goodlisten

Clip

Gears of War 3 Source Code Leak
listen on Spotify
41:53 - 44:12 (02:19)

A developer illegally obtained the source code for Gears of War 3 over a year before its release, causing potential spoilers and security concerns for the game.

Similar Clips
The speaker talked about an unspoken rule among them during a video game conference which was to avoid drawing unnecessary attention to themselves to avoid poking the bear.
48:12 - 50:17 (02:04)
listen on Spotify
Video games
Summary

The speaker talked about an unspoken rule among them during a video game conference which was to avoid drawing unnecessary attention to themselves to avoid poking the bear. They decided to stop logging in and let things die down to not be noticed by others around them.

Chapter
Gaming and Hacking
Episode
Ep 45: XBox Underground (Part 1)
Podcast
Darknet Diaries
Rowdy had Sanad call Justin so he could get tips on how to connect to the secured wireless network at PAX.
50:17 - 51:10 (00:53)
listen on Spotify
PAX
Summary

Rowdy had Sanad call Justin so he could get tips on how to connect to the secured wireless network at PAX. Despite the advice, Justin still couldn't get access.

Chapter
Gaming and Hacking
Episode
Ep 45: XBox Underground (Part 1)
Podcast
Darknet Diaries
An anonymous man shares his encounter with unidentified police officers who stopped him while he was walking his dog.
29:52 - 32:22 (02:29)
listen on Spotify
Police Encounter
Summary

An anonymous man shares his encounter with unidentified police officers who stopped him while he was walking his dog. He claims to have stopped an earlier attack and was shocked by the presence of the officers, who weren't in police uniform and didn't identify themselves.

Chapter
Encounter with Unknown Law Enforcement
Episode
62: Cam
Podcast
Darknet Diaries
The speaker describes how remote access attacks can be carried out despite having state-of-the-art cybersecurity measures in the company.
56:57 - 59:05 (02:07)
listen on Spotify
Cybersecurity
Summary

The speaker describes how remote access attacks can be carried out despite having state-of-the-art cybersecurity measures in the company. This emphasizes the importance of being cautious and vigilant when using a computer.

Chapter
Security Measures for Building Networks
Episode
69: Human Hacker
Podcast
Darknet Diaries
Azrael's Klan is taking matters into their own hands and reporting people and chat rooms with child pornography to Kik, who for the most part, do not take action.
1:25:59 - 1:27:26 (01:27)
listen on Spotify
Child pornography
Summary

Azrael's Klan is taking matters into their own hands and reporting people and chat rooms with child pornography to Kik, who for the most part, do not take action. Azrael's Klan has resorted to phishing and doxing users of these chat rooms to obtain more information about them and report them to the cybercrime division of the FBI.

Chapter
Struggles of an IT Security Expert with Access to Sensitive Information
Episode
93: Kik
Podcast
Darknet Diaries