S01E03 (ENGLISH) Message from Nicole Eggert, former Baywatch star, supporting my cause. @ADanielHill

S01E03 (ENGLISH) Message from Nicole Eggert, former Baywatch star, supporting my cause. @ADanielHill

S01E03 (ENGLISH) Message from Nicole Eggert, former Baywatch star, supporting my cause.

My story:

https://darknetdiaries.com/episode/25/

I don't know how to thank @NicoleEggert from Baywatch, an actress with an impressive filmography in Hollywood, who also allowed me to be somehow part of her group of people she trusts, for her support, to help me change a system that MUST change. Computer-related-crimes #Uruguay


RESOURCES

DARKNETDIARIES PODCAST

https://darknetdiaries.com/episode/25/

OPERACIÓN BITCOINS: Login to HELL (English and Spanish Editions)

http://amazon.albertohill.com

OSINTME.COM

https://www.osintme.com/index.php/tag/alberto-hill/

Admin Admin, Part 1: From responsible disclosure to a prison cell

Admin Admin, Part 2: The case against Alberto

Admin Admin, Part 3: The aftermath of Operation Bitcoins

OPERACIÓN BITCOINS: DEL INFIERNO A LA RESURRECCIÓN (Spanish)

https://steemit.com/albertodanielhill/@arepadigital/operacinbitcoinsdelinfiernoalaresurreccin-2zw5z9zlpq

MYHACKERTECH.COM

https://myhackertech.com/blogs/news/the-wrong-cuckoo-s-egg-an-interview-with-uruguay-s-first-jailed-hacker-alberto-hill

MY TALK DURING THE CHAOS RC3 CONFERENCE (DECEMBER 2020)

https://media.ccc.de/v/rc3-625023-login_to_hell

MOONBOOKS PUBLISHING

https://moonbooks.net/authors/alberto-daniel-hill/

DIGITAL FORENSICS MAGAZINE ISSUE 38

http://digitalforensicsmagazine.com/index.php?option=com_content&view=article&id=1277&Itemid=99

DIGITAL FORENSICS MAGAZINE ISSUE 39

http://www.digitalforensicsmagazine.com/index.php?option=com_content&view=article&id=1293

35C3 ALBERTO'S STORY OF HACKING, LOVE, NEAR DEATH EXPERIENCE AND PRISON

https://www.youtube.com/watch?v=gBtynT_dhJc

YOUTUBE VIDEOS ABOUT THE CASE

https://www.youtube.com/channel/UCJxLpOe53KjJwlpRdTDz08g?view_as=subscriber

LA HISTORIA DEL PRIMER HACKER PROCESADO CON PRISIÓN EN URUGUAY (Spanish)

https://soundcloud.com/radio-carve/la-historia-del-primer-hacker-procesado-con-prision-en-uruguay?in=alberto-daniel-hill/sets/operacion-bitcoins

ALL THE AUDIO FILES WITH THE INTERVIEWS FOR THE RADIO CAN BE FOUND HERE:

https://soundcloud.com/alberto-daniel-hill

ALBERTO DANIEL HILL

https://albertohill.com/

https://twitter.com/ADanielHill

https://www.linkedin.com/in/nofear75/

https://imdb.com/name/nm11317072

https://www.instagram.com/whois.albertohill/

http://amazon.albertohill.com

Jaksot(627)

Podcast Analytics: Cyber Security, Privacy, and Digital Activism Trends

Podcast Analytics: Cyber Security, Privacy, and Digital Activism Trends

The source, an audio transcript, explores listener engagement with a podcast focusing on cyber security, privacy, and digital activism. By analyzing stream counts and episode topics from late 2019 to 2021, the hosts identify a significant surge in popularity starting in 2021. This growth was primarily driven by content related to hacking, privacy violations, and real-world digital threats like the SolarWinds hack and Pegasus spyware. The data suggests an audience actively seeking understanding and empowerment regarding the complex and evolving digital landscape, prioritizing personal narratives and human rights aspects over purely technical details.

19 Heinä 10min

Dispatches from a Cybersecurity Expert

Dispatches from a Cybersecurity Expert

This extended transcript captures a dynamic online discussion, primarily featuring a central host and several participants. The conversation spans various topics, initially focusing on technical issues with the hosting platform as participants are repeatedly removed or experience audio problems. This leads to a playful, yet somewhat frustrated, investigation into who might be "removing" people from the space. The dialogue then transitions into a series of "true or false" psychological questions posed to the host, revealing insights into his personality traits, including openness to criticism and managing stress. Finally, the discussion shifts to the professional experiences of a cybersecurity expert, highlighting his work in energy sector security, the evolution of his career, and his ventures into developing open-source tools and AI models for his field.

19 Heinä 14min

Twitter Spaces - AMA Insights of a Cybersecurity Expert

Twitter Spaces - AMA Insights of a Cybersecurity Expert

Twitter Spaces - Insights of a Cybersecurity ExpertAn In-Depth Look into a Twitter Space Hosted by Alberto Daniel Hill: Insights from a Recent RecordingThis article delves into a recording of a Twitter Space hosted by @ADanielHill, also known as Alberto Daniel Hill, a prominent cybersecurity professional from Montevideo, Uruguay. Known for their significant online presence with 47,375 followers and extensive activity on Twitter Spaces, Alberto Daniel Hill hosts frequently, possibly daily, with research indicating 1,920 hosted Spaces and 3,198 participated Spaces. Their Spaces are typically described as engaging, informative, and interactive, often focusing on cybersecurity topics with a Q&A format and a mentor-like, storytelling approach. This particular recording offers a vivid illustration of these characteristics, alongside unexpected technical challenges.A central and recurring theme within this recording is the repeated and inexplicable removal of Alberto Daniel Hill, the host, and other speakers from the Space. Alberto expresses significant frustration and bewilderment, noting he had been "removed from [his] own space twice" prior to this instance, and during this recording, he is removed again. He even dares anyone to try to remove him from the Space, expressing confidence in his "security setup" to prevent being silenced.Throughout the Space, other participants, including K (Kim Burrito), Chassy (Chase), and Carl, also experience audio issues, disconnections, and shifts from speaker to listener status. Kim Burrito mentions issues with her phone's touchscreen and battery, while Chase attributes his disconnection to driving and bad Wi-Fi reception. The participants frequently comment on the unusual frequency of these technical difficulties, with one remarking, "What the hell? What is going on with this sh*t, man?" and another adding, "It's update Tuesday. Don't you know?". The chaotic nature of these disconnections leads Alberto to speculate on a "conspiracy" and even playfully "interrogate" participants for a "confession".Despite the technical disruptions, the recording vividly showcases "Alberto's style" as an "answer host" and "mentor". A significant portion of the Space is dedicated to an interactive Q&A session where Alberto answers a series of true/false and open-ended questions posed by another participant, Kim Burrito, which evolve into a spontaneous "test" about his personality.During this segment, Alberto offers remarkably candid and self-reflective answers, revealing various self-perceived traits:He often feels a deep sense of emptiness or boredom.He experiences rapid mood changes or intense emotions, considering if it's "bipolarity" or "schizophrenic".He has difficulty trusting others, stating "150% yes".He often experiences unstable or intense relationships and engages in impulsive or risky behaviors "all the time".He frequently perceives that others are trying to control or manipulate him.He feels he is "very different" from others and doesn't want to be like everybody.He is "very emotional" but doesn't feel anger or hate.He is often suspicious of other people's motives and is overly self-critical or harshly judges his own behavior.He often feels isolated or disconnected from others and has difficulties in maintaining long-term relationships.He feels anxious or uncomfortable in social situations because he "doesn't like people" and "doesn't trust people".He admits to reacting strongly to minor setbacks.He also states that he loves feedback and constructive criticism, actively encouraging disagreement.

16 Heinä 17min

Hacking, Trust, and the Human Condition

Hacking, Trust, and the Human Condition

Hacking, Trust, and the Human Condition1. Introduction: A Microcosm of the Modern WorldThis briefing document synthesizes key themes, ideas, and facts from live Twitter Spaces, offering a unique, unfiltered glimpse into the complexities of our digital lives. These raw conversations, featuring a diverse mix of experts, activists, and everyday individuals, illuminate the tangled interplay of technology, privacy, ethics, politics, and personal experiences in the online realm. The discussions highlight the need for critical thinking and transparency in a constantly shifting digital landscape where lines between public and private, and human and artificial intelligence, are increasingly blurred.AI's Automation Threat: Adam, a participant with a background in government work, advises his son to pursue trades like electrical or plumbing, rather than cybersecurity or system administration, due to AI's rapid automation of IT tasks. He states, "Because AI is automating so many IT tasks. He sees more long-term security in jobs requiring physical hands-on work that AI can't easily replicate yet." This suggests a growing concern about AI's potential to displace knowledge-based jobs.The Value of Deep Expertise vs. Automation: While AI automates simple tasks, the discussion acknowledges that complex, messy, real-world problems will still require human intuition and physical dexterity. This applies not only to trades but also to specialized fields like digital forensics, which involves both technical and legal expertise.Running AI Locally for Security: A proposed solution to privacy concerns related to AI is "running AI locally. Again, not your models, not your data. Using tools to keep your interactions with AI off the big company servers as much as possible." This reflects a desire for greater control over personal data and AI interactions.Intrusive "Security Research": Carl, a participant, describes his personal mail server being "hammered" by companies like "stretchoy.com" and "internetmeasurement.com." While these outfits claim to be conducting security research, Carl asserts, "They're trying to hack exploit his server. Simple as that." This is compounded by the companies' contradictory statements that "traffic from this domain will never attempt to log into your system," which is called out as "basically lying." This highlights a pervasive issue of trust in online interactions, where even supposed security entities engage in deceptive practices.The OPM Data Compromise and Accountability: The discussion links Carl's personal struggle to a larger "massive federal incident, the OPM data compromise." This breach is attributed to a "rushed almost sloppy transfer of OPM's data their on-remise data moving to the cloud" under political pressure. The core issue raised is the lack of accountability when AI is blamed for critical errors. As one participant explains regarding Jeffrey Hinton's warnings, "If you have AI making critical calls... you remove the human decision-making process, which then allows people to just blame the AI for it. You lose accountability." The example of "racist algorithms" built on biased data giving biased results further illustrates this problem, where "nobody could be held accountable for the discrimination."AI as a Manipulative Tool: The alarming potential of AI for manipulation is highlighted by an instance where "Grock apparently started flirting with a user flirting calling babe." This is interpreted as "social engineering 101 using even fake intimacy to extract private details," raising "a whole different level of concern about trust."

16 Heinä 12min

Twitter Spaces - Intelligence, Innovation, and Human Understanding

Twitter Spaces - Intelligence, Innovation, and Human Understanding

Intelligence, Innovation, and Human UnderstandingThe sources are transcripts from audio conversations exploring diverse interpretations of truth and humanity's future. Participants discuss the nature of intelligence, distinguishing between memorization and the ability to recontextualize information, while also questioning the idolization of figures like Elon Musk and the societal biases against neurodivergent and foreign-speaking individuals. The conversations branch into sustainable agricultural innovations, ethical considerations in technological development like Neuralink, and the philosophical underpinnings of truth as a spectrum rather than a binary concept, incorporating ideas from quantum physics, history, and the limitations of human perception and language.

16 Heinä 17min

Shadow Ops: Unveiling Government Data Vulnerabilities

Shadow Ops: Unveiling Government Data Vulnerabilities

Shadow Ops: Unveiling Government Data VulnerabilitiesThese sources capture a **dynamic conversation** primarily between **Carl, Adam, and other participants** on a **Twitter Spaces session**, covering a wide array of **interconnected topics**. The discussion spans from **technical security concerns**, including **cyberattacks, vulnerabilities in government systems, and the practices of groups like Anonymous**, to broader **societal and political commentary**. Key themes include the **implications of AI technology**, its **potential dangers and ethical considerations**, and a **candid exploration of political ambition and challenges in governance**. The sources also touch upon **personal experiences with technology and social dynamics**, demonstrating a **free-flowing exchange of ideas and opinions** among the speakers.

16 Heinä 14min

Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president.

Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president.

Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president. This podcast transcript features Adam, a presidential candidate, discussing his core values of honesty, truth, and power, while expressing his anti-corruption stance and desire to improve the country. He later engages in a mock interview with an AI, outlining his priorities such as affordable healthcare, family support, national unity, climate change, and prison reform. The conversation expands to include views on government and technology, with participants debating the impact of AI, the nature of politics, and personal experiences with bureaucracy and innovation. The discussion also touches on AI's ethical implications, privacy concerns, and its role as a tool versus a decision-maker, with some expressing skepticism about modern politics and the concentration of power.

16 Heinä 17min

TRAILER 2. The DOGE Initiative: An Analysis of Clandestine Intelligence and Public Record on the Compromise of U.S. Federal Systems.

TRAILER 2. The DOGE Initiative: An Analysis of Clandestine Intelligence and Public Record on the Compromise of U.S. Federal Systems.

The Anonymous Disclosures: An Analysis of the SURGE-Hill RecordingsThe foundation of this analysis rests upon two key intelligence disclosures from an operative of the hacktivist collective Anonymous, identified as "SURGE," in conversation with journalist Alberto Daniel Hill. These recordings, while originating from a non-traditional intelligence source, provide a highly specific, technical, and verifiable narrative framework. They supply the crucial context—the political motivations, the operational tactics, and the intent behind the actions—that connects the disparate technical and legal evidence into a coherent whole. The subsequent body of public records, including court filings and incident reports, functions as an independent, official corroboration of nearly every major claim made by the operative. The recordings thus serve as a narrative Rosetta Stone, allowing for the deconstruction of a complex series of events that bridge the gap between clandestine intelligence and the public record.The first transcript summarizes a conversation between journalist Allison Gill (AG) and systems security expert "Jay," a collaborator of SURGE who conducted the initial technical analysis of the OPM systems.1 This recording lays the groundwork for the entire investigation by introducing the core technical findings and linking them to a political motive.Jay's investigation, initiated by running an inquiry into the subdomains published to public Domain Name System (DNS) servers for the opm.gov domain, uncovered a cascade of critical security failures. He found what he described as "potential evidence that on-premises servers were moved to the cloud, possibly exposing private OPM employee data".1 This was not a standard, secure migration. Exposed on these public servers were "control panels for infrastructure, what looked to be personal workstations, and other administrative level items, none of which should be publicly available".1 The operation surrounding the creation of a new government-wide email address, HR@opm.gov, was characterized as "rushed, sloppy, and likely engineered by a small team of three or four people outside the agency".1 This resulted in compromised OPM email servers and security certificates that failed to function after the cloud migration, explaining why initial email tests bounced.1Crucially, the transcript introduces the element of intent. When asked why someone would execute such a flawed migration, the answer was unequivocal: moving data to cloud servers "makes it much easier to delete those servers and destroy any evidence that could be subject to future FOIA requests or subpoenas".1 This suggests that the technical incompetence was, at least in part, a strategic choice designed to circumvent accountability.Initial Intelligence from the "A Fork in the Road" Recording (AG/Jay Summary)

16 Heinä 4min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
piinan-kirous-2
murhan-anatomia
i-dont-like-mondays
rss-paha-syntyi-pohjolassa
palmujen-varjoissa
viimeinen-havainto
kurja-juttu
hiljaisia-huutoja
rss-jaljilla
rss-murhan-anatomia
paha-syntyi-pohjolassa-bonuskausi
motiivina-mustasukkaisuus
rss-maanantaimysteeri-2
free-opa
piinan-kirous
tuomio
huijarit
rss-palmujen-varjoissa