Unjust Systems: A Hacker's Journey

Unjust Systems: A Hacker's Journey

This Twitter Space recording, hosted by Alberto Danile Hill, covers a wide range of topics, predominantly revolving around cybersecurity, privacy, and personal experiences with digital and societal challenges. The conversation also offers insights into the personalities and psychological profiles of the participants.Conversation TopicsThe discussion in the Space touched upon several key areas:• Personal Health Challenges: The conversation began with mentions of serious health issues, including Carl Martin's eight days in a coma due to COVID-19 where he "was really really about allowed to die". Another participant, Asia, "experienced something like that" but stated "we don't die", and someone else was in a coma for eight days and hospital for fifteen days to ensure they "wasn't not going to die".• Twitter Account Issues & Moderation: ◦ Alberto's personal account problems were a recurring theme, including having "zero followers" despite being followed, his account being "suspended" or "punished," leading to visibility issues. He was also "punished for three days for not following for violating the rules of following people". ◦ Discussions included the rules and limits of following/unfollowing on Twitter, particularly the "5,000 followers rule". ◦ Alberto detailed a severe account compromise where his email and phone number fields were emptied, and his "Google authenticator and U key" security controls were "reset" or "removed". ◦ There was frustration with Twitter's content moderation, noting that reports on clear aggressions or disturbing content (like pedophile accounts) often yield no action, while minor rule violations lead to punishment. ◦ Participants shared experiences of being attacked or losing followers for online content or perceived views, such as Alberto being accused of discriminating women or being attacked for not attending an LGBT+ march.• Cybersecurity & Personal Safety: ◦ A significant portion of the conversation was dedicated to malware analysis with Jessica, an expert in the field. Jessica's company, Monarchs, specializes in remediating malware, competing with companies like Site Lock and Immunifi. ◦ Topics included vulnerabilities in third-party plugins (WordPress, Magento, Joomla), phishing scams, and malicious actors infiltrating websites to "wreck everything". ◦ Strategies for personal cybersecurity were extensively discussed, including changing emails, usernames, and passwords after a compromise. Jessica strongly advised having multiple email accounts (financial, personal, spam) and different computers for different activities (work, personal, school) to minimize risk. ◦ Password security was a key topic, with advice against using identifying information and suggestions for randomly generated, complex passwords. Jessica advocated for an "old school" method of writing passwords on paper and storing them in a locked cabinet as the most secure. ◦ The dangers of checking emails and clicking links in DMs or SMS messages were highlighted as primary infiltration methods. The importance of initiating contact with companies rather than responding to incoming messages was emphasized. ◦ Specific examples of sophisticated scams were shared, including a Bitcoin scam via Instagram that defrauded Jessica's girlfriend of $25,000, involving fake accounts, networks, and even a deceptive website with a UI.

Episoder(850)

Alberto Daniel Hill: Reputation and Credibility Intelligence Report

Alberto Daniel Hill: Reputation and Credibility Intelligence Report

These sources profile Alberto Daniel Hill, a prominent cybersecurity expert and advocate whose reputation is defined by his transition from a wrongfully imprisoned hacker in Uruguay to a respected glo...

2 Apr 44min

The Signal and the Knight: Analyzing Social Audio Intelligence

The Signal and the Knight: Analyzing Social Audio Intelligence

The Signal and the Knight: Analyzing Social Audio Intelligence

2 Apr 5min

Alberto Daniel Hill

Alberto Daniel Hill

Alberto Daniel Hill is a globally recognized Uruguayan-Italian cybersecurity and digital forensics expert whose authority was forged by surviving a harrowing 17-month wrongful imprisonment in Uruguay....

2 Apr 22min

The Chronus Mafia Siege of Argentina

The Chronus Mafia Siege of Argentina

While the sources do not contain media updates specifically dated for today, April 2, I can provide you with the most recent media landscape and coverage information available in the days immediately ...

2 Apr 36min

Ciberataque de Chronus Mafia contra Vaca Muerta

Ciberataque de Chronus Mafia contra Vaca Muerta

Basado en los informes de inteligencia del 2 de abril de 2026, en particular el reporte "Chronos Cyberattack Media Impact Analysis", el panorama mediático y las reacciones tras la megafiltración se ca...

2 Apr 32min

SPACE "PLATICANDO CON MRBAN"

SPACE "PLATICANDO CON MRBAN"

RAW AQUDIO

2 Apr 1h 49min

 El Resquicio de los $150,000: Exponiendo una Red de Espionaje y Corrupción

El Resquicio de los $150,000: Exponiendo una Red de Espionaje y Corrupción

Título del Episodio: El Resquicio de los $150,000: Exponiendo una Red de Espionaje y CorrupciónDescripción:En este impactante episodio, desentrañamos la explosiva historia real de un contrato de ciber...

2 Apr 5min

The Shadow Protocols of Mexican Espionage and Political Corruption

The Shadow Protocols of Mexican Espionage and Political Corruption

Episode Title: The $150,000 Backdoor: Exposing the Espionage NetworkDescription:In this gripping episode, we uncover the explosive true story of a cyber-espionage contract gone wrong. When a team of s...

2 Apr 34min

Populært innen True crime

podme-krim
avhort
insiders
krimpodden-vg
rss-avhort-aktuelt
krimarkivet-2
rss-pa-innsiden-av-psychohoder
rss-henlagt-andy-larsgaard
rss-svarttrost
kriminalkrniken
verdens-verste
forsvinningsfredag-podkast
truecrimepodden-2
drapet-pa-tina-jorgensen-doden-er-en-mann-2
krimpodden-orderud
hold-pusten
avhort-forfulgt
dodens-gard
rss-tause-vitner
rss-overste-etasje