Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? | Insider

Поділитися
Вставка

КОМЕНТАРІ • 4,6 тис.

  • @InariAlchemist
    @InariAlchemist 3 роки тому +6292

    I think the most realistic hacking scene ever is in Archer, where he correctly guesses the password is "guest"

  • @BMoore556
    @BMoore556 3 роки тому +15187

    she's got fingerless gloves, I'll believe everything she says about hacking

    • @kemolowlow
      @kemolowlow 3 роки тому +350

      Probably carpal tunnel syndrome and not a fashion statement...LuLz

    • @BMoore556
      @BMoore556 3 роки тому +261

      @@kemolowlow you're probably right buuut I stand by my joke tho

    • @IGamingStation
      @IGamingStation 3 роки тому +54

      @@BMoore556 Do hackers really wear gloves? Just wondering.

    • @BMoore556
      @BMoore556 3 роки тому +130

      @@IGamingStation nah, pretty sure it's a movie/TV trope you see a lot

    • @leandrolaporta2196
      @leandrolaporta2196 3 роки тому +21

      LMFAO you made my day with this comment

  • @akomocombine3357
    @akomocombine3357 3 роки тому +6506

    "Hackers dont break in we login" - TRUE.

    • @cooperthegrandkid5639
      @cooperthegrandkid5639 3 роки тому +51

      Yeah buddy

    • @BacklTrack
      @BacklTrack 3 роки тому +23

      @@cooperthegrandkid5639 what do you read header files for fun lmao? Usually all preprocessor variables are all caps... it's not just in your favorite header file

    • @Kenionatus
      @Kenionatus 3 роки тому +8

      @@BacklTrack That's what Eliot does to wind down.

    • @Shenaniganz_z
      @Shenaniganz_z 3 роки тому +1

      600 likes. Congo 🎊 🤣 🤣

    • @mebasically9193
      @mebasically9193 3 роки тому +7

      Script kiddie

  • @mrkiky
    @mrkiky 2 роки тому +1194

    I like that she has actually seen all shows the scenes are from and she knows the context. Many other experts criticize the scene without knowing that the context explains away some of their critique.

    • @MrWarrenRB
      @MrWarrenRB Рік тому +25

      You can’t expect every expert to watch every movie and tv show of their own job.

    • @mrkiky
      @mrkiky Рік тому +60

      @@MrWarrenRB Yea but it's nicer like this anyway.

    • @andmicbro1
      @andmicbro1 Рік тому +11

      Yeah, quite refreshing! I also found her ratings pretty good, like she gave good points for the stuff that was done well, and properly rated the bad ones low. Though her criticism of the time is a hard one, most movies have time compressions because they can't sit there and show you a real hack in real time or that would be the whole movie's runtime. Even for "based on a true story" scenarios, thye often have a lot of time compression for events that happened over a longer space of time. If it's comically short, then yeah, it should be low rated. But for a real life hack that is show to take a few hours as opposed to a few more hours, I think we can cut them some slack.

    • @Bunny99s
      @Bunny99s 9 місяців тому +3

      Also she's glossing over the fancy 3d fly-by math formula, greek character screen-saver effect in Hackers because it's clear that this is just a mental image for the audience and should explain the thought process in his brain which of course you can't really visualize.
      Many often claim that Hackers was soo unrealistic, but some parts were just a bit exaggerated. I started programming 30 years ago and I have to confess that I actually did write some fancy visual tools back then, just for fun. I dived deep into OpenGL around 2000. I always was and still am a sucker for technology. About a year ago I wrote my own DNS server in C# just for fun. I do actually run it with mono on my raspberry pi to this day. So it is in use, but not really for important stuff. I'm more interested in how things work. I read so many specifications. One of my favourite ones was the GIF specification. I wrote a gif loader and I was impressed by the format design. Especially that it was actually really extensible. PNG kinda followed the footsteps and is also "chunking" the file so a parser could simply ignore chunks it does not understand. It's kinda sad that animated gif support was better back then. Nowadays the Graphic Control Extension is always interpreted as a sequance of frames to conduct an animation. However back then it was actually possible to create gif files with images with more than 256 colors by splitting the colors up into several frames which were painted on top of each other. Gif actually uses a virtual canvas and contains write instructions for pixel image data but also could render text.

    • @imitenotbe
      @imitenotbe 5 місяців тому +1

      @@MrWarrenRB I'd expect someone agreeing to do a piece like this to have context and background of what they are about to comment on as an "expert", yes. It's obviously not live, so there isn't any excuse for on the spot reactions without context

  • @madcat1865
    @madcat1865 3 роки тому +2988

    Nothing like listening to a really enthusiastic hacker that knows what they’re doing to really make you want to change your passwords

    • @joejacko1587
      @joejacko1587 3 роки тому +17

      she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol

    • @codyeble0713
      @codyeble0713 3 роки тому +20

      Doesn't have to hack me, I'll just give her my password

    • @lucasng4712
      @lucasng4712 3 роки тому +24

      @@joejacko1587 stroke

    • @JLilliquist
      @JLilliquist 3 роки тому +4

      @@joejacko1587 Yep. all her ratings are too high.

    • @purplewine7362
      @purplewine7362 3 роки тому +48

      @@joejacko1587 lmao armchair coders commenting on an experts opinions if the best description of youtube comments

  • @kaamilmirza6963
    @kaamilmirza6963 3 роки тому +4689

    Her standards for critiquing Mr Robot is just absolutely wonderful to watch. Just shows how good Mr Robot is.

    • @disco.lemonade
      @disco.lemonade 3 роки тому +286

      Yeah, but it should've been 10/10. The "should take longer" is so obvious, I don't think you should know about programming and hacking to figure that out. 9.5 at least, and even 9... The whole show is that well curated when it comes to programming details

    • @kaamilmirza6963
      @kaamilmirza6963 3 роки тому +76

      @@disco.lemonade I completely agree with you, I too expected a solid 10 but don't know why she didn't give.

    • @disco.lemonade
      @disco.lemonade 3 роки тому +33

      @Untitled 1 Welcome to Mr. Robot. It'll be an interesting ride for four seasons

    • @philosophicalearthworm6819
      @philosophicalearthworm6819 3 роки тому +34

      @@disco.lemonade Mostly agree. The same is kinda true of the whole show, it's pretty much all possible but probably wouldn't be done by such a small group and/or in such a short amount of time. Points to consider though, firstly that nation-state threat actors were involved and there was a lot going on the background, and we don't exactly get every piece of the story. Second, as far as getting rid of the backdoor, wasn't the Mr. Robot alter already aware of this information? That was probably more a hole in the plot than in the technicals, though that also is not necessarily a hole...the show was riddled with bizarre internal conflicts between the alters(Tyrell: "You, as a person, make no sense").
      Ultimately if the show was any more realistic, it'd be a documentary.
      Aside from the hacking portions, I'd also like to see different aspects of this show rated by intelligence officials, law enforcement officials, and psychologists. Like the creepy personnel tactics of the Dark Army("Have you ever cried during sex?" "Have you ever cheated on your wife?"), law enforcement procedures("Green! FBI! Don't shoot!" "We call it the python approach."), and the nature of dissociative identity disorder.
      Seems like one of these Hollywood realism clips mentioned Dom keeping her gun and badge in a locked safe at her house but I can't remember.

    • @cheesecakelasagna
      @cheesecakelasagna 3 роки тому +10

      @@disco.lemonade I have the tendency to put pause watching intense shows (I think the issue is that I binged, so getting burnt out is quicker). I enjoy the S1 and half of S2, but there are certain subplots that I just roll my eyes on.

  • @alexandravisnick
    @alexandravisnick 3 роки тому +3087

    The Mr Robot data center UPS scene was so detailed that companies depicted on screen actually reviewed their designs after the episode aired.

    • @arturszatkowski8062
      @arturszatkowski8062 3 роки тому +42

      Can you direct me to the article about it, I can't find anything

    • @alexandravisnick
      @alexandravisnick 3 роки тому +393

      @@arturszatkowski8062 I worked for one of those companies at the time. This was not published but something I saw myself.
      I should probably add that we concluded the hardware systems in place would have prevented it. Their commitment for accuracy was stunning though.

    • @Anna-bk8el
      @Anna-bk8el 3 роки тому +34

      I loved mr robot

    • @Fredaxter
      @Fredaxter 2 роки тому +21

      @@justincruz5720 Season 2 Episode 12.

    • @00bean00
      @00bean00 2 роки тому +9

      What happened with the UPS es, I forget?

  • @Enrique-Garcia
    @Enrique-Garcia Рік тому +479

    There's actually a very good reason why they'd use "impossible" IP addresses in movies, and that's to simply avoid accidentally posting someone's actual IP address and setting them up for potential cyber-harassment. It's the same reason they used to use "555" for everyone's phone number, because people were actually attempting to call those numbers. Nowadays it's easy to buy a phone number used in a movie, the studio will use it as a marketing tool or simply not activate it, and for URLs mentioned in movies they'll do the same, register it and then use it as a marketing site or simple redirect to their studio website. Can't really do that with IP addresses.

    • @_Tomon
      @_Tomon 8 місяців тому +23

      Was wondering if there would be this comment about the IP addresses already and wasn't dissapointed.
      Honestly that's one of the mistakes I think actually shows that they know what they're doing (or don't and got lucky :-D )

    • @Enrique-Garcia
      @Enrique-Garcia 8 місяців тому

      @@_Tomon I know for sure, bigger productions do a thorough search on anything that can be mistaken or misused. They even check character names, they don't want to risk getting sued because anyone of note with the same name as someone in the movie might be defamed. So I'm sure they also check things like IPs and phone numbers (remember until recently, all movie phone numbers started with 555. Now, studios buy the phone numbers mentioned in the movie and use them as marketing).

    • @aracoixo3288
      @aracoixo3288 7 місяців тому +3

      Yeah she's 👽

    • @crazyg666
      @crazyg666 6 місяців тому +3

      well, you can try resetting your router and after many times, you're gonna eventually get the right ip address lmao

    • @auturgicflosculator2183
      @auturgicflosculator2183 5 місяців тому

      @@crazyg666 Depending on the ISP, this may or may not work. On most ISPs, you'd have to turn the router off for like a full day or more to have the IP recycled, and even then the ISP might choose specifically not to do so, whether or not your IP is dynamic.

  • @valhallenx
    @valhallenx 3 роки тому +7632

    You should bring a regular guy review The Office

    • @assembled1855
      @assembled1855 3 роки тому +338

      More like Office worker rate Office scene in movies and tv shows.

    • @ZOB4
      @ZOB4 3 роки тому +83

      I'd watch that

    • @chuckhoyle1211
      @chuckhoyle1211 3 роки тому +147

      As someone who worked in Big Corporate for years, it is pretty spot-on if you dial back the nonsense a couple notches. There is always drama and stupid corporate crap going on. There is a Dwight in every office. There is always a short-timer around that won't do anything.

    • @Cramblit
      @Cramblit 3 роки тому +36

      @@chuckhoyle1211
      Depending on the place, you even have those oddball bosses that don't seem to do anything worthwhile but still get all the promotions and rewards too.

    • @nalediserunye4073
      @nalediserunye4073 3 роки тому +2

      That real funny

  • @b326yr
    @b326yr 3 роки тому +2882

    I love how she explain everything in details...
    I'm still confused

    • @re43p3raod3
      @re43p3raod3 3 роки тому +21

      coming from a red hat, some of it even after a few years is really confusing XD you are not alone

    • @originalunoriginal4055
      @originalunoriginal4055 3 роки тому +13

      Hahaha.
      I'm guilty of trying to kid my own self that "I am understanding everything she is staying" Even though my mind, attention was completely in kuku land and would refocus on the video which lasted a few seconds, to then only go back to kuku land for the next couple of minutes, after a few seconds of coming back to reality! Hahaha

    • @suppoy10
      @suppoy10 3 роки тому +1

      Lmfao

    • @JimBob1937
      @JimBob1937 2 роки тому +6

      Which parts did you find confusing? I may be able to explain some areas better. She never went too deep into the topics due to time and the audience this video is for, but I think if you give some specific aspect I can write a more in-depth explanation that may help.

    • @iamwisdomsky
      @iamwisdomsky 2 роки тому +1

      I'm not even a self-proclaimed hacker even though I've hacked things before, but I do understand most of what she's talking about and I can say that she is indeed a "legit" hacker.

  • @frankzeppelin
    @frankzeppelin 3 роки тому +1685

    Excellent presentation skills, good sense of humor, knows not only what's going on in the scenes but able to put them in context. She gets 10/10.

    • @akashnag3879
      @akashnag3879 3 роки тому +24

      And she is very beautiful

    • @Far1988
      @Far1988 3 роки тому +50

      She also makes this a fun experience and doesn't take the clips too serious. She respects that Hackers or Matrix for example are movies with a lot of goofy stuff happening that are nowhere near realistic - but she's focussing on the things that might or might not be accurate, which is very nice.
      If you've seen certain expert reacts episodes on gameology you know what I'm talking about.

    • @jondunmore4268
      @jondunmore4268 9 днів тому

      and she's a cutie too

  • @Yvaelle
    @Yvaelle 2 роки тому +260

    I love that her only complaint about Hackers was the lack of seeing the code. Thank you, people rip on it all the time for being inaccurate - but we're never actually shown enough code to know if its accurate: instead we experience what it Feels Like for the hackers, not specifically the steps they go through. Also, because we don't see them taking specific actions, the movie is timeless - it doesn't date itself to the early 90's. Hackers is arguably the best hacker movie ever made, it doesn't teach you anything about How To hack, but it explores why and why not.

    • @screminmemes
      @screminmemes Рік тому +8

      It is one of my all time favorite movies with one of the greatest soundtracks (why I still listen to The Prodigy and Orbital to this day.) My gripe though was always the silly scenes where they are flying through this computer landscape representing the company's network and stuff. I know, it's Hollywood Hacking but they could have at least off set that with some actual code.

    • @McCuipandKitty-qw1wj
      @McCuipandKitty-qw1wj Рік тому +3

      I still love the movie Hackers as it shows them actually going into buildings to line in rather than just sitting there.

    • @Ken.-
      @Ken.- 10 місяців тому +1

      Hackers was a silly joke that only little kids that never seen a hacker movie before thought was 133t when it came out. It was embarrassing in every way possible. Literally nothing accurate at all.
      WarGames was the only movie that was any good.

    • @jfbeam
      @jfbeam 4 місяці тому

      People rip on it because it *isn't* accurate. But it's not supposed to be. It's entertainment, not educate or documentary. And yes, it very much dates itself to the 90's... payphones, "686", "RISC", BBS's, hacking the cable company's _VCR!_ ... And the f'ing "gibson". No computer has EVER looked like that. Computer operation rooms are not black f'ing pits. (until midnight when we took over the NOC to watch movies / TV on the wall-o-monitors - rear projection monitors.)

    • @KasumiRINA
      @KasumiRINA 4 місяці тому

      I think it exposes Angelina Jolie's boobies too so extra points for that (Imma girl, she's just too much of an icon to not appreciate).

  • @jitxhere
    @jitxhere 3 роки тому +5851

    "I have been in cybersecurity... for more than 25 years"
    I thought she is just 25.

    • @savsaga4991
      @savsaga4991 3 роки тому +101

      D u think she is hacker? or is she lying for youtube?

    • @orngjce223
      @orngjce223 3 роки тому +474

      You'd be surprised what moisturizer and hair dye can do.

    • @yessum15
      @yessum15 3 роки тому +834

      @@savsaga4991 Dude don't be silly. She's well known and her resume is easy to verify. Also, she's 41 years old (dob: 1980). Good genetics & self care. "Hackers" movie came out in '95 and targeted teenagers.

    • @PrototypeHQ1
      @PrototypeHQ1 3 роки тому +381

      @@bm_wuratli6883 you know that she can be a white hat hacker....not a black or red hat

    • @munster1404
      @munster1404 3 роки тому +56

      I can say she looks her age. Obvious from the first glance that she was at least in her later thirties to early forties.

  • @g-nonymousgems3047
    @g-nonymousgems3047 3 роки тому +2377

    Didn't know Aunt May is a hacker.

    • @interstellarastronaut712
      @interstellarastronaut712 3 роки тому +43

      Lmfaoo

    • @tink6225
      @tink6225 3 роки тому +97

      there's a lot of things May keeps a secret

    • @TigerGreene
      @TigerGreene 3 роки тому +12

      She's not. Her much fatter kid sister is.

    • @ken-ne3ei
      @ken-ne3ei 3 роки тому +44

      So I guess I'm not the only one who thought of that 😂😂

    • @SonOfAFridge_
      @SonOfAFridge_ 3 роки тому +18

      Maybe she learnt it from peter

  • @screenshottactical5201
    @screenshottactical5201 3 роки тому +2322

    Plot twist: The CIA is now monitoring fingerless glove sales in order to go on a phishing expedition.

    • @edwardc48
      @edwardc48 3 роки тому +18

      Hahahahah punny humor!

    • @kriss3d
      @kriss3d 3 роки тому +44

      Thats gonna flag alot of bicyclists.

    • @screenshottactical5201
      @screenshottactical5201 3 роки тому +26

      @@kriss3d and motorcyclists, european sports car drivers, and mma fighters!

    • @AramatiPaz
      @AramatiPaz 3 роки тому +6

      Oh my.
      I have a story of programing courses, IT degree, and have a lot of notes for writing that makes me loot like a psychic.
      Now my fingerless gloves are totally make me look suspicious!

    • @Far1988
      @Far1988 3 роки тому +5

      You joke but I bet intelligence services are monitoring some crazy things around the world. Not just the obvious, like amonium nitrate sales and such.

  • @Ceares
    @Ceares 2 роки тому +205

    This was great. I love that Hackers actually influenced her to become a Hacker. Please bring her back for more. I would have loved to see Die Hard 4...wanna know how much of the Fire Sale is real. Also Leverage and some of Hardison's hacks, like the car theft hack or against the Sterenko.

    • @HusniArsyah
      @HusniArsyah 2 роки тому +6

      Oh my, yes I remember Die Hard 4, the Fire Sale hack, I'm also curious about the real aspect of this thing...

    • @Roguechan
      @Roguechan Рік тому +4

      I want to see her comment on that infamous NCIS scene lol

    • @jacquelineamelie5467
      @jacquelineamelie5467 3 дні тому

      I would LOVE for any of these hackers to comment on Leverage.

  • @yutro213
    @yutro213 3 роки тому +591

    Very proud of Mr. Robot. Its attention to realistic hacking is very much appreciated.

    • @Peter_Cordes
      @Peter_Cordes 3 роки тому +14

      In some ways, the errors in the terminal session graphics in Mr. Robot (season 1) bothered me more (or in different ways) than shows which don't even try to be realistic. Like, if you're seriously trying to be realistic, actually get the fine details right. Stuff I remember included having the command prompt printed at the left of the output of the command, so you know they didn't actually set up a test network that would let them just run `nmap` or whichever command it was. Like, you were so close, but clearly just made this image in an image editor, not on a real terminal session.
      Or another scene had the arguments backwards to ln for making a symlink. It's
      ln -s target_name link_name_to_create
      not the other way around. I've used GNU/Linux as my desktop OS for about 25 years, mostly with the command line other than a web browser.
      Plot-wise I appreciated the accuracy of what hacks can/can't do, but the expectation of accuracy made things like that break suspension of disbelief for me for a few minutes each time, and made me want to double-check every other screen image.

    • @fishyc43sar
      @fishyc43sar 3 роки тому

      @@Peter_Cordes hi, fella nerd

    • @justincruz5720
      @justincruz5720 3 роки тому +16

      @@Peter_Cordes Even if the hacking isn’t completely accurate, you can see the effort that was put into those sequences. This is also entertainment, so some creative liberties must be taken. It’s a bit like _Breaking Bad_ . The show looks like it’s teaching you how to perform these cool illegal things, but if they showed you how to do it verbatim, it could potentially be very problematic.

    • @Peter_Cordes
      @Peter_Cordes 3 роки тому +5

      @@justincruz5720 - My issue wasn't with any "hacking commands" or techniques, instead with the basic appearance of the UI sometimes, or with a basic command like `ln` (similar to file-copy, a bit like DOS `copy`).
      As an analogy, imagine if Top Gun had had incredibly realistic dogfighting techniques, but occasionally they left the landing gear down while doing so. (More people know about planes than about Unix/Linux, and it's not a perfect analogy.)
      Or maybe a Windows analogy: if somebody ran a program, and its window appeared behind the desktop icons instead of on top. People who use Windows regularly would be saying "WTF" the one time that happened; people who don't might not notice.
      If the things that bothered me don't bother other people, that's great. It wasn't a showstopper for my enjoyment of the show, but it did bug me and stick in my memory.
      The realism of the actual hacking was great, just an occasional error in the super basics, like having the command prompt appear at the left of output lines of a command. So if they had a Unix/Linux user reviewing the screen images, that one slipped through the cracks.
      As for getting `ln` args backwards, that's more understandable; I sometimes have to think about it when I use it, and from some perspectives it seems backwards. So that's just an amusing reminder that they mock this stuff up in an image editor instead of actually running it. Easy to imagine someone getting that backwards even if they do know Unix/Linux command line tools. But still, if you notice it, it's a clear reminder this isn't real. :/

    • @justincruz5720
      @justincruz5720 3 роки тому

      @@Peter_Cordes Is any of it real? 😂 In all seriousness, I heard Sam had some programmers as consultants to help work on the show.

  • @Mister_Laughs
    @Mister_Laughs 3 роки тому +1264

    I didn’t know it was actually possible to have “hacker gloves”

    • @johntucker3695
      @johntucker3695 3 роки тому +71

      Probably for really bad carpal tunnel

    • @JKTCGMV13
      @JKTCGMV13 3 роки тому +55

      @@johntucker3695 Cold environments too, maybe? I used to have my comp sci class as the first class of the day in high school and on cold days I could barely type for a good portion at the beginning of class.

    • @johntucker3695
      @johntucker3695 3 роки тому +24

      @@JKTCGMV13 This sounds sarcastic but that is actually very interesting. I never really thought about how cold hands would make it harder to type.

    • @Mell0wY3ll0w
      @Mell0wY3ll0w 3 роки тому

      Shows whos not a hacker then.

    • @AgentWuT
      @AgentWuT 3 роки тому +7

      It's needed because of hand sweats

  • @OriginalPiMan
    @OriginalPiMan 3 роки тому +281

    I'm surprised that so many competent scenes were found for analysis. I didn't realise this many existed.

    • @manchesterunitedno7
      @manchesterunitedno7 3 роки тому +13

      Watch the Mr. Robot series. Arguably the best show about a hacker so far.

  • @maverickcreations8864
    @maverickcreations8864 2 роки тому +67

    For a layman, one of the most fun educating, eye opening things about hacking in 25 minutes. Would love to have more of her with such equally good movies.

  • @Survivor-ng4te
    @Survivor-ng4te 3 роки тому +2652

    “We can tell she’s a hacker shes got all those stickers on her laptop”
    I sense some sarcasm

    • @UnoriginalElephant
      @UnoriginalElephant 3 роки тому +153

      I'm a software engineer and my laptop is actually covered in stickers 😂 It's a pretty common practice, and some companies even give employees stickers to put on their laptops. Granted, my hacking skills are somewhat lacking.

    • @rustybolt_
      @rustybolt_ 3 роки тому +88

      I am a programmer but I don't like stickers on my laptop.

    • @ThatGuy-vp3un
      @ThatGuy-vp3un 3 роки тому +63

      I am not a programmer and don't like stickers on laptop.

    • @oxbunnehxo
      @oxbunnehxo 3 роки тому +58

      I am not a programmer but I like stickers on my laptop

    • @andreshyh
      @andreshyh 3 роки тому +201

      I'm not a laptop but I like programmers on my stickers

  • @captainfactoid3867
    @captainfactoid3867 3 роки тому +1299

    “Why is this air freshener connected to the internet”

  • @lanewaldon6450
    @lanewaldon6450 3 роки тому +1321

    I feel like Mr. Robot has some of the most realistic examples of hacking to date

    • @wedmunds
      @wedmunds 2 роки тому

      ​@G T Or the FBI paid Microsoft to keep the backdoors open. It literally happened with Wanacry.

    • @ghostabastard2208
      @ghostabastard2208 2 роки тому +7

      Also some of the most idiotic and boring tv shows ever.

    • @Vagabond-Cosmique
      @Vagabond-Cosmique 2 роки тому +65

      @@ghostabastard2208 What's idiotic about it?

    • @snowyshivas
      @snowyshivas 2 роки тому

      @@ghostabastard2208 you really are a high school drama enjoyer, go watch your vampire diaries and call it entertaining

    • @andresurdaneta8249
      @andresurdaneta8249 2 роки тому

      @@ghostabastard2208 You justify your answer.

  • @Narsil31
    @Narsil31 9 місяців тому +22

    Mr. Robot is the best IT/Hacking show or movie that's been made. It's combination of the technical elements and the psychological complexity of the characters with Elliot being one of the best written characters I've ever seen. A brilliant show and if your a tech nerd you need to watch this.

    • @JohnRiley-r7j
      @JohnRiley-r7j 8 місяців тому

      True,only because creators of Mr.Robots are smart people who want to create realistic hacker show.
      They are backed with elite hacking team of top security engineers and IT specialist that perform all Mr Robots hacks for them in real life,everything that team was doing was build in a flash animations that are later played on the show so it seems that eliot or other characters performed them.

    • @auturgicflosculator2183
      @auturgicflosculator2183 5 місяців тому

      @@JohnRiley-r7j An elite hacking team built animations using flash? Something doesn't add up here.

    • @jfbeam
      @jfbeam 4 місяці тому

      Sure, for people who don't know any better, it's very entertaining. But for me and my "tech nerd" friends, it's infuriating how things are trivialized, and the otherwise hatchet job done in the name of hollywood. (sure thing Deviant... many doors can be slipped, and once inside the water treatment plant f'ing nothing has a password; no one is watching the cameras, and the drive in the NVR has been full or broken for years.)

    • @quantumblurrr
      @quantumblurrr 3 місяці тому +1

      @@jfbeam Hey, it beats NCIS two people typing on the same keyboard hacking, looking like they just downloaded something dodgy from early 2000's Limewire and getting flooded with popups. It's progress!

  • @johnf7332
    @johnf7332 3 роки тому +3332

    Finally, they got a hacker who REALLY knows what she’s talking about

    • @gavinvelez1468
      @gavinvelez1468 3 роки тому +38

      They have done 3 other of these pieces with other Hackers.

    • @garethwood1139
      @garethwood1139 3 роки тому +134

      @@gavinvelez1468 OP is saying that those three didn't know what they were talking about.

    • @JAnx01
      @JAnx01 3 роки тому +27

      The video was boring af.

    • @JAnx01
      @JAnx01 3 роки тому +18

      @Nybbl er The content of this video is for kids, though.

    • @TroyLonie
      @TroyLonie 3 роки тому +118

      @Nybbl er It's actually kind of perfect for those with adhd if it interests them enough for them to hyperfocus on it.

  • @ManteIIo
    @ManteIIo 3 роки тому +448

    I had zero surprise when she said that Hackers (1995) movie was her absolute love... c'mon, it's every hackers holy grail and in most cases inspiration to become one.

    • @peterjeffery8254
      @peterjeffery8254 3 роки тому +25

      I am older for me it is "wargames"

    • @hackerx7329
      @hackerx7329 3 роки тому +8

      Even when it came out everybody I knew that knew anything about computers loved that movie, but as an ironic comedy rather than a thriller. The music was spot on and clearly somebody did research lots of real stuff involving hackers. But then hollywood got ahold of that info and just threw it around all slapdash and made a complete mess of it. The scene where they are using acoustic couplers in phone booths for VR rigs is just peak absurdity. For reference, assuming you have the world cleanest connection you might maintain a connection of a few hundred bits per second. A decent typist can type faster than you can transmit on a connection like that and the machine will start beeping at you because the keyboard buffer is full.

    • @stolzilp2407
      @stolzilp2407 3 роки тому +3

      @@peterjeffery8254 both for me.....

    • @Glitch-qj3nj
      @Glitch-qj3nj 2 роки тому

      Doubt

    • @user54389
      @user54389 2 роки тому +6

      @@peterjeffery8254 yep. Wargames, Sneakers, and Hackers are why I am in infosec now.

  • @michaelcooper3633
    @michaelcooper3633 3 роки тому +454

    14:58 *remote hack starts driving a car*
    Me: haha ridiculous 1/10
    Keren: "This is a real-world hack..."
    Me: ah yes I love the realism

    • @gbalfour9618
      @gbalfour9618 3 роки тому +18

      I was at one of those demo where they did it (with a bunch of other tech me). At first everyone was searching for a cheat thinking it was a trick then everyone started hacking and doing it themselves. Ended up being the show stopper event of that conference. Haha

    • @Totally_Not_A_Haxxer
      @Totally_Not_A_Haxxer 2 роки тому +2

      its pretty real, maybe not in the exact points but CAN exploitation or Controller Area Network exploitation is very very real, CAN is the interface often used in cars, all it is is finding the CAN address and Network, Sniffing the data off of that interface, making a bluetooth logger hang onto the card ( Most CAN interfaces have bluetooth ), dumping the information and exploiting the device if there is a working or current vulnerability that has not been patched yet or has been abandoned by the developers

  • @BuckeyeStormsProductions
    @BuckeyeStormsProductions Рік тому +47

    My brother works in IT, more on the hardware side. He was tasked once with helping do a security audit. He was basically given a hi-vis vest, a hard hat, clipboard, and fake ID, and told to see what he could access without question. He said it was amazing how many places he could get without even showing an ID...and how many more he could get just flashing a badge. People will always be the weakest link.
    Edit: SQL for the foreseeable future. I work at a corporation running emulations of 60 year old hardware for chunks of their operations because they've never decided to update. We call it going greenscreen, because the software emulates the old green CRT terminal monitors. Everything we do is command line based. We basically have an emulation of the whole network (server and terminals) on each device, and they all regularly sync to make sure everyone is on the same page.

    • @sgtGiggsy
      @sgtGiggsy 4 місяці тому

      Okay, but Star Trek doesn't take place in the foreseeable future. Also, SQL injection barely works today. Basically you need VERY sloppy developers to have a site or service that is vulnerable to SQL injection. Discovery is set 230 years from now. Even if SQL will be used then, it's highly unlikely SQL injection could work.

    • @TheNeo349
      @TheNeo349 3 місяці тому

      @@sgtGiggsy practices turn to nouns all the time. maybe SQL injection is a type of hack in the future? tho imo they should have used better terms, there are systems, languages etc. which have survived since a long time in tech. some of the basic code and the things that make tech work are still used today as OP posted (I've seen it myself after working in tech for 7 years).

  • @capp00
    @capp00 3 роки тому +3304

    I really enjoyed this, nice to see at least a chunk of them are making efforts to get it marginally correct.
    But, I got a 2-ad-break after every single scene she analyzed. Skippable ads, but dear God it's annoying to see a cluster of ads every 3 minutes.

    • @fuckoffwithnovideoschallen2456
      @fuckoffwithnovideoschallen2456 3 роки тому +46

      haha noob

    • @xyc350
      @xyc350 3 роки тому +115

      @@NX-gw7wg adblooooooooooocker is worth the price

    • @kerrim508
      @kerrim508 3 роки тому +3

      @@NX-gw7wg how much does it cost?

    • @kerrim508
      @kerrim508 3 роки тому

      @@Itaygaming311Xx thanks! 🙂

    • @Fastwinstondoom
      @Fastwinstondoom 3 роки тому +87

      @@kerrim508 ublock origin extension for chrome is free, free and free. Not seen ads for the last 10 years myself.

  • @mleise8292
    @mleise8292 3 роки тому +441

    When she said you can do beautiful things with code, she didn't mean graphics, she meant elegant code that a master of the art looks upon with tears of joy.

    • @gbalfour9618
      @gbalfour9618 3 роки тому +16

      It really is like looking at a piece of fine art when someone does a nice code. I’m not a coder but man is it beautiful.

    • @petertrudelljr
      @petertrudelljr 2 роки тому +20

      You guys and your 'nice code'. Spaghetti is a feature, not a bug! if it was hard to write, it should be hard to read!

    • @spiral83
      @spiral83 2 роки тому +1

      @@petertrudelljr 😂

    • @torres9807
      @torres9807 2 роки тому +4

      ​@@petertrudelljr You can also claim that the spaghetti code is a form of "obfuscation"

    • @emperorpalpatine6080
      @emperorpalpatine6080 2 роки тому +4

      yes but , if I wrote a beautiful program whose aim is to produce spaghetti code , would it still be beautiful ?
      would that program be spaghetti complete ?
      what if I wrote a spaghetti meta code , to produce spaghetti code , would that be considered a spaghetti machine ?
      would goldon ramsay's brain halt ?

  • @lucysrz3496
    @lucysrz3496 3 роки тому +453

    Can't believe you didn't show her the iconic NCIS scene

    • @ZombieWilfred
      @ZombieWilfred 3 роки тому +139

      The part where they're both typing on the same keyboard is one of the dumbest things I've ever seen... 😆😂🤣

    • @orye09
      @orye09 3 роки тому +38

      Would be hilarious if she confirmed it was real

    • @manchesterunitedno7
      @manchesterunitedno7 3 роки тому +26

      That's low-hanging fruit to pick. So obvious even to someone slightly familiar with computer.

    • @TigerGreene
      @TigerGreene 3 роки тому +15

      Can you imagine the sheer volume of mockery that actress gets for that scene? That is like, her whole life! lol

    • @ZombieWilfred
      @ZombieWilfred 3 роки тому +44

      @@TigerGreene Personally, I don't put most of the blame on the two actors, I also blame the writers, directors, editors, etc. Someone should've pointed out that it was dumb and nobody did! It's crazy to me that so many people had to be involved, like with any scene, and that made it on the show. Also, I doubt anybody gives her too much grief, cuz Abbie was everybody's goth tech bae fantasy, that some didn't even know they had. It's universal, even people who aren't into goth love Abbie! 😍😆

  • @Yvaelle
    @Yvaelle 2 роки тому +22

    In Trinity's full-finger glove defense, she's inside the Matrix, she doesn't actually need to touch the keys to type, it's her mind injecting commands into the simulated machine: she may not even be touching the keys, she's just making the gesture of typing to signal that she's doing it.

  • @patrickmalec8419
    @patrickmalec8419 3 роки тому +145

    It’s no surprise that David Fincher’s movies are some of the highest rated. His attention to detail translates to showing off real world hacking techniques

    • @Manuel.jimenez
      @Manuel.jimenez 3 роки тому +5

      In fact, I expected 10/10. Even the Linux version the character uses looks like the the one we had then!

  • @H76Pro
    @H76Pro 3 роки тому +768

    Being an ex white hat hacker myself I understood everything she said as I get frustrated sometimes with hackers in movies but you must understand it is done for entertainment. Real hacking is boring and tedious, well until you hack something then it gets exciting.

    • @00bean00
      @00bean00 2 роки тому +33

      Script goes brrr

    • @mrkiky
      @mrkiky 2 роки тому +45

      Except Mr Robot is not boring at all. Granted he is supposed to be a super genius and almost all of his attempts are immediately successful.

    • @powertrip6426
      @powertrip6426 2 роки тому +50

      Ex-white hat hacker AKA current black hat 🤣😜

    • @satyaki4058
      @satyaki4058 2 роки тому +1

      Teach me.

    • @MrHaggyy
      @MrHaggyy 2 роки тому +17

      😂 id love to see a movie where the hacker says i need a month, start researching for 2 weeks, build some hard and software for another 2 weeks and than just simply fries the target because he accidently made a ground loop xD

  • @stealthhumor
    @stealthhumor 3 роки тому +461

    Bogus IP addresses might be a movie thing like putting "555" in a phone number. An actual IP address probably belongs to a computer and will undoubtedly get unwanted attention from real hackers and unnecessary litigation for filmmakers. So, I wouldn't take points away because of the fake IP as it's an entertainment-inspired legal deal, possibly.

    • @nonyabidness6492
      @nonyabidness6492 3 роки тому +3

      Doubt they are smart enough to think about that

    • @Mo-gg5fj
      @Mo-gg5fj 2 роки тому +10

      Doesn't really matter if you use private IPs

    • @androgynousmaggot9389
      @androgynousmaggot9389 2 роки тому +20

      It's to make sure not to use real IP address, same as tel number and avoid getting sued! Maybe there are laws, or rules, about it! ¯\_(ツ)_/¯

    • @l3zl13
      @l3zl13 2 роки тому +34

      @@androgynousmaggot9389 If they showed a real IP address in a scene and then that IP address got DDOSsed afterwards the owner of the IP would sue for sure.

    • @WelcomeBackMeHere
      @WelcomeBackMeHere 2 роки тому +65

      @@nonyabidness6492 They used the number 256 in an ip address in the picture, which is exactly 1 higher than allowed. So it seems pretty deliberate, hard to imagine that they would have picked that number randomly.

  • @jamesfobar4368
    @jamesfobar4368 2 роки тому +90

    One of the things that I'm disappointed that she didn't mention is social engineering, which is also used in Hackers where he takes over the TV station by calling up the guard to get the number to the modem. It is a real thing that was also used to gain access to different places by pretending to belong there and someone willingly gives you the access you want.

  • @kroven009
    @kroven009 3 роки тому +37

    Hollywood hacking: *Frantic typing at a 3D visual effects animation* "I'm in."

  • @alexnorth3393
    @alexnorth3393 3 роки тому +321

    Elliot isn't simply set up to be above average intelligence, he's basically portrayed as a genius of I.T!

    • @manchesterunitedno7
      @manchesterunitedno7 3 роки тому +34

      He is a savant in the hacking world.

    • @Anonymous-mz9un
      @Anonymous-mz9un 3 роки тому +9

      Na he is a 1337

    • @disco.lemonade
      @disco.lemonade 3 роки тому +31

      Yeah, above average is like... some guys working at FB or something like that. Elliot definitely is in the top 1% of the top 1% programmers.

    • @randomuser5237
      @randomuser5237 3 роки тому +8

      Alex North That's why it's being called unrealistic. It's simply not possible for any human to do what he did in basically 2 mins. That was a poor execution by the show's writer and directors, kind of ruined the hard work that the security consultant put in.

    • @w1z4rd9
      @w1z4rd9 3 роки тому +1

      @@randomuser5237 Well he could have done a preview of the CTF. Or maybe just lucky on solving things out, considering his proven skills since he was a kid. But I do agree if you are pointing ot other scenes on the series where they are extremly lucky or you just notice a plot-tool, by the percentage not likely but technically yes the exploits and ways on Mr.Robot is great.

  • @sugabud
    @sugabud 3 роки тому +325

    I really can’t suggest mr robot any more. It’s an absolute masterpiece.

    • @moonpie7982
      @moonpie7982 3 роки тому +9

      It’s slow and not for everyone

    • @LordiGFX
      @LordiGFX 3 роки тому +7

      @@moonpie7982 I agree,I watched the first few episodes with my friends and they quickly got bored.

    • @keepinitkawaii
      @keepinitkawaii 3 роки тому +2

      It is AMAZING

    • @LordSevla
      @LordSevla 3 роки тому +8

      It's basically the 4chan version of Fight Club.

    • @billzidis2656
      @billzidis2656 3 роки тому +9

      Mr.Robot is like watching ART. My favourite series ever

  • @nikoblading
    @nikoblading 2 роки тому +8

    In Mr. Robot he could have noticed some easy to spot defect like SQL injection, saw an input argument to a function which just got invoked as a DB statement as is. That kind of a defect can be spotted quickly an no need to dig into the code. Enjoyed the video, thank you!

  • @PaoloFSpina
    @PaoloFSpina 3 роки тому +639

    Me: *takes one single computer science class in college*
    Also me: “You know I’m somewhat of an hacker myself”

    • @lePoMo
      @lePoMo 3 роки тому +17

      considering you need zero computer science classes to be a hacker, that is ok.
      You mostly need an interest in understanding how things work and a will to look up it up until you do. Hackers are creative tinkerers.
      A computer science education does help in getting a broad set of basics and get them right. Some things you might otherwise not even know you would want to look up.

    • @bobnoob1467
      @bobnoob1467 3 роки тому +1

      More like the "hacker" reacting to this is: "Considered somewhat of a hacker" lol.

    • @valelelentin
      @valelelentin 3 роки тому +6

      @@lePoMo it's gonna take you a lot if you didn't finish some kind of computer science degree. There's just so much to learn. It takes a lot of work in college with mentors that can teach you. Think about what would it take if you were to learn it alone...

    • @CG-ej8nu
      @CG-ej8nu 3 роки тому +2

      @@lePoMo bruh you just can't "Look up" stuff related to hacking, it's not that easy.

    • @IGamingStation
      @IGamingStation 3 роки тому

      @@CG-ej8nu What about those textbooks and reddit? I can't be a hacker? :C

  • @jalabi99
    @jalabi99 3 роки тому +82

    Five seconds in I knew this would be a great episode when Keren shouted "This is terrible!" and "YIKES" at those scenes. We need a part 2, and she needs to be in it!

  • @phoenixcreations5797
    @phoenixcreations5797 3 роки тому +168

    Me who can't even print hello world in C language- hmm..looks interesting

    • @cjcjxxx4404
      @cjcjxxx4404 3 роки тому +1

      (TT)O_o:-O:-)^_^8-)B-)ᕙ( • ‿ • )ᕗᕙ( ͡◉ ͜ ʖ ͡◉)ᕗ

    • @cjcjxxx4404
      @cjcjxxx4404 3 роки тому

      9WHQ+8M Boston, MassachusettsTap on a clip to paste it in the text box.

    • @TheShinySnivy
      @TheShinySnivy 3 роки тому +9

      As a 2nd year CS student currently working with C and C++, I wouldn’t hold that against yourself. C is hell. Try python instead.

    • @AramatiPaz
      @AramatiPaz 3 роки тому

      I was "alphabetized" in Java. I hate C so much. I'm learning C# but Python sure is a given of the Heaven

    • @akashnag3879
      @akashnag3879 3 роки тому

      I think Python is way to go for hacking

  • @bamachine
    @bamachine 2 роки тому +61

    The IP address with 256 in it, is probably similar to them using 555 as the city code for telephone numbers in TV and movies, to keep people from trying those numbers and successfully reaching some random person. Don't want them trying to reach Jenny's laptop, only to accidentally to to connect to something like a server at the NSA, which gets your own IP logged for potential cyber crimes, when you are just a kid playing around with something they saw in a movie.

    • @derleonator2232
      @derleonator2232 Рік тому +3

      Came here to say that, they probably didnt want to accidently use someones actual IP Adress so they took one that isnt possible

    • @someguy4915
      @someguy4915 Рік тому +2

      @@derleonator2232 They also show at least one real valid IP owned by Level3, the way they use leading zeros so inconsistently shows that whoever designed that scene has heard about IPv4, over the phone.
      Definitely not done on purpose to prevent DDoS/spamming against real IPs. If that were the concern (which it should be), they would use local IP addresses (RFC1918) or APIPA addresses which would guarantee nobody would ever be affected by it.

    • @Nina-cd2eh
      @Nina-cd2eh 7 місяців тому

      @@someguy4915 It's done for legal liabilities, as every legal IP is borrowed by a company, and they could be liable to the owner, even if there was no attacks against it. The most appropriate IPs to use are probably those reserved for documentation besides private and zeroconf addresses. I'm guessing they like to use big and random numbers instead because they look "cooler", and because they don't have to think too much about it.

    • @jeremyschulthess63
      @jeremyschulthess63 5 місяців тому +1

      There are also a lot of times where they will use an IP from the Private IP Ranges for a Public IP.

  • @fustigate314159
    @fustigate314159 3 роки тому +165

    "... using open source intelligence, which is a fancy term for 'the internet.'" 😄 Love it, Keren!

  • @brownbearedurardo
    @brownbearedurardo 3 роки тому +46

    As a computer engineering student, I am having fun learning this kind of video

  • @vinnieg6161
    @vinnieg6161 3 роки тому +151

    ''Hey, why does that air freshener have an internet cable plugged in?
    - ''Don't worry about it''

    • @miranina1585
      @miranina1585 3 роки тому +4

      -It's a POE powered air freshener.

    • @xeridea
      @xeridea 3 роки тому +10

      There used to be a big problem with people just picking up any random USB stick and plugging it in. Hackers would leave malicious USB sticks lying around at banks, offices, etc, and a surprising amount would get plugged in. Policies on USB sticks have changed, especially at banks, this is a huge no no.

    • @gbalfour9618
      @gbalfour9618 3 роки тому +3

      You’d be surprised on how many times people don’t question that type of thing.

    • @desfoley6335
      @desfoley6335 2 роки тому +2

      It's for the Fragrances DLCs

  • @paderborner5213
    @paderborner5213 2 роки тому +11

    Regarding the last one:
    My guess is that they deliberately used an invalid IP address, just like all phone numbers in US-movies that start with 555.
    Being off by a single digit indicates to me that they knew exactly what they were doing there.

  • @prestonroe268
    @prestonroe268 2 роки тому +97

    On the topic of Elliot, I assume anytime we see something happen too fast, it's because we're seeing it from his perspective. We already know he doesn't process things well and hyperfocus is a pretty common trait that causes people to "lose time". He might be spending an hour on a task, but only really processing it as a few minutes. Since we follow his perspective we process time the way he does.
    This probably isn't right, but I like it as a head canon.

    • @wisteela
      @wisteela 5 місяців тому +1

      That is perfect.

  • @TheMule71
    @TheMule71 3 роки тому +56

    In all fairness, Trinity is in the Matrix when she's hacking. Given the powers she has about bending the rules of the simulation, including jumping across streets from building to building and kinda flying thru tiny windows w/o a scratch, outrunning Agents, typing correctly with leather gloves doesn't strike as unbelievable... I think we can grant her the 0.5 back :)

  • @MrSparda1989
    @MrSparda1989 3 роки тому +313

    Needless to say this is one the many reasons why I keep my Laptop Camera covered with tape.

    • @rdarkmind
      @rdarkmind 3 роки тому +16

      While leaving the one on you cell uncovered I would pressume.

    • @MrSparda1989
      @MrSparda1989 3 роки тому +14

      @@rdarkmind nope got that covered too.

    • @alexgigelu
      @alexgigelu 3 роки тому +14

      @@MrSparda1989 I have a lot of co-workers and friends with laptop cameras covered but you're the first person I hear to have your phone camera covered as well. Kudos to you! Too bad you can't 'cover' your microphone if you want to actually use your phone for talking with people.

    • @codyherring3895
      @codyherring3895 3 роки тому +4

      mine came with a cover built in to the case B)

    • @IGamingStation
      @IGamingStation 3 роки тому +1

      @@alexgigelu Just turn off your phone, lol

  • @emo_galaxy9413
    @emo_galaxy9413 Рік тому +5

    I absolutely love season 1 of Mr. Robot. There has never been a mind ducking of that level for me. I was so looking forward to new episodes with extreme excitement and enjoyment. No other show has done that for me. I miss the characters.

  • @shivanshsaini5275
    @shivanshsaini5275 3 роки тому +305

    She said she had been in cybersecurity for 25 years,lol, I would believe if anyone said to me she is just 22 yrs. Old

    • @ajay4319
      @ajay4319 3 роки тому +81

      She's 41 years old

    • @joshjosh2842
      @joshjosh2842 3 роки тому +43

      @@ajay4319really ? but she looks young tho

    • @ajay4319
      @ajay4319 3 роки тому +7

      @@joshjosh2842 yep.

    • @swirlandtwirl5417
      @swirlandtwirl5417 3 роки тому +8

      @@pet.me102 she's fit too

    • @atfsgeoff
      @atfsgeoff 3 роки тому +21

      this is what happens when you never see daylight lol

  • @waasar
    @waasar 3 роки тому +71

    I'm shocked they didn't review the most powerful hacker of all time: Hackerman from Kung Fury.
    You won't ever catch him on rookie mistakes like wearing fingered gloves. I learnt everything I know from that guy.

  • @theelvenwtich
    @theelvenwtich 3 роки тому +48

    I am SOOO glad that most of my IT work was done before ransomware. In all honesty that is the main reason I stopped. It was fun keeping things running, but it is not fun having to play defense 24/7. May the gods bless all you brave souls that picked up the torch.

    • @digitalcyclone7218
      @digitalcyclone7218 3 роки тому +7

      tbh securely backing up your data and not installing HappyFunTime.exe from some random USB stick in the parking lot should be enough to play defense.

    • @theelvenwtich
      @theelvenwtich 3 роки тому +5

      @@digitalcyclone7218 In the old days I had one of my users request a new 3.5-inch boot disk every day. One day I followed her and noticed that after she used it she secured it by using a magnet to hold it to her desk drawer. After that I put NOTHING past the masses. Also, the number of times I came into a new client only to find that there backups were not working properly for years is only surpassed by the stars in the sky. Hopefully these newer generations of techno-savvy users will mitigate some of these issues, but I spent decades teaching Luddites not to click on spam links.

    • @digitalcyclone7218
      @digitalcyclone7218 3 роки тому +2

      @@theelvenwtich fair enough tbh.

  • @ashwinbhargava3011
    @ashwinbhargava3011 Рік тому +27

    Blackhat (2015) is the most hack accurate and underated movie i ever watched. I wanted it be in the list 😭

    • @mizar_copernicus138
      @mizar_copernicus138 Рік тому +1

      Its so fuckin boring. I forgot its about hacking several times throughout the movie

    • @Darkes336
      @Darkes336 Рік тому +3

      @@mizar_copernicus138 Because hacking is boring, if it was so entertaining everyone would be a hacker. Moreover, hacking requires social ingenieering capacities that most geeks don't have.

    • @mizar_copernicus138
      @mizar_copernicus138 Рік тому

      @@Darkes336 no that wasnt the case as i mentioned there was hardly any hacking and it was boring without it

    • @mizar_copernicus138
      @mizar_copernicus138 Рік тому

      @@Darkes336 did you even see the movie?

  • @Ganiscol
    @Ganiscol 3 роки тому +202

    They were generous in picking the scenes to analyze, simply because there are many more examples to bury under a 1/10 than there are worthy of a 5+/10 🤭

    • @kallyb1998
      @kallyb1998 3 роки тому +5

      So true, I'm not a huge tech wizard for a 22 year old, but I know most hack scenes are b.s. This was a fun episode for me to learn something new.

    • @scottwallbank4794
      @scottwallbank4794 3 роки тому +1

      Swordfish is the film that comes to mind.

    • @kc5997
      @kc5997 3 роки тому

      Blackhat was horrendous. On par with swordfish.

    • @joejacko1587
      @joejacko1587 3 роки тому

      she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol

    • @craigcrissman4651
      @craigcrissman4651 3 роки тому +6

      @@joejacko1587 bro can you stop spamming this shit all over the comments

  • @anthonymonge7815
    @anthonymonge7815 3 роки тому +329

    I am a automobile security researcher. Everything she depicts is accurate. Even with driverless vehicles, I would be hard pressed to make the vehicle perform the maneuvers depicted in the movie. Just FYI, your vehicle’s computer systems are incredibly insecure. It is frightening just how insecure they are.

    • @fightingfalconfan
      @fightingfalconfan 3 роки тому +4

      It's only certain models that can do the remote thing. The factory has to install the 'On Star' feature. It usually comes with a price tag to the end user who purchases the vehicle. But what she stated in the scene about computing power; that's real. You maybe able to hack in to the system. But that's really as far as your able to go. You would need some top of the line servers to make that all happen that quick.

    • @snazzypazzy
      @snazzypazzy 3 роки тому +30

      I don't own a car, but I do not like that all appliances and even cars are becoming smart. Give me my stupid fridge and a car that just needs a key to open it. It only creates weak spots where things can break (or be broken into).

    • @anthonymonge7815
      @anthonymonge7815 3 роки тому

      @@fightingfalconfan servers have nothing to do with it.

    • @mechanomics2649
      @mechanomics2649 3 роки тому +7

      @@snazzypazzy The fact is, things much more vital than your car or fridge are already potentially vulnerable to hacking. Interconnectivity goes hand in hand with globalization. Cyber security is, and always has been, an arms race and will continue to be for the foreseeable future.

    • @Ebondeath22
      @Ebondeath22 3 роки тому

      @@anthonymonge7815 You would need processing power. I'm not sure how similar it would be to running a brute force attack. I've seen computers with 4,6, even 8 PCIe slots that house as many GPU's to utilize their processing power for password cracking. I would have to assume you would need something similar but on steroids to manage that type of attack. Even so, I doubt the NICs in self-driving cars are broadcasting their network traffic in plain text. Thats just something you dont see anymore with AES. I think self-driving cars use GPS and proximity sensors to navigate and I'm sure theres some kind of AI that processes the information in real time. Im sure we will see self-driving car hacks happen with greater frequency in the coming years.

  • @thegirlsedit1598
    @thegirlsedit1598 3 роки тому +262

    She explains those things so perfectly even tho I'm not a hacker but I learned more from her than my math teacher.

    • @JLilliquist
      @JLilliquist 3 роки тому +5

      32 x 32 =

    • @asimplenight8220
      @asimplenight8220 2 роки тому

      @@JLilliquist lmao

    • @asimplenight8220
      @asimplenight8220 2 роки тому

      I'd say you're biased as we all are.
      Also,math and computer science despite being interdependent don't necessarily equate in knowledge of one amounting to knowledge of another.

    • @vincentvega5686
      @vincentvega5686 2 роки тому +1

      Your math teacher was teaching you how to hack? lol

    • @2684dennis
      @2684dennis 2 роки тому

      im curiouse, what did you learn from her in this vid?

  • @SamanthaMagdalena
    @SamanthaMagdalena 2 роки тому +6

    The most informative video I have seen on this channel! Never knew what the backdoor operation meant, even after research. She explained it so well with the "secret handshake" analogy. On point 👌

  • @jazz_meh
    @jazz_meh 3 роки тому +93

    "we can tell she's a hacker. She's got all those stickers on her laptop"
    Me: looks over at my laptop. I'm a hacker! 🙌

  • @juggerfox
    @juggerfox 3 роки тому +214

    Technically the Matrix Reloaded would be a 10 since when Trinity is doing the hack with the gloves, she is within the matrix, where she has learned to go beyond certain limits that would otherwise impede her performance, for example, doing those really high jumps. Had she done this outside of the Matrix then yes, there we could have judged her in comparison to "reality".

    • @grahamstrouse1165
      @grahamstrouse1165 3 роки тому +34

      If someone is able to long jump 50 feet & run along walls I’m gonna assuming that typing with gloves on isn’t too much of an issue... 😁

    • @juggerfox
      @juggerfox 2 роки тому +8

      @@LinkinVerbz44 Yes, hence why I said, technically, since in all the Matrix movies we can see and tell the difference between the digital and the real realms. Neo for example can fly within the Matrix, but not outside of it. Trinity can hack with gloves flawlessly within the Matrix, not outside of it. So for that scene, as she is within the Matrix, techinically should be a 10.

    • @MikkoRantalainen
      @MikkoRantalainen 2 роки тому +5

      @@juggerfox Good points. And the Tank in the first Matrix movie living in the real world does use fingerless gloves.

    • @laprimaverrra
      @laprimaverrra 2 роки тому

      Plot twist: You didn't watch a UA-cam video of a white hat hacker reviewing a Matrix scene. You are not even reading this comment of your own free will. You are in the Matrix. 😅

    • @juggerfox
      @juggerfox 2 роки тому

      @@laprimaverrra can't argue against that, but still a 10! ^^

  • @hylianchriss
    @hylianchriss 3 роки тому +70

    Great video! But I am missing Swordfish's infamous scene where Hugh Jackman is doing a weird 3d puzzle to hack something 😂

    • @Lucy-dk5cz
      @Lucy-dk5cz 3 роки тому +1

      😂😂😂

    • @TigerGreene
      @TigerGreene 3 роки тому +4

      Wait. Hackers don't actually have chiseled pecs and a muscular a$$ and look like models?

    • @jojotwice8918
      @jojotwice8918 3 роки тому +4

      lol i thought u were gonna say halle Berry's sunbathing scene

    • @Violet-Spark
      @Violet-Spark 3 роки тому +5

      @@jojotwice8918 Halle Berry: *goes topless*
      “I’m in.”

  • @chad1755
    @chad1755 2 роки тому +31

    For anyone who loves real life hacking stories, "The Cuckoo's Egg" was a great read, a true account in the very early days of the internet about an astronomy grad student who got roped into chasing a hacker around through various school and military networks.

    • @jackkraken3888
      @jackkraken3888 Рік тому

      That book was amazing and the author Clifford Stoll is on UA-cam but he usually talks about his other pursuits like his klein bottles.
      Not only is the book good but it might be the first time someone laid the groundwork on how to deal with a digital intruder instead of just kicking them off the network.

    • @mojoblues66
      @mojoblues66 Рік тому

      Your comment currently has 23 likes, so I will not click the like button now.

  • @kaushalnandan7187
    @kaushalnandan7187 3 роки тому +27

    We need Keren Elezari to react to Watch Dogs and Cyberpunk!! 😭 Please do a special episode on this

  • @remo394
    @remo394 3 роки тому +84

    serial killers rating killing scenes
    "hey, that's actually good"
    takes out notebook

  • @crub4906
    @crub4906 3 роки тому +17

    Evolution of UA-cam Ads.
    2010: No ads.
    2015: Skip ads.
    2018: Skip ads after 5 seconds.
    2020: Video will play after ads.
    2030: Video may play
    2040: Video unavailable, watch ads.
    2050: UA-cam renames AdTube".

  • @reprovedcandy
    @reprovedcandy Рік тому +2

    As a software developer, I hate how movies make coding out to be this thing that can be done in a breeze with no time needed at all.
    Idiots try to contract me to build super complex software and say "this should be easy if you know what you're doing" ... Hollywood and the American education system are to blame.

  • @_Lucas.
    @_Lucas. 3 роки тому +153

    As a hacker I can confirm she is very knowledgeable - good job 👍

    • @darkgenie3167
      @darkgenie3167 3 роки тому +17

      Hacking and slashing those Minecraft sheep

    • @raulrus9026
      @raulrus9026 3 роки тому +1

      Are You really a hacker?

    • @theSwomry
      @theSwomry 3 роки тому +5

      @@raulrus9026 i doubt it

    • @orye09
      @orye09 3 роки тому +4

      Indeed I too am a real hacker and can confirm

    • @RandalReid
      @RandalReid 3 роки тому +12

      @@orye09 I can vouch that this dude is really a hacker

  • @leslauner5062
    @leslauner5062 3 роки тому +45

    I was hoping she'd look at "Goldeneye" to see if Boris' SPIKE program was possible....

    • @Prototyp3m1nd
      @Prototyp3m1nd 3 роки тому +2

      Slug head!

    • @HeroicBrando
      @HeroicBrando 3 роки тому +6

      Even she wouldn't be able to stop it, because he is INVINC-EE-BLE!

    • @tomarnold7284
      @tomarnold7284 3 роки тому

      I think she would start with what terrible typist both Boris and Natalya were.

    • @joejacko1587
      @joejacko1587 3 роки тому

      might be a way to keep the relay on over buffering but it wouldn't work on all modems i doubt it would really work on any modem tracert is a thing but yea there is so much wrong there

  • @schitflowsdwnhil
    @schitflowsdwnhil 3 роки тому +32

    "👌 One does not simply hack a registrar in two seconds 👌"

  • @siahillshire3040
    @siahillshire3040 28 днів тому +1

    I saw this just as I was about to give up studying Cybersecurity. I guess the universe doesn't want me to stop, maybe its my calling. This video just gave me the push to study hard and be as cool as her knowing all these stuff.

  • @Name-zo2ts
    @Name-zo2ts 3 роки тому +37

    3:59 He is super inteligent. Remember the bluetooth car hacking scene? "Did i make a mistake? No. I dont make mistakes." He is like a computer.

  • @stillakilla
    @stillakilla 3 роки тому +85

    I was expecting a "This episode was brought to you by today's sponsor, express vpn.."

    • @Astraeus..
      @Astraeus.. 3 роки тому +1

      I've actually seen 2 popups for Express VPN that show my IP address and location as a way of showing how "insecure" my information is. They told me I was in New Jersey, but I think I should be pretty safe. I'm in Canada, already using Express VPN :/

    • @vinnieg6161
      @vinnieg6161 3 роки тому

      thanks to those ads I looked up free VPNs, and obviously downloaded malicious bullshit.

  • @neolyth
    @neolyth 2 роки тому +41

    this was great! 2:45 when she says "unfortunately mr. Bond" like a villain. hackers are too clever for their own good :)

  • @Beegrene
    @Beegrene 2 роки тому +13

    A lot of the points deducted were for things happening faster than they would in real life. I'm willing to be a bit more forgiving about those because screenwriting is all about hitting your story beats as quickly as possible. Nobody wants to watch a hacker stare at a monitor for hours on end. You can do it with a montage like Hackers did, but even montages get tedious if you use too many.

    • @deathtrap5556
      @deathtrap5556 Рік тому +2

      To be fair a way I would get around that is show something else that is simultaneously going on. And if not that, a quick cut to an outside shot showing light being at a deeper angle also helps. It will be subtle, but people watching Mr Robot would probably notice

  • @Barnacules
    @Barnacules 3 роки тому +661

    This was fun to watch, I disagree with her critique of Trinity from Matrix resetting the root password after gaining root access being unnecessary. It’s very smart to reset the password when you gain access to keep the actual root out while you’re working 😎

    • @Subsistence69
      @Subsistence69 3 роки тому +89

      Also when she deducted points for phony ip addresses, they did it cuz its a movie like “555” in phone numbers

    • @FeduGina
      @FeduGina 3 роки тому +70

      if you want to be inconspicuous, you don't touch the pw. If you need to be fast, there ain't no time for that. If the girl just wanna hv fun... oh yeah 🥳

    • @YungFrenchToasty
      @YungFrenchToasty 3 роки тому +13

      What's funny is she said it was based on an actual program and vulnerability found in it yet a hacker in another wired video said this scene's program was fake lmao

    • @ThisGuyDakota
      @ThisGuyDakota 3 роки тому +11

      @@FeduGina too bad we didn't see the nmap triggers. Maybe we could've determined if she was being sneaky or aggressive

    • @sysbofh
      @sysbofh 3 роки тому +53

      @@YungFrenchToasty He is wrong - that vulnerability was quite real. I remember patching my systems, and looking through logs, when this came out. Got quite impressed that the movie used it too.

  • @do-nuthole8548
    @do-nuthole8548 3 роки тому +17

    Me who still doesn't know the shortcut keys for Copy and Paste: Interesting

  • @bailey3209
    @bailey3209 3 роки тому +30

    I am completely shooketh that the matrix was a nearly perfect score

    • @joelcastro-reyes1667
      @joelcastro-reyes1667 3 роки тому +6

      The Wachowskis are no slouches when it comes to computer knowledge. They had to rewrite the original script in order to make it more accessible to laypeople. Humans weren't supposed to be batteries, but sub-processors that gave the machines more power.

    • @digitalcyclone7218
      @digitalcyclone7218 3 роки тому +2

      @@joelcastro-reyes1667 I'm actually still salty about that because it wasn't even their choice. they only did it because the higher-ups wanted it to be more "easier to grasp". now because of that, the matrix has one gigantic logical flaw poked into it.

    • @nonyabidness6492
      @nonyabidness6492 3 роки тому

      It's for fun, chill

  • @notta3d
    @notta3d 5 місяців тому +1

    This woman is great. Great explanations as opposed to others I've seen.

  • @instantbeansoup
    @instantbeansoup 3 роки тому +35

    I barely understand anything but I enjoy her enthusiasm

  • @T1Oracle
    @T1Oracle 3 роки тому +16

    This one is the best of these. Not everything decent is an automatic 10, and point deductions are well explained. Good job!

    • @michaelcooper3633
      @michaelcooper3633 3 роки тому +1

      It's almost as if she was in a profession that requires you to be very logical, organized and detail-oriented.

  • @B0TFrosty
    @B0TFrosty 3 роки тому +20

    Cybersecurity sounds really cool to learn, but also really difficult to get into

    • @jasont587
      @jasont587 3 роки тому +2

      It is...

    • @MinecraftMasterNo1
      @MinecraftMasterNo1 3 роки тому +9

      Eh, setting up firewalls and authentication is easy enough. The hard part isn't the software. The hard part is keeping the human factors in check. Most hacks are done by exploiting the users.
      You can have the most secure system in the world but a dumbass employee can bring it all down by accidentally leaking his login info.

  • @pmanolak
    @pmanolak 2 роки тому +5

    Keren is adorable, smart and expert. I have followed her for years. Great video!

  • @THMILLER
    @THMILLER 3 роки тому +43

    Remember when the FBI played the game with Apple by "asking them" for some access to a device as if it wasn't very easy.
    As a Network administrator i was surprised at how many people thought and still think Apple has some sort of super security and android doesn't when they are both Linux.

    • @sundhaug92
      @sundhaug92 3 роки тому +5

      iOS is not based on Linux, it's derived from OSX (which is BSD/UNIX with Mach)

    • @joejacko1587
      @joejacko1587 3 роки тому

      i didn't think anybody had hacked that version yet when they asked them

    • @permafrosty
      @permafrosty 3 роки тому

      @@sundhaug92 Unix is just discount Linux, change my mind

    • @jokangpua2152
      @jokangpua2152 3 роки тому

      @@joejacko1587 - come to South East Asia. just about any roadside phone repair shop can do it for you. For a fee.

    • @marckiezeender
      @marckiezeender 5 місяців тому

      Unix existed first and Linux was based on it.

  • @ichiroutakashima4503
    @ichiroutakashima4503 3 роки тому +367

    When you realize she says that the Matrix is real, you know the world has gone to deep hell right now.

    • @simplylethul
      @simplylethul 3 роки тому +8

      It's plausible that we do exist in the matrix.

    • @Likexner
      @Likexner 3 роки тому +24

      She doesnt say that though.

    • @simplylethul
      @simplylethul 3 роки тому +1

      The world is going to a made up place? 😂

    • @ByAnyMeansNecessary.
      @ByAnyMeansNecessary. 3 роки тому +17

      She didn't say that. She said Nmap is real. The commands Trinity types into the terminal are real.

    • @MrTheDarku
      @MrTheDarku 3 роки тому +5

      the tools were real, the exploit used was real and so on, not the matrix. that was the whole point of what she was saying

  • @syed2170
    @syed2170 3 роки тому +17

    i can’t believe i actually learned these stuff two years ago. i used to hate this subject.

  • @dex1lsp
    @dex1lsp 8 місяців тому +18

    If only she would use those skills AGAINST her government, maybe she could actually save some lives.

    • @cjvipinosa3328
      @cjvipinosa3328 3 місяці тому

      Lol what she's an Israeli
      And Israel is literally a Cybersecurity powerhouse
      If she's that good there's another one even better than her

  • @assembled1855
    @assembled1855 3 роки тому +33

    Hope they make a part 2 of her rating hacking scene. They need to show Thomas Gabriel's hacking in Live Free Or Die Hard.

  • @TheManOfTomorrow
    @TheManOfTomorrow 3 роки тому +11

    *Mr. Robot* shows the most realistic, accurate and the best hacking ever shown in all of movies, series or whatever.
    On the basis of the reason she told for giving Mr. Robot hacking scene the 9/10, I think it should have been 9.5 instead of 9 as it's almost equally big mistake as in The Matrix Reloaded.

  • @gbalfour9618
    @gbalfour9618 3 роки тому +105

    I’m a digital forensics and network security tech and she is so right on a lot of these points. When I did a security training for a bank I handed out password generators just so people did reuse passwords.
    I have done several CTFs and got to do Def Con once. So much fun. I’m terrible at them I score around the low 1000s, best I got was mid 500s (complete luck and a leap of faith). The team ones are so much more fun then the solo ones (at least for me). Was team leader twice and we had a monitor where I watched what everyone else was doing, again only scored low 1000s.
    I’m just not a great hacker, haha.
    As for PIN number sounds, there was a book that told you what numbers to hit to play songs.

    • @MRAYAN-uv6cq
      @MRAYAN-uv6cq 2 роки тому +3

      Help me start a career in hacking.

    • @denbot.cycling
      @denbot.cycling 2 роки тому +1

      The tones are know as DTMF tones 🤦🏻‍♂️ should know that being a security boffin, it's part most compliance audits for phone system these days
      As for physical password generators 😵 hopefully none have been flashed with dodgy firmware with set passwords preloaded so hackers know what password will bs issued by the generator for any given month 🤦🏻‍♂️

    • @lastninjaitachi
      @lastninjaitachi 2 роки тому

      I feel like shes wrong about the password cracking box tool. I feel this very much is likely a real thing that could easily go through 1000's of pws. Im not sure why she is claiming it couldnt exist.

    • @vergilmontiero2558
      @vergilmontiero2558 2 роки тому +1

      @@lastninjaitachi there's a reason that she would

    • @Ruintheus
      @Ruintheus 2 роки тому +6

      @@lastninjaitachi she's referencing that the computing power required to brute-force hack or even using rainbow tables far exceeds not just the best supercomputers around rn, but around in the foreseeable next 50 years. It's a mathematical/physics issue and not a clever engineering one.

  • @JanEmanuel1986
    @JanEmanuel1986 2 роки тому +1

    I am personally interested in this subject and it is a major eye-opener to see someone with a professional background rate movies.

  • @vex_ahlia7
    @vex_ahlia7 3 роки тому +126

    Those are not "Cool Hacker Gloves."
    If I had to take an educated guess.. Those are probably doctor prescribed carpel tunnel bandage - gloves.

    • @TigerGreene
      @TigerGreene 3 роки тому +7

      Hey now! Those gloves are totally radical to the max! You just need a time machine to travel back to 1985 to be in the 'Beat It' music video.

    • @AramatiPaz
      @AramatiPaz 3 роки тому +39

      As a fingerless gloves user and a IT person I say those are great if you have Renaud syndrome or spend much time typing in cold rooms.

    • @AramatiPaz
      @AramatiPaz 3 роки тому +8

      Also they help keep the hand moisturized.

    • @Wynner3
      @Wynner3 3 роки тому +5

      @@AramatiPaz I wish I had known (or thought) about them two years ago. My old office had an hvac system that dumped cold air down my back every day. My hands were always cold and stiff. In some especially cold server rooms I do jumping jacks, wall push ups, and squats to stay warm.

    • @imonymous
      @imonymous 3 роки тому +3

      @@Wynner3 i Actually bought two mini heaters that i placed on both sides behind the keyboard! I switched to fingerless gloves but these look more appropriate. Going to try to find some i can buy.

  • @johnpiernicky8674
    @johnpiernicky8674 3 роки тому +52

    I could listen to her talk shop all day. She could teach me so much and I really understand what she's talking about now that I have my Cybersecurity degree. Would love to meet her at Def Con and work for her. Awesome stuff.

    • @gbalfour9618
      @gbalfour9618 3 роки тому +1

      Mind if I join in? Digital forensics degree and work in cyber security; I just want to be a fly on the wall and take notes. I’ve done so much but still feel like there is so much more to know, haha.

    • @MrPhilbautista
      @MrPhilbautista 2 роки тому

      @@gbalfour9618 Why don't you just hack in on their conversation?

  • @dustinhxc
    @dustinhxc Рік тому +1

    Awesome video! Hackers is what made me want to be in Cybersecurity.

    • @johncoyne1642
      @johncoyne1642 3 місяці тому

      Is Cybersecurity cool or good? I want to know because It look Interesting for a Job

  • @kparsa1
    @kparsa1 3 роки тому +55

    I took cyber security in college for my master's degree. I had so much fun doing the lab assignments but the amount of forms we had to sign really sucked. Oddly enough, I do development now and not so much security.

    • @UnoriginalElephant
      @UnoriginalElephant 3 роки тому +5

      Huh. They didn't make us sign any forms in my cyber security class, they just told us never to do anything we learned without permission from the owner.

    • @gbalfour9618
      @gbalfour9618 3 роки тому

      @Nate McGrew
      They did the same with us. No paper work but we’re told to only do it with permission or to our own networks at home.

    • @JimBob1937
      @JimBob1937 2 роки тому +4

      "I do development now and not so much security"
      In theory you should be utilizing some of those skills in your development. Defenses to vulnerabilities start with knowing what classes of attack vectors exist and developing software to (ideally) not have them.

    • @kparsa1
      @kparsa1 2 роки тому +2

      @@JimBob1937 I use more of the concepts when I do designing and testing. In Salesforce development, we often to do code reviews and validations to find vulnerabilities that would be rejected when going through federal guidelines. Some people tend to be very lax when coding and as a release management I've dinged them for it.

    • @JimBob1937
      @JimBob1937 2 роки тому

      @@kparsa1 , yep, that sounds like a good process. Have knowledge of vulnerabilities, code defensively with those vulnerabilities in mind, then a code review and validation of known vulnerabilities. In general we're seeing a tighter integration and cross-disciplinary approach to security these days towards security for hardware and software developers and engineers. Tacked on security is most usually weaker than a proper implementation from the start.

  • @ivybrandyn
    @ivybrandyn 3 роки тому +143

    I love her. She's amazing at communicating her ideas and has a great sense of humor. :) I want to buy her a drink and learn from her!!!!

    • @jayantkumar159
      @jayantkumar159 3 роки тому +9

      She is hella smart and not a alcoholic 😂

  • @aisadal2521
    @aisadal2521 3 роки тому +35

    Cool, I hope we see more of her in the future!

    • @fustigate314159
      @fustigate314159 3 роки тому +1

      Keren's TED is good

    • @sundhaug92
      @sundhaug92 3 роки тому +1

      @@fustigate314159 Yeah Keren and her sister knows their shit

  • @Ange1ofD4rkness
    @Ange1ofD4rkness 2 роки тому +3

    As someone who used to play CTFs, I wish we had more of them (I would participate with my college, usually doing reverse engineer stuff)

  • @asg8813
    @asg8813 3 роки тому +13

    Wow, she explained all the things so well and in detail. Love to see more of her videos.