone doesn’t have the proper button on it.
They clarify they will dial the final convention quantity, however they will’t enter the five-digit code to attach them to their particular convention name.
So, colleague asks them for the quantity and for permission to attach as a take a look at.
Consumer agrees; colleague connects with out situation.
Colleague is puzzled and asks the consumer to undergo it once more step-by-step with them, saying what buttons they’re urgent as they’re urgent it.
All the things’s OK till the consumer will get to the five-digit code, which has a pleasant sequence: 7-8-9-10.”
[AMUSED] You’ll be able to see the place that is going…
“Straightforward to recollect, straightforward to sort. Nevertheless, the consumer explains that their cellphone keypad solely goes from 0 to 9, so that they don’t have a ’10’ key.”
DUCK. [LAUGHS]
DOUG. “The colleague goes on mute for a number of seconds, and as soon as they’ve stopped laughing, they diplomatically recommend that somebody might have given them an incorrect code and to attempt ‘one-zero’, not ‘ten’.”
That could be a very diplomatic reply – good on them!
DUCK. That’s *very* nicely completed.
DOUG. Sure!
DUCK. However that’s tech help, isn’t it?
DOUG. It’s!
DUCK. For anybody who’s ever completed it, “Mysteries by no means stop.”
DOUG. So true!
All’s nicely that ends nicely… and when you’ve got an Oh! No! you’d prefer to submit, we’d like to learn it on the podcast.
You’ll be able to electronic mail suggestions@sophos.com; you possibly can touch upon any one in all our articles; or you possibly can hit us up on social media: @NakedSecurity.
That’s our present for immediately; thanks very a lot for listening…
For Paul Ducklin, I’m Doug Aamoth, reminding you: till subsequent time…”
BOTH. …keep safe!
[MUSICAL MODEM].
[ad_2]