pneyzariat May 01,2017 We went from the discussion of cookies and their binaries to hacking into someone's FaceBook profile and sending malicious codes in order to reel someone in for your own personal benefit. Love it.
I enjoyed listening to him sharing his skills and the visuals made sense with the way he was explaining them. I can imagine however that a good chunk of the processes is something that is a lot more complicated to do than he's making it sound.
Just listening to him so eloquently explain something so malicious you can exploit makes one really consider the security measures they are implementing in their day to day activities via the internet and social media.
sreinoso103at May 04,2017 Interesting to learn something about .php and great review on bits and bytes in a practical setting. He is quite the character.
jstanfo2at June 20,2017 I found the bit math and the how a message can be whittled down to a fraction of the number of unknown bits to make it easier to hack into a person’s life. I learned I do not have a devious mind. I am not one to hunt people down by taking their information surreptitiously. I found it interesting just how easy it is to target a person’s metadata and use it to ones benefit.
We need better software that will identify computer processing that is out of the norm for each user. This can be done using statistics and social engineering variables to find suspicious activities. We need software that will isolate the programs that seem to have gone rogue, report them to the user and provide suggestions as to how to protect their system. If someone starts, to jiggle my home’s outside doorknob at 2:00am in the morning and I hear my dog bark, I have been alerted to an event that is a not typical event in my home. I know I must be self-protecting and take the necessary precautions to survive the attack.
Why does my operating systems not offer the same kind of alerts and notifications so I can keep myself safe? Is because the software companies are not held accountable? Is it because they had not had a class action suit filed against them for the damage hacking has caused. The risk of losing a few customers seem trivial compared to losing multi-million dollars in a judgment. Is the extra time, effort and cost so high that is compels computer companies to abandon the business ethics of protecting their customers, of providing the best produce possible, a product that will help self-protect a customer’s privacy and information. We the customers, have to make it more expensive for these software companies if they fail in their due diligence to provide effective security solutions. The real threat to our data and privacy is not the hacker that wants to get in but the software and hardware we purchase that is not keeping them out. We might as well say we have left our front door open since the computer companies have left their hardware and software doorways unsecure. There is too much many to be made on anti-virus software, corrupted systems and disposable durable goods that seem to break as soon as the warranties have expired. We live in a hostile environment that is taking advantage of us from all angles and at all times. We are the prey and your data and money is the prize.
Athaokloat July 23,2017 It's so amazing what he could do to show that no privacy exists the Internet world at all. Even though computer systems or protocols are secured by any methods, if smart hackers like him understand in-depth about mechanisms or protocols used to secure what they want to attack, they can eventually tricky ways to break it. As demonstrated in this video, he can get 160 bits of a cookie, based on knowing the basic components of data in a cookie. Another think from this video that changed my thought is the way to collect the geolocation information when we pin our location via our personal computer on Google map. Recently, I thought that Google acquires the geolocation of router from Internet Service Providers. However, this video points out that the geolocation information of routers is collected by street-view cars.
cmasseyat July 29,2017 Funny to hear the story about the Samy Worm from the guy who wrote it, especially since it's mentioned earlier in one the other videos in this gallery. Though being a bit redundant, the idea of web-exploits on social media is still very much relevant as usage only grows and grows.