goodlisten

Clip

Real-Life Simulated Hacking
listen on Spotify
04:53 - 06:23 (01:29)

A hacker simulates a real attack to showcase vulnerabilities in systems and educate on how to secure them. However, they receive a request to hack someone outside their friend group, leading to moral dilemmas.

Similar Clips
The podcast discusses the importance of responsible disclosure in cybersecurity and the potentially negative consequences of not properly disclosing vulnerabilities.
36:34 - 39:04 (02:30)
listen on Spotify
Cybersecurity
Summary

The podcast discusses the importance of responsible disclosure in cybersecurity and the potentially negative consequences of not properly disclosing vulnerabilities.

Chapter
Security Researcher vs. 63 Red Safe
Episode
Ep 49: Elliot
Podcast
Darknet Diaries
The podcast discusses the allure of online anonymity and the world of hacking, including examples of hacking for activism versus malicious intent.
02:32 - 04:52 (02:19)
listen on Spotify
Hacking
Summary

The podcast discusses the allure of online anonymity and the world of hacking, including examples of hacking for activism versus malicious intent. The concept of anonymous online identities is explored through the story of a hacker who goes by the name Wormer when interacting with the hacker collective Anonymous.

Chapter
The Rise and Fall of WikiLeaks
Episode
63: w0rmer
Podcast
Darknet Diaries
Anonymous is a collection of people with some hackers involved in it, along with reporters and people in the media who were interested in getting the inside scoop on things.
1:52:59 - 1:54:29 (01:30)
listen on SpotifyListen on Youtube
Anonymous
Summary

Anonymous is a collection of people with some hackers involved in it, along with reporters and people in the media who were interested in getting the inside scoop on things. Reporters can have a complicated relationship with Anonymous, and the internet allows people to make up stories easily.

Chapter
The Dangers of Hacking for Fun
Episode
#340 – Chris Tarbell: FBI Agent Who Took Down Silk Road
Podcast
Lex Fridman Podcast
The Red Team-Blue Team concept originated from military drills, and it involves attackers (Red Team) and defenders (Blue Team).
00:00 - 01:21 (01:21)
listen on Spotify
Red Team-Blue Team
Summary

The Red Team-Blue Team concept originated from military drills, and it involves attackers (Red Team) and defenders (Blue Team). The Blue Team's role is to lock things down, secure applications, and harden systems.

Chapter
Red Team vs Blue Team: The Battle for Cybersecurity
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
An employee at a vapor shop recounts his experience being interrogated by FBI agents about his encrypted chats following the San Bernardino attack in 2015.
1:14:44 - 1:16:09 (01:25)
listen on Spotify
FBI
Summary

An employee at a vapor shop recounts his experience being interrogated by FBI agents about his encrypted chats following the San Bernardino attack in 2015.

Chapter
Interrogation by Secret Service Agents
Episode
Ep 46: XBox Underground (Part 2)
Podcast
Darknet Diaries