[00:55.640 --> 00:57.940] All right, what is up everybody? [00:57.940 --> 01:12.640] So, I am here with an author, Brian Oakes, who has a very interesting story to tell us about life, loss, and persevering through some of the hardest moments that you've, you know, had in your life. [01:12.640 --> 01:15.840] And so, I think it'll be very, it'll be a fun conversation. [01:15.840 --> 01:20.380] We kind of had a little bit of this conversation yesterday, so we'll play off of that. [01:20.380 --> 01:27.740] We'll be diving into a little bit of conspiracy theory and, you know, governmental, whatever you want to talk about it, corruption. [01:27.820 --> 01:33.300] So, Brian, before we start this off, can you just tell us who you are and what you do? [01:33.300 --> 01:34.040] Sure. [01:34.180 --> 01:35.540] So, my name is Brian Oakes. [01:35.540 --> 01:39.620] I am a early crypto investor, crypto miner. [01:39.620 --> 01:45.060] I also am a escalation engineer at Microsoft and I'm not representing Microsoft in any way. [01:45.060 --> 01:46.840] That makes all the lawyers happy. [01:46.920 --> 01:49.460] I'm also an IT director for another company in Texas. [01:49.460 --> 01:56.320] So, pretty much my whole career has been in IT management, IT hardcore debugging, just things related to that. [01:56.320 --> 01:57.060] Awesome. [01:57.060 --> 01:58.680] So, you wrote a book. [01:58.680 --> 01:59.820] It's called Undermine. [01:59.820 --> 02:01.280] I'm holding it right here. [02:01.320 --> 02:02.980] This is a good little book. [02:02.980 --> 02:03.620] I have one. [02:03.620 --> 02:06.220] I'm actually looking, very looking forward to reading it. [02:06.220 --> 02:11.260] Now , tell us, before we get into the story, tell us the premise behind the book. [02:11.380 --> 02:22.280] So , the premise behind the book was a December 8th, 2020, I was sim-swapped and that ultimately led to the loss of 31.5 million in crypto. [02:22.440 --> 02:26.520] Took them about eight minutes and I was actually watching it occur while it happened. [02:26.520 --> 02:28.780] Completely helpless, unable to do anything. [02:28.940 --> 02:29.240] Yeah. [02:29.240 --> 02:32.100] Can you, you know, let's kind of dive into that now. [02:32.100 --> 02:34.300] Let's start to unpack some of the things here. [02:34.460 --> 02:41.940] So, tell us the story, you know, as much details you want to share without, you know, obviously giving out all the details of the book. [02:41.940 --> 02:43.740] We want people to go and buy the book. [02:43.740 --> 02:45.520] Come over to Brian's booth. [02:45.520 --> 02:46.560] He's got a QR code. [02:46.560 --> 02:47.340] Buy his book. [02:47.340 --> 02:48.620] It's on Amazon. [02:48.620 --> 02:49.380] It's on Amazon. [02:49.380 --> 02:50.860] Everywhere you get books. [02:51.380 --> 02:58.380] But yeah, just tell us how this occurred, you know, what was your initial feelings when it happened? [02:58.460 --> 02:59.160] Sure. [02:59.200 --> 03:02.500] So, like any good story, it was a cold and windy night. [03:02.500 --> 03:04.680] It actually was, which is kind of ironic. [03:04.740 --> 03:10.520] I was actually at the office with my wife and kids because, you know, we were moving into a new office. [03:10.900 --> 03:13.620] And this was an office for where I was an IT director. [03:13.800 --> 03:16.240] And so, bring up the kids. [03:16.240 --> 03:17.880] Child labor is a good thing, right? [03:17.880 --> 03:19.600] Teach them good responsibilities. [03:19.600 --> 03:21.720] Have my son help rearrange the office. [03:21.740 --> 03:23.660] Brandy went ahead and brought up some food. [03:23.700 --> 03:26.980] And actually, I remember she had a little Instapot. [03:26.980 --> 03:27.600] She made something. [03:27.600 --> 03:28.400] It was nice. [03:28.480 --> 03:31.420] And we're going ahead and we're moving things around. [03:31.420 --> 03:35.220] And it was about 8.08 p.m. [03:35.360 --> 03:37.320] And I looked down at my computer. [03:37.600 --> 03:44.220] And actually, I get an email first in my Hotmail account that says a transaction was processed at AT&T. [03:44.220 --> 03:49.540] And then about a few seconds later, I look down at my computer and it says needs password. [03:49.640 --> 03:50.880] Like an Outlook, right? [03:51.340 --> 03:55.820] And then all of a sudden, I look to my left and my phone says no signal. [03:56.460 --> 04:02.180] So, at that point, I mean, you just kind of get the chills. [04:02.540 --> 04:06.280] Because everything that we do is through this device. [04:06.280 --> 04:07.860] And so, if you think about it, right? [04:08.040 --> 04:11.220] You're all of a sudden in a remote area and you need help. [04:11.240 --> 04:12.820] You look down and you have no signal. [04:12.820 --> 04:14.420] It's that type of feeling. [04:14.420 --> 04:16.660] You just kind of get that weird pins. [04:16.940 --> 04:20.640] And then immediately, I'm like, you know, ask Brandy if she did anything. [04:20.640 --> 04:21.880] She said no. [04:21.880 --> 04:25.400] And then I just begin to start processes this. [04:25.500 --> 04:28.060] And that's where the story starts. [04:28.240 --> 04:34.260] Yeah, you know, this is something that can happen to anyone. [04:34.260 --> 04:40.600] I mean, you don't necessarily need to be a crypto millionaire to be targeted for this attack. [04:40.600 --> 04:43.780] But kind of go over that target. [04:43.900 --> 04:49.200] What makes a good target for one of these attacks? [04:49.640 --> 04:54.900] So, the best target is the person who doesn't think they're ever going to be a target. [04:54.960 --> 04:57.580] And in fact, everyone in this room is a target. [04:57.640 --> 04:59.620] But we just never realize it, right? [04:59.760 --> 05:04.920] So, for me, in the crypto space, I was a very unassuming behind the scenes person. [05:04.920 --> 05:11.460] Not really a speaker, I mean, I've been to conferences and was somewhat known in some mining circles. [05:11.460 --> 05:19.000] But as far as a person who would do a keynote or anyone who would ever be considered a target, I would never see myself as that. [05:19.120 --> 05:21.160] And that was one of the mistakes that I made. [05:21.160 --> 05:22.000] Yeah, absolutely. [05:22.000 --> 05:26.280] So, can you tell us like, how much did they take? [05:26.540 --> 05:31.080] So, total that night, it was $31.5 million in crypto. [05:31.080 --> 05:42.060] So, it was a total of 500 Bitcoin, plus another wallet that had various, lots of other coins that I used for buying, selling, trading, more of a quick wallet. [05:42.120 --> 05:51.000] And what, how were they able, I mean, we know that you got SimSwapped, they were able to get into your phone, but how did they actually take the crypto? [05:51.240 --> 06:03.740] So, the crypto was, so, okay, so, effectively, when you're SimSwapped, if you think about it, you are no longer in control of the device that we're using for two-factor authentication. [06:03.940 --> 06:09.560] So, as much as you want to use your normal SMS two-factor, it's probably not the strongest thing. [06:10.100 --> 06:13.080] That's why they always want you to use the standard two-factor app. [06:13.080 --> 06:15.380] Well, those are also compromisable as well. [06:15.440 --> 06:26.960] In my particular case, they were able to reset a password on my Hotmail account, and in the information associated in the Hotmail account, led them to be able to get access to all the crypto. [06:26.960 --> 06:43.840] Yeah, so, what are, you know, because I want to dive into your reaction and how you responded to it, but before we get there, I want to kind of paint this picture of how people can protect themselves from a scenario like this as best as they possibly can. [06:44.020 --> 06:58.380] So, you really, I mean, you can, but you can't, if that makes any sense, because in my particular case, I never thought I was going to be a target, and what I ended up leaving was simple breadcrumbs in a mailbox that I had forgotten about for over a decade. [06:58.400 --> 07:10.500] So, it's the logic of, you want to email yourself maybe a picture of your driver's license, or maybe part of a social security number, or maybe a part of a password, or something that we all have done it, and anyone in this room who says they haven't, [07:10.500 --> 07:14.000] they're a bold-faced liar, because we all have, and that's okay. [07:14.100 --> 07:19.800] It's just a matter of those pieces of information are useless until somebody wants to connect the dots on you. [07:19.800 --> 07:30.840] And if someone is sitting watching any one of us, they could pick up our patterns, they could pick up some of the things that we repeat, they could pick up some of our tells, and use that effectively against you. [07:30.840 --> 07:38.280] In fact, a lot of these projects that I'm seeing here throughout the conference are great, they're awesome, neat things, until they're used for nefarious purposes. [07:38.340 --> 07:41.360] And I come from the generation that maybe is naive. [07:41.660 --> 07:47.660] We generated a lot of these things, and we thought they were neat, they were fun, they were interesting educational projects. [07:48.200 --> 07:55.840] Sure, there was probably a segment of the people who were in that, were into it for nefarious, but I just don't think that way. [07:55.840 --> 07:58.580] So again, I never thought I was going to be a target in this case. [07:59.020 --> 08:06.160] Yeah, I think it's, you know, even though you don't think you're going to be a target, always understand that the unexpected can happen. [08:06.180 --> 08:06.540] Absolutely. [08:06.540 --> 08:19.820] I mean, you know, we had our company build or Bitcoin Mining World, we had an experience like this, you know, I mean, obviously not to this extent, but these kinds of attacks, they can happen to anyone. [08:19.820 --> 08:30.140] And if you're unsuspecting, I mean, you're more vulnerable than you are, if you are suspecting, and if you're suspecting, then you can start to prepare and just be vigilant. [08:30.200 --> 08:40.060] And in this space, I mean, especially in Bitcoin, there's so much money that's on the line, and it's, you know, increasing in value every single year. [08:40.060 --> 08:45.440] And so it is more and more important to be vigilant and, you know, take this seriously. [08:45.440 --> 08:52.700] Don't just, you know, buy Bitcoin and say, oh, you know, I've got the greatest asset in the world, I don't need to do anything with it, I don't need to protect myself. [08:52.700 --> 08:56.340] It's like, actually, you kind of do, it's super important. [08:56.680 --> 09:07.420] So one other point I'll bring up though, because there's an interesting angle to this, the one piece that I no longer, the one piece of security that I didn't have control over, is what was compromised. [09:07.900 --> 09:19.640] And that's the thing that I want to take people, I really want people to understand is that when we sign up with our bank, excuse me, or we sign up with a financial institution, they want us to use SMS two-factor messaging. [09:19.760 --> 09:25.580] And in this particular case, when I was SIM swapped, the actual phone number was sent to another phone. [09:25.580 --> 09:31.920] So for instance, let's say I wanted to reset my password, I no longer had physical control of the device receiving that information. [09:31.920 --> 09:34.400] And it was due to no fault of my own. [09:34.400 --> 09:36.620] It was due to the fault of a compromise of the carrier. [09:36.620 --> 09:40.180] So the carrier in this case was as much of a victim as I was. [09:40.460 --> 09:42.660] Doesn't make it any better. [09:42.740 --> 09:46.660] But they were actually compromised just like I was. [09:46.660 --> 09:50.620] I unfortunately was the end target who was exploited. [09:50.660 --> 09:52.060] Yeah, absolutely. [09:52.320 --> 10:06.400] So when I think about what I would do in a scenario where I had $30 million plus and the value is exponentially increasing every year, because that's what Bitcoin does. [10:06.400 --> 10:10.400] When I think about that, I don't have great thoughts. [10:10.400 --> 10:13.080] I think it gets a little dark pretty quickly. [10:13.400 --> 10:30.080] And, you know, I really believe that most people working nine to five spending trading their time and their energy for dollars, look at that number being stolen, lost, or whatever as as a devastating event that cannot be recovered from. [10:30.080 --> 10:32.320] So what did you do? [10:32.320 --> 10:33.820] What was your response? [10:33.820 --> 10:36.540] And how did you overcome this? [10:37.300 --> 10:42.740] So a lot of thoughts and a lot of things went into this, right? [10:42.740 --> 10:49.880] So when I initially started telling people the story, I mean, kind of vary off on that for a second. [10:51.220 --> 10:54.060] I began to see how they reacted, right? [10:54.060 --> 11:06.560] So similarly, when I initially told you the story, people reacted in a way where, in fact, actually, when I was talking to some folks yesterday, I could see them visually change when I told them the dollar amount. [11:06.880 --> 11:09.400] And immediately in their head, they kind of went to a different space. [11:09.400 --> 11:10.740] And it was that dark place. [11:10.780 --> 11:21.980] And it was a situation where folks would, and some of the feedback I got initially, when we initially started telling people this happened to us, and this was our friends and family, mind you, the reaction was, hey, you know, I would have killed myself or something. [11:21.980 --> 11:23.800] Now, would they have actually done that? [11:23.900 --> 11:24.760] Probably not. [11:24.760 --> 11:28.400] But the simple fact that they actually went to that first bothered me. [11:28.400 --> 11:35.200] And what it kind of showed me was that, as a society, maybe we just are not equipped to handle things like we used to. [11:35.340 --> 11:48.100] And so one of the takeaways from the book was, I had to get to a point where what worked for me was what I put in the book and how I got through this from a kind of a therapy mental health perspective. [11:48.640 --> 11:52.080] And maybe what worked for me could work for some other folks. [11:53.440 --> 12:02.240] Effectively, kind of going back to the beginning is, when this occurred, I'm seeing it and I'm watching it real time. [12:02.240 --> 12:05.100] I had to send Brandy home because I needed to focus on it. [12:05.100 --> 12:09.980] So at that point, I'm not in the post-traumatic stress, I'm dealing with it. [12:09.980 --> 12:11.980] And so I went into what I call critsit mode. [12:12.320 --> 12:15.700] And some of my jobs, I'm part of a critsit team where we deal with critical situations. [12:15.700 --> 12:21.280] So you're easily able to take away the emotion of what you're feeling and concentrate on the data. [12:21.280 --> 12:29.880] And I was able to gather enough data that night where I was able to track the folks who got into the account to a compromised computer in Seattle. [12:29.880 --> 12:32.080] So at that point, I'm gathering data. [12:33.260 --> 12:42.240] About an hour later, after I was done, got AT&T to finally cancel my phone for that night, I broke down. [12:45.120 --> 12:49.480] Because at that moment, it's just kind of hitting you. [12:50.000 --> 12:52.660] It's hitting you of what actually took place. [12:52.660 --> 12:54.560] And I don't think people realize that in the moment. [12:55.520 --> 13:05.100] Because you have a lot of emotions going through and, you know, it's not the financial loss at that point, it's making a mistake, right? [13:05.100 --> 13:14.860] And how we handle that and how we treat each other and, friends and peers, because everyone here is effectively, you know, I've said this to a few people, we're kind of the smart people in the room. [13:14.980 --> 13:19.580] And when you realize what happened, because I was able to connect the dots very quickly. [13:20.040 --> 13:21.460] You know, that's what I do for a living. [13:21.460 --> 13:24.780] I was able to connect the dots of what actually happened and I knew immediately. [13:25.160 --> 13:32.180] And going and telling your, you know, spouse and family, you don't have any more of what they, to be honest, didn't even know I had in the first place. [13:32.180 --> 13:33.640] So it just came crashing down. [13:33.640 --> 13:39.540] And then, you know, eventually I gathered the data the next day and we, you know, continue on with parts of the story. [13:39.540 --> 13:40.140] Yeah. [13:40.760 --> 13:55.860] This is a devastating thing that happens, you know, and to your earlier point of how most people react, I really do believe that that is due to our association of money with energy spent. [13:55.860 --> 14:05.400] Whether it's, you know, whether you intrinsically know it, whether you outwardly know it, we spend a lot of time in our lives working for this value, this dollar value. [14:05.400 --> 14:19.340] And when something like that happens, almost very much like a physical moment in time where you lose something that matters very much to you, your mind goes to a dark place. [14:19.340 --> 14:20.660] How am I going to recover? [14:20.660 --> 14:22.320] How am I going to move through this? [14:22.320 --> 14:28.560] And how am I going to tell the people that I love that I experienced this or I lost this thing? [14:28.560 --> 14:32.280] And that becomes very traumatic for a lot of people. [14:32.440 --> 14:32.640] Sure. [14:32.640 --> 14:39.380] And one of the things that you also want to think about is, for me, I'm a, you know, one Bitcoin is one Bitcoin. [14:39.620 --> 14:41.000] One Litecoin is one Litecoin. [14:41.000 --> 14:42.800] Just, you know, one coin is one coin. [14:42.800 --> 14:45.700] The dollar amount has never really been my focus. [14:45.700 --> 14:49.600] And that's, you know, as long as other folks have known me, that's been a statement I've stayed true to. [14:50.220 --> 14:59.160] But it comes down to the trophy that I had, the big stack of whatever that I accumulated is now gone. [14:59.300 --> 15:02.680] And so there's that loss, regardless of the dollar amount. [15:02.680 --> 15:05.540] And then you begin to think of, well, it's gone. [15:05.540 --> 15:11.700] So the time that I'd spent, the emotions that I put in, the sacrifices that I'd made was for nothing. [15:11.700 --> 15:16.680] And so you go through those thoughts in the moment, because that's how we react to things. [15:16.860 --> 15:23.100] And so the point of telling the story was, this is what worked for me. [15:23.100 --> 15:25.220] This was my journey going through it. [15:25.220 --> 15:29.700] And here is how I was able to come out the other side. [15:29.780 --> 15:32.520] The book begins with the theft. [15:33.100 --> 15:40.080] But then you have to tell the story of how I even accumulated that in the first place. [15:40.380 --> 15:45.620] And the thoughts and the dedication and the time. [15:45.620 --> 15:51.820] And it's like I said, it's a memoir with a lot of thoughts and mental health, you know, sprinkled in. [15:52.040 --> 15:52.300] Yeah. [15:52.300 --> 15:58.340] So after the theft occurs, you know, you gather all this data, you gather all this information. [15:58.840 --> 16:00.360] What was your next step? [16:00.360 --> 16:01.420] What did you do? [16:01.700 --> 16:06.020] So the next step was, where do I go from here? [16:06.020 --> 16:09.500] So initially, I knew the carrier. [16:09.860 --> 16:15.160] I knew that was going to be a mountain I didn't necessarily want to climb. [16:15.380 --> 16:19.980] So believe it or not, I contacted LifeLock, which is kind of funny when you think about it. [16:19.980 --> 16:23.220] Well, based on crypto, that's technically property. [16:23.340 --> 16:24.960] So I had a property theft. [16:24.960 --> 16:27.500] So I also contacted my homeowner's insurance too. [16:27.500 --> 16:28.380] Why not, right? [16:28.380 --> 16:34.640] And it was interesting because I had to explain and relive the crime every single person I had to explain. [16:34.880 --> 16:36.640] So that's what I did. [16:36.640 --> 16:38.760] Now, well, technically that was second. [16:38.760 --> 16:41.040] What it first did was actually contact the police, right? [16:41.040 --> 16:44.340] So I filed a police report where the theft actually occurred. [16:44.340 --> 16:47.140] Come to find out you're supposed to file that where you live. [16:47.140 --> 16:47.940] Didn't know about that. [16:47.940 --> 16:55.300] So learned a lot about that, but actually went through and was able to gather as much data as I could. [16:55.360 --> 17:03.820] And there's a lot of details to that process in the book because as you're going through this and retelling the story, you're having to relive it every single time, right? [17:03.820 --> 17:09.880] Which is then creating additional stress and frustrations because they don't see it like you see it. [17:09.880 --> 17:16.360] If you see this as a bar of gold that you physically mined out of the ground that was stolen, they would understand that. [17:16.360 --> 17:23.280] But the people you're talking to really at that point in time can't comprehend that's the equivalent of. [17:23.280 --> 17:24.140] Yeah. [17:24.140 --> 17:42.040] So, you know, after you've contacted LifeLock, after you've contacted your carrier, after you've contacted all the people, you know, relive this story over and over and over again, trying to stay calm, trying to not react, but respond. [17:42.680 --> 17:43.920] What did you do? [17:43.920 --> 17:48.640] I mean, I want to get to this whole story of the detective. [17:48.640 --> 17:50.620] That's really where I'm going with this. [17:50.620 --> 17:55.900] So there's an interesting angle to this. [17:55.900 --> 18:00.660] So when I filed the police report, it was a suburb of St. [18:00.660 --> 18:03.320] Louis and it was a small police department. [18:03.320 --> 18:07.340] And so I filed the police report, was contacted by the detective. [18:07.580 --> 18:16.020] And when I went ahead and told him the story, he didn't really understand it because he'd never really experienced this before. [18:16.020 --> 18:18.840] I said, well, just think of it as retail theft. [18:19.480 --> 18:21.500] And he said, well, but nobody was in the store. [18:21.980 --> 18:24.980] And I said, well, yeah, they remotely controlled the computer. [18:25.180 --> 18:26.180] Well, how did you know that? [18:26.180 --> 18:27.620] Well, that's what I'm theorizing. [18:27.780 --> 18:31.980] So then I went ahead and gave him some breadcrumbs of what I think he might be able to find. [18:32.000 --> 18:34.040] And sure enough, he was able to find. [18:34.120 --> 18:39.140] And I was able to give him enough data that eventually he was able to confirm what I was suspecting. [18:39.140 --> 18:42.740] Those are data points that I provided to the and so on and so forth. [18:42.740 --> 18:43.300] Yeah. [18:43.300 --> 18:49.980] So, you know, this detective was able to walk through what you were telling him to do. [18:50.220 --> 18:56.800] Did that bring up any suspicion on his part that you might be involved with this theft or, you know, how did that look like? [18:56.800 --> 18:58.800] Because, I mean, you were handing him everything. [18:58.920 --> 19:03.520] So the accusation was actually made by the carrier, which I thought that was kind of interesting. [19:03.840 --> 19:05.340] Why would I steal from myself? [19:05.340 --> 19:07.100] But that's a whole other conversation. [19:07.640 --> 19:16.380] It actually got to an interesting point where the detective was actually instructed to no longer talk to me, which I thought was interesting. [19:16.380 --> 19:21.040] I didn't really think about that in the moment because I was kind of moving on in this whole process. [19:21.220 --> 19:26.500] After all that was complete, we eventually contacted the carrier and had to relive it all over again. [19:26.740 --> 19:27.080] Yeah. [19:28.920 --> 19:32.720] It's crazy to me that, you know, all of this can happen. [19:32.980 --> 19:43.420] And, you know, because we're dealing with something that, you know, a lot of people don't understand, you know, shots fired across the bow, you know, you're being suspected of stealing from yourself. [19:43.420 --> 19:49.860] Meanwhile, you just lost $30 million or more at this point as we're increasing through the time. [19:49.860 --> 19:55.060] But why on earth would you steal that money from yourself? [19:55.060 --> 20:06.360] And why, like, my mind starts to go to even darker places of corruption and lies when the detective who's supposed to be working on your case is told he's no longer allowed to contact you. [20:06.360 --> 20:16.540] Yeah, so that was kind of another additional data point that came up is that I was reached through other mechanisms by this individual who said he was instructed to no longer contact me. [20:16.540 --> 20:20.740] And, you know, I can theorize of what was happening in the background at that point in time. [20:20.740 --> 20:24.100] The carrier came in and removed all of the equipment actually from the store. [20:24.100 --> 20:25.420] And this was a franchise store. [20:25.420 --> 20:28.840] So, you know, there's some other situations with that. [20:28.840 --> 20:35.260] But at the end of the day, you know, nobody really wanted to protect the consumer. [20:35.400 --> 20:39.680] And that's kind of something that I like to continue to talk about in this particular case. [20:40.060 --> 20:42.100] So let me just kind of take a step back. [20:42.100 --> 20:46.200] So for anybody who has ever seen SIM swapping, there's effectively three types. [20:46.200 --> 20:47.860] But really there's two. [20:47.900 --> 20:53.040] One is there's somebody on the inside of the store who is paid to go ahead and transfer numbers, right? [20:53.040 --> 20:56.060] That's fairly common, more than people want to admit. [20:56.500 --> 21:01.340] The second type is what I call the telegram groups, right? [21:01.340 --> 21:02.980] Where there's a coordinated group of folks. [21:02.980 --> 21:08.680] They go in, they steal the manager's laptop or tablet, which is logged in. [21:08.680 --> 21:14.400] They've got about 35, 40 minutes to actually go ahead and change as many numbers as they can. [21:14.400 --> 21:16.740] Usually a coordinated group, you know. [21:16.840 --> 21:19.620] And then there's mine, which you don't really ever hear about. [21:19.620 --> 21:24.900] The actual terminals or laptops, computers inside the store were compromised remotely. [21:24.900 --> 21:28.560] The store was actually closed when mine occurred. [21:28.680 --> 21:32.580] So the store was specifically targeted, pre-planned. [21:32.580 --> 21:38.680] They already had, I'm again theorizing, that they had already lifted the manager's password. [21:38.680 --> 21:46.980] The folks in the store, based on my observation and just feeling, had zero indication or involvement in this. [21:46.980 --> 21:49.580] So again, they were as much victims as myself. [21:49.580 --> 21:54.580] And at some of those franchise stores, they have a secondary level of security that's not a requirement . [21:54.600 --> 21:56.920] Simple username and password is all that's required. [21:56.920 --> 22:01.000] Yeah, this was a coordinated attack from a sophisticated group of individuals. [22:01.020 --> 22:03.800] And kind of tell us how you've come to that conclusion . [22:03.800 --> 22:08.200] I know that we kind of laid it out from the store perspective and from the sim swap. [22:08.200 --> 22:19.420] But the different things that happened through the sim swap, what are those indications that made you feel like this was a coordinated attack of sophisticated individuals who've probably done this before? [22:19.700 --> 22:28.860] So, you know, when people are really good at what they do, sometimes it's just beautiful to watch people work. [22:29.160 --> 22:34.260] And I know this is kind of odd from this perspective, but I was impressed at how well it was done. [22:34.260 --> 22:37.100] Now, in the moment, yeah, obviously not, right? [22:37.100 --> 22:56.640] But when you kind of take a step back and you begin to look at how quickly it was executed, how well it was organized in the sense of, just as an example, once they were in, I started and I was able to get back into the account, I could see every exchange and every provider was hit alphabetically quite well. [22:56.640 --> 22:57.980] And I mean simultaneously. [22:57.980 --> 23:02.300] So it was either automated, scripted, passwords were reset through the two-factor code. [23:02.300 --> 23:11.100] And in fact, the interesting piece in this is that the phone was actually triangulated to about 150 miles from the actual store. [23:11.940 --> 23:24.780] So the IP addresses where that it came from was actually in a compromised computer in Seattle, but the physical phone that it was triangulated to was about 150 miles away from the actual store, which was in a completely other state. [23:24.780 --> 23:27.020] So that actually created another interesting issue. [23:27.020 --> 23:42.540] When I called the carrier that night, I have to argue with the gentleman who's on the phone, just a normal customer service rep, and convince him that I did not go to the store, I am the actual person, and get him to turn off the phone. [23:42.680 --> 23:47.620] And that was another hour and a half, two hours at that point that I was completely out of control. [23:47.620 --> 23:52.940] Now, you know, in the moment, I'm thinking IT guy, I want to track everybody, I want to follow them. [23:52.960 --> 23:58.340] But what I should have done is just pick up the desk phone that was sitting right there and actually called the carrier. [23:58.340 --> 24:01.260] Never crossed my mind until maybe an hour later. [24:01.700 --> 24:09.620] Yeah, I mean, you're going through a very traumatic moment at that time, and your mind is racing, it's hard to see what's right in front of you. [24:09.620 --> 24:23.280] Well, and you also have to remember, again, nothing against the customer service guy I was talking to, but to have him understand what was happening as I'm seeing it, this was completely in another dimension that he, in the moment, or maybe now, still doesn't even comprehend. [24:23.580 --> 24:23.980] Yeah. [24:24.120 --> 24:29.780] So you've been through this very rough experience in life. [24:29.780 --> 24:41.400] And, you know, I think that a lot of people, maybe they don't lose 30 million dollars, but they go through experiences that are just as bad to them in the moment. [24:41.400 --> 24:52.420] And, you know, the way that we react or the way that we respond to those events kind of defines us as individuals, as human beings, and how we progress further in life. [24:52.420 --> 25:03.040] I can think back to multiple experiences in my life where something bad has happened, and the way that I reacted to it could have been much better. [25:03.140 --> 25:11.280] And, you know, maybe I focused on it, hyperfixated on it, really led me down a dark path, and I had to learn and grow from that. [25:11.420 --> 25:20.120] So this experience, the way that you responded to it, how has it affected your life and other moments in your life? [25:21.640 --> 25:29.340] So, well, I mean, really you have to begin to think of how you identify, right? [25:29.340 --> 25:31.260] So, like I made the comment earlier, right? [25:31.260 --> 25:37.940] If we're effectively the smartest people in the room, and we make a simple human mistake that everyone else does, what does that do? [25:38.020 --> 25:48.340] And I know that may seem, you know, some people may get it, some people may not, but it's kind of that whole personal pride in the simple fact that you have to admit that you made a mistake. [25:48.440 --> 25:57.800] And once I realized what had actually happened, that was the beginning of me trying to figure out how to handle it, right? [25:57.860 --> 26:05.120] And so in this particular case, you know, acceptance from wife, spouse, friends, family, I mean, that was one of those things. [26:05.120 --> 26:09.180] But you also had to tell them what you were doing for the last decade that they had no clue of. [26:09.180 --> 26:16.280] So it was one of those things, you know, you go to your Sunday school, small group, that type of thing, you know, your social group, your friends, family. [26:16.620 --> 26:19.860] Yeah, hey, yeah, I got hacked, lost 30 million bucks. [26:19.880 --> 26:20.600] What? [26:21.360 --> 26:22.300] Like, what? [26:22.400 --> 26:29.240] Oh, yeah, all the times I wasn't at church, or I wasn't, you know, at a function, I was at the farm doing stuff. [26:29.360 --> 26:32.220] Had a few people saying, I thought you were doing farming. [26:32.320 --> 26:34.160] Like, no, I was doing crypto farm. [26:34.160 --> 26:34.760] What's crypto? [26:34.760 --> 26:37.500] You know, so it basically began all these conversations. [26:37.500 --> 26:44.160] You know, as much as they wanted to understand and help and listen, they still really didn't get it. [26:44.160 --> 26:54.440] What I found helpful was I ended up finding a therapist, which is a fun conversation, because in my life, this was a massive loss. [26:54.540 --> 26:59.520] But I have a healthy marriage, my kids are okay, I have a fine job. [26:59.840 --> 27:02.440] The other aspects of my life are fine. [27:02.440 --> 27:08.400] This was just a big focus of attention that I had to figure out how to handle. [27:08.580 --> 27:14.880] So what I ended up doing was I went to BetterHelp, this isn't an advertisement, but it was easy and simple. [27:14.920 --> 27:18.760] And I found a therapist, which was a fun conversation itself. [27:18.760 --> 27:22.800] So one thing I like about them was you could try them out. [27:23.280 --> 27:32.140] And there was one lady, for all the people who are older, in California, you had Miss Cleo from California Psychics, I always remember that. [27:32.280 --> 27:37.120] And she was basically kind of a Caribbean lady, she had a voice . [27:37.260 --> 27:41.820] And the first therapist that they hooked me up with was kind of a Miss Cleo type. [27:41.860 --> 27:46.620] And all she wanted to do was, she was chatting with me, what can I fix? [27:46.620 --> 27:47.480] What can I fix? [27:47.480 --> 27:48.620] What can I fix? [27:49.040 --> 27:53.640] And my response to her was, I don't need to be fixed. [27:53.680 --> 27:55.380] I just need somebody to listen. [27:55.380 --> 28:03.100] And so after a few therapists, there was a lady in South Texas, Lynn, and we talked. [28:03.500 --> 28:09.580] And she didn't try to fix anything, she just listened. [28:09.700 --> 28:14.720] Because I began the conversations, and a lot of the conversations we had are actually in the book, and I wanted to put those in there. [28:14.720 --> 28:22.660] Because when I'm talking to her, I begin this with, this is my first world problem. [28:22.760 --> 28:24.620] Because I wanted to frame this in perspective. [28:24.620 --> 28:33.340] Because you know, in order to deal with some of your problems, you have to frame them so you provide a proper understanding of where you are, right? [28:33.960 --> 28:36.640] This is my loss, and this is how I understand it. [28:36.640 --> 28:39.820] But it's still my, like I always call it, my first world problem. [28:39.980 --> 28:44.460] And once we had those dialogues, it was nice to finally get them out. [28:44.460 --> 28:47.760] Because it wasn't something I wouldn't burden my wife with. [28:47.760 --> 28:49.700] And she would absolutely listen. [28:50.120 --> 28:51.760] But it really didn't matter. [28:51.760 --> 28:55.960] In fact, a point that I put in the book is, she never even knew how much crypto I had. [28:56.360 --> 28:57.720] Because I never brought it up. [28:57.720 --> 29:02.120] Because it was something that I never really focused on, if that made sense. [29:02.120 --> 29:06.520] I was about the mining, the technology, the interest, the blockchain itself. [29:06.520 --> 29:08.140] Not the dollar amount, right? [29:08.140 --> 29:09.260] And that was just something. [29:09.260 --> 29:11.460] So she took that pretty well. [29:11.460 --> 29:14.240] She knew I had a lot, but she never really knew the amount. [29:15.040 --> 29:16.840] Still loves me, still happily married. [29:16.840 --> 29:18.620] So that worked out well. [29:18.740 --> 29:24.400] But it was one of those things, when I started talking to Elin, it was nice because I could finally get it out without judgment. [29:24.980 --> 29:26.160] Somebody just listening. [29:26.160 --> 29:29.560] Now, it's funny because we've had some conversations afterward. [29:29.560 --> 29:31.100] I haven't talked to her in a while. [29:31.100 --> 29:32.160] I included her in the book. [29:32.160 --> 29:37.260] But we chatted offline and she said it was... she's kind of given me the un-therapist view. [29:37.260 --> 29:41.880] And she said it was interesting as I'm driving in the car telling her about my first world problem. [29:42.280 --> 29:46.080] She didn't really believe the story in the beginning. [29:46.400 --> 29:49.260] But at the end of the day, she is a Bitcoin supporter and she loves it. [29:49.260 --> 29:57.900] A lot of our conversations turned into me having to educate her, even through the therapy process, as she's listening so she could understand what I was saying. [29:58.320 --> 30:03.340] Yeah, I want to take this back to what you said about a happy marriage and your life. [30:03.340 --> 30:08.340] Otherwise, your life was quote-unquote perfect from your standpoint. [30:08.700 --> 30:20.660] And maybe that kind of sets you up to not utterly fail in this situation and utterly lose yourself in the desperation of the loss. [30:20.660 --> 30:26.060] But I want to talk about the definition of happiness and success. [30:26.060 --> 30:30.600] Because I think this is really important in no matter what endeavor you do. [30:30.600 --> 30:36.800] I mean, we're all entrepreneurs here and we're all trying to build businesses and failure happens. [30:36.800 --> 30:52.120] Whether you lose 30 million dollars, whether your wife gets breast cancer, which is an experience you also had, or your business fails, your definition of happiness, your definition of success can make or break you in that situation. [30:52.120 --> 30:54.020] So let's dive into that a little bit. [30:54.120 --> 30:57.600] So that's an interesting question that I always ask is, how do people define happiness? [30:57.600 --> 31:01.600] And that was something that as I go through this journey, I always ask people that. [31:01.960 --> 31:05.620] So in the case of Brandy, that's my wife. [31:05.620 --> 31:09.460] So I go and I tell her this and her response was, okay. [31:09.820 --> 31:16.380] And I know people wouldn't really understand that, but when you begin to understand her, she's just okay. [31:16.380 --> 31:23.800] So she has been throughout my whole career, I hate to refer to my wife as a battle buddy, but she's my battle buddy and she always has been. [31:23.800 --> 31:29.220] And having that partner going, friend, family, spouse, however it works for people. [31:29.220 --> 31:35.740] Having that person who goes through that experience with you, any experience, you just naturally have that support. [31:35.740 --> 31:39.780] And that's something that I think people seem to forget in a lot of cases. [31:39.780 --> 31:49.340] So in my case, having that support going through the process with me just gives you that inert strength that people don't necessarily value as much as they used to. [31:49.680 --> 31:53.600] Yeah, you know, having a good life partner is very helpful. [31:53.600 --> 31:58.200] And you know, for me, the definition of success is varying. [31:58.200 --> 32:05.700] And I think that depending on how you define success, depending on who you have in your life, I mean, something like this happens. [32:05.960 --> 32:08.920] Let's say you build a business and it fails. [32:09.560 --> 32:17.480] If you define your value of success, you define success for yourself as, you know, I am a happy person. [32:17.480 --> 32:18.960] I have love in my life. [32:18.960 --> 32:21.060] I have that battle partner. [32:21.060 --> 32:24.280] Then it doesn't matter what happens to you. [32:24.280 --> 32:26.280] It doesn't matter if the business fails. [32:26.340 --> 32:31.740] Well, and that's the other thing, having that localized support system. [32:31.920 --> 32:35.820] When you go through something like this, people obviously try and relate. [32:35.840 --> 32:38.480] Like, hey, well, you know, I went through this experience. [32:38.660 --> 32:40.880] That's their process to try and connect with you. [32:40.880 --> 32:48.600] In this particular case, the one thing that, you know, she always said was, hey, we'll be okay. [32:48.600 --> 32:50.500] And I completely agree with that, right? [32:50.500 --> 32:54.840] But in the moment, you know, you're still having to deal with it as yourself. [32:54.840 --> 33:01.020] And until people are willing to deal with it how they deal with it, you know, it's just going to be that thing that continually creeps up. [33:01.020 --> 33:08.700] So somebody who, you know, I always preach the mental health journey as much as I can, because I think in society today, we don't deal with things like we used to. [33:08.700 --> 33:12.660] We're just not necessarily equipping people through social relationships and family. [33:12.660 --> 33:20.680] And again, I lucked out in this case, because I have a spouse who lets me go off on, she likes, she likes to refer to them as my adventures. [33:20.940 --> 33:24.520] I go off on these adventures and tangents and things, and that's just me. [33:24.580 --> 33:28.900] And that has allowed me to have great success in some areas, obviously some failures. [33:29.060 --> 33:41.020] The other thing I had to kind of figure out is, and I'll go back to the happiness question in a second, is maybe the story I needed to tell was not what I wanted to do with crypto, which was philanthropic and those type of things. [33:41.340 --> 33:45.140] Maybe the story I was supposed to tell was how I got through it. [33:45.520 --> 33:48.800] So tough pill to swallow, but maybe that is the case. [33:48.800 --> 33:50.680] So it's the whole keep on keeping on. [33:50.840 --> 33:55.900] But the question that I was asking, this is what I asked you the other day, is how do you define happiness, right? [33:55.900 --> 34:05.560] And this is something I want everybody here to kind of think about, is when somebody asks you that question, it's an in-the-moment question, but it's not. [34:05.760 --> 34:09.340] It's a how do you define happiness in your own life? [34:09.340 --> 34:10.420] And it's okay. [34:10.440 --> 34:15.000] It's completely subjective to who you are, how you're in the moment. [34:15.000 --> 34:17.140] Some people like to turn it up to 11. [34:17.520 --> 34:18.800] Spinal tap's awesome. [34:19.040 --> 34:20.580] Some people don't, right? [34:20.580 --> 34:22.100] Some people like to be low-key. [34:22.100 --> 34:24.320] Some people like to have support to go off on adventures. [34:24.520 --> 34:26.360] Some people like to write books. [34:26.360 --> 34:27.420] Some people like to crypto mine. [34:27.420 --> 34:28.500] It doesn't matter. [34:28.500 --> 34:30.060] It's how you define it. [34:30.060 --> 34:34.080] And once you define that for you, then you become who you actually are. [34:34.260 --> 34:39.120] Yeah, and if you can define that for you, and there are no wrong answers at the end of the day. [34:39.120 --> 34:42.780] It's as long as you know who you are and you're willing to define that for you. [34:42.840 --> 34:46.040] That is how you become a better entrepreneur. [34:46.040 --> 34:50.080] Because when you are secure in what you want, you're secure in your happiness. [34:50.080 --> 35:00.300] As you more move forward and progress through life, through your endeavors, your journeys, you make better decisions because they're aligned with who you truly are and what you want. [35:00.680 --> 35:15.860] So the process of writing this book, I mean, you had this experience and I think it's valuable for the wider world to know, to understand that this happened so that we can better protect ourselves and be more vigilant. [35:15.860 --> 35:19.980] But why on earth would you write a book, Brian? [35:20.300 --> 35:23.460] So the book actually started as a burn journal, right? [35:23.460 --> 35:30.420] So there's a burn journal concept where you write down your notes and you burn it and it's off to the ether and it's out of you. [35:30.420 --> 35:32.220] It's part of a therapy process. [35:32.220 --> 35:39.720] But also, I'm having to write all these notes down for attorneys and lawyers and cops and so I've got a pretty good note thing. [35:40.760 --> 35:45.700] And after we went through the theft, I began to start to tell people about it a little bit. [35:45.700 --> 35:59.960] And how they reacted kind of caused me to do more notes and then eventually went ahead and just kind of came up with the timeline and then eventually hooked up with Carrie Nyman, who was a ghostwriter that I hired to help me through the process, which that's a fun process in itself. [36:00.760 --> 36:02.100] I'll just go into that real quick. [36:02.100 --> 36:04.860] So a fun story with that. [36:04.860 --> 36:10.680] So with Carrie, so I actually hired her to help me write the book and she's an official ghostwriter. [36:10.680 --> 36:12.600] I think she's at 27 books now. [36:12.740 --> 36:20.940] And so I talked to her about the first chapter and she writes it and this was after we talked for about four hours. [36:21.280 --> 36:25.860] She then gives it to me and I rewrote about 60% of it. [36:26.160 --> 36:28.420] And so she kind of reacted odd. [36:28.420 --> 36:30.680] She was like, okay, that's fine. [36:30.680 --> 36:33.840] She didn't like my redlining on all the things that she wrote. [36:33.840 --> 36:35.760] This was her baby that she was writing. [36:36.200 --> 36:39.120] So then we did chapter two. [36:39.620 --> 36:45.220] And chapter two was a little bit more of history and I rewrote about 60% of that. [36:45.740 --> 36:50.580] And she got a little irritated and said, why do you keep messing with my book? [36:50.720 --> 36:55.160] I said, well, first off, the way I think is I'm a reverse engineer guy. [36:55.160 --> 36:58.580] I'm a rewriting the code of my book. [36:58.720 --> 37:08.720] And once I began to explain that to her and once I began to get her to understand that, it was a magical process because now she understood that I'm going to critique everything. [37:08.860 --> 37:12.200] And so if you end up reading the book, the book has two narratives. [37:12.200 --> 37:22.240] It has the constant, which is kind of her words, and then it has mine, which are the shiny squirrel things that are all over the place and all the important details that kind of fill in the gaps. [37:22.660 --> 37:31.880] Yeah, you know, as we start to wrap this up, you know, I want to give you the opportunity, you know, speaking to your audience, speaking to the wider world. [37:32.400 --> 37:34.620] What are some pieces of advice that you have? [37:34.620 --> 37:38.140] What are some key takeaways that you want to leave the audience with? [37:38.660 --> 37:44.140] So one of the key takeaways is that if you don't think you're ever going to be a target, you already are. [37:44.180 --> 37:46.280] And in fact, everybody here is a target. [37:46.460 --> 37:52.700] Some of the mistakes that I own up to that I make in the book, every single person here has made those mistakes. [37:52.700 --> 37:55.120] It's the concept of convenience versus security. [37:55.700 --> 38:02.140] And I mean, just as a great example, I'm sure everyone has put part of their social security number, maybe a picture of their driver's license. [38:02.140 --> 38:06.160] They emailed it to get it between devices conveniently, which is fine. [38:06.160 --> 38:07.000] It's not. [38:07.020 --> 38:08.600] But people do it. [38:08.600 --> 38:10.220] They just never go back and clean it up. [38:10.220 --> 38:19.220] So if you're part of my age, I'm 49, so I'm at the beginning of the analog digital technology, had email addresses since the mid 90s. [38:19.460 --> 38:23.900] And of course, I'm a pack rat of digital data like everybody else. [38:24.180 --> 38:30.280] And if you don't go back and sanitize it, then if somebody wants to get in, it's a simple fact of they can. [38:30.600 --> 38:31.840] Yeah, absolutely. [38:31.840 --> 38:34.320] Go back and sanitize your digital life. [38:34.320 --> 38:35.700] I think it's very important. [38:36.700 --> 38:38.860] We're here at the CypherCon. [38:38.860 --> 38:46.580] I mean, there is all kinds of technology here, people educating people on cybersecurity, on ways to protect your digital life. [38:46.580 --> 38:51.740] And I think that there's a lot of different things that we can do to protect ourselves. [38:51.740 --> 38:53.840] I mean, that doesn't mean that it's not going to happen. [38:53.840 --> 38:55.900] You're still going to be able to be targeted. [38:55.900 --> 39:01.100] This was a very sophisticated attack, that there's not really much you can stop from the attack happening. [39:01.100 --> 39:07.080] But there are ways that you can mitigate them being able to get the information like you were saying. [39:07.080 --> 39:14.620] But there's also ways to keep them from getting valuable crypto or money. [39:14.760 --> 39:21.980] Like if you back up your wallets, if you do it in secure encrypted ways, there are other methods to protect yourself. [39:21.980 --> 39:26.520] But there's also another angle to this too, is that when it does happen, it's okay. [39:26.880 --> 39:32.800] And that's the part that I think people don't realize is that when this does happen to you, you will be okay. [39:32.800 --> 39:34.460] Your life may be a little different. [39:34.460 --> 39:38.120] You may have to change some things, but you'll come out okay. [39:38.120 --> 39:48.260] And that's the thing that... so in the book, I talk about two people that I know who were in the crypto equipment sales and the ups and downs trading, and they took their own life. [39:48.260 --> 39:53.460] And it was they took their own life because they couldn't handle what they thought this was going to turn into. [39:53.460 --> 39:57.440] They were not mentally prepared to handle the downfalls. [39:57.500 --> 40:15.660] And it was sad to see they had put their value in how they were being identified as a crypto trader, or this was going to solve all their marriage problems, or solve their... a guy that I knew was a basically divorced father, and he wanted custody of his kids. [40:15.660 --> 40:17.160] And so this was his answer. [40:17.160 --> 40:19.340] And unfortunately, he ended up taking his own life. [40:19.640 --> 40:22.820] He couldn't handle the ups and downs, unfortunately, and it was sad to see. [40:22.860 --> 40:30.900] And so the message I want to leave people with is that when this does happen, because it's going to happen to everybody at some point, in some way, it'll be okay. [40:30.900 --> 40:35.160] That's kind of why I ended up writing the book. [40:35.200 --> 40:39.140] Yeah, I think that's why I wanted to outline the definition of happiness. [40:39.140 --> 40:47.780] Because when your happiness is, and again, it's subjective, but if your happiness is tied up in what you do, and who you are, like your role... [40:47.780 --> 40:49.020] How you identify yourself. [40:49.060 --> 40:50.360] Exactly, exactly. [40:50.360 --> 40:56.200] I mean, particularly for me, I mean, just to get a little bit meta, I'm a father. [40:56.220 --> 41:02.940] And what defines happiness for me is my little boy, my wife, the way that they see me. [41:02.940 --> 41:16.720] And so looking at your experience and thinking about, okay, if something similar like this had happened to me, I think what would be more important, more devastating is if my family looked at me different because something like this happened. [41:16.720 --> 41:18.080] And I know that that would never happen. [41:18.080 --> 41:20.340] I mean, my wife would never look at me differently. [41:20.480 --> 41:23.020] She would be very similar, your battle partner. [41:23.340 --> 41:28.320] And I think that that would help me get through a scenario like this. [41:28.320 --> 41:32.760] And again, going back to it doesn't necessarily have to be the loss of $30 million. [41:32.800 --> 41:35.300] It can be the loss of a family member. [41:35.300 --> 41:38.700] It can be the loss of a business that you've dedicated your heart and soul into. [41:38.700 --> 41:42.440] It can be a medical expense. [41:42.440 --> 41:44.500] It can be a lot of different things. [41:44.580 --> 41:55.540] Life has hardships, but who you define yourself as, where you place your value, happiness, and your success in will help you get through this. [41:55.620 --> 41:59.280] One of the expressions I use a lot is just keep on keeping on. [41:59.280 --> 42:05.280] And so one of the things that, and as we were writing the book, my wife was diagnosed with breast cancer. [42:05.340 --> 42:20.580] That was rough, but the reason we ended up putting in the book was because as I was telling Carrie, we just handled it. [42:20.580 --> 42:24.060] And so she ended up having a double mastectomy a month after she was diagnosed. [42:24.380 --> 42:27.520] And that just absolutely floored Carrie. [42:27.820 --> 42:33.760] And she wanted us to put it in because how we handled that was kind of how we handled the crypto theft. [42:33.760 --> 42:35.120] We just kept on. [42:35.120 --> 42:37.360] We just continually moved forward. [42:37.360 --> 42:40.500] Didn't dwell in the moment and what was happening. [42:40.500 --> 42:42.980] You just have to keep it on. [42:43.360 --> 42:44.140] Absolutely. [42:44.140 --> 42:45.400] I couldn't agree more. [42:45.400 --> 42:50.860] Well, Brian, I want to say thank you so much for writing this book and telling your story. [42:50.920 --> 42:52.720] I think this is an important story to tell. [42:52.720 --> 42:55.920] For anybody who wants to get the book, you can find it on Amazon. [42:56.020 --> 42:58.800] It's called Undermined by Brian Oakes. [42:59.180 --> 43:01.580] I highly recommend that you go and get the book. [43:01.660 --> 43:03.280] He has some with him here today. [43:03.280 --> 43:05.320] If you're in the audience, he's got some books. [43:05.320 --> 43:07.580] Come buy a book, get it signed by Brian. [43:07.600 --> 43:10.940] If you have any questions for him, I'm sure he'd be happy to answer them. [43:10.980 --> 43:15.620] Brian, I want to say thank you so much for what you do and I appreciate your time. [43:15.620 --> 43:16.400] Thank you very much. [43:16.400 --> 43:22.300] All right, guys, we will be back in about 15 minutes for the next one. [43:22.320 --> 43:24.800] It's not on the TV, but we've got some good stuff for you. [43:24.800 --> 43:27.340] We're going to be talking about Bitcoin and Bitcoin mining.