Unjust Systems: A Hacker's Journey

Unjust Systems: A Hacker's Journey

This Twitter Space recording, hosted by Alberto Danile Hill, covers a wide range of topics, predominantly revolving around cybersecurity, privacy, and personal experiences with digital and societal challenges. The conversation also offers insights into the personalities and psychological profiles of the participants.Conversation TopicsThe discussion in the Space touched upon several key areas:• Personal Health Challenges: The conversation began with mentions of serious health issues, including Carl Martin's eight days in a coma due to COVID-19 where he "was really really about allowed to die". Another participant, Asia, "experienced something like that" but stated "we don't die", and someone else was in a coma for eight days and hospital for fifteen days to ensure they "wasn't not going to die".• Twitter Account Issues & Moderation: ◦ Alberto's personal account problems were a recurring theme, including having "zero followers" despite being followed, his account being "suspended" or "punished," leading to visibility issues. He was also "punished for three days for not following for violating the rules of following people". ◦ Discussions included the rules and limits of following/unfollowing on Twitter, particularly the "5,000 followers rule". ◦ Alberto detailed a severe account compromise where his email and phone number fields were emptied, and his "Google authenticator and U key" security controls were "reset" or "removed". ◦ There was frustration with Twitter's content moderation, noting that reports on clear aggressions or disturbing content (like pedophile accounts) often yield no action, while minor rule violations lead to punishment. ◦ Participants shared experiences of being attacked or losing followers for online content or perceived views, such as Alberto being accused of discriminating women or being attacked for not attending an LGBT+ march.• Cybersecurity & Personal Safety: ◦ A significant portion of the conversation was dedicated to malware analysis with Jessica, an expert in the field. Jessica's company, Monarchs, specializes in remediating malware, competing with companies like Site Lock and Immunifi. ◦ Topics included vulnerabilities in third-party plugins (WordPress, Magento, Joomla), phishing scams, and malicious actors infiltrating websites to "wreck everything". ◦ Strategies for personal cybersecurity were extensively discussed, including changing emails, usernames, and passwords after a compromise. Jessica strongly advised having multiple email accounts (financial, personal, spam) and different computers for different activities (work, personal, school) to minimize risk. ◦ Password security was a key topic, with advice against using identifying information and suggestions for randomly generated, complex passwords. Jessica advocated for an "old school" method of writing passwords on paper and storing them in a locked cabinet as the most secure. ◦ The dangers of checking emails and clicking links in DMs or SMS messages were highlighted as primary infiltration methods. The importance of initiating contact with companies rather than responding to incoming messages was emphasized. ◦ Specific examples of sophisticated scams were shared, including a Bitcoin scam via Instagram that defrauded Jessica's girlfriend of $25,000, involving fake accounts, networks, and even a deceptive website with a UI.

Jaksot(850)

Weaponizing Italian Law Against Meta. The Nicole Eggert case.

Weaponizing Italian Law Against Meta. The Nicole Eggert case.

Based on the sources, the Geocities Prophecy and the element of Synchronicity refer to the statistically improbable chain of events connecting a teenage fan in 1990s Uruguay to a Hollywood star's digi...

12 Helmi 30min

The 5 Billion Dollar Button: How One Email Could Bankrupt Meta

The 5 Billion Dollar Button: How One Email Could Bankrupt Meta

"The 5 Billion Dollar Button."Synopsis:What happens when a trillion-dollar algorithm ignores the wrong person?In the world of Big Tech, users are data points. But when Nicole Eggert (Baywatch) had her...

12 Helmi 6min

Saving Nicole Eggert’s Cancer Diary From Deletion

Saving Nicole Eggert’s Cancer Diary From Deletion

What are the odds? No, seriously. Let’s run the numbers.What is the statistical probability that Nicole Eggert (Summer Quinn from Baywatch, the show watched by 1.1 billion people) gets hacked by a scr...

12 Helmi 34min

Abuso Basado en Imágenes

Abuso Basado en Imágenes

Este documento sintetiza un análisis del abuso sexual basado en imágenes (IBSA), trazando su evolución desde hackeos dirigidos a celebridades hasta la amenaza actual de los "deepfakes" generados por I...

27 Joulu 20257min

The Unseen Wound

The Unseen Wound

These sources examine the non-consensual distribution of intimate images, a form of digital abuse frequently referred to as "revenge porn." The texts explore the severe mental health consequences for ...

27 Joulu 20256min

Nonconsensual Intimate Images: Unpacking Digital Abuse, Legal Gaps, and the Fight for Justice

Nonconsensual Intimate Images: Unpacking Digital Abuse, Legal Gaps, and the Fight for Justice

This document synthesizes an analysis of image-based sexual abuse (IBSA), charting its evolution from targeted celebrity hacks to the current threat of AI-generated “deepfakes.” The sources reveal a s...

27 Joulu 202552min

Uruguay Surveillance System: Oversight Failure and Abuse

Uruguay Surveillance System: Oversight Failure and Abuse

The provided sources examine "El Guardián," a sophisticated telecommunications interception system utilized by the Uruguayan Ministry of the Interior to monitor calls, emails, and social media. While ...

27 Joulu 202517min

El Guardián ¿controles efectivos contra el abuso?

El Guardián ¿controles efectivos contra el abuso?

Las fuentes proporcionadas examinan "El Guardián", un sofisticado sistema de interceptación de telecomunicaciones utilizado por el Ministerio del Interior de Uruguay para monitorear llamadas, correos ...

27 Joulu 202516min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
palmujen-varjoissa
i-dont-like-mondays
murhan-anatomia
backmanholmavuo
kurja-juttu
rss-jaljilla
piinan-kirous-2
viimeinen-havainto
rss-murhan-anatomia
rss-paha-syntyi-pohjolassa
paha-syntyi-pohjolassa-bonuskausi
rss-maanantaimysteeri-2
motiivina-mustasukkaisuus
se-voisin-olla-mina
motiivina-raha
huijarit
kulttien-johdossa
sattuman-vaara