S01E14 ENGLISH - I don't believe in anything. It is all a lie to me, until a 3rd independent part shows the opposite.

S01E14 ENGLISH - I don't believe in anything. It is all a lie to me, until a 3rd independent part shows the opposite.

S01E14 - I don't believe in anything. It is all a lie to me, until a 3rd independent part shows the opposite.

Here I will explain you why I believe everything is a lie.


There either is or is not







a way things are.































The color of the day.







How it felt to be a child.































The feeling of saltwater







on your sunburned legs.































Sometimes the water is yellow.







Sometimes it's red.































The color in memory







depends on the day.































I won't tell the story







the way it happened.































I'll tell it the







way I remember it.

A true story about a hackers real world.

This includes hacking, love and death; even while on prison!

This is the story of the first hacker to serve time in prison in #uruguay - This is my story.... Well only a small % of my story.

This is the story of Alberto from Uruguay.

Operacion Bitcoins Series - twitter.com/ADanielHill/ via whatsapp +59897724842 wa.me/59897724842

The story is covered in 40 minutes in this great podcast:

darknetdiaries.com/episode/25/

twitter.com/ADanielHill/

https://albertohill.com

Episoder(630)

The Global Cyber Threat Landscape 2024-2025.

The Global Cyber Threat Landscape 2024-2025.

The provided report offers an extensive overview of the global cyber threat landscape for 2024-2025, emphasizing the professionalization of cybercrime and its increasing entanglement with geopolitical motives. It highlights the rise of Ransomware-as-a-Service (RaaS) models and the evolution of multi-extortion tactics, which have significantly impacted various sectors worldwide. The document also provides detailed profiles of ten notorious hacker groups, categorizing them by their motivations, such as financial gain or state-sponsored espionage, and illustrating their methods through notable attack examples. Ultimately, the report concludes with crucial strategic lessons for defenders, advocating for proactive, intelligence-led defense mechanisms to combat these sophisticated and rapidly evolving threats.

27 Aug 6min

A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.

A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.

The provided sources offer a multifaceted conversation exploring challenges in the digital age, particularly concerning online platforms and free speech. They highlight personal struggles and emotional reunions among friends, alongside the pervasive influence of Artificial Intelligence in both its beneficial and harmful applications. A significant portion of the discussion focuses on cybersecurity threats, including government incompetence, widespread surveillance, and the need for secure communication alternatives. The texts also touch upon legal strategies to combat perceived online injustices and the personal toll of past traumas and societal dysfunction, reflecting a desire for greater personal agency and protection in an increasingly controlled digital world.

27 Aug 5min

Narco-Influencers: Mexico's Corrupted Landscape.

Narco-Influencers: Mexico's Corrupted Landscape.

Estos materiales exploran la creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se manifiesta a través de los "narcoinfluencers". Los textos describen cómo los cárteles han evolucionado desde la propaganda tradicional de los narcocorridos hasta el marketing digital sofisticado en redes sociales como TikTok, utilizando la glamorización de estilos de vida ilícitos y el lenguaje codificado para atraer y reclutar jóvenes. Las fuentes también detallan las peligrosas consecuencias de esta influencia, ilustradas por el asesinato de influencers y la intensificación de la violencia en el crimen organizado. Además, se analiza la complicidad de políticos mexicanos con diversos cárteles, destacando un profundo arraigo de la corrupción que socava la legitimidad del Estado. Finalmente, se critican las ineficaces respuestas gubernamentales y corporativas, proponiendo estrategias más coordinadas para combatir esta amenaza digital y social.

26 Aug 19min

ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto detalla cómo los cárteles utilizan plataformas como TikTok para glamorizar estilos de vida criminales, reclutar nuevos miembros y ejercer control a través de la intimidación y la propaganda. Además, los documentos revelan una profunda corrupción gubernamental y política en México, donde funcionarios de diversos niveles y partidos colaboran con organizaciones criminales, a menudo pactando con cárteles rivales para asegurar su poder. Ambos recursos subrayan las graves consecuencias de esta situación para la juventud, la estabilidad social y la seguridad pública, destacando la impunidad y la violencia que prevalecen en el país.

26 Aug 19min

ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación y sus capacidades reales de ciberseguridad. Destaca la venta de millones de registros confidenciales, incluidos 30,000 certificados de infraestructura de clave pública (PKI) de identificación nacional con contraseñas descifradas, en foros de la web oscura como DarkForums. El documento identifica a "Uruguayo1337" como un actor de amenazas clave con motivaciones políticas y financieras, que explota vulnerabilidades sistémicas como credenciales comprometidas, configuraciones incorrectas y sistemas obsoletos. Además, el informe examina el marco legal y la capacidad institucional de Uruguay, reconociendo los avances recientes y señalando deficiencias operativas críticas en la prevención y respuesta a estos sofisticados ataques cibernéticos, que en última instancia plantean graves riesgos para los ciudadanos y la seguridad nacional.

26 Aug 23min

Uruguay's Digital Breach: A Crisis of Trust and Security

Uruguay's Digital Breach: A Crisis of Trust and Security

This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecurity capabilities. It highlights the sale of millions of sensitive records, including 30,000 National ID Public Key Infrastructure (PKI) certificates with cracked passwords, on dark web forums like DarkForums. The document identifies "Uruguayo1337" as a key threat actor with both political and financial motivations, exploiting systemic vulnerabilities like compromised credentials, misconfigurations, and outdated systems. Furthermore, the report examines Uruguay's legal framework and institutional capacity, acknowledging recent advancements while pointing out critical operational deficiencies in preventing and responding to these sophisticated cyberattacks, ultimately posing severe risks to citizens and national security.

25 Aug 46min

 X Corp.'s Content Moderation Practices and Challenges.

X Corp.'s Content Moderation Practices and Challenges.

This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" and the platform's often opaque and inconsistent enforcement of rules. It outlines how automated systems primarily handle suspensions, which are effective against spam but lead to a lack of due process for individual users due to limited human support and automated appeal rejections. The analysis details various reasons for suspension, ranging from technical "spam" violations to more severe infractions like hate speech, and explains the different tiers of penalties users may face. Ultimately, the source critically examines the fairness, transparency, and effectiveness of X's moderation, suggesting that its post-2022 operational changes, including reduced human staff, have eroded user trust and driven many to seek alternative, often decentralized, platforms offering more transparent and community-driven governance models.

25 Aug 47min

Image-Based Sexual Abuse: Global Analysis and Legal Responses.

Image-Based Sexual Abuse: Global Analysis and Legal Responses.

This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often driven by power and control rather than simple revenge. It explores the diverse motivations of perpetrators, ranging from financial gain to misogyny, and details the demographics of victims, noting the disproportionate impact on women, young adults, and marginalized groups. The text also examines the profound psychological, social, and professional harms experienced by victims. Finally, it provides a global overview of legal responses—including evolving criminal and civil statutes in the U.S., UK, and Australia, as well as the unique "molka" epidemic in South Korea—while highlighting challenges like jurisdictional complexities, free speech concerns, and the rise of AI-generated deepfakes.

24 Aug 52min

Populært innen True crime

krimpodden-vg
avhort
podme-krim
rss-avhort-aktuelt
krimarkivet-2
henlagt-espen-lee-andy-larsgaard
rss-svarttrost
verdens-verste
pa-innsiden-av-psychohoder
truecrimepodden-2
forsvinningsfredag-podkast
kriminalkrniken
kvinna-i-bagasjerommet
hold-pusten
avhort-forfulgt
uforklarlig-med-lilli-bendriss
svenske-mordhistorier-pa-norsk
sektpodden-2
blalys
truecrimepodden-dokumentar