Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
Welcome to Super Simple Security Principles, where you learn how to think, not just what to do.
I'm Nick Jackson, here to learn along with you from my good buddy and Master Guardian, Makani Mason.
Today, this is episode 84, Conquer Your Email Woes.
(00:24):
This is something I'm super pumped about because I watch my Master Guardian, Makani, use his email, and I get bugged because my email isn't a source of help.
It is a source of woe.
(00:47):
I get more emails that I don't want.
I very rarely use it for a valid communication, you know, other than when I have to, which drives me nuts.
So, for me, this is a really big topic because I've seen you use email, and you use it almost as a layer of security.
(01:12):
And so, for me, I'm super pumped about this because, look, I want to keep some of these guys from getting my info.
And you've kind of figured some cool secrets out.
So, dude, where do we begin, man? Let's go.
Yeah. Well, and this is going to be, you know, the beginning of a huge series of episodes.
(01:35):
And actually, the way I want to kick it off, even before I really get into the main meat for this episode, is share a story.
Because this wasn't planned, but this is just one of those things where it happened.
And I was like, oh, this is a very topical story.
We're going to just throw this in.
And because, so, Kem, he received an email the other day from his accountant.
(02:03):
Okay.
And he looked at it, and he's like, huh.
He checked the email, checked all the things.
Yeah, it's definitely from his accountant.
But, man, it sure looks fishy.
Yeah.
As in phishing, right?
Oh, man.
And so, you know, he shared it with me.
What do you think?
Like, yeah, I agree.
(02:24):
That's definitely.
And he told me some of the things.
So, it had a file attachment that, you know, he needed to sign or something.
I can't even remember now.
But it wasn't shared by the usual.
Like, they already had an established protocol for sharing files.
And it was not sending an attachment through email.
Because that's a terrible, terrible, insecure method to do it.
(02:48):
And it's the source of phishing attempts.
So, anyway, he, needless to say, he did not click on it.
And he reached out to his accountant.
And the problem was his accountant's email had been taken over.
And so, then the phishing folks sent out, of course, an email to all their, all his clients.
(03:11):
And, I mean, I don't know how many, if it went to all of them or whatever.
But, you know, but it came legitimately from, I mean, obviously, it wasn't actually from him.
But it came from his email account, right?
Yeah.
So, no matter how careful you were about looking at it, it was going to be coming from him.
Yeah.
So, anyway, just a good reminder of, yep, account takeovers are happening.
(03:36):
Phishing's happening.
Email is broken.
Yeah.
So, anyway, that's my opening story for you.
Email's broken.
Yeah.
That's kind of my, that's my overall stance on it.
Well, that's why we're doing this series, right?
Like, here's the reality.
(03:58):
So many people experience broken email.
Everybody does.
Minus maybe you and a few others.
Like, but, yeah.
Yeah.
No, I'm, well, and that's, I mean, that's certainly been my personal experience observing.
You know, it's very rare that I talk to someone that's like, yep, everything's great with email.
(04:21):
No email was.
Right.
Yeah.
In fact, I, I don't know.
I can't think of anybody.
So, but this, a lot of this started with, if you remember,
you pitched the idea of us doing an email workshop.
Yeah.
(04:41):
And so, you know, that's been, I don't know, a month or two.
Can't remember exactly how long I've been, you know, I keep having ideas about it.
I've made quite a bit of notes, pondering.
And finally, what I decided was the next step was to just do a bunch of episodes with you
to explore, to cover all the topics so we're well-prepared.
(05:05):
And we can take what we learned together, what we figure out, the questions that come up for you,
all this kind of stuff.
And, you know, turn it into a workshop.
I love it.
So this is, you know, I, obviously, as you know, I still have a full-time day job.
So I'm kind of squeezing this in when I can.
So this, I feel like, will kind of be a efficient way of bringing some useful content to our folks along the way.
(05:32):
But also building sort of something that I think will be even more helpful for them.
Because then, well, with the workshop, the idea is that, you know, it's not going to be a video.
I mean, there will be videos probably in between the workshop sessions as, you know, kind of the homework and the teaching part.
But the workshop itself, I want to get on with a group of people and help them interactively.
(05:58):
Yeah.
So, you know, and everybody can benefit.
We can answer questions.
I'll even, like, have people share screens, fix problems with them interactively.
But do it in a group setting so they can all learn from it.
Yeah.
If that makes sense.
Yep.
(06:18):
And so that's what I say, or that's what I mean when I say workshop.
And that's, so just to kind of recap the format that I'm thinking, envisioning, you know,
happy to hear your feedback or listener feedback on this.
But is, you know, I don't know exactly how many sessions, depends on how long it takes or whatever.
But what I would do is probably have a homework video, so to speak, that kind of preps you for each session.
(06:46):
Right.
That you'd watch on your own schedule.
Yeah.
And then you come to the session and bring questions about the video, about your email stuff in general.
We'll have some very open-ended options as well.
But I figure we want to work in a little bit of teaching along the way as well.
That's offline on their own schedule.
And so then the time we actually have together, we can really maximize interactively.
(07:13):
Yeah.
Because the watching passively or me even just lecturing, it really can be done much more efficiently just offline, so to speak.
Yeah.
So, again, I don't know exactly how many.
We'll see.
Obviously, we want to make it as efficient and short as possible, get people going quickly.
(07:34):
So that's the ultimate goal is speed.
But also solving everything.
And so we may break it down.
So there might be different sessions on different topics.
And so, for example, my sister I know has, like, four different Google accounts, Gmail accounts.
(07:55):
Because she's tried over the years switching, I think maybe it might be only three, but anyway, where she's kind of tried to fix her spam and other issues by, okay, we'll start a brand new one, right?
Right.
And now she's just really, I know she's, when I told her about this idea, she's like, yes, I will be your first one to sign up and come join it.
(08:16):
I've been begging you to kind of help me with this for years.
Right.
Because it's a huge source of frustration, but people who only have one, maybe they skipped that session.
They're like, you know, I only have one account, no big deal.
So try to optimize it from that perspective, too.
Yeah.
(08:36):
So my question for you, though, Nick, and I don't know, I mean, you know, you're the one who pitched, obviously, email as our first workshop.
So, you know, what, I don't know, what are your reasons, expound for our listeners, what your reasons are for wanting it?
Look, here's the reality.
(08:57):
I would love to have email be what I feel like it was intended for.
And that was a way of secure communication, you know, I would love to find a way to safeguard that a little bit.
I know there's some flaws with the system itself, you know, and how people can contact me, et cetera.
(09:21):
I know that.
But what I'm looking for is something that's not getting thousands of messages a day, you know, but the messages I do get are reliable, that they're what I'm wanting to get, and they're communications that are pertinent, right?
(09:42):
And so I don't use email to reach out to a buddy and say, hey, what's up, dude?
I've got plenty of other communication needs for that.
But, like, if all of a sudden I decide to sell a property and I'm working with my real estate agent and I need to do some docusigns or things like that, I want to be able to trust the emails that I'm getting in.
(10:06):
Like, I want to be able to have more control over my email box is what I want.
Yeah.
Yeah.
No, that makes sense.
Well, and let me address one thing you said in there.
Yeah.
Because when it was first built, it was not designed to secure communications.
(10:27):
Ah.
Because, I mean, it is so old, it is basically the oldest form of mass communication we have on the internet, and so security was the last thing on their mind, honestly.
Yeah.
It didn't even enter the equation at all.
I mean, when I was in college, it used to be so easy, you know, things have gotten better, they've kind of bolted on some security features to it, but I'm sure I've probably told you this story, but I used to email my friends as Santa.
(10:57):
Because it was trivial to spoof any email address you wanted back then.
Ah.
And so, because it just wasn't the goal.
It was, they were just trying to improve communication, right?
Yeah.
Like now, we have so many communication methods that, right, we want to do security stuff, right?
(11:21):
We want to do it securely.
But, the reason it's broken, I don't have anybody necessarily at fault, just that it's old, it was built before that, and everybody uses it.
Mm-hmm.
So, it's hard to change.
But, all the rest of the objectives you talked about, you know, kind of boiled down to the way I'd say is, you don't want junk in there, you don't want spam in there, right?
(11:49):
Right.
Exactly.
And that we can do.
That we can do.
There are some email providers that try to kind of make email more secure.
But, until we revamp and replace the email system, which is, in terms of the systems that I personally want to build, has been my dream to replace for years.
(12:14):
Nice.
Is still, it's my top one, and so, I'm kind of glad to do the workshop first, too, because email has been one of my most fascinating, most delved into, I've coded email clients.
It's, like, a lot of stuff that I've done with email over the years, and so, I really want to do that.
(12:34):
But, in the meantime, as you know, like you said, you've seen my email, and I do feel like we have the ability to minimize the amount of junk you have there.
Yeah.
I still do not recommend it.
I think having the other communication tools, especially for now, for secure communications, like Signal, is still a much better way to go.
(13:03):
Transferring files, use different mechanisms.
That's a different topic.
But, email, the main thing about email, like you said, you know, you point out with your real estate, right, is it's universal.
Everyone has it as one.
Corporations and companies, businesses you deal with, they're going to use email, right?
So, that's one of the reasons why we're starting with the email workshop, too, is because it is the most universal communication method.
(13:31):
Nice.
Right.
The other one, of course, and we've talked about this a lot, is that it's, you know, the master key.
Yeah.
To unlocking all of your other accounts because of the forgotten password mechanism.
Right.
The other thing closely related to that is it's also a great method to discover all your other accounts by reviewing the emails you have.
(13:56):
So, if somebody gets in your email, not only can they unlock all your other accounts, they can go a long way towards discovering what other accounts you have that they want to unlock.
Yeah.
Yeah.
Right.
Right.
So, anyway, those are the, so that's why the workshop, that's why the, why it's important is, you know, the communication, forgot password, it's just such a critical piece.
(14:21):
And I feel like that is, you know, the, the most foundational piece of security, um, that we want to work on to help, help our people.
Yeah.
So.
Okay.
Well, that's, that's what I have for today.
Awesome.
Awesome.
That was a good one.
(14:41):
Oh, wait, you got to, no, you got to do takeaways now, though.
I did.
You did.
That was your takeaway.
You responded on them.
Okay.
Remember?
And then I rambled on.
Okay.
That was your takeaway.
Okay.
Well, then I got to, I got to rattle for a second more because my takeaway, I think, is that, and I, I kind of did some of it, but I guess I'll just add this, that I want to go narrower for now, even than what we've started.
(15:09):
Okay.
Um, I mean, we'll, you know, we'll get to all security in general, but for a while, I just really want to focus on email.
Yeah.
And go deeper in it until, and kind of what I'm thinking is like, I really just want to focus on this workshop and helping people until we've helped, like, I don't know, you know, a thousand people have this kind of same success and feel like, okay, I've mastered my email, you know, uh, and they, you know, tell us about it and are like excited and they've, they've got it.
(15:38):
And, and I'm just, I'm really excited about this because I want to, I mean, you know, I'm trying to help people with the podcast, but I know, especially with our topic, online security, a lot of that comes back to actually helping people interactively.
Yeah.
And I want to do that in a way that can scale though, too.
I like, I want to be able to help a lot of people.
(16:00):
I want my cake and eat it too.
I want to help them interactively, but I want to help everybody.
And those, those two things are kind of at odds in a way, right?
So the workshop can hopefully help bridge those, both those goals to a certain degree.
So.
Excellent.
Anyway.
Okay.
I love it.
Yeah.
I'm excited.
(16:21):
Me too.
Okay.
Yes.
Okay.
Okay.
Are you ready to take action and wondering where to start?
Get my Bulletproof My Identity Starter Kit for free.
The seven most vital layers of protection everyone needs.
I'll send you one step at a time and help you if you get stuck.
(16:42):
Just go to bulletproofmyid.com and enter your name and email and I will send you the first step.
Again, that's bulletproofmyid.com.