goodlisten

Clip

Anonymous Hacking
listen on Spotify
48:03 - 48:49 (00:46)

The speaker reminisces about his past experiences with hacking and illegal Trojan horses in high school, praising the sophisticated hacking abilities of anonymous hackers.

Similar Clips
The hosts have a conversation about passwords, scams in Detroit and Danny Brown's experience with them.
08:02 - 08:59 (00:57)
listen on Spotify
Danny Brown
Summary

The hosts have a conversation about passwords, scams in Detroit and Danny Brown's experience with them. They also discuss the importance of protecting personal information.

Chapter
Beware of Scams in Ads
Episode
Ep. 139 | 2 Bears 1 Cave w/ Tom Segura & Danny Brown
Podcast
2 Bears, 1 Cave with Tom Segura & Bert Kreischer
The process of tracking and identifying internet users involves analyzing various signals such as mouse movements, keystrokes, operating system, fonts, and headers to uniquely identify individuals, even without cookies.
24:26 - 25:21 (00:54)
listen on SpotifyListen on Youtube
Internet Privacy
Summary

The process of tracking and identifying internet users involves analyzing various signals such as mouse movements, keystrokes, operating system, fonts, and headers to uniquely identify individuals, even without cookies. Despite being crackable, it's an ongoing cat and mouse game for high-security places on the web.

Chapter
The Importance of Cybersecurity and VPNs
Episode
#307 – Brian Armstrong: Coinbase, Cryptocurrency, and Government Regulation
Podcast
Lex Fridman Podcast
Anonymous was known for exposing issues that they thought the public should know about.
08:30 - 10:06 (01:35)
listen on Spotify
Science/Tech
Summary

Anonymous was known for exposing issues that they thought the public should know about. It became a movement to just get, let's get the truth out there and expose something. The Occupy Movement protests began, calling witness to wealth inequality in the U.S.

Chapter
The Rise and Fall of WikiLeaks
Episode
63: w0rmer
Podcast
Darknet Diaries
A group of six hackers formed a crew and began to search for servers running zero-day exploits.
1:47:39 - 1:49:25 (01:45)
listen on SpotifyListen on Youtube
Hacking
Summary

A group of six hackers formed a crew and began to search for servers running zero-day exploits. They claimed to be targeting corrupt individuals.

Chapter
The Rise of Anonymous and the Power of the Collective
Episode
#340 – Chris Tarbell: FBI Agent Who Took Down Silk Road
Podcast
Lex Fridman Podcast
A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.
30:51 - 35:06 (04:14)
listen on Spotify
Ring, security
Summary

A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.

Chapter
Ring camera users’ security breached
Episode
108: Marq
Podcast
Darknet Diaries