Every Computer Can Be Hacked!

Поділитися
Вставка
  • Опубліковано 21 вер 2024

КОМЕНТАРІ • 287

  • @nimbuI
    @nimbuI 2 роки тому +530

    I appreciate the dark video. It's different and easy on the eyes. Global dark mode ftw

    • @ggwp7745
      @ggwp7745 2 роки тому +12

      Let the darkness rise

    • @michaeltorkaman6875
      @michaeltorkaman6875 2 роки тому +2

      @@weakspirit_ hahaha

    • @THExRISER
      @THExRISER 2 роки тому +3

      @@weakspirit_ Ok "Dawn Praiser".

    • @kellysmith7357
      @kellysmith7357 2 роки тому +2

      the fact that some devs dont put in dark mode pisses me off

  • @VaradMahashabde
    @VaradMahashabde 2 роки тому +408

    "every device is hackable"
    "weaponized exploits"
    "every person can be killed"
    UA-cam : _you are on thin ice there mister_

    • @Originalimoc
      @Originalimoc 2 роки тому +1

      😂

    • @ologhai8559
      @ologhai8559 2 роки тому +27

      also YT: "Hey, nothing wrong with that scam spamming comments you have reported. We wont delete it."

    • @aighti
      @aighti 2 роки тому

      *on

    • @supe4701
      @supe4701 2 роки тому

      Why should UA-cam care what he is saying? Besides a few keywords that might automatically flag the video, there’s nothing UA-cam would dislike.

    • @forreutubey780
      @forreutubey780 2 роки тому

      @@supe4701 you clearly have living in a cave

  • @danthe1st
    @danthe1st 2 роки тому +250

    every human could be killed doesn't mean every human gets killed
    ~ LiveOverflow, 2021

  • @em_ma3092
    @em_ma3092 2 роки тому +162

    Me after watching this video:
    **reboots phone just in case**

  • @Daniooo
    @Daniooo 2 роки тому +72

    Liking the new little edits like the glitches and stuff, adds more personality to your videos :D

  • @Stoney_Eagle
    @Stoney_Eagle 2 роки тому +280

    General rule of thumb: If you've seen Doom running on it, it's hackable. 😁

    • @sunnymishra1057
      @sunnymishra1057 2 роки тому +50

      I have seen Doom on pregnancy test kit

    • @vectoralphaSec
      @vectoralphaSec 2 роки тому +39

      @@sunnymishra1057 it's hackable.

    • @efeyzee
      @efeyzee 2 роки тому +11

      @@sunnymishra1057 sadly it was just displaying Doom running on an RPi

    • @zach2830
      @zach2830 2 роки тому +1

      @@sunnymishra1057 came to say that

    • @ThePC007
      @ThePC007 2 роки тому +8

      @@efeyzee And it wasn't even the original hardware. The guy just put his own hardware into the kit and streamed doom to it, which is just boring and completely negates the entire purpose of the challenge. :(

  • @jfb-
    @jfb- 2 роки тому +49

    The fact that every computer could in principle be hacked is the singular thing that makes me nervous about self driving cars

    • @golfmc7941
      @golfmc7941 2 роки тому +5

      So can normal cars 🙃

    • @theairaccumulator7144
      @theairaccumulator7144 2 роки тому +12

      @@golfmc7941 Cars with no computer can't be hacked.

    • @tresuvesdobles
      @tresuvesdobles 2 роки тому +9

      There is no such thing as cars with no computer anymore. Furthermore, for instance, plains are completely automatic too, yet there are no known cases of hacking. Idk, I feel we just have to not think too much about it

    • @veneering4128
      @veneering4128 2 роки тому +4

      @@tresuvesdobles planes have been hacked before by the CIA in order to kill people fighting against their oppression

    • @maxpoppe
      @maxpoppe 2 роки тому +2

      @@tresuvesdobles well the USA military has cars without electronics in case of an emp so yea those aren't hackable

  • @precipire1025
    @precipire1025 2 роки тому +4

    "Hey I think I have a virus"
    "Have you tried turning it off and on again?"
    "what"

  • @_CryptoCat
    @_CryptoCat 2 роки тому +26

    Awesome video 😸 So lucky cts didn't get hit by the exploit targeting researchers! I'm also among the 3% that use Firefox 🔥🦊😎

  • @Florian.Dalwigk
    @Florian.Dalwigk 2 роки тому +50

    The amount of proficiency in this video is pure MindOverflow 😅

    • @DarkyBoy
      @DarkyBoy 2 роки тому +7

      Cool dich hier zu sehen :P

    • @BenjaminAster
      @BenjaminAster 2 роки тому +7

      Ich erwarte eine Kollaboration zwischen euch! Ihr seid schließlich beide deutschsprachig.

    • @Florian.Dalwigk
      @Florian.Dalwigk 2 роки тому

      @@DarkyBoy 😊

    • @Florian.Dalwigk
      @Florian.Dalwigk 2 роки тому +3

      @@BenjaminAster Ich werde es mal anbringen :)

    • @teggolT
      @teggolT 2 роки тому +4

      Zwei deutsche sprechen Englisch miteinander
      ---
      Two Germans speaking English with each other

  • @solveigvan808
    @solveigvan808 2 роки тому +34

    I think a more useful question is: "Can every device be hacked remotely without your interaction or awareness."
    This is the type of attack that concerns me the most and fortunately there are several ways to prevent this almost completely.

  • @bopon4090
    @bopon4090 2 роки тому +1

    Could not thank enough for sharing these. I use to think no one can hack my phone unless they have a physical access to my device.

  • @mu11668B
    @mu11668B 2 роки тому +4

    Expectation:
    _Free WiFi is dangerous it could pwn your phone and drain your wallet._
    Reality:
    *Ahhhahaha free routers botnet goes brrrrrrr!*
    *Ohh this kid downloaded our fake cracks and installed malware on their parents' desktop! By disabling the antivirus as what we told them! Lmao!*

  • @BasteG0d69
    @BasteG0d69 2 роки тому +11

    Great video! :-)

    • @askplays
      @askplays 2 роки тому +2

      :) Ayy it's the guy from the video

    • @daljeetbhati8353
      @daljeetbhati8353 11 місяців тому

      U r videos sure go over head but they are very good

  • @mo938
    @mo938 2 роки тому

    i remember when LO didn't show his face. he has come so far and it's been incredible watching. keep up the good work.

  • @b3twiise853
    @b3twiise853 2 роки тому +8

    Dude casually has a pwn2own award hanging behind him

  • @EnricoCalrissian
    @EnricoCalrissian 2 роки тому

    I couldn't have summarized it better myself. And congrats to being published in Phrack

  • @valshaped
    @valshaped 2 роки тому +5

    Step 1: Define "device" in a meaningful way
    Step 2: check if your target is a device

  • @zanidd
    @zanidd 2 роки тому +3

    I really enjoyed this format. I need mooore :D

  • @default939
    @default939 2 роки тому +1

    Can you do a video about row hammer exploitation please ?

  • @kipchickensout
    @kipchickensout 11 місяців тому

    "phishing or a company mishandling your data" kinda reminded me of the new (at least german) IDs requiring you to let them store your finger prints and even though I don't know why that could be a problem, I do not even remotely trust them with those... it feels like telling them my password which they then probably just store in plain text

  • @kritikusi-666
    @kritikusi-666 2 роки тому

    @ 14min...you stay away from my cookies. This was a very great piece.

  • @Maxjoker98
    @Maxjoker98 2 роки тому +4

    > Always remember, always reboot your phone
    Yeah right, like I have any other choice with my PinePhone. That thing is a little unstable ;)

  • @GBlunted
    @GBlunted 2 роки тому

    I feel like this is awesome content! Love the input from the other experts sprinkled throughout the video, each in their own style. So cool! 😎

  • @luizinhoensina
    @luizinhoensina 2 роки тому +3

    dude, your content has to be one of the best in UA-cam, love what you're doing!

  • @ron46135
    @ron46135 2 роки тому

    Thank you for this well made video. Interesting discussions and pointers raised!

  • @TheGrimravager
    @TheGrimravager 2 роки тому +9

    running debian unstable with a cron that runs every 6 hours: sudo apt-get update -yqq && sudo apt-get upgrade -yqq
    so basically, I'm super vulnerable when the debian repository gets hacked xd

  • @887310954
    @887310954 2 роки тому

    sometime big software firms leave vulnerabilities unpatched just because they accept risk and put blidfold

  • @kkon5ti
    @kkon5ti 2 роки тому +1

    my phone fucks itself up so often, it gets rebooted sometimes even twice daily

  • @YandiBanyu
    @YandiBanyu 2 роки тому

    The subtitle is golden haha. Loved your content

  • @VivekYadav-ds8oz
    @VivekYadav-ds8oz 2 роки тому +3

    Seeing how so many of these vulnerabilities are memory-related, it would be interesting to see how the solutions that tackle it at the programming language level pan out. If you would make a video on that it'd be really cool.

  • @CraneArmy
    @CraneArmy 2 роки тому +39

    breaking into fort knox for a gold heist, may be possible, how many armored divisions do you have?
    worth?

    • @nexovec
      @nexovec 2 роки тому +4

      Originally I read it as fart box, but that doesn't matter. Security solution for newer samsung phones is literally named knox.

    • @gameglitcher
      @gameglitcher 2 роки тому +2

      I am unsure of the processes of Fort Knox, but I am sure they have incoming and outgoing shipments of things. Access to the ledgers for these would provide a much more realistic attack vector. After all, your goal is to get the material out, why not use the systems they have to your advantage and weaken the target? I am sure much more research went into the development of the Fort than the armored transports.
      Physical security still has the same weaknesses of mismanaged I/O and backdoors. Plus when the physical security is controlled by electronics, an armored truck is just a mechanized safe with lethal security measures on wheels, right?

    • @CraneArmy
      @CraneArmy 2 роки тому

      @@gameglitcher Im sure you are right. but I'm giving this as a benchmark. This is the immediate solution, that sets a baseline for risk and cost. All other solutions are going to be higher risk and lower cost, or they are bad vectors.

    • @gameglitcher
      @gameglitcher 2 роки тому

      @@CraneArmy Fair XD. if it wasn't for your comment I wouldn't have had a response >.>

  • @_xpl0it_
    @_xpl0it_ 2 роки тому +1

    thanks for this video brother, got to learn a lot from this video. I too definitely disabled jit and webassembly for no obvious reason, but since the experts do and it's good to do so then why not

  • @fjb1854
    @fjb1854 2 роки тому +1

    7:45 Full chain. I've clicked on Google ads using a Google browser and gotten malware, so I can confirm this.

  • @j3r3miasmg
    @j3r3miasmg 2 роки тому

    Nice to see some of the legends talking about vulnerabilities.

  • @vectoralphaSec
    @vectoralphaSec 2 роки тому +11

    Would be great to hear what the researchers think is the best or more secure browser? is it Google Chrome? Microsoft Edge? Firefox? Opera? Brave Browser? Safari? or any other browser. Which one do they think is better?

    • @Jujo1
      @Jujo1 2 роки тому +1

      Yeah even I would love to know this, glad the guy was using Firefox but considering how Firefox is one of the most used browsers out there wouldn't there be people trying to make 0day exploits that can work on both chromium and Firefox too? Should I really rely on Firefox so much?

    • @binarycat1237
      @binarycat1237 2 роки тому +1

      lynx (¾ joke)

    • @marz3308
      @marz3308 2 роки тому +2

      no one safe, it's just less targeted than others

  • @codegeek98
    @codegeek98 2 роки тому +1

    The subtitles go haywire starting at 10:35 and 13:13

  • @sajjadhossanshimanto8622
    @sajjadhossanshimanto8622 2 роки тому +19

    You're lying. You can't hack my Broken PC

    • @Gabriel-xq5es
      @Gabriel-xq5es 2 роки тому +9

      haha Axe go brr

    • @ludfde
      @ludfde 2 роки тому

      If somebody hacks my pc thats literally the only person, that has access to it.

    • @SproutyPottedPlant
      @SproutyPottedPlant 2 роки тому

      What about my Sega Mega Drive?

  • @gunner9037
    @gunner9037 2 роки тому +13

    it's incredible that buying and selling these exploits to third parties isn't illegal even though it definitely should be

    • @LiveOverflow
      @LiveOverflow  2 роки тому +13

      it's heavily regulated

    • @YandiBanyu
      @YandiBanyu 2 роки тому +1

      @@LiveOverflow May I ask why? I mean, what is the purpose? If it's government, I could see it, but a third party?

    • @TheElexec
      @TheElexec 2 роки тому +6

      It's just information. Regulating this gets really close to regulating free speech. A lot of third party buyers are also governments and tech companies themselves. Making a market illegal just moves the buyers into the black market. Also, security researchers are smart enough to hide their traces anyway.

    • @YandiBanyu
      @YandiBanyu 2 роки тому +2

      @@TheElexec you've got a point. Moving the market to the black market just make things worse.

    • @georgehammond867
      @georgehammond867 2 роки тому +3

      pagacus is made by israel and very advances in real life.

  • @danthe1st
    @danthe1st 2 роки тому +7

    depends on how you define "every device"

  • @iamNATFAN
    @iamNATFAN 2 роки тому +7

    My issue with one point in this video is that a software "weapon" is very different from real weapons, like you said. However in my opinion the key difference here isn't the level of damage that can be caused (quality), it's the amount of people that can be affected (quantity). We know that exploits like Pegasus do exist in the real world, and they are relatively hard to detect. Because a zero click exploit could be effectively deployed on any device, it can therefore be deployed on every device.
    Without trying to sound too much like a conspiracy theorist, we know that historically nation states are usually 10-20 years ahead of consumer technology. I don't see why we should consider the Digital Age any different in that regard. If you were a dictator, and you wanted to have near omnipotence of anything that happens in your country (or abroad, the Internet doesn't abide by physical borders), why wouldn't you pay a few million (or billion, you have country-level money) and get a nice new zero click zero day that you can deploy on any number in the phone book?
    Sorry for the ramble, happy to chat with people further about this. I'd love to be proved wrong, because right now I can't really see a fault in my logic here, apart from speculating on potential technology, which I am willing to admit debases the premise a little.

  • @AgentM124
    @AgentM124 2 роки тому +1

    Even with an infinite amount of ways to hack a computer, there can still be unhackable computers.

  • @matasarlauskas3165
    @matasarlauskas3165 2 роки тому

    Thank you, this video was really interesting and helpful :)

  • @freeweed4all
    @freeweed4all 2 роки тому +1

    Tell us the truth.. why Todesco refused to be interviewed? BTW, always good content!

  • @nathanellis7819
    @nathanellis7819 2 роки тому

    Thank you for the dark mode. My eyes are grateful. Wish more ppl would do this.

  • @hpsmash77
    @hpsmash77 2 роки тому +1

    You should also, in the general guidelines, include that its better physically disable stuff that using some software, like how you should detach your webcam and mic when not in use.
    great video

  • @snowstar3560
    @snowstar3560 2 роки тому

    "Every computer can be hacked" well good luck trying to hack an offline computer lol

  • @OrangeSan
    @OrangeSan 2 роки тому

    "every device is hackable"
    *turns on on incognito mode*
    You can't touch me now buckaroo :)

  • @krlst.5977
    @krlst.5977 2 роки тому

    Excellent video, thanks!

  • @rachitmukherjee5725
    @rachitmukherjee5725 2 роки тому +1

    The subtitles from 10:35 to 10:57 say something elsee 🤔🤔🤔🤔

  • @Zedoy
    @Zedoy 2 роки тому +2

    Nee Video!!! Yaaay ❤️

  • @yugiohsc
    @yugiohsc 2 роки тому +1

    I also hadn’t updated my phone! Thanks

  • @OthmanAlikhan
    @OthmanAlikhan 2 роки тому

    Thanks for the video =)

  • @georgehammond867
    @georgehammond867 2 роки тому

    you are a lot better then alot of others people around on UA-cam.
    can you give that SUDO exploit, this will make you very famous.

  • @tacokoneko
    @tacokoneko 2 роки тому +11

    15:50 the firefox master race wins again. obviously this isn't saying there aren't firefox exploits, but it is saying that chromium exploits are much more sought-after, popular and common than firefox, because of market share. all the more reason to use pale moon - present-day pale moon is hard forked from no newer than firefox 52, making upstream firefox 0-days incredibly unlikely to work on it. and no matter what browser you use, turning off javascript completely except for a small whitelist makes it exponentially more difficult to target your attack surface.

    • @isse6790
      @isse6790 2 роки тому

      Using old software doesn't make you more secure, it makes you much more unsecure. Furthermore Pale moon is maintained by a retarded furry and should not be used by anyone. Palemoon has already been attacked once when one of their servers got hacked and every executable was bundled with malware.
      Don't give security advice when you don't know what you're talking about.

    • @tacokoneko
      @tacokoneko 2 роки тому +1

      @@isse6790 the fact you think pale moon is old software automatically makes your entire opinion invalid and discarded

  • @steven9492
    @steven9492 2 роки тому

    i think the production value of this channel is going up, and I love it! however I think the shadows on your face were too dramatic

  • @xerotoninz
    @xerotoninz 2 роки тому +1

    just restarted my phone... and ill update later

  • @myname-mz3lo
    @myname-mz3lo Рік тому

    with a quantum computer yes. everything can be decrypted . no need for it to even be hacked

  • @jeanpierre5941
    @jeanpierre5941 2 роки тому

    The question isn’t can you be hit by a 0-day of course you can, the question is instead are you worth it, are you in possession of have access to something that would justify using the work of 5-10 highly skilled engineers?
    90% of the time the answer is no.

  • @ericschroeman5020
    @ericschroeman5020 2 роки тому

    palo alto 0day wreaking havoc atm

  • @safwanljd
    @safwanljd 2 роки тому

    Your content is gold, you just need more appealing thumbnails

  • @Desperado070
    @Desperado070 2 роки тому

    We all get killed by the grim reaper in the end...
    Time to put me computer in a safe.

  • @愛
    @愛 2 роки тому

    16:30 good info

  • @asandax6
    @asandax6 2 роки тому

    Question is the video supposed to cut off around 8:04 with a message "An error ocurred. Please try again later.(Playback ID: xxxxxxxxx)"?

  • @kobenbawest
    @kobenbawest 2 роки тому

    “Amy” scares me

  • @monolofiminimal
    @monolofiminimal 2 роки тому +19

    The true answers is yes & no xd, depending on the phase of the moon

    • @zyansheep
      @zyansheep 2 роки тому +2

      The answer for every question is "it depends"

    • @gl3nda96
      @gl3nda96 2 роки тому

      @@zyansheep is this reply a reply?

    • @du42bz
      @du42bz 2 роки тому +1

      @@gl3nda96 It depends

    • @gl3nda96
      @gl3nda96 2 роки тому

      @@du42bz Thank you, I was in an existential crisis over that

  • @glyslay4102
    @glyslay4102 2 роки тому +1

    16:49 umatrix shouldn't be used as a mitigation of javascript-related threats. Development is ended and the github repository is archived. Use alternative solutions for js blacklisting.

    • @adamblomberg
      @adamblomberg 2 роки тому

      Outdated stuff. The developer has just said to use unlock origin since it has similar features from same developer. Also what she mean with iphone? There's only safari on iphone, that's the only engine used for all of them. It's very outdated as well apple not supporting web standards to keep monopoly on app store. Also exploits for Android has been more expensive than iOS because iOS had so many they had to disable the security firm couldn't take any more and closed reporting for a time don't know the situation now. Also pretty curious how famous people like Elon musk with extreme confidential information deal with this it's pretty known he uses an iPhone.

  • @ozgur5117
    @ozgur5117 2 роки тому +1

    5:54 lol Microsoft exchange anyone surprised

  • @_specialneeds
    @_specialneeds 2 роки тому

    I know you can run separate systems on Android in a VM which I do from time to time for browsing the web. I really don't bother with Apple products because of their unethical opposition to the right to repair movement but VMs are a good way to isolate your activity.

  • @MrKristian252
    @MrKristian252 2 роки тому +2

    Ok, so Apple is paying millions to prevent jailbreaking?

    • @NameGoesHere285
      @NameGoesHere285 2 роки тому +2

      Oh no, that is a buyer and reseller of zero-day exploits, their final buyer is probably governments/intelligence agencies, nothing to do with Apple.

  • @AgentM124
    @AgentM124 2 роки тому

    I wonder if you buy a phone that's 4 years old, if it's vulnerable to attacks because the factory software is out of date and still has to perform a system update to the latest security version. So there might be a time frame in which you could get trojaned or something.

  • @myname-mz3lo
    @myname-mz3lo Рік тому

    the people you had on will have a harder time finding work i hope you know that .

  • @Whitbug68
    @Whitbug68 2 роки тому

    I actually need a phone tracked. No number and address and name.

  • @ag0ny
    @ag0ny 2 роки тому

    Nice. Thanks 👍

  • @SergiuszOlszewski
    @SergiuszOlszewski 2 роки тому +1

    I use Windows 10 Mobile. 0.01% market share. No chance there is an exploit for my phone one would be able to sell.

  • @Fatih9837
    @Fatih9837 11 місяців тому

    Great Video

  • @Rerbun
    @Rerbun 2 роки тому +1

    I'm guessing using the Lynx browser in termimal also reduces the attack surface quite a bit?

    • @4.0.4
      @4.0.4 2 роки тому +5

      No, you need to hide in the woods and communicate only by pigeon. Make sure to inspect every pigeon packet to be double safe.

  • @Nohiding
    @Nohiding 2 роки тому

    That's all well and good. You can be concerned of a zero day if you want, but why wouldn't I just break in your house. Or break in your car to exfiltrate your laptop when you are at Starbucks. This is what mobile developers go through. Most likely security researchers too. I mean really government has a monopoly on this type of attack. Zero day is much easier for government when they can see the code in the apps you use.

  • @Kynatosh
    @Kynatosh 2 роки тому +1

    They can't hack my mechanical turing machine without having physical access :D

  • @loganjoy-koer5936
    @loganjoy-koer5936 2 роки тому

    This video reminded me to restart my phone. Thank you.

  • @LittleRainGames
    @LittleRainGames 2 роки тому

    I think the government has to worry, not the average citizen.

  • @ARitzCracker
    @ARitzCracker 2 роки тому +1

    I got a question for you. What's the risk when Android phone manufactures stop pushing updates to their devices after the devices are 3 years old? When my Phone started getting kernel updates from the manufacturer, I started using LineageOS. I know someone could theoretically edit my system partition to put their nasty stuff instead if they have physical access, but wouldn't being unable to receive system updates for your phone make you more vulnerable to drive-by's?

    • @ActualAshCam
      @ActualAshCam 11 місяців тому

      If your kernel has release-keys builds (which I believe Lineage does), you should be able to re-lock your bootloader and still receive OTA updates.

    • @ARitzCracker
      @ARitzCracker 11 місяців тому

      @@ActualAshCam ah, the issue is that I use magisk so I can bypass the non-manufacturer-approved OS checks so I can still use my banking app on my phone. Re-locking the bootloader in that state still bricks the phone.

    • @ActualAshCam
      @ActualAshCam 11 місяців тому

      @@ARitzCracker Ah, I see. You still probably could, it would just take a lot more work, including creating your own signing keys, and signing patched boot images.

  • @LiEnby
    @LiEnby 2 роки тому

    Man it would be so cool to be able to do this .

  • @prevostclement
    @prevostclement 2 роки тому

    Any advice for crypto users? Especially with DeFi stuff, disabling js is definitely not possible. Do you have recommendations?

  • @MrAntiKnowledge
    @MrAntiKnowledge 2 роки тому

    I can hack every device if I get my hands on it.
    * sharpens his hatchet *

  • @eqwadordivoo3792
    @eqwadordivoo3792 2 роки тому

    but what is the most common method to discover 0days ? fuzzing, code audit(only for open source) or reverse engineering?

  • @samuelsamuel4099
    @samuelsamuel4099 2 роки тому +6

    I use TempleOS btw

    • @vectoralphaSec
      @vectoralphaSec 2 роки тому +1

      what's that?

    • @migueltucabron
      @migueltucabron 2 роки тому +1

      No, you're not. TempleOS can't even connect to the internet.

    • @samuelsamuel4099
      @samuelsamuel4099 2 роки тому +2

      @@migueltucabron that was my point

    • @migueltucabron
      @migueltucabron 2 роки тому

      @@samuelsamuel4099 No, your point doesn't make an sense because you're writing a comment on UA-cam.

    • @v380riMz
      @v380riMz 2 роки тому

      I use AmongOS

  • @l3yce583
    @l3yce583 2 роки тому

    If for example a journalist uses a second machine (and maby a second network) for projects which is not connected to global network (or to anything else outside his control) anny way of access should be eliminated right?

  • @humanrightsadvocate
    @humanrightsadvocate 2 роки тому

    19:19 I rebooted my phone without giving it a second thought!

  • @denisrosas
    @denisrosas 2 роки тому

    One question I always had. Is copying and pasting my password from a password manager is a really stupid way to get pwned?

  • @Opcode
    @Opcode 2 роки тому +3

    make video in row hammer exploitation please :)

    • @Swixo
      @Swixo 2 роки тому +2

      I’m also very interested 👍

    • @default939
      @default939 2 роки тому +1

      good idea !

  • @tibofordeyn1529
    @tibofordeyn1529 2 роки тому

    Ok but that’s quite scary

  • @antoinehanako3193
    @antoinehanako3193 2 роки тому

    Ok, but what about intentional backdoors either in software, or hardware?

  • @niisc
    @niisc 2 роки тому +2

    Time to switch to TempleOS

  • @0okaze
    @0okaze 2 роки тому +1

    Reassuring to hear fellow computer scientist workers basically say the same things that I’ve known, said and applied for 20+ y. Using Umatrix on my Firefox browser (compiled specifically for my PC) is basics for me.

  • @johnnutsack
    @johnnutsack 2 роки тому

    that steven guy looks like white rose from Mr Robot

  • @erwor
    @erwor 2 роки тому

    Is it dangerous to use an old android phone that does not get updates for more than 3 years now?

  • @lis6502
    @lis6502 2 роки тому

    this autoupdate crap is double sided edge and i feel sheer lack of UAT/ DTAP model of delivering updates.
    consider that updated browser doesn't support password saving "for security reasons". or what's worse, stuff their annoying ad banners to menu, because they can.
    no,thank you, i'll decide by myself if its worth of applying certain update.

  • @TheHandsomeOne
    @TheHandsomeOne 2 роки тому +1

    When you're a nobody and has good opsec, there's nothing much to worry about.😊

  • @clippy3656
    @clippy3656 2 роки тому

    I am so curious if he really rebooted his phone in that video or if he just slid his finger over the screen