Unjust Systems: A Hacker's Journey

Unjust Systems: A Hacker's Journey

This Twitter Space recording, hosted by Alberto Danile Hill, covers a wide range of topics, predominantly revolving around cybersecurity, privacy, and personal experiences with digital and societal challenges. The conversation also offers insights into the personalities and psychological profiles of the participants.Conversation TopicsThe discussion in the Space touched upon several key areas:• Personal Health Challenges: The conversation began with mentions of serious health issues, including Carl Martin's eight days in a coma due to COVID-19 where he "was really really about allowed to die". Another participant, Asia, "experienced something like that" but stated "we don't die", and someone else was in a coma for eight days and hospital for fifteen days to ensure they "wasn't not going to die".• Twitter Account Issues & Moderation: ◦ Alberto's personal account problems were a recurring theme, including having "zero followers" despite being followed, his account being "suspended" or "punished," leading to visibility issues. He was also "punished for three days for not following for violating the rules of following people". ◦ Discussions included the rules and limits of following/unfollowing on Twitter, particularly the "5,000 followers rule". ◦ Alberto detailed a severe account compromise where his email and phone number fields were emptied, and his "Google authenticator and U key" security controls were "reset" or "removed". ◦ There was frustration with Twitter's content moderation, noting that reports on clear aggressions or disturbing content (like pedophile accounts) often yield no action, while minor rule violations lead to punishment. ◦ Participants shared experiences of being attacked or losing followers for online content or perceived views, such as Alberto being accused of discriminating women or being attacked for not attending an LGBT+ march.• Cybersecurity & Personal Safety: ◦ A significant portion of the conversation was dedicated to malware analysis with Jessica, an expert in the field. Jessica's company, Monarchs, specializes in remediating malware, competing with companies like Site Lock and Immunifi. ◦ Topics included vulnerabilities in third-party plugins (WordPress, Magento, Joomla), phishing scams, and malicious actors infiltrating websites to "wreck everything". ◦ Strategies for personal cybersecurity were extensively discussed, including changing emails, usernames, and passwords after a compromise. Jessica strongly advised having multiple email accounts (financial, personal, spam) and different computers for different activities (work, personal, school) to minimize risk. ◦ Password security was a key topic, with advice against using identifying information and suggestions for randomly generated, complex passwords. Jessica advocated for an "old school" method of writing passwords on paper and storing them in a locked cabinet as the most secure. ◦ The dangers of checking emails and clicking links in DMs or SMS messages were highlighted as primary infiltration methods. The importance of initiating contact with companies rather than responding to incoming messages was emphasized. ◦ Specific examples of sophisticated scams were shared, including a Bitcoin scam via Instagram that defrauded Jessica's girlfriend of $25,000, involving fake accounts, networks, and even a deceptive website with a UI.

Jaksot(850)

Hackers, Spies & Politics

Hackers, Spies & Politics

These transcripts document a chaotic series of **X (formerly Twitter) Spaces** where self-proclaimed **hackers, activists, and alleged cartel operatives** discuss the intersection of cybercrime and po...

29 Maalis 6min

Inside the Latin American Hacker Underground

Inside the Latin American Hacker Underground

These audio transcripts capture a series of interactive digital forums involving high-profile hackers, cybersecurity experts, and independent journalists. The discussions primarily focus on the techni...

29 Maalis 44min

Tu ego es tu mayor vulnerabilidad

Tu ego es tu mayor vulnerabilidad

Título del Episodio: Coliseos Digitales, el Hackeo a Argentina y la Ilusión de SeguridadDescripción del Episodio:Sumérgete en las trincheras del ciber-inframundo latinoamericano en un episodio donde l...

27 Maalis 23min

Crónica de un Ciberataque Anunciado: Análisis de la Amenaza a la Infraestructura Digital Argentina

Crónica de un Ciberataque Anunciado: Análisis de la Amenaza a la Infraestructura Digital Argentina

Based on the provided sources, the interrogation of Alberto Daniel Hill by the "OFF" (Cibercholos) digital mob was a highly coordinated swarm tactic that occurred after he was spotted observing their ...

26 Maalis 24min

Target Argentina: The Cronus Mafia Cyberattack and Alberto Hill's Warning

Target Argentina: The Cronus Mafia Cyberattack and Alberto Hill's Warning

Recently, Uruguayan cybersecurity and digital forensics expert Alberto Daniel Hill brought to light a severe geopolitical cyber threat unfolding in real-time on X (formerly Twitter) Spaces. After bein...

25 Maalis 41min

 Narco Hackers and Cyber Security Threats in Latin America6 sources

Narco Hackers and Cyber Security Threats in Latin America6 sources

These sources consist of raw audio transcripts from Spanish-language and English digital forums that expose a volatile ecosystem of cybercrime and political corruption. The discussions reveal deep tie...

23 Maalis 7min

N_A.mp3

N_A.mp3

N_A.mp3

23 Maalis 7h 52min

karmpa is a biatch.mp3

karmpa is a biatch.mp3

karmpa is a biatch.mp3

23 Maalis 19h 29min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
palmujen-varjoissa
i-dont-like-mondays
murhan-anatomia
backmanholmavuo
kurja-juttu
piinan-kirous-2
rss-jaljilla
viimeinen-havainto
motiivina-mustasukkaisuus
paha-syntyi-pohjolassa-bonuskausi
rss-paha-syntyi-pohjolassa
rss-maanantaimysteeri-2
rss-murhan-anatomia
huijarit
se-voisin-olla-mina
rss-palmujen-varjoissa
motiivina-raha
syyton