Ciberseguridad Sin Filtro: El Campo de Batalla Legal de la NDII

Ciberseguridad Sin Filtro: El Campo de Batalla Legal de la NDII

Punto de Debate 1: El Problema con la Terminología.Host: Absolutamente. Las fuentes dejan claro que la terminología es crucial. Expertos legales y defensores están presionando por términos como NDII o IBSA porque "pornografía de venganza" es a menudo un nombre inapropiado y controvertido. ¿Por qué? Porque enfocarse en el motivo del perpetrador—la venganza—es engañoso y problemático, ya que puede implicar que la víctima de alguna manera "merecía" el abuso. No todos los abusadores son impulsados por la venganza; buscan notoriedad, entretenimiento, o ganancia financiera. El daño central radica en la violación del consentimiento, la privacidad y la autonomía, independientemente del estado mental del agresor.IBSA y NDII son términos más precisos porque capturan el espectro completo del abuso. No se trata solo de exparejas compartiendo selfies consensuales. También incluye grabaciones voyeurísticas tomadas sin el conocimiento de la víctima (como el problema de "molka" en Corea del Sur), imágenes robadas mediante hacking (como en el caso IsAnyoneUp.com), y la dimensión aterradora y creciente de las imágenes deepfake generadas por inteligencia artificial (IA) para representar falsamente a una persona en un contexto sexual.Punto de Debate 2: La Batalla Legal Global y los Desafíos de la Ejecución.Host: Con un alcance tan amplio, ¿nuestras leyes están a la altura? La respuesta es compleja, con avances significativos y desafíos persistentes.En el lado positivo, la reforma legal está acelerándose. En EE. UU., los 50 estados, más D.C. y territorios, cuentan ahora con leyes penales específicas contra la NDII. A nivel federal, la Ley de Reautorización de la Violencia contra la Mujer (VAWA 2022), promulgada en marzo de 2022, estableció una causa civil de acción para que las víctimas puedan recuperar daños y honorarios legales. El avance más reciente es la Ley TAKE IT DOWN, firmada en mayo de 2025, que convierte en delito federal el hecho de compartir a sabiendas o amenazar con compartir imágenes íntimas, incluidos los deepfakes generados por IA. Criminalizar la NDII a nivel federal es crucial porque potencialmente la exime de la inmunidad concedida a las plataformas por la Sección 230 de la Ley de Decencia en las Comunicaciones (CDA). Internacionalmente, Australia ofrece un enfoque integral de tres frentes: leyes penales, remedios civiles (basados en el "incumplimiento de la confianza") y un esquema de sanciones civiles aplicado por el Comisionado de eSafety.Pero aquí está la cruda realidad: la aplicación sigue siendo un calvario.1. Pesadilla Jurisdiccional: La naturaleza transnacional de internet permite a los perpetradores operar en diferentes países, dificultando la investigación y el enjuiciamiento, lo que exige una mayor colaboración internacional y estándares legales armonizados.2. Dificultad de Prueba: En muchos casos, probar elementos legales como la "intención de causar daño" o el "daño emocional grave" sigue siendo difícil. De hecho, figuras como Hunter Moore fueron condenadas por piratería informática y robo de identidad, no por el delito específico de NDII en sí, destacando el vacío legal anterior.3. Tecnología y Privacidad: El surgimiento de los deepfakes ha creado el desafío de definir una "imagen visual" y probar la intención de dañar cuando no existe una imagen original real.Punto de Debate 3: Impacto en las Víctimas y Soluciones de Agencia Tecnológica.Host: El impacto en las víctimas es devastador y duradero, a menudo equiparado a las consecuencias del asalto sexual. Entre el 80% y el 93% de las víctimas sufren angustia emocional significativa, incluyendo trastorno de estrés postraumático (TEPT), ansiedad, depresión e incluso ideación suicida. Este trauma se agrava por el estigma social y la "culpa a la víctima," que puede provocar aislamiento, pérdida de empleo y daños a la reputación.Para contrarrestar esto, se están implementando soluciones técnicas centradas en la agencia de la víctima.•

Avsnitt(639)

Image-Based Sexual Abuse: Global Analysis and Legal Responses

Image-Based Sexual Abuse: Global Analysis and Legal Responses

Debate Point 1: The Problem with the Name.Host: Absolutely. The sources make it clear: terminology matters. Legal experts and advocates are pushing hard for terms like NDII or IBSA because "revenge porn" is often a gross misnomer. Why? Because focusing on the perpetrator's motive—revenge—is misleading and problematic. Not every abuser is motivated by vengeance; they might seek profit, notoriety, or simply entertainment. Worse still, a UK judge criticized the term for conveying the impression that the victim somehow "deserved" the abuse. The core harm lies not in the perpetrator’s state of mind, but in the violation of consent, privacy, and autonomy.IBSA and NDII are far more accurate because they capture the full spectrum of abuse, which goes way beyond ex-partners sharing selfies. We’re talking about voyeuristic recordings (like South Korea’s "molka" epidemic), images stolen via hacking (think the notorious IsAnyoneUp.com case), and the devastating new reality of deepfake imagery created by AI.Debate Point 2: The Efficacy of Legal and Tech Solutions.Host: So, if the scope is that wide, are our laws catching up? There’s a mix of good news and major, terrifying challenges.On the positive side, legal reform is accelerating globally. In the US, every single one of the 50 states, plus D.C. and U.S. territories, now has criminal laws against NDII. Furthermore, we finally have federal civil recourse under the VAWA 2022, which lets victims recover damages and legal fees. The big news, though, is the TAKE IT DOWN Act, signed in May 2025. This makes it a federal crime to knowingly share or even threaten to share deepfakes or intimate images, requiring platforms to remove the material within 48 hours. Criminalizing NDII federally is key because it potentially exempts these acts from the immunity granted to platforms by Section 230 of the Communications Decency Act (CDA).Internationally, Australia models a fantastic comprehensive approach with criminal laws, civil remedies, and a civil penalties scheme enforced by the eSafety Commissioner. And the UK saw a landmark civil case awarding a victim nearly £100,000 for image-based abuse, treating the impact as "akin to the impacts of sexual assault".But here’s the grim reality check: Challenges abound.Jurisdictional Nightmare: The transnational nature of online distribution means perpetrators can be miles away, creating a nightmare for investigation and prosecution.Legal Elements: Proving elements like "intent to harm" can still be incredibly hard. As we saw in the Hunter Moore case, the "revenge porn kingpin" was convicted for hacking and identity theft, not the NDII itself, highlighting the former legal vacuum.The Free Speech Hurdle: Legal debates persist over balancing the right to privacy against First Amendment free speech protections, complicating the drafting and upholding of robust laws.Debate Point 3: The Tech Countermeasures.Host: The final battle is fought on the platforms themselves. We need technical solutions that provide victims agency.Thankfully, tech companies like Google, Microsoft, Facebook, and Twitter have policies against NCII. More importantly, they use hashing technology. This is a digital fingerprint (a unique hash value) created from a victim's image on their own device that gets shared with platforms like StopNCII.org. The actual intimate image never leaves the device, but the hash prevents re-circulation on participating sites. Organizations like the Cyber Civil Rights Initiative (CCRI)—which offers the Image Abuse Helpline (844-878-2274) and the Safety Center—are crucial in providing immediate support and guiding victims through reporting.

25 Sep 15min

Narco-Influencers: Mexico's Corrupted Landscape.

Narco-Influencers: Mexico's Corrupted Landscape.

The rise of the narco-influencer in Mexico marks a strategic evolution in cartel operations, shifting from traditional propaganda like narcocorridos (drug ballads) to sophisticated, digital "narco-marketing". This phenomenon is rooted in narcocultura, which grew in areas where poverty and state neglect positioned traffickers as anti-heroes.Digital Tactics and Lethal ConsequencesSocial media platforms, especially TikTok, function as an "algorithmic amplifier" that normalizes the criminal lifestyle, presenting it as an accessible and aspirational career path for youth. Cartels flood platforms with content showcasing luxury cars, high-value assets, and exotic pets like tigers.To bypass content moderation, cartels use a sophisticated digital vernacular, including coded communication with emojis. Examples include the rooster emoji (🐓) for the CJNG leader "El Mencho" and the pizza emoji (🍕) for "Chapizza," referencing the sons of "El Chapo" Guzmán, known as "Los Chapitos". Los Chapitos exemplify "narcojuniors" who deliberately use their online presence to flaunt inherited power, contrasting with the secrecy of older leaders.This digital strategy fuels recruitment funnels. Job advertisements are disguised as legitimate roles like "security personnel". The recruitment net extends into online video game chats (e.g., Free Fire, Fortnite), targeting minors. By 2021, an estimated 30,000 teenagers had been recruited by cartels.Platforms are also vital for psychological warfare (posting gruesome interrogation videos) and public relations campaigns (distributing aid after disasters) to cultivate a "Robin Hood" image and challenge state legitimacy.Operating in this space carries fatal risk:• Valeria Marquez, a beauty influencer, was murdered during a TikTok livestream in May 2025. U.S. sanctions named her alleged romantic partner, CJNG commander Ricardo Ruiz Velasco ("El Doble R"), as the prime suspect.• The narco-influencer Camilo Choa was killed after a hacker was contracted by "El Mayo" Zambada to locate him in a private subdivision. The location was confirmed after his wife opened a malicious link. This highlights the use of digital tools for targeted homicide.Systemic Political CorruptionThis cartel influence is underpinned by deep-seated corruption and complicity within Mexico's political structure. The sources identify politicians from nearly all major parties—including Morena, PRI, PRD, and the Green Ecologist Party—linked to cartels like CJNG, the Gulf Cartel, Los Zetas, and Beltrán Leiva. These "narcopolíticos" occupy high-level posts, including governors, federal deputies who approve laws, and supreme tribunal justices.This complicity allows cartels to operate freely, move armed personnel across state lines (by telling police/military to "rest"), and engage in a form of "competitive governance," solidifying control where the state fails to deliver justice or welfare. The overall system is described as a "narcoestado" where the political structure is "trash".Ineffective ResponsesThe response from official entities has been misaligned.• Government Strategies: The government has oscillated between non-confrontational strategies ("hugs, not bullets") and the revived "kingpin" strategy, which has historically caused cartels to fragment and violence to escalate.• Corporate Moderation: Platform policies are systemically incapable of containing the adaptive, coded nature of the propaganda, forcing a game of "whack-a-mole".• Impunity: The violence is enabled by extreme impunity; the homicide conviction rate is estimated to be as low as 1%. This lack of consequence ensures that violence remains a primary tool of control. The corruption extends to the media, with press often being compromised ("narcotelevisión").For marginalized youth facing poverty and inequality, the narco-influencer remains a potent, though perilous, symbol of upward mobility and respect, fueling the system's perpetuation.

25 Sep 14min

Este tema de los narco-influencers y la corrupción en México es una intersección compleja de guerra digital, violencia de la vida real y fallas sistémicas del estado.

Este tema de los narco-influencers y la corrupción en México es una intersección compleja de guerra digital, violencia de la vida real y fallas sistémicas del estado.

La aparición del narco-influencer en México representa una evolución estratégica de la propaganda criminal, pasando de los narcocorridos analógicos a una guerra de información sofisticada en plataformas digitales como TikTok. Este fenómeno se basa en la narcocultura, que se originó en regiones con pobreza y falta de oportunidades, donde los traficantes se vieron como anti-héroes.Tácticas y Consecuencias DigitalesLos cárteles utilizan una estrategia de "narco-marketing" para glamorizar el estilo de vida ilícito, mostrando lujos, vehículos blindados, armas y mascotas exóticas. Esta presentación aspira a hacer que la vida criminal parezca una "carrera profesional viable". Las plataformas, especialmente la página "Para Ti" de TikTok, actúan como un "amplificador algorítmico" que crea un bucle de retroalimentación auto-reforzante para normalizar esta conducta.Para evadir la moderación corporativa, los cárteles emplean un "lenguaje vernáculo digital" que utiliza emojis y jerga codificada. Por ejemplo, el Cártel Jalisco Nueva Generación (CJNG) es referenciado con el emoji del gallo (🐓), y la facción de "Los Chapitos" del Cártel de Sinaloa usa la pizza (🍕) para el término "Chapizza".Este contenido es un vector fundamental para el reclutamiento. Los cárteles publican anuncios de trabajo opacos para roles como "personal de seguridad" y extienden su red a chats de videojuegos populares. Se estimó en 2021 que 30,000 adolescentes habían sido reclutados por cárteles. Además de la glamorización, las plataformas se usan para guerra psicológica, publicando videos de torturas para infundir miedo, y para campañas de relaciones públicas donde distribuyen ayuda social para desafiar la legitimidad del estado.La presencia en línea conlleva un riesgo letal. El asesinato de la influencer Valeria Marquez en mayo de 2025 durante un livestream ilustra esto. Su pareja, el comandante del CJNG Ricardo Ruiz Velasco ("El Doble R"), fue señalado como principal sospechoso por el Departamento del Tesoro de EE. UU.. La violencia digital se ha vuelto sofisticada: el influencer Camilo Choa fue asesinado después de que un hacker fuera contratado por "El Mayo" Zambada para ubicarlo. La geolocalización se logró cuando su esposa abrió un enlace malicioso que reveló su ubicación en Cuernavaca.El Desafío de la Corrupción Sistémica y la Respuesta FallidaEl impacto más profundo de esta "narco-influencia" es la erosión de la legitimidad estatal. La estructura política de México está profundamente penetrada por el crimen, al punto de ser considerada un "narcoestado". El registro narcopoliticos.com revela que políticos de casi todos los partidos (Morena, PRI, PRD, Partido Verde Ecologista) están relacionados con diversos cárteles.Estos "narcopolíticos" permiten el orquestamiento de la violencia al dejar pasar camiones blindados y armas entre estados gobernados por cárteles rivales, al ordenar a militares y policías "que se vayan a descansar". La impunidad es casi total, con solo el 1% de los casos de homicidio resultando en condena, haciendo que la violencia sea una herramienta de control efectiva. La prensa también es vista como comprometida ("narcotelevisión").Las respuestas oficiales han sido ineficaces. El gobierno mexicano ha oscilado entre la estrategia no confrontacional de "abrazos, no balazos" y el regreso a una política de "kingpin" enfocada en arrestos de alto perfil, que históricamente solo fragmenta a los cárteles y aumenta la violencia. Las plataformas, por su parte, se ven superadas por la naturaleza adaptativa y codificada del contenido, forzándolas a un juego de "whack-a-mole". Para contrarrestar esta amenaza digital persistente, se necesitan estrategias que aborden las causas socioeconómicas subyacentes y que modifiquen los algoritmos para demoler el contenido que glorifica a los grupos criminales.

25 Sep 22min

"Human Factor:" the psychological and ethical focus, as participants analyze human behavior, relationships, and mental health (PTSD, depression).

"Human Factor:" the psychological and ethical focus, as participants analyze human behavior, relationships, and mental health (PTSD, depression).

The recording of this twitter space features a multifaceted, multilingual discussion (primarily Spanish and English) spanning personal trauma, professional ethics, and controversial social issues.The conversation begins on a serious, empathetic note as participant Big Crazy reports a factory explosion near his location (Suacha, Colombia), where he had friends working and was scheduled for an interview. Host Alberto Daniel Hill and the group offer immediate, deep emotional support, establishing a tone of solidarity and concern.The host, Alberto (from Uruguay), recounts his defining traumatic experience: his 2018 arrest and imprisonment for reporting a vulnerability (admin/admin) in a medical system. He details how the police and media mischaracterized him as a "ciberterrorista" and "criminal," leading to the seizure of his electronic equipment. This trauma resulted in Post-Traumatic Stress Disorder (PTSD) and severe depression.While incarcerated, he suffered a medical event, resulting in a three-hour coma. He views this near-death experience, where he overheard doctors discussing his potential death, as his "despertar" (awakening), changing him from an "egoist" to someone dedicated to helping others. His story was popularized by The Dark Diaries podcast, reaching over 1 million listeners, which he used as a springboard to teach ethical hacking and write his book, Login to Hell.The participants engage in deep technical dialogue, often distinguishing between a "hacker" (a skilled individual who can protect systems) and a "cracker" or "criminal".Cybersecurity Philosophy: Alberto advocates for ethics as the foundation of cybersecurity. Alexo stresses the programmer's need to focus on security by design, noting that development often neglects security measures, making systems vulnerable to attacks like SQL injection.Knowledge Sharing: The conversation highlights the value of self-learning (self-learner) and open communities like OWASP and Linux distributions (Cali, Backtrack) for professional growth.Global Relevance of English: English is repeatedly recognized as the "language of the word of business" and essential for professional advancement, information access, and global communication.The space frequently discusses polarizing social and psychological topics:Dark Personalities and Relationship Dynamics: Silan, who embraces his "rasgos oscuros de personalidad", champions "cultos egoístas". He describes seeking submissive (sumisa) partners and states that he lacks empathy. Adriana challenges this, labeling it an unhealthy, toxic pattern and suggesting that repeating destructive relationship patterns may stem from internal psychological issues.Sexualization and Generalization: Silan repeatedly asks broad, often vulgar questions about female sexuality. Adriana rejects generalizations about women (such as whether Colombian women are "fáciles"). She connects the desperation observed in places like Cartagena and Cuba to social inequality and poverty that normalize sex work and tourism.Gender Bias in Tech: There is consensus that women are severely underrepresented in IT and engineering. Reasons cited include cultural biases, corporate hesitations (e.g., cost of maternity leave), and frequent sexual harassment and discomfort experienced by women seeking to advance in male-dominated fields.Multicultural Participants: The space includes speakers from diverse countries, including Uruguay, Colombia, Spain, Mexico, USA, Italy, and Finland, confirming the multinational context of the discussion. Scott, an American participant, notes his personal struggle to practice Spanish because others instantly switch to English to accommodate him.I. Crisis and Emotional ContextII. Alberto Daniel Hill's History and RedemptionIII. Technology, Ethics, and ProfessionalismIV. Social Dynamics and Controversy

24 Sep 12min

 Digital Discussions and Cybersecurity and Italian big brother

Digital Discussions and Cybersecurity and Italian big brother

The source provides an extensive transcript of an online audio space conversation involving several participants, primarily a speaker identified as Alberto and another called Silan, along with a DJ named Rori and brief appearances by Silan's grandmother and an Italian guest. The discussion rapidly shifts between personal anecdotes, cyber security concepts, pop culture, and humor, often focusing on Silan's academic stresses, Alberto's past, and various social interactions. A notable segment features Alberto interviewing Silan's grandmother about her musical preferences, while other parts touch on cybersecurity roles like threat hunting, an alleged encounter with a "Big Brother" contestant from Italy, and lighthearted, combative banter between Alberto and Silan. The conversation concludes with Alberto and Silan discussing current events and life advice, often using highly informal and provocative language.

24 Sep 22min

x (Twitter) spaces recording (I'm not speaking in this in a recorded space") - The_Privacy_Placebo.

x (Twitter) spaces recording (I'm not speaking in this in a recorded space") - The_Privacy_Placebo.

The analysis of the X Spaces discussions from September 22nd and 23rd reveals a fundamental conflict between pervasive digital surveillance and deep human vulnerability, explored through technical exposé and intimate conversation.**I. The Architecture of Surveillance (Sept 22nd Analysis)**The core finding is the **"paradox of digital trust,"** the tension between the intimate feel of live audio chats and the reality of data collection on a huge scale. Technical analysis showed that the platform operates on an **"always-on"** paradigm: **every single space is recorded by X, always**. The host's control button to stop recording is a **"privacy placebo,"** a user-interface fiction that offers an **"illusion of control"** designed to placate users and encourage free speech, even though the platform's backend continues to capture and store everything.The scale of extraction is vast; one expert noted the ability to access **233,000 different recordings** directly from the platform’s servers. The underlying commercial imperative is **"surveillance capitalism,"** where private human experience is commodified and extracted as **"free raw material"** for commercial benefit and selling ads.The intended use of this massive dataset involves intrusive algorithmic profiling:1. **AI Personality:** Training synthetic voices to inject personality and make them less **"bland"**.2. **Psychological Profiling:** Analyzing audio for **"various emotional tones and various types of aggression"**.3. **Predictive Health:** Correlating voice samples with biometric data to **"predict if we will have a heart rate failure"** or other medical issues—a dangerous practice of unvalidated medical prediction.These activities are in direct contravention of the GDPR and are on a collision course with the EU AI Act, particularly regarding the processing of special category data (health) and high-risk applications like emotion recognition.**II. Profiles, Psychology, and Interaction**The community consists of highly technical and aware participants. They are **hyper-aware of the platform's shortcomings** and the persistent surveillance, often treating it with **"performative cynicism"** and a **"sense of resignation,"** yet the value of community connection outweighs the known risks.**Key Speakers:*** **Alberto Daniel Hill:** The central "hub". A recognized cyber security expert from Uruguay. His experience includes being wrongfully imprisoned (his "personal 9/11" was September 11, 2017). This trauma informs his advocacy.* **Masha:** Expressed **severe tech anxiety and phobia** due to the constant stream of bad news and the emotional toll of **waking up to death threats every day** and enduring harassment.* **@Oelma Alma (Velma):** Described as a **"cyber warrior"** with **PII phobia** (fear of identifiable information release), highlighting intense focus on digital privacy, often manifested through dark, geopolitical humor.**Interaction and Vulnerability (Sept 23rd Audio):**The audio content was deeply personal and focused on coping with trauma. Alberto was **"extremely open"** about his Complex PTSD and depression, encouraging other men not to hide their struggles. Masha advocated for **"peace in action,"** proposing anonymous blood donation in public squares as a positive, life-saving counter-protest to violence and disruption.The discussion touched on writing as a response to trauma, the vulnerability of women facing online abuse, and moral philosophy, using the Mike Ehrmantraut character from *Breaking Bad* to debate the necessity of **"full measures"** (extreme action) when **"half measures"** fail to protect loved ones. Alberto stated he would use full measure (kill) to protect his daughter. Despite the technical knowledge that their vulnerable sharing is being recorded and profiled, the community remains a vital source of peer support, symbolizing the human need for connection overriding intellectual defense.

23 Sep 7min

The_Great_Deception__Why_X_Spaces_Record_Everything_and_the_Eth [1].mp3

The_Great_Deception__Why_X_Spaces_Record_Everything_and_the_Eth [1].mp3

The discussion around a certain platform's data practices reveals profound ethical and technical concerns, particularly regarding non-consensual use of intimate user data, invasive profiling, and opaque recording practices. These issues raise questions about privacy, trust, and the exploitation of personal information for commercial and AI development purposes.**Ethical Concerns**1. **Non-Consensual Use of Intimate Data (Surveillance):** The platform reportedly records all interactions in its "spaces," regardless of privacy settings. A technical expert claims access to over 233,000 recordings stored on centralized servers, undermining user expectations of privacy. Even when hosts disable recording reminders to create a sense of comfort, the constant surveillance persists, violating explicit consent and eroding trust.2. **Intrusive Profiling and Diagnosis:** The use of AI, including GPTs and unsupervised machine learning, to analyze audio for emotional tones, aggression, and other personal traits is deeply invasive. This profiling extends beyond basic identification, delving into sensitive psychological and behavioral characteristics without user consent, raising significant ethical red flags.3. **Prediction of Medical Issues:** The conversation highlights the platform's potential to correlate voice data with medical records (e.g., from smartwatches) to predict health issues like heart rate failure. This unauthorized health profiling crosses severe ethical boundaries, as users are unaware their conversational data could be used for such sensitive purposes.4. **Exploitation for Commercial Gain:** The platform’s primary motive appears to be commercial monetization, with user interactions exploited for ad revenue rather than fostering genuine communication. This cynical approach prioritizes profit over user benefit, further eroding trust in the platform’s intentions.5. **Obfuscation of Identity and Trust:** Weak verification standards, allowing users to purchase badges with "burner credit cards" and fake addresses, compromise the authenticity of identities. This lack of trust enables potential malicious profiling or engagement by unverified users, further undermining the platform’s integrity.**Technical Implications**1. **AI Development: Enhancing Personality and Realism:** The platform leverages conversation data to train AI, particularly to inject "personality" into synthetic voices. The emotional richness of real-world audio makes it highly valuable for creating more human-like GPT voices, which are currently described as "bland."2. **Unsupervised Machine Learning for Trait Extraction:** Advanced algorithms analyze audio to quantify emotional and aggressive tones automatically. This unsupervised machine learning enables the platform to extract complex user characteristics, which are then used to enhance AI models.3. **Data Access and Storage Vulnerability:** The ease with which a single user can access vast amounts of stored recordings highlights significant vulnerabilities in the platform’s data storage and access controls. This exposes sensitive audio and transcripts to potential breaches.4. **Automation of Profiling:** The platform’s system links speakers directly to transcriptions, enabling automated, detailed profiling of users’ personalities and traits. This technical capability amplifies the ethical concerns surrounding unauthorized data use.-------------This episode of Cybermidnight Club explores. Hosted by Alberto Daniel Hill, a cybersecurity expert who was the first hacker unjustly imprisoned in Uruguay.➡️ Explore All Links, Books, and Socials Here: https://linktr.ee/adanielhill➡️ Subscribe to the Podcast: ``https://podcast.cybermidnight.club➡️ Support the Mission for Digital Justice: https://buymeacoffee.com/albertohill#CybermidnightClub #Cybersecurity #Hacking #TrueCrime

23 Sep 13min

Populärt inom True Crime

en-mork-historia
infor-ratta
podme-dokumentar
podme-crime
rattsfallen
aftonbladet-krim
svenska-fall
fallen-jag-aldrig-glommer
bakom-galler
svd-dokumentara-berattelser-2
forhorsrummet
svenska-mordhistorier
rattegangspodden
krimrummet
p3-krim
mordpodden
rss-svenska-fall-podcast
seriemordarpodden
rss-krimstad
massmordarpodden