INTERESTING: Are humans like these Deer In The Czech Republic Have Migration Patterns Guided By Memories Of?

https://www.mindbounce.com/trivia/deer-in-the-czech-republic-have-migration-patterns-guided-by-memories-of/

TRIVIA
Deer In The Czech Republic Have Migration Patterns Guided By Memories Of?
Fault Lines
Medieval Trade Routes
The Iron Curtain
Abandoned Logging Roads
Cuchulainn/Wikimedia

*** begin quote ***

Answer: The Iron Curtain

Researchers tracking the movement of red deer in the Czech Republic discovered something rather curious. Despite the physical ability to travel freely wherever they wished, the deer’s travel routes never crossed the border between the Czech Republic and Germany.

The deer have no political motivation in avoiding international travel, but instead are obeying what amounts to a set of rules passed down, generationally, from doe to fawn. During the Cold War, the entire border between the Czech Republic and West Germany was fenced off with parallel electrified fences and patrolled by armed guards. Crossing the border was a death sentence for the deer and they learned to avoid the entire length of it.

Young red deer spend roughly a year with their mother after birth and it turns out that red deer mothers have, for generations now, been teaching their young to avoid the border. At this point, they could easily cross the border without worry, but the habit is ingrained and although the deer can’t communicate why the area is dangerous to each other, they learn by behavior and avoid it for the rest of their lives—passing the border avoidance on to their offspring.

*** end quote ***

Rule of thumb

How many ingrained habits do we humans have?  Lessons aka “rules of thumb” called, in fancy language heuristics, can lead us astray when they no longer apply (i.e., the universe change making them erroneous, obsolete, or if we are lucky just a quaint oddity. We get them from our ancestors or other human beings.

A heuristic is a mental shortcut that allows an individual to make a decision, pass judgment, or solve a problem quickly and with minimal mental effort. While heuristics can reduce the burden of decision-making and free up limited cognitive resources, they can also be costly when they lead individuals to miss critical information or act on unjust biases.

Sometimes, it can be quaint when one of those “rules” is observed in the real world that just makes no sense (i.e., “the man should walk on the left side of a woman” so should he need to draw his sword she’d be safe).  But other times, to just dangerous to ignore (i.e., the safe following distance when driving).

In any event, this story reminds me about how they train elephants to be bound by a thin leg rope.  The elephant is conditioned that they can not escape.

How many limiting beliefs do we have?

How many do I have?

What can’t be seen?

—30—

SECURITY: SMS should NOT be used for 2FA

*** begin quote ***

“The company that routes SMS for all major US carriers was hacked for five years. It isn’t revealing whether or not messages were exposed, but it’s just another reason not to use SMS for 2FA.”

*** end quote ***

So for the average layman, it means that if any service provider texts codes to your phone as a way of security your account, they are at risk of a security breach.

I’ve begin communicating with the providers I use putting them on notice that (1) they are using a insecure technology to secure my account; and (2) when do they plan to switch to a phone based authentication technology or something better.

Now, if they say they use GOOGLE or APPLE authenticator, you can point out that those too are insecure by design.  Since a hack of either high profile target, will make you vulnerable.

Using the “home grown” authenticator, (something written by the service provider like IDME), doesn’t have the transparency of the source code to assure security.

Any “home grown” authenticator, Google, orApple authenticators does NOT separate the necessary sufficient controls for good Information Security.

Suggest you tell them support AUTHY or other third party authenticators.  This is more secure because the “key” is only held by them and by you locally on your phone.

Or if they really want to protect you, they can give you are hardware token like YUBIKEY or a hardware authenticator like SECURE_ID.

—30—