Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver

Sdílet
Vložit
  • čas přidán 15. 05. 2024
  • With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco.
    Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology solutions. Eric and his company are at the forefront of the latest developments in the world of global espionage, and the merging of man and machine. He attests that the Hollywood-created image of the daring secret agent sneaking into a foreign government's laser protected server room to steal top secret information couldn't be further from modern reality. In fact, the "James Bond" of the 21st century doesn't just use a computer, he is the computer.
    This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at www.ted.com/tedx
  • Věda a technologie

Komentáře • 693

  • @javierescontrias
    @javierescontrias Před 4 lety +194

    This guys "dad jokes" must be epic.

  • @AnthonyGorss
    @AnthonyGorss Před 4 lety +26

    This is a good video to share with those who are oblivious to the real-world threats we face on the digital battleground.

  • @delilahtuxedo6993
    @delilahtuxedo6993 Před 2 lety +15

    That was the most informative TEDx talk I've listened to. Thank you so much.

  • @kar351
    @kar351 Před 4 lety +12

    What is sad is that the same technology that does this, could be used to improve life for everyone on the planet.
    But since we are full of stupidity and greed this is what we have.
    I am about to hit 50 years old, I saw the internet growing, I saw amazing innovations and was hopefully for the future, and this is what my kids kids, will have.

  • @iLaddx
    @iLaddx Před 9 lety +644

    "the youtube"

    • @Nitsujcm2600
      @Nitsujcm2600 Před 9 lety +97

      As soon as he said it, I scrolled down looking for this comment.

    • @YouSunkMyFishy
      @YouSunkMyFishy Před 9 lety +18

      It's like the boobtube, but on the internet.

    • @turbocrew8039
      @turbocrew8039 Před 6 lety +3

      Daryl Ladd as soon as I heard that I was looking for this comment

    • @michaelmettie9430
      @michaelmettie9430 Před 6 lety +6

      that moment when you realize your thoughts will already be the top rated comment and just look for the thumbs up on it instead. So yeah, let me save you 20 minutes and save you from becoming dumber..... skip this video. Don't listen to a lecture about technology from a guy that says "the youtube" hint: hes probably from "the iraq"

    • @SLACKLINEDUDE
      @SLACKLINEDUDE Před 5 lety +3

      Daryl _"I don't do the Email"_

  • @bobbymorelli9763
    @bobbymorelli9763 Před 5 lety +54

    17:27 hes sending hackers to the mirror dimension. dr strange would be proud

  • @soundaddiktion2006
    @soundaddiktion2006 Před 5 lety +9

    "Will we ever realise it" made me think of Brave New World in a chilling way

  • @candaceberry6651
    @candaceberry6651 Před 2 lety +2

    I really enjoyed this! Such a great balance of humor and information. Sucked me right in! Fascinating!

  • @SimplySpace
    @SimplySpace Před 4 lety +114

    "Imagine the fallout" Ahhhh, I see what you did there.

  • @arshaghazie
    @arshaghazie Před 4 lety +9

    man I recall all those viruses name from my childhood when I was so obsessed with computer magazines

  • @MrSkyTown
    @MrSkyTown Před 7 lety +227

    Unplugging my GameCube from now on, don't want to get hacked

    • @eduardoarty1228
      @eduardoarty1228 Před 6 lety

      MrSkyTown hahaha wtf

    • @finnelhumano6096
      @finnelhumano6096 Před 6 lety +3

      After the vault 7 leak, that doesn't sound so funny anymore does it?

    • @LordJackass
      @LordJackass Před 5 lety +9

      they'll spin that tiny CD so fast it'll break the CD drive.

    • @brisclan7813
      @brisclan7813 Před 4 lety +1

      Good idea, can't trust those Japanese

    • @amead5248
      @amead5248 Před 4 lety +2

      I already warned you.....do not unplug me.

  • @kn0ck496
    @kn0ck496 Před 6 lety +1

    new age honeypots is essentially the gist of this talk. The software suite they use is obviously next gen and mind blowing.

  • @alexgoslar4057
    @alexgoslar4057 Před 4 lety +2

    Thanks Eric, for this enlightenment.

  • @Calm_Energy
    @Calm_Energy Před 5 lety +36

    What a great presenter! These jokes really kept me engaged lol

  • @rodkneeellil3905
    @rodkneeellil3905 Před 5 lety

    Thanks, TED 4 sharing.

  • @existencebeyond5398
    @existencebeyond5398 Před 4 lety +6

    He is a very great presenter! Thanks!

  • @pharcyde110573
    @pharcyde110573 Před 4 lety +32

    Love this guy, wish I had a boss like this!!

    • @sdsfgsty
      @sdsfgsty Před 4 lety +1

      Propose to him! 😍

  • @brianmilligan1787
    @brianmilligan1787 Před 2 lety +3

    He never really scratched at the true facts but all he said was very interesting and with humour thumbs up

  • @maverick4220
    @maverick4220 Před 6 lety +5

    I've heard about this secret mission before. I believe there is a full documentary about it.

  • @amediarts
    @amediarts Před 4 lety

    Thanks for the real question at the end.

  • @quelorepario
    @quelorepario Před 8 lety +118

    "shadow networks" > Honeypots

    • @ryanschafer9034
      @ryanschafer9034 Před 7 lety +14

      its the same thing on a larger scale.
      better known as honeynets which are made of honeypots.
      these are just smart honeypots that are linked together. TrapX makes a neat product thatll even replicate PLC equipment and generate bogus event log things so it looks real enough.

    • @marcinnawrocki1437
      @marcinnawrocki1437 Před 6 lety +4

      Yup, just network of honeypots, nothing neew really. And Stuxnet story has few more very interesting aspects.

    • @cyberkidnap6359
      @cyberkidnap6359 Před 6 lety +2

      yup except they are programmed to talk to each other☝

    • @zyeuh2565
      @zyeuh2565 Před 5 lety +1

      @@marcinnawrocki1437 such as ?

  • @jeanayala5239
    @jeanayala5239 Před 4 lety +19

    "Imagin the fallout", I see what you did there, and I love it.

    • @therealderekchurch
      @therealderekchurch Před 4 lety

      please explain...

    • @jameswhite6152
      @jameswhite6152 Před 4 lety +3

      @@therealderekchurch if you were to bomb a nuclear reactor there would be "nuclear fallout" in the form of radiation. What he did was a play on words. Because fallout used as a word by itself to explain something means consequences.

  • @tsehampton
    @tsehampton Před 6 lety +4

    Wow! A great talk, informative and a little scary with a glimpse into the future. Thanks.

  • @migsfire5912
    @migsfire5912 Před 4 lety +2

    I remember hearing about the "Michaelangelo" virus when I was playing Oregon Trail , in Elementary school

  • @gsogso3444
    @gsogso3444 Před 3 lety

    Wow...thank you
    Great speaker.🙏✨

  • @apurwamusic
    @apurwamusic Před 3 lety +1

    This video is 8 years old and still looks next gen today.

  • @EXHellfire
    @EXHellfire Před 7 lety +78

    I was hoping this guy would say agent 009 is now agent 1001 but eh... wasted opportunities...

    • @ingebrecht
      @ingebrecht Před 6 lety +30

      Nope, he is top secret. Agent 404.

    • @EXHellfire
      @EXHellfire Před 6 lety +9

      not found, huh, that one is also good

    • @lostspace5811
      @lostspace5811 Před 5 lety +1

      Said it near the end 001

    • @timmonrf3347
      @timmonrf3347 Před 4 lety +8

      @@lostspace5811 Thats not what he meant. The number 9 in binary code is 1001. 7 would be 0111

    • @bluejay6904
      @bluejay6904 Před 4 lety +1

      it was double 001 earlier James Pond. it's cutely in binary.

  • @CaptainSamie
    @CaptainSamie Před 5 lety +4

    The first virus was written on punch cards in 1968. The internet didn't even exist as we know it today, it was a connection between universities and military so that data could be quickly shared. A collage kid wrote it to see what would happen. And he also wrote the first virus protection program.

  • @oo-dd3lk
    @oo-dd3lk Před 5 lety

    Fascinating talk....

  • @jdrissel
    @jdrissel Před 4 lety +1

    I have for years thought that engine computers at least could alter the spark timing to cause occasional extremely early ignition (and very high cylinder pressure) leading to early mechanical failure. My suspicion dates back to a 1976 Pontiac. At about 6 years of age it began pinging when it had not before. It pinged but with no seeming pattern, and not even 100 octane racing fuel stopped the pinging. We replaced the ignition module, the coil, cap and rotor, all the wires and plugs without any impact. Carbon deposits were the next suspect, but when we pulled the heads it was clean. We did a valve job and installed new springs and vatted the intake manifold. When we put it back together and drove it, the pinging was gone. Then we realized we left the plug that sets the ignition timing to base unplugged, and wouldn't you know it, the pinging came back. We wound up installing a stand-alone MSD system that just used mechanical and vacuum advance. That worked and got better mileage and better acceleration, though both were still awful. It was a 1976 Pontiac 455 (with a pavement-shattering 160hp LoL) after all, but it was still going at about 300k when I lost track of it. Not many '76 engines of any make or model made it much past 100k.

    • @Bojan-tg2vk
      @Bojan-tg2vk Před 2 lety

      More mechanics and less digital technology and people will not be able to hack or spy on it, but the future is unfortunately 0% mechanic and 100% digital technology. That's why I always hated these new mobile phones.

  • @pamcota3451
    @pamcota3451 Před 4 lety +1

    Excellent Presentation !! Although scary !!!

  • @rydmerlin
    @rydmerlin Před 7 lety

    Interesting how his contention is the subject of Spectre and how boots on the ground defeats "cyber" in the movie.

  • @danielrobinson4795
    @danielrobinson4795 Před 4 lety

    Great vid!

  • @shaneksmith1957
    @shaneksmith1957 Před 5 lety

    Thank You!

  • @sweden5665
    @sweden5665 Před 7 lety

    what software was he using at the end?

  • @user-gv4bf4zx2s
    @user-gv4bf4zx2s Před 4 lety +2

    The only way to be 100% sure is to have a physically isolated network. I had a customer that insisted on it. They had two computers on each desk: one was connected to the Internet, and the other was connected to the LAN and server with the ERP system. All USB ports were disabled, and of course, end users were not 'Admins', lol. They never had a problem w the isolated system. Imagine that.

    • @basicdesign1
      @basicdesign1 Před rokem

      yep. Got that since 2000. 20+ yrs of peace and I'll be dead before they find a way of getting around that 🖕. Meanwhile my son, who grew up with that system, has become a hacker - of course.

  • @hop3881
    @hop3881 Před 4 lety +3

    Anyone know what software he is using towards the end of the talk? Some sort of network visualizer?

    • @DaveSuperDaveLyon
      @DaveSuperDaveLyon Před 4 lety +1

      You civilians don't get to have that stuff until the machines allow you to.

  • @alessandrocernuzzi
    @alessandrocernuzzi Před 4 lety +1

    Next Halloween I'll just skip the usual horror movies and theme thing and I go to the next level. I watch a lecture by Eric Winsborrow

  • @KeithCooper-Albuquerque

    Great video!

  • @mehrdademami149
    @mehrdademami149 Před 8 lety +3

    Operation "Olympic Games" ??? But DOPED !!!

  • @jamessmaby8758
    @jamessmaby8758 Před 5 lety

    A great Ted !

  • @natebeattie8945
    @natebeattie8945 Před 2 lety

    wow excellent presentation

  • @hamidnikkhah929
    @hamidnikkhah929 Před 4 lety

    Good ,informative and true

  • @badriprajapat
    @badriprajapat Před 10 měsíci

    Great knowledge sharing.. And the voice is very clear and bold like some hacker threatening very seriously 😂

  • @mst5g826
    @mst5g826 Před 4 lety +2

    Actually, he showed how the confluence of man and machine makes us much more susceptible.

  • @melvinmayfield470
    @melvinmayfield470 Před 2 lety

    Excellent!

  • @spaghetti9845
    @spaghetti9845 Před 4 lety +1

    i used a securid ... since it changes codes every 30 sec that is tough

  • @yardmasterswealtheducation8424

    Old School Theory (not uploaded to my channel yet...) counters this threat beautifully!

  • @robertwagner7439
    @robertwagner7439 Před 4 lety

    Thank you

  • @PatchedThePipe
    @PatchedThePipe Před 6 lety +6

    Ahh I remember the “I love you” hit just as panic died down when it became clear the Y2K bug wasn’t gonna happen

  • @NeedSec
    @NeedSec Před 11 lety +15

    Nothing new or groundbreaking in this presentation but a great introduction for the layman.

  • @Tej517
    @Tej517 Před 4 lety +1

    @7:12 it's Natanz not Nantaz .

  • @divyaboy
    @divyaboy Před 6 lety

    Excellent Heads UP Glade Guys Like you are on our side

  • @552rehtyls
    @552rehtyls Před 9 lety +2

    What program is being used to show the network here? I am interested in that!

    • @shepkohler6399
      @shepkohler6399 Před 5 lety

      PRISM

    • @babybirdhome
      @babybirdhome Před 4 lety

      Xavier Grogan Microsoft PowerPoint. It's an illustration modeled after the fact based on network packet captures and log analysis.

  • @johnsabaku2257
    @johnsabaku2257 Před 4 lety +1

    2013? holy moley! I wish I this guy's foresight

  • @nilsp9426
    @nilsp9426 Před 6 lety +5

    What also works instead of espionage? Diplomacy. Sometimes trust is worth more than having a thousand missiles or viruses. But we are taught to defeat the enemy, not befriend him.

  • @MrKurisu28
    @MrKurisu28 Před 4 lety +5

    I honestly wouldn’t be surprised if he turned out to be a robot.

  • @prasoonpandey1184
    @prasoonpandey1184 Před 6 lety +2

    Fantastic... Knowledge along with humour.. great

  • @geoffreylee5199
    @geoffreylee5199 Před 5 lety

    Diamonds Are Forever is about computer break in, with an audiocassette ...

  • @americaalwayswins9655
    @americaalwayswins9655 Před 10 lety

    Excellent. I want in.

  • @over00lordunknown12
    @over00lordunknown12 Před 5 lety +5

    5:46 DAMN IT! The gyroscope in my phone will burn out and I won't be able to use the compass... XD

    • @BOT-vk7wq
      @BOT-vk7wq Před 3 lety

      Unplugging my GameCube from now on, don't want to get hacked

  • @jink6091
    @jink6091 Před 6 lety

    Good speaker.

  • @aaronjones2429
    @aaronjones2429 Před 4 lety

    What is this software that hes creating shadow clients and shadow networks?

  • @davidsandford8343
    @davidsandford8343 Před 5 lety

    very interesting

  • @kizombeiro8130
    @kizombeiro8130 Před 5 lety +8

    Do all the Ted talk presenters follow the exact same talk structure
    ?

  • @MathewunnamedWeymouth
    @MathewunnamedWeymouth Před 4 lety +1

    Nice advertisement hidden as a TED talk...

  • @greywolf271
    @greywolf271 Před 6 lety +2

    I don't know why he bothered creating a vision of the future when what he's describing is exactly what Cliff Stoll described in The Cuckoo's Egg.

  • @Larrythebassman
    @Larrythebassman Před 5 lety

    Impressive

  • @earthman6700
    @earthman6700 Před 4 lety

    As Captain Adama said 'I will not have networked computers on this ship!'. (a lesson from the future).

  • @q1w2e3621
    @q1w2e3621 Před 9 lety +14

    The piece just before the conclusion was a non-sequitur ('Licence to kill'). He didn't go anywhere with it.

    • @RajSingh-qc6lq
      @RajSingh-qc6lq Před 6 lety +2

      He's a bit socially awkward is all.

    • @__-cd9ug
      @__-cd9ug Před 6 lety

      yeah idk, I feel like he uses the "licence to kill" in comparison with the "ally" that james bond has today, which is a fake agent that does the job but doesn't reveal actual information - like he explain right before with shadow networks or whatever

    • @slidhg2247
      @slidhg2247 Před 6 lety

      I guess it’s more his way to say that they are also allowed to engage on the networks which are collecting data from their honeypot/ shadow network. I didn’t do research on this guy, but he seems to have pretty good inside in offensive hacking strategies of the past decade. so why are you thinking his company just uses this defensiv mechanisms he showed during the talk

    • @tombraider77777
      @tombraider77777 Před 5 lety

      "License to murder ".

  • @spacemanjames
    @spacemanjames Před 8 lety +1

    This guy is brilliant, genius and hilarious.

  • @lloydjoseph6484
    @lloydjoseph6484 Před 6 lety +12

    this was technology back in2013 ,now after 5 years .
    we are at a way higher RISK

    • @Enonymouse_
      @Enonymouse_ Před 4 lety +2

      China's i-war end game has advanced considerably since this guy gave the talk. They are constantly targeting cellphone networks and other assets.

    • @roderrickgaming9949
      @roderrickgaming9949 Před 4 lety

      Yeah no way jose

  • @andrewe3165
    @andrewe3165 Před 7 lety +96

    Chuck Norris could swim in a desert.

    • @larrytownley2231
      @larrytownley2231 Před 5 lety

      Usta surf sand dunes in N.M. !

    • @Calm_Energy
      @Calm_Energy Před 5 lety +3

      When Chuck Norris jumps in the ocean he doesn't get wet. The ocean gets Norris.

    • @yiagi6126
      @yiagi6126 Před 4 lety +1

      Mark rober already did that to one of his cousin 😂
      Watch his super mario effect

    • @UltimateBargains
      @UltimateBargains Před 4 lety +1

      There was a time when Chunks Norris could do that, but he's over the hill now.

    • @donbow450
      @donbow450 Před 4 lety

      Chuck Norris would have not sped up the centrifuges, he would have sped down earth.

  • @TheChurchHeydey
    @TheChurchHeydey Před 4 lety

    …………….absolutely one of the best TEDxTALKS...quality work

  • @justineb211
    @justineb211 Před 4 lety +4

    USB not surprising, I remember I love you and everyone at the company being warned BUT STILL opening it. Uggh, pain for the day.

  • @RigorMortisRape
    @RigorMortisRape Před 4 lety +10

    When he says ‘the agents’, I keep hearing the Asians.

  • @adishamzic8504
    @adishamzic8504 Před 4 lety

    Bravo

  • @aseeds7785
    @aseeds7785 Před 3 lety +2

    18:45 In a nutshell: In a virtual world but full of Player versus player, then booted to a world full of npcs with the sprites of the original players.

  • @Adawg420
    @Adawg420 Před 5 lety +6

    the chinese had access for 10 years, huh...that 1 Trillion dollar annual defense budget is really worth the price tag

  • @DouglasMoran
    @DouglasMoran Před 6 lety +4

    The speaker gets a lot wrong and the sloppiness makes me doubt much more. For example, the Melissa/ILoveYou worm of May 2000 was not, as he claimed, the first case of SPAM. First, the first case of SPAM was in 1978 although the term wasn't coined until the mid-1990s. Second, although Melissa used email to spread, it wasn't SPAM. Another example, the Code Red worm hit in mid-July 2001, not after 9/11. A quick consultation with Wikipedia would have revealed these errors.
    And as others have noted below, his "shadow networks" are collections of "honeypots". Honeypots arose in the 1990s, although I don't know when the threshold was crossed of being populated with enough data to warrant that term. In 2000, there was at least one commercial product designed to facilitate creating custom honeypots by providing the underlying capabilities such as hidden monitoring.
    I didn't hear anything here that would help an executive be more aware of the threat. It was little more than "Be afraid. Be very afraid."

  • @francescoquadrio5824
    @francescoquadrio5824 Před 4 lety

    One of the best Ted talks

  • @deancantave5233
    @deancantave5233 Před 4 lety +4

    This was an EXCELLENT talk on CyberSecurity, wow! Seems simple enough but I would have never thought about enabling network intrusion via the creation of a dummy or "shadow network". Since we aren't in a space where we can re-architecture how networks pass data its an ingenious idea to use a network to trap and direct hackers to make them think they've hit paydirt.

    • @ebaystars
      @ebaystars Před 2 lety

      believe me its all nonsense 99% of this presentation has no foundation in reality.

    • @brok3nsec
      @brok3nsec Před 2 lety

      @@ebaystars Then why aren’t you on here presenting your newest discovery?

    • @ebaystars
      @ebaystars Před 2 lety +1

      @@brok3nsec no money in it :-)

    • @brok3nsec
      @brok3nsec Před 2 lety

      @@ebaystars lol says you.

    • @AnglandAlamehnaSwedish
      @AnglandAlamehnaSwedish Před rokem

      Dummy

  • @blendpinexus1416
    @blendpinexus1416 Před 6 lety

    if i found a usb stick i would insert it into my virtual machine to check and wipe it. then use it. (the wiping also wipes and replaces the partition table so ALL data is gone, nearly pemenently)

    • @babybirdhome
      @babybirdhome Před 4 lety +1

      scooter800m None of those things you said are true except that you'd plug it into your computer.
      Your virtual machine can't access that USB stick until your host operating system has connected and talked to it to tell your VM that it exists in the first place. By the time your VM knows it's there, you've already been pwned.
      Also, if it's actually a rogue device designed to hack your machine, you're only going to be able to wipe the part that it wants you to think you've wiped, not the part that was put there to infect your machine.

    • @rickwrites2612
      @rickwrites2612 Před 2 lety

      I don't understand why anyone would even take it. They're cheap.

  • @manishahamal950
    @manishahamal950 Před 4 lety

    It gives me goosebumps whenever i see these kinda videos. But does shadow network relate to dark web??

    • @FamesHD
      @FamesHD Před 4 lety

      Manisha Hamal definitely intertwined.
      011011010011110101 011000010010111 011
      111011100111011100
      0100110 0110101001

  • @crissd8283
    @crissd8283 Před 6 lety +6

    "Has technology made our lives better or worse." I would argue that it has made our lives just slightly better. There is still poverty, depression, wars, and now an online mob. Do we really
    want this technology even more in our lives?

  • @teddy7746
    @teddy7746 Před 5 lety

    Damn that was a good speech.

  • @rot10119
    @rot10119 Před 3 lety +1

    In what universe did the cold war create the computer?

  • @1ntoTheAbyss
    @1ntoTheAbyss Před 9 lety

    How does one go about getting in this line of work, i am interested.

    • @benendo9234
      @benendo9234 Před 9 lety

      Charles Cherry CISSP requires 5 years of experience. Maybe start with Security+?

    • @fission1110
      @fission1110 Před 9 lety +1

      CISSP has a very management heavy focus. It goes lightly into the tech, but focuses more on speaking, risk management, the CIA triad, etc. It's very well respected among management types in the industry, so if you want a way in, it's probably a good idea. But depending on what you want to do, it may not be the best option.

    • @jamieclarke2694
      @jamieclarke2694 Před 8 lety

      +John Huffy Use an operating system called Kali Linux and learn Python and other programming languages all using youtube and google. Then take a networking course and go from there.

  • @FrannyWard
    @FrannyWard Před 4 lety +1

    Cyberdyne Systems series T-800 Model 101 is already old news.

  • @danielescobar7618
    @danielescobar7618 Před rokem

    It's already happening. Just this morning I went to microwave some soup and when I got it out the bowl was scalding hot to the touch but the soup was still COLD

  • @drrugee
    @drrugee Před 4 lety +1

    Someone get this man a glass of water

  • @Gudzon91
    @Gudzon91 Před 3 lety

    haha, its so funny how i lost connection in the middle of playing this video, haha

  • @kbto
    @kbto Před 23 dny

    A lot of this is incorrect in terms of the Natanz stuxnet attack. The Natanz siemens box was airgapped so it was impossible for stuxnet to phone home, it was programmed to know what to do. Also recently (3 months as of the writing of this comment) it was discovered that stuxnet was delivered via a water pump installed in the facility.

  • @Nepheos
    @Nepheos Před 2 lety +3

    I really want a TED of Jim Browning or the other scam bait hackers lol

  • @edrieljeffrey
    @edrieljeffrey Před 3 lety

    There is no sound

  • @MZITinfo
    @MZITinfo Před 7 lety +1

    I don't think the "I love you" virus was the first one to spread via email, was it?

  • @wcdjmase
    @wcdjmase Před 4 lety

    Compelling talk and dad jokes FTW

  • @hollyhood666
    @hollyhood666 Před 5 lety

    Imagine The Fallout

  • @lifeisgood070
    @lifeisgood070 Před 6 lety

    ooooo man this dude is sick. Interesting.

  • @DaveSuperDaveLyon
    @DaveSuperDaveLyon Před 4 lety

    Great f'ing talk.