Unjust Systems: A Hacker's Journey

Unjust Systems: A Hacker's Journey

This Twitter Space recording, hosted by Alberto Danile Hill, covers a wide range of topics, predominantly revolving around cybersecurity, privacy, and personal experiences with digital and societal challenges. The conversation also offers insights into the personalities and psychological profiles of the participants.Conversation TopicsThe discussion in the Space touched upon several key areas:• Personal Health Challenges: The conversation began with mentions of serious health issues, including Carl Martin's eight days in a coma due to COVID-19 where he "was really really about allowed to die". Another participant, Asia, "experienced something like that" but stated "we don't die", and someone else was in a coma for eight days and hospital for fifteen days to ensure they "wasn't not going to die".• Twitter Account Issues & Moderation: ◦ Alberto's personal account problems were a recurring theme, including having "zero followers" despite being followed, his account being "suspended" or "punished," leading to visibility issues. He was also "punished for three days for not following for violating the rules of following people". ◦ Discussions included the rules and limits of following/unfollowing on Twitter, particularly the "5,000 followers rule". ◦ Alberto detailed a severe account compromise where his email and phone number fields were emptied, and his "Google authenticator and U key" security controls were "reset" or "removed". ◦ There was frustration with Twitter's content moderation, noting that reports on clear aggressions or disturbing content (like pedophile accounts) often yield no action, while minor rule violations lead to punishment. ◦ Participants shared experiences of being attacked or losing followers for online content or perceived views, such as Alberto being accused of discriminating women or being attacked for not attending an LGBT+ march.• Cybersecurity & Personal Safety: ◦ A significant portion of the conversation was dedicated to malware analysis with Jessica, an expert in the field. Jessica's company, Monarchs, specializes in remediating malware, competing with companies like Site Lock and Immunifi. ◦ Topics included vulnerabilities in third-party plugins (WordPress, Magento, Joomla), phishing scams, and malicious actors infiltrating websites to "wreck everything". ◦ Strategies for personal cybersecurity were extensively discussed, including changing emails, usernames, and passwords after a compromise. Jessica strongly advised having multiple email accounts (financial, personal, spam) and different computers for different activities (work, personal, school) to minimize risk. ◦ Password security was a key topic, with advice against using identifying information and suggestions for randomly generated, complex passwords. Jessica advocated for an "old school" method of writing passwords on paper and storing them in a locked cabinet as the most secure. ◦ The dangers of checking emails and clicking links in DMs or SMS messages were highlighted as primary infiltration methods. The importance of initiating contact with companies rather than responding to incoming messages was emphasized. ◦ Specific examples of sophisticated scams were shared, including a Bitcoin scam via Instagram that defrauded Jessica's girlfriend of $25,000, involving fake accounts, networks, and even a deceptive website with a UI.

Jaksot(850)

Chronus Mafia and AI powered heists

Chronus Mafia and AI powered heists

The emergence of the Chronus Group (often known as the Cronus Mafia or @Team_Chronus) and the simultaneous rise of AI-powered heists represent a massive shift in the landscape of Latin American cyber-...

29 Maalis 48min

Chronus Group: Cyber-Mafia, AI Warfare, and Forensic Failures

Chronus Group: Cyber-Mafia, AI Warfare, and Forensic Failures

This research document examines the sophisticated evolution of the Chronus Group, a Latin American cyber-syndicate that blends high-level data exfiltration with psychological warfare and social media ...

29 Maalis 22min

MRBAN, retro de programación, FLECKERI R7, Chronus Team

MRBAN, retro de programación, FLECKERI R7, Chronus Team

MRBAN, retro de programación, FLECKERI R7, Chronus TeamRAW AUDIO

29 Maalis 3h 47min

Echoes from the Digital Coliseum

Echoes from the Digital Coliseum

These sources consist of a transcript from a social media audio space involving hackers, cyber security analysts, and digital activists primarily within the Latin American underground. The dialogue fo...

29 Maalis 6min

Mafia hacker audita gobiernos de Latinoamérica

Mafia hacker audita gobiernos de Latinoamérica

These sources consist of a transcript from a social media audio space involving hackers, cyber security analysts, and digital activists primarily within the Latin American underground. The dialogue fo...

29 Maalis 26min

The Anonymous Legacy: Digital Vigilantism and Global Change

The Anonymous Legacy: Digital Vigilantism and Global Change

These sources present a comprehensive documentary exploring the origins and global influence of the Anonymous hacking collective. The materials examine how this decentralized group transformed from in...

29 Maalis 5min

Hacker Feud & Political Spy Tool

Hacker Feud & Political Spy Tool

These audio transcripts capture a series of interactive digital forums involving high-profile hackers, cybersecurity experts, and independent journalists. The discussions primarily focus on the techni...

29 Maalis 2min

The Ghost Hacker: Deconstructing "Damaso Lopez"

The Ghost Hacker: Deconstructing "Damaso Lopez"

These transcripts document a chaotic series of X (formerly Twitter) Spaces where self-proclaimed hackers, activists, and alleged cartel operatives discuss the intersection of cybercrime and political ...

29 Maalis 7min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
palmujen-varjoissa
i-dont-like-mondays
murhan-anatomia
backmanholmavuo
kurja-juttu
piinan-kirous-2
rss-jaljilla
viimeinen-havainto
motiivina-mustasukkaisuus
paha-syntyi-pohjolassa-bonuskausi
rss-paha-syntyi-pohjolassa
rss-maanantaimysteeri-2
rss-murhan-anatomia
huijarit
se-voisin-olla-mina
rss-palmujen-varjoissa
motiivina-raha
syyton