What is sad is that the same technology that does this, could be used to improve life for everyone on the planet. But since we are full of stupidity and greed this is what we have. I am about to hit 50 years old, I saw the internet growing, I saw amazing innovations and was hopefully for the future, and this is what my kids kids, will have.
that moment when you realize your thoughts will already be the top rated comment and just look for the thumbs up on it instead. So yeah, let me save you 20 minutes and save you from becoming dumber..... skip this video. Don't listen to a lecture about technology from a guy that says "the youtube" hint: hes probably from "the iraq"
its the same thing on a larger scale. better known as honeynets which are made of honeypots. these are just smart honeypots that are linked together. TrapX makes a neat product thatll even replicate PLC equipment and generate bogus event log things so it looks real enough.
@@therealderekchurch if you were to bomb a nuclear reactor there would be "nuclear fallout" in the form of radiation. What he did was a play on words. Because fallout used as a word by itself to explain something means consequences.
I have for years thought that engine computers at least could alter the spark timing to cause occasional extremely early ignition (and very high cylinder pressure) leading to early mechanical failure. My suspicion dates back to a 1976 Pontiac. At about 6 years of age it began pinging when it had not before. It pinged but with no seeming pattern, and not even 100 octane racing fuel stopped the pinging. We replaced the ignition module, the coil, cap and rotor, all the wires and plugs without any impact. Carbon deposits were the next suspect, but when we pulled the heads it was clean. We did a valve job and installed new springs and vatted the intake manifold. When we put it back together and drove it, the pinging was gone. Then we realized we left the plug that sets the ignition timing to base unplugged, and wouldn't you know it, the pinging came back. We wound up installing a stand-alone MSD system that just used mechanical and vacuum advance. That worked and got better mileage and better acceleration, though both were still awful. It was a 1976 Pontiac 455 (with a pavement-shattering 160hp LoL) after all, but it was still going at about 300k when I lost track of it. Not many '76 engines of any make or model made it much past 100k.
More mechanics and less digital technology and people will not be able to hack or spy on it, but the future is unfortunately 0% mechanic and 100% digital technology. That's why I always hated these new mobile phones.
The first virus was written on punch cards in 1968. The internet didn't even exist as we know it today, it was a connection between universities and military so that data could be quickly shared. A collage kid wrote it to see what would happen. And he also wrote the first virus protection program.
The only way to be 100% sure is to have a physically isolated network. I had a customer that insisted on it. They had two computers on each desk: one was connected to the Internet, and the other was connected to the LAN and server with the ERP system. All USB ports were disabled, and of course, end users were not 'Admins', lol. They never had a problem w the isolated system. Imagine that.
yep. Got that since 2000. 20+ yrs of peace and I'll be dead before they find a way of getting around that 🖕. Meanwhile my son, who grew up with that system, has become a hacker - of course.
yeah idk, I feel like he uses the "licence to kill" in comparison with the "ally" that james bond has today, which is a fake agent that does the job but doesn't reveal actual information - like he explain right before with shadow networks or whatever
I guess it’s more his way to say that they are also allowed to engage on the networks which are collecting data from their honeypot/ shadow network. I didn’t do research on this guy, but he seems to have pretty good inside in offensive hacking strategies of the past decade. so why are you thinking his company just uses this defensiv mechanisms he showed during the talk
This was an EXCELLENT talk on CyberSecurity, wow! Seems simple enough but I would have never thought about enabling network intrusion via the creation of a dummy or "shadow network". Since we aren't in a space where we can re-architecture how networks pass data its an ingenious idea to use a network to trap and direct hackers to make them think they've hit paydirt.
What also works instead of espionage? Diplomacy. Sometimes trust is worth more than having a thousand missiles or viruses. But we are taught to defeat the enemy, not befriend him.
Never seen people get to upset over someone giving them information. I mean seriously, would you rather be in the dark and blind our whole life? He’s not pushing opinions onto you. He’s simply giving you facts and information. Do with it what you will.
"Has technology made our lives better or worse." I would argue that it has made our lives just slightly better. There is still poverty, depression, wars, and now an online mob. Do we really want this technology even more in our lives?
This speech is informative about the way the present and future will be on cyber defense and infiltration. The down side is its bias to oneside, saying that this country or that country is making nuclear weapons. Let countries like the USA, Russia and China also have stock nuclear weapons. So if another country tries to arm itself it is added to a sanctions list. Its a case of a story not being bias to one country and keep it neatral to all countries. Keep it to science and tech and not politics.
18:45 In a nutshell: In a virtual world but full of Player versus player, then booted to a world full of npcs with the sprites of the original players.
It's already happening. Just this morning I went to microwave some soup and when I got it out the bowl was scalding hot to the touch but the soup was still COLD
if i found a usb stick i would insert it into my virtual machine to check and wipe it. then use it. (the wiping also wipes and replaces the partition table so ALL data is gone, nearly pemenently)
scooter800m None of those things you said are true except that you'd plug it into your computer. Your virtual machine can't access that USB stick until your host operating system has connected and talked to it to tell your VM that it exists in the first place. By the time your VM knows it's there, you've already been pwned. Also, if it's actually a rogue device designed to hack your machine, you're only going to be able to wipe the part that it wants you to think you've wiped, not the part that was put there to infect your machine.
McFacoffee - this has been a pain telling me l had no protection (when l have Defender which l found after a search) and slowing my operating system. I am NOT computer literate but managed to delete the bugger for good today. Now my computer runs smoother than ever! Does anyone think its a bad apple? (If doctors feed you with bad apples they can always charge you for services.) l think some of these companies actually give your computer viruses so you sign up in a panic.
So what is new? How much time is required before a hack is found? Are you relying on your trusted software developers for security? You are a target don't you think it prudent to test your vulnerability? Would you not bait and trap? Ever considered training and education in " computer espionage "? Cyber warfare anyone?
This talk reflect the information that is verifiable in most media. The first this or that is actually the first time journalists spread the new to everybody. The experts know many more earlier examples. Just dig at the right place for counter examples. That doesn't diminish the importance of the talk. I just want to remind people to do a little more research before propagating the facts that are said in this video.
A lot of this is incorrect in terms of the Natanz stuxnet attack. The Natanz siemens box was airgapped so it was impossible for stuxnet to phone home, it was programmed to know what to do. Also recently (3 months as of the writing of this comment) it was discovered that stuxnet was delivered via a water pump installed in the facility.
This is a good video to share with those who are oblivious to the real-world threats we face on the digital battleground.
That was the most informative TEDx talk I've listened to. Thank you so much.
This guys "dad jokes" must be epic.
Poor kids :-)
His dad jokes are dead jokes.
Oh boy.. just you wait...
You have no idea man…dinner table jokes are something else
What is sad is that the same technology that does this, could be used to improve life for everyone on the planet.
But since we are full of stupidity and greed this is what we have.
I am about to hit 50 years old, I saw the internet growing, I saw amazing innovations and was hopefully for the future, and this is what my kids kids, will have.
Yup sir!
17:27 hes sending hackers to the mirror dimension. dr strange would be proud
"the youtube"
As soon as he said it, I scrolled down looking for this comment.
It's like the boobtube, but on the internet.
Daryl Ladd as soon as I heard that I was looking for this comment
that moment when you realize your thoughts will already be the top rated comment and just look for the thumbs up on it instead. So yeah, let me save you 20 minutes and save you from becoming dumber..... skip this video. Don't listen to a lecture about technology from a guy that says "the youtube" hint: hes probably from "the iraq"
Daryl _"I don't do the Email"_
Unplugging my GameCube from now on, don't want to get hacked
MrSkyTown hahaha wtf
After the vault 7 leak, that doesn't sound so funny anymore does it?
they'll spin that tiny CD so fast it'll break the CD drive.
Good idea, can't trust those Japanese
I already warned you.....do not unplug me.
"Imagine the fallout" Ahhhh, I see what you did there.
What is da meaning ?...
"Will we ever realise it" made me think of Brave New World in a chilling way
Sound Addiktion Me too.
new age honeypots is essentially the gist of this talk. The software suite they use is obviously next gen and mind blowing.
He never really scratched at the true facts but all he said was very interesting and with humour thumbs up
"shadow networks" > Honeypots
its the same thing on a larger scale.
better known as honeynets which are made of honeypots.
these are just smart honeypots that are linked together. TrapX makes a neat product thatll even replicate PLC equipment and generate bogus event log things so it looks real enough.
Yup, just network of honeypots, nothing neew really. And Stuxnet story has few more very interesting aspects.
yup except they are programmed to talk to each other☝
@@marcinnawrocki1437 such as ?
I really enjoyed this! Such a great balance of humor and information. Sucked me right in! Fascinating!
man I recall all those viruses name from my childhood when I was so obsessed with computer magazines
I was hoping this guy would say agent 009 is now agent 1001 but eh... wasted opportunities...
Nope, he is top secret. Agent 404.
not found, huh, that one is also good
Said it near the end 001
@@lostspace5811 Thats not what he meant. The number 9 in binary code is 1001. 7 would be 0111
it was double 001 earlier James Pond. it's cutely in binary.
He is a very great presenter! Thanks!
"Imagin the fallout", I see what you did there, and I love it.
please explain...
@@therealderekchurch if you were to bomb a nuclear reactor there would be "nuclear fallout" in the form of radiation. What he did was a play on words. Because fallout used as a word by itself to explain something means consequences.
Love this guy, wish I had a boss like this!!
Propose to him! 😍
This video is 8 years old and still looks next gen today.
What a great presenter! These jokes really kept me engaged lol
Thanks Eric, for this enlightenment.
I have for years thought that engine computers at least could alter the spark timing to cause occasional extremely early ignition (and very high cylinder pressure) leading to early mechanical failure. My suspicion dates back to a 1976 Pontiac. At about 6 years of age it began pinging when it had not before. It pinged but with no seeming pattern, and not even 100 octane racing fuel stopped the pinging. We replaced the ignition module, the coil, cap and rotor, all the wires and plugs without any impact. Carbon deposits were the next suspect, but when we pulled the heads it was clean. We did a valve job and installed new springs and vatted the intake manifold. When we put it back together and drove it, the pinging was gone. Then we realized we left the plug that sets the ignition timing to base unplugged, and wouldn't you know it, the pinging came back. We wound up installing a stand-alone MSD system that just used mechanical and vacuum advance. That worked and got better mileage and better acceleration, though both were still awful. It was a 1976 Pontiac 455 (with a pavement-shattering 160hp LoL) after all, but it was still going at about 300k when I lost track of it. Not many '76 engines of any make or model made it much past 100k.
More mechanics and less digital technology and people will not be able to hack or spy on it, but the future is unfortunately 0% mechanic and 100% digital technology. That's why I always hated these new mobile phones.
Nothing new or groundbreaking in this presentation but a great introduction for the layman.
The first virus was written on punch cards in 1968. The internet didn't even exist as we know it today, it was a connection between universities and military so that data could be quickly shared. A collage kid wrote it to see what would happen. And he also wrote the first virus protection program.
Next Halloween I'll just skip the usual horror movies and theme thing and I go to the next level. I watch a lecture by Eric Winsborrow
I've heard about this secret mission before. I believe there is a full documentary about it.
Wow! A great talk, informative and a little scary with a glimpse into the future. Thanks.
Actually, he showed how the confluence of man and machine makes us much more susceptible.
Thanks, TED 4 sharing.
this was technology back in2013 ,now after 5 years .
we are at a way higher RISK
China's i-war end game has advanced considerably since this guy gave the talk. They are constantly targeting cellphone networks and other assets.
Yeah no way jose
The only way to be 100% sure is to have a physically isolated network. I had a customer that insisted on it. They had two computers on each desk: one was connected to the Internet, and the other was connected to the LAN and server with the ERP system. All USB ports were disabled, and of course, end users were not 'Admins', lol. They never had a problem w the isolated system. Imagine that.
yep. Got that since 2000. 20+ yrs of peace and I'll be dead before they find a way of getting around that 🖕. Meanwhile my son, who grew up with that system, has become a hacker - of course.
Thanks for the real question at the end.
This guy is brilliant, genius and hilarious.
Great presentation.
The piece just before the conclusion was a non-sequitur ('Licence to kill'). He didn't go anywhere with it.
He's a bit socially awkward is all.
yeah idk, I feel like he uses the "licence to kill" in comparison with the "ally" that james bond has today, which is a fake agent that does the job but doesn't reveal actual information - like he explain right before with shadow networks or whatever
I guess it’s more his way to say that they are also allowed to engage on the networks which are collecting data from their honeypot/ shadow network. I didn’t do research on this guy, but he seems to have pretty good inside in offensive hacking strategies of the past decade. so why are you thinking his company just uses this defensiv mechanisms he showed during the talk
"License to murder ".
This was an EXCELLENT talk on CyberSecurity, wow! Seems simple enough but I would have never thought about enabling network intrusion via the creation of a dummy or "shadow network". Since we aren't in a space where we can re-architecture how networks pass data its an ingenious idea to use a network to trap and direct hackers to make them think they've hit paydirt.
believe me its all nonsense 99% of this presentation has no foundation in reality.
@@ebaystars Then why aren’t you on here presenting your newest discovery?
@@brok3nsec no money in it :-)
@@ebaystars lol says you.
Dummy
What also works instead of espionage? Diplomacy. Sometimes trust is worth more than having a thousand missiles or viruses. But we are taught to defeat the enemy, not befriend him.
I remember hearing about the "Michaelangelo" virus when I was playing Oregon Trail , in Elementary school
Interesting how his contention is the subject of Spectre and how boots on the ground defeats "cyber" in the movie.
I honestly wouldn’t be surprised if he turned out to be a robot.
Anyone know what software he is using towards the end of the talk? Some sort of network visualizer?
You civilians don't get to have that stuff until the machines allow you to.
I don't know why he bothered creating a vision of the future when what he's describing is exactly what Cliff Stoll described in The Cuckoo's Egg.
Someone get this man a glass of water
Mic at fault.
Never seen people get to upset over someone giving them information. I mean seriously, would you rather be in the dark and blind our whole life? He’s not pushing opinions onto you. He’s simply giving you facts and information. Do with it what you will.
Thank you
Old School Theory (not uploaded to my channel yet...) counters this threat beautifully!
Excellent Presentation !! Although scary !!!
Fantastic... Knowledge along with humour.. great
One of the best Ted talks
wow excellent presentation
Chuck Norris could swim in a desert.
Usta surf sand dunes in N.M. !
When Chuck Norris jumps in the ocean he doesn't get wet. The ocean gets Norris.
Mark rober already did that to one of his cousin 😂
Watch his super mario effect
There was a time when Chunks Norris could do that, but he's over the hill now.
Chuck Norris would have not sped up the centrifuges, he would have sped down earth.
Do all the Ted talk presenters follow the exact same talk structure
?
Fascinating talk....
Excellent!
2013? holy moley! I wish I this guy's foresight
A great Ted !
Ahh I remember the “I love you” hit just as panic died down when it became clear the Y2K bug wasn’t gonna happen
"Has technology made our lives better or worse." I would argue that it has made our lives just slightly better. There is still poverty, depression, wars, and now an online mob. Do we really
want this technology even more in our lives?
Wow...thank you
Great speaker.🙏✨
Great knowledge sharing.. And the voice is very clear and bold like some hacker threatening very seriously 😂
Good ,informative and true
Thank You!
Great vid!
the chinese had access for 10 years, huh...that 1 Trillion dollar annual defense budget is really worth the price tag
Operation "Olympic Games" ??? But DOPED !!!
Feel the freedom with Utopia.
Excellent Heads UP Glade Guys Like you are on our side
"our side".
Ha. Ha.
This guy is mesmerizing
Great video!
It gives me goosebumps whenever i see these kinda videos. But does shadow network relate to dark web??
Manisha Hamal definitely intertwined.
011011010011110101 011000010010111 011
111011100111011100
0100110 0110101001
@7:12 it's Natanz not Nantaz .
i used a securid ... since it changes codes every 30 sec that is tough
As Captain Adama said 'I will not have networked computers on this ship!'. (a lesson from the future).
Diamonds Are Forever is about computer break in, with an audiocassette ...
When he says ‘the agents’, I keep hearing the Asians.
What program is being used to show the network here? I am interested in that!
PRISM
Xavier Grogan Microsoft PowerPoint. It's an illustration modeled after the fact based on network packet captures and log analysis.
USB not surprising, I remember I love you and everyone at the company being warned BUT STILL opening it. Uggh, pain for the day.
Good speaker.
This speech is informative about the way the present and future will be on cyber defense and infiltration. The down side is its bias to oneside, saying that this country or that country is making nuclear weapons. Let countries like the USA, Russia and China also have stock nuclear weapons. So if another country tries to arm itself it is added to a sanctions list. Its a case of a story not being bias to one country and keep it neatral to all countries. Keep it to science and tech and not politics.
18:45 In a nutshell: In a virtual world but full of Player versus player, then booted to a world full of npcs with the sprites of the original players.
It's already happening. Just this morning I went to microwave some soup and when I got it out the bowl was scalding hot to the touch but the soup was still COLD
Nice advertisement hidden as a TED talk...
If you close your eyes you can enjoy Patrick Swayze giving a talk on cyber spy technology.
5:46 DAMN IT! The gyroscope in my phone will burn out and I won't be able to use the compass... XD
Unplugging my GameCube from now on, don't want to get hacked
I Like this Guy
if i found a usb stick i would insert it into my virtual machine to check and wipe it. then use it. (the wiping also wipes and replaces the partition table so ALL data is gone, nearly pemenently)
scooter800m None of those things you said are true except that you'd plug it into your computer.
Your virtual machine can't access that USB stick until your host operating system has connected and talked to it to tell your VM that it exists in the first place. By the time your VM knows it's there, you've already been pwned.
Also, if it's actually a rogue device designed to hack your machine, you're only going to be able to wipe the part that it wants you to think you've wiped, not the part that was put there to infect your machine.
I don't understand why anyone would even take it. They're cheap.
mcafee is so bad i dont use an antivirus anymore
They're the ones spreading the viri
Windows Defender should be good enough for the average user, for now. If you really want a secure box use Linux.
McFacoffee - this has been a pain telling me l had no protection (when l have Defender which l found after a search) and slowing my operating system. I am NOT computer literate but managed to delete the bugger for good today. Now my computer runs smoother than ever! Does anyone think its a bad apple? (If doctors feed you with bad apples they can always charge you for services.) l think some of these companies actually give your computer viruses so you sign up in a panic.
Calm Energy Linux is not going to be more secure than Windows or Mac for the average user. The average user is better off with an iPad.
they're going to use our kids they're going to go through the game consoles, gamers
In what universe did the cold war create the computer?
what software was he using at the end?
So what is new? How much time is required before a hack is found? Are you relying on your trusted software developers for security? You are a target don't you think it prudent to test your vulnerability? Would you not bait and trap? Ever considered training and education in " computer espionage "? Cyber warfare anyone?
ooooo man this dude is sick. Interesting.
Next convergence is probably Skynet
This talk reflect the information that is verifiable in most media. The first this or that is actually the first time journalists spread the new to everybody. The experts know many more earlier examples. Just dig at the right place for counter examples.
That doesn't diminish the importance of the talk. I just want to remind people to do a little more research before propagating the facts that are said in this video.
This guy could have been field personnel. Everyone would look right past him.
started out predictably, maybe even kinda cheesy, but this is a good one!
Excellent. I want in.
Big Brother is us.
A lot of this is incorrect in terms of the Natanz stuxnet attack. The Natanz siemens box was airgapped so it was impossible for stuxnet to phone home, it was programmed to know what to do. Also recently (3 months as of the writing of this comment) it was discovered that stuxnet was delivered via a water pump installed in the facility.
A rose is a ROSE that which we call A ROSE by other NAME would SMELL as SWEET.