Mr. Robot Episode 3 Review

Mr. Robot Episode 3 Review



[ NOTE: There are spoilers below, not just for this episode but for the show in general. ]

Enough people have asked me to start doing reviews of Mr. Robot episodes that I’m going to have a go at it. The deciding factor was the fact that I had such a strong desire to write during the third episode.

I’m going to start here with thoughts on the show in general, not just on episode 3.

Mr. Robot in general

The character

The main protagonist is an interesting character. He is what the writer evidently wants to capture, or actually believes to be, the template for a true hacker, which is highly damaged.

I am quite struck with the focus that is placed on how truly messed up he is. He has major drama with the way his father was killed. He largely hates society. He has deep personal depression. And he’s a user of narcotics.

I’m left thinking along the lines of a Hemingway type of artist, where the best creativity (in this case hacking) comes from those wo are the most tortured internally. Painters, musicians, etc. We’re familiar with the template.

This redeeming qualities, which the writers take equal efforts to highlight, are the desire to protect people, his love for the blonde girl, and a general but understated willingness to fight back against the soul-crushing force of our modern, consumerist society.

I really enjoy how he is only actually going to see his psychiatrist because he’s trying to help her, and if she’s actually going to help him it’ll kind of be on accident.

He deeply analyzes people and sees if they’re good, or weak, or in need of help, and then if they are he kind of hates them less because of this. And he is willing to use his superpowers to help them as a result, like when he pushed that guy out of his psychiatrist’s life.

The tech

Before going into the various problems, it must be said that the information security writing has been exemplary. I’d say definitely the best we’ve seen in either movies or “television” (whatever that is).

That said, there are a number of missing links in the armor.

On one of the first episodes, possibly the first, I noticed an IP address with a final octet in the 300’s. That’s just an editing miss, but it did take me out of the fantasy.

In Episode 2, which I generally didn’t like, I was quite bothered by the destruction scene. Here’s what I think happened there. They wanted to do a destruction scene, they had it all rigged up, and they wrote the story so that he’d do a quick hack and then get spooked enough to do it.

Then they show the infosec writer(s) the story component and they’re like,


Um, no. There’s no way anyone of this skill level would be hacking from his actual IP address.


And they’re like,


Well, we need to do this scene. Most people will miss that, and the scene will be cool enough to make up for it.


So the writer stomps out of the room mumbling about how they shouldn’t have hired him for authenticity if they were going to make such obvious mistakes, and they go with it.

Who knows if that really happened, but that’s how I imagine it.

Comments on modern society

I also find the comments on modern society to be quite interesting. I think it’s a big part of the whole hacker feel.

Hackers have always had this component to their mystique. Being counter-culture. Being underground. Fighting against the man. So the idea that everything is a conspiracy with the rich exploiting the poor, the strong exploiting the weak, and everything being about selling advertising and the dominance o...

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Episoder(531)

The Alarming Power of Deepfakes

The Alarming Power of Deepfakes

Trump shared a fake image of Harris speaking at a Communist event. This one looks fairly fake, but 1) lots of people will still believe it’s real, and 2) current tech can already make more believable ones.  Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!  Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

26 Sep 20246min

UL NO. 451: Altman Says ASI in "Thousands of Days"

UL NO. 451: Altman Says ASI in "Thousands of Days"

A new Fabric web app called FabricUI!, Many AI Eyes, PagerAttack Analysis, a new Ripgrep, and more... Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

26 Sep 202431min

Russia Is Paying Right Wing Influencers?

Russia Is Paying Right Wing Influencers?

A whole bunch of right-wing influencers received millions from Russia in return for promoting pro-Russian talking points. Hilarious to me since their whole narrative is to be skeptical and discerning. Except when it comes to obvious Russian propaganda. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

25 Sep 20247min

This Is The Future Career For Creators - Virtual Realities, Economies, and Meaning

This Is The Future Career For Creators - Virtual Realities, Economies, and Meaning

The more I think about it, the more I think a major career for creators going forward will be building entire realities for people to live inside of. So think post-AG/SI and post UBI, and where games are extraordinarily immersive. I think there will be a huge market for creative people building the story lines and stat systems and look and feel of entire worlds that people will live inside of for a period of years at a time. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

24 Sep 20248min

My First Thoughts on New OpenAI Strawberry Model ( OpenAI o1-preview)

My First Thoughts on New OpenAI Strawberry Model ( OpenAI o1-preview)

Here are my first thoughts after using OpenAI's New Strawberry Model for a couple of hours Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

19 Sep 202422min

UL NO. 450: Thoughts on o1-preview and the Path to AGI

UL NO. 450: Thoughts on o1-preview and the Path to AGI

80% Chinese Cranes, Drones vs. Abrahams, a RAG kickstart, a Canary-based Security Maturity Model, and more... Check out Wiz for a Free Could Security Scan:https://www.wiz.io/ul Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

17 Sep 202424min

A Conversation with Shiladitya Sircar from BlackBerry on DeepFake Threats

A Conversation with Shiladitya Sircar from BlackBerry on DeepFake Threats

In this conversation, I speak with Shiladitya Sircar, Senior VP of Product Engineering and Data Science at BlackBerry. We talk about: The Rise of Deepfakes and Cyber ThreatsInnovation Meets Malicious Intent: Deepfakes are not just a tech novelty; they’re a growing threat. From text-based phishing to hyper-realistic fake videos and audio, the landscape of cyber threats is evolving rapidly. Deepfake technology can clone voices, making it easier for cybercriminals to impersonate individuals and bypass security measures. Understanding Identity CompromiseVoice Cloning Dangers: Our brains are wired to trust familiar voices, making voice cloning particularly insidious. We share a chilling story about a cybercriminal impersonating Ferrari’s CEO. The attacker’s deepfake was so convincing that it almost led to a major scam. The Impact on TrustEroding Trust in Systems: Deepfakes can undermine trust in institutions and systems, much like traditional scams but with a high-tech twist. Beyond individual attacks, deepfakes can manipulate public opinion and even influence elections. Organizations need to train employees to spot deepfakes, and there’s a pressing need for laws that specifically address deepfakes and identity spoofing. And more Intro (00:00:00)Main Cyber Threats from Deepfakes (00:00:56)Identity Compromise Explained (00:02:47)Impact of Deepfakes on Trust (00:06:23)Deepfakes in Attack Chains (00:08:15)Case Studies of Deepfake Attacks (00:09:41)Emerging Threat Landscape (00:13:56)Defending Against Deepfake Attacks (00:15:07)Regulatory Frameworks Needed (00:16:28)The Role of Education and Technology (00:18:57)Future of Content Authenticity (00:20:53)Legislation and Authenticity Mechanisms (00:22:04)Real-Time Deepfake Validation (00:23:18)Government and Industry Partnership (00:24:07)Media Forensic Research (00:24:23)Zero Knowledge Proofs (00:25:36)Content Provenance and Authenticity (00:26:52)Trust Network Expansion (00:28:00)Puppeteering Technology (00:29:20)Stream Authentication Challenges (00:30:21)Hardware-Level Trust (00:32:00)Fragmentation in Standards (00:32:29)Trust in Communication Protocols (00:33:51)Collaboration for Solutions (00:35:22)Apple's Unique Position (00:36:47)Erosion of Trust (00:37:31)AI Agents for Detection (00:38:11)Short-term and Long-term Solutions (00:38:45)Awareness and Education (00:41:23)Predictions for Deepfake Technology (00:41:48)Community Action Against Deepfakes (00:43:09)Learning More About BlackBerry's Work (00:43:29)Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

17 Sep 202444min

UL NO. 449: China Hits US ISPs, NIST CSF 2.0, Russian Intel Attacks, Stagnant Companies...

UL NO. 449: China Hits US ISPs, NIST CSF 2.0, Russian Intel Attacks, Stagnant Companies...

Life changing books, defining your core problems, the Apple updates, and much more... ➡ Check out Vanta and get $1000 off:vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

16 Sep 202454min

Populært innen Teknologi

romkapsel
rss-avskiltet
teknisk-sett
tomprat-med-gunnar-tjomlid
energi-og-klima
rss-impressions-2
shifter
nasjonal-sikkerhetsmyndighet-nsm
elektropodden
fornybaren
rss-alt-vi-kan
rss-alt-som-gar-pa-strom
smart-forklart
rss-snakk-om-sikkerhet
teknologi-og-mennesker
kunstig-intelligens-med-morten-goodwin
rss-bouvet-bobler
i-loopen
pedagogisk-intelligens
rss-digitaliseringspadden