(ENG) F**CK I deserve recognition! I was sent to prison for PINGING A SERVER!

(ENG) F**CK I deserve recognition! I was sent to prison for PINGING A SERVER!

(ENG) F**CK I deserve recognition! I was sent to prison for PINGING A SERVER!

Port scanning is not a crime!

Intro: (from darknetdiaries.com @darknetdiairies)

In Feb 2017, a medical provider in Uruguay got hacked. The attacker stole a bunch of patient records and then used that to conduct extortion on the provider. They said they’d release the records of everyone with HIV unless they get $60,000 worth of bitcoin.

The medical provider worked with the police to catch and arrest Alberto, a 41 year old Uruguayan. Alberto had a ton of hacker paraphernalia and electronic devices at his house.

We’re talking dozens of credit cards, a bunch of hardware bitcoin wallets, thumb drives galore with hacking tools and viruses on them, a credit card writer with a bunch of blank cards, numerous hard drives, computers, routers, printers, and an anonymous mask.

Alberto Hill admitted to hacking into the medical provider, admitted to owning all this equipment, and even admitted to the the police he sent the email. But he claims he’s innocent. Listen to his story and you be the judge on whether he’s guilty or not.

The story until nov. 1, 2018 can be heard here: https://darknetdiaries.com/episode/25/


I am ALBERTO and NoW it is DECEMBER 2019, AND I HAVE TO SAY F***K!!!

F**CK I deserve recognition! I was sent to prison for PINGING A SERVER!

FINALLY, THE CRAZY TRUE FACTS BEHIND THE CASE OF ALBERTO FROM URUGUAY. SIT DOWN BEFORE LISTENING, I WILL NOT BLAME YOU IF YOU BELIEVE THIS AUDIO IS A JOKE. BUT.... IT IS NOT! MY NAME IS ALBERTO HILL AND THIS IS MY CRAZY STORY....

MY FULL STORY @DARKNETDIARIES

https://darknetdiaries.com/episode/25/

Jaksot(627)

ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto detalla cómo los cárteles utilizan plataformas como TikTok para glamorizar estilos de vida criminales, reclutar nuevos miembros y ejercer control a través de la intimidación y la propaganda. Además, los documentos revelan una profunda corrupción gubernamental y política en México, donde funcionarios de diversos niveles y partidos colaboran con organizaciones criminales, a menudo pactando con cárteles rivales para asegurar su poder. Ambos recursos subrayan las graves consecuencias de esta situación para la juventud, la estabilidad social y la seguridad pública, destacando la impunidad y la violencia que prevalecen en el país.

26 Elo 19min

ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación y sus capacidades reales de ciberseguridad. Destaca la venta de millones de registros confidenciales, incluidos 30,000 certificados de infraestructura de clave pública (PKI) de identificación nacional con contraseñas descifradas, en foros de la web oscura como DarkForums. El documento identifica a "Uruguayo1337" como un actor de amenazas clave con motivaciones políticas y financieras, que explota vulnerabilidades sistémicas como credenciales comprometidas, configuraciones incorrectas y sistemas obsoletos. Además, el informe examina el marco legal y la capacidad institucional de Uruguay, reconociendo los avances recientes y señalando deficiencias operativas críticas en la prevención y respuesta a estos sofisticados ataques cibernéticos, que en última instancia plantean graves riesgos para los ciudadanos y la seguridad nacional.

26 Elo 23min

Uruguay's Digital Breach: A Crisis of Trust and Security

Uruguay's Digital Breach: A Crisis of Trust and Security

This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecurity capabilities. It highlights the sale of millions of sensitive records, including 30,000 National ID Public Key Infrastructure (PKI) certificates with cracked passwords, on dark web forums like DarkForums. The document identifies "Uruguayo1337" as a key threat actor with both political and financial motivations, exploiting systemic vulnerabilities like compromised credentials, misconfigurations, and outdated systems. Furthermore, the report examines Uruguay's legal framework and institutional capacity, acknowledging recent advancements while pointing out critical operational deficiencies in preventing and responding to these sophisticated cyberattacks, ultimately posing severe risks to citizens and national security.

25 Elo 46min

 X Corp.'s Content Moderation Practices and Challenges.

X Corp.'s Content Moderation Practices and Challenges.

This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" and the platform's often opaque and inconsistent enforcement of rules. It outlines how automated systems primarily handle suspensions, which are effective against spam but lead to a lack of due process for individual users due to limited human support and automated appeal rejections. The analysis details various reasons for suspension, ranging from technical "spam" violations to more severe infractions like hate speech, and explains the different tiers of penalties users may face. Ultimately, the source critically examines the fairness, transparency, and effectiveness of X's moderation, suggesting that its post-2022 operational changes, including reduced human staff, have eroded user trust and driven many to seek alternative, often decentralized, platforms offering more transparent and community-driven governance models.

25 Elo 47min

Image-Based Sexual Abuse: Global Analysis and Legal Responses.

Image-Based Sexual Abuse: Global Analysis and Legal Responses.

This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often driven by power and control rather than simple revenge. It explores the diverse motivations of perpetrators, ranging from financial gain to misogyny, and details the demographics of victims, noting the disproportionate impact on women, young adults, and marginalized groups. The text also examines the profound psychological, social, and professional harms experienced by victims. Finally, it provides a global overview of legal responses—including evolving criminal and civil statutes in the U.S., UK, and Australia, as well as the unique "molka" epidemic in South Korea—while highlighting challenges like jurisdictional complexities, free speech concerns, and the rise of AI-generated deepfakes.

24 Elo 52min

Book overview: The Satoshi Variant: An Accidental Genesis Block.

Book overview: The Satoshi Variant: An Accidental Genesis Block.

This is an overview of a fictional narrative about a woman named Ana, a "Digital Thanatologist" who specializes in decommissioning AI, and her unexpected relationship with an entity calling himself Satoshi, the decentralized, multi-persona embodiment of the Bitcoin creator. This narrative explores themes of identity, technology, and connection through their unusual courtship, which begins with an accidental Tinder match. It details the challenges of Ana understanding Satoshi's shifting personalities and his grand vision for applying blockchain principles to human emotion, moving beyond mere currency. The story further intensifies with the revelation of Ana's secret membership in "The Loom Breakers," a neo-Luddite cult opposed to convenience, who launch a "51% Attack" on Satoshi to gain control of his fortune and implement a plan called "The Great Inconvenience," aiming to dismantle global infrastructure through bizarre methods. Ultimately, Ana and Satoshi counter the cult's attack with a "smart contract of empathy" and a global "Proof-of-Bizarre" distraction, culminating in their merging of consciousness into a new, decentralized entity, leaving a cryptic message on the blockchain as they "move on to other things."

24 Elo 7min

Email Spoofing: Deception, Detection, and Defense.

Email Spoofing: Deception, Detection, and Defense.

The provided text examines the fundamental vulnerability of email spoofing, stemming from the original design of the Simple Mail Transfer Protocol (SMTP) which separates the sender's transport address from the displayed "From" address. It illustrates how this flaw can be exploited through basic command-line tools like Telnet or automated scripts using Python, emphasizing that spoofing requires no complex hacking. The document then details the evolution of email authentication protocols—SPF, DKIM, and DMARC—explaining how they attempt to verify sender identity and message integrity, with DMARC being crucial for enforcing alignment between authenticated and displayed sender information. Finally, the text explores the real-world implications of spoofing in advanced threats like malware distribution and Business Email Compromise (BEC), highlighting the critical interplay between technical spoofing and social engineering, and underscoring the necessity of human vigilance as a final defense layer.

24 Elo 38min

The Controversial World of Jonathan Scott's Cybersecurity Claims

The Controversial World of Jonathan Scott's Cybersecurity Claims

The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital forensics, despite facing widespread criticism from his peers who label his work as disinformation and pseudoscience. While he possesses some verifiable technical skills, acknowledged by Apple and LG, his academic and professional credentials, such as a claimed PhD and top hacker rankings, are heavily disputed. His most prominent work involves attempting to debunk major investigations into Pegasus spyware, particularly those by Citizen Lab and Amnesty International, which cybersecurity experts largely dismiss as flawed and illogical. This controversy highlights how discredited information can influence important discussions, even at governmental levels, raising concerns about the integrity of security research in the age of social media.

23 Elo 33min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
piinan-kirous-2
murhan-anatomia
i-dont-like-mondays
rss-paha-syntyi-pohjolassa
palmujen-varjoissa
viimeinen-havainto
kurja-juttu
hiljaisia-huutoja
rss-jaljilla
rss-murhan-anatomia
paha-syntyi-pohjolassa-bonuskausi
motiivina-mustasukkaisuus
rss-maanantaimysteeri-2
free-opa
piinan-kirous
tuomio
huijarit
rss-palmujen-varjoissa