This is why I wanted to go to college for Cyber Security. Instead I went for a general Computer Science degree. I dropped out at the end of 2020 and joined the Navy trying to go for the rate CTN. They didn't have it available at the time, so I took IT. Can't wait to try and get into cyber security still in the future.
This doc deserves some awards. The christmas theme being used with the CGI of Google cleansing the hack from their network? The LED wall? This is so well done.
i recently graduated with my degree in CS, my job on campus as an "research assistant" actually ended up protecting my campus's infrastructure from cyber attacks. it was honestly eye opening how many attacks we would uncover ended up being from china/russia. proud to have helped my campus get by without a hitch, i miss the adrenaline rush of uncovering compromised hardware on our systems. and it'd be awesome to get a job at a larger company doing that or software developing with protecting software with that in mind.
I remember being a hacker late 80s early 90s. I should have joined security instead of programming, oh well. It was fun to hack for a bit. Luckily I never got caught, but I didn't do it to harm anything either. It was more of a study on how computers respond. It is a rush to get in and look around a bit. This brings back memories. Long live the pink shirt book, if you know you know.
Very similar. Was a "hacker" in the early 90's. Mostly just for fun and seeing what was possible. Went to school for computer science and got my BS. Now I'm a carpenter :) Programming just wasn't for me like I thought it would be.
@@ScorpionXXXVII I am interested in what you mean by "wasn't for me like i thought it would be." ? Do you mind to elaborate on that? If you dont want to do it here, we can also have a chat.
@@murtazafakhry2955 Its more a lifestyle rather than "thing", as you need to always be curious and wanting to sail ik a different direction then what youve learned. For me, before I started to learn exploiting systems for their intended use, social engineering was my way to go. I remember that a friend and myself, got a free boat trip as we knew how to persuade them with things as of we belong there. We did this by simply doing some superficial recon online. But if you really want to start somewhere: TryHackMe is a good site, or HackTheBox. And its useful to know the basics of coding, start with pyhton as this the easiest one to learn, then switch to web languages like JavaScript, php, as it is a very common entry into the system
I got goosebumps, i understand the size of operation but it's hard when you are not present in war room to understand the scale. Whatever google decides to do, they do it the best.
Why was this better than the youtube rewinds, this documentary is more entertaining then the annual video you release that’s supposed to be the last cool thing of the year.
So many things here. 1. Great Graphics 2. They were phished not hacked 3. They use the term Attack a lot. If I send you a fake bill and you choose to pay it. Did I attack you? 4. The problem when you get this big is that you miss the little things and the little things always bite you. 5. Infiltrating systems can be very complicated. The easiest attack surface is always the human operating them.
Made me tear up, as a Computer Engineering student, from a smaller country such as Albania, it seems like a dream to be able to work at a company such as Google. Amazing video!
Fascinating. I'm neither a programmer nor a security expert. I am a Chrome user. War against Google became war on us all. I love that the information was shared with us in this manner, and I'll be following the series. I will not, however, be following any links responding to my comment, so don't bother.
For those who don't know Colleges across the country and often times international schools compete in competitions to hack other teams from other schools in a tournament it isn't just a job what you think are updates or maintenance is legitimately just another form of hacking there are terms for types of hackers the most common 3 are Grey Hat, White Hat, and Black Hat. Not to mention this is pretty badass I'm going to sub to this series.
If UA-cam could recommend more of this I’m all for it. Don’t just present this as an ad. Recommend this video. Fantastic work to everyone who was involved in this.
This is an amazing surprise to see this morning I couldnt stop watching this even if there was a fire all around me! What a well made... great information ... truly amazing for anyone to understand how it all happened and how the amazing team at Google worked to solve it... gave me great relief to see that they could figure out the enemy.
As someone who wants to be a badass programmer, this is the best video I have seen in years. I must join the Google team of Software Engineers someday.
The team behind this CRUSHED every waking moment of this video. Took something that is generally thought of as "dull" and made it highly engaging in every way. Bravo
The way of story telling and the most intresting video editing and sound effects are amzing. I felt excitement, sad , anger ,happy all in 18 minutes only
Wow, coming from a younger person who can't wait to get into cyber security... this gave me goosebumps! Absolutely amazing production & I really admire everyone's way of thinking about various different things. Please continue making these!
As someone who just started getting into some of this security stuffs at my job, this really is amazing to see, as well as to see a dedication to a job people love. Also, while pointing out newly learned info, friends of mine thought I was hacking, when I was just showing a website's network information (api calls and such). It showed me that they really do go hand in hand.
I have such Watchdogs vibe from it. Thanks for defending Google. I'm not a hacker and probably never will be. I'm just simple programmer and I thank you for holding your part of internet.
If you want electronic data to be truly secure it certainly cannot be attached to a network. If it is cut off from all networks, it is still "hackable". So it becomes a balance between how communicable the data (or systems whatever it is) needs to be vs potential negative outcomes.
I don't like that phrasing much because it encourages security nihilism and doesn't explain why some networked devices are much more secure than others. I like to use finite state machines because the concept is easy to explain, can model pretty much any software, shows why real systems are hard to model (lots of components interacting, tons of internal state, your well analyzed program probably runs on a less secure OS/firmware/hardware, rowhammer, timing side channels, etc), and allows defining exploits somewhat concisely. You can model software as a state machine which takes inputs, updates its own state based on those inputs, and produces outputs. If you have a pin pad lock which only unlocks when the last 6 digits equal its set pin, makes physical tampering as difficult as destroying the lock itself, doesn't reveal information about the correct code (see WPS half PINs, non-constant time string comparison for passwords), and doesn't have some service key for changing the PIN without knowing it, that pin pad would likely be considered secure (users may wish to prevent de Bruijn sequence brute force speedup by erasing the PIN when it checks the value, and 6 digits isn't a lot, someone may record the PIN entry or check wear on the keys, an attacker can carry something heavy to get an authorized person to open the door for them, etc.) Ideally, the software team cares about not revealing the PIN or granting access without it, the product manager also cares about physical issues, and the customer cares about employees ignoring the "no tailgating" sign to be nice (note that this is a non-networked system which can still fail at keeping unauthorized people out and possibly keeping its PIN secret, because the real world is messy. OK, it's late, that needs some formatting which UA-cam doesn't support, and I'm mostly writing to remind myself of the broad meaning of "security" and maybe tack on my threat model for the above paragraph (which at least doesn't consider coercion).
This is like a netflix documentary! Love it 🥰 Thank you for bringing awareness to cyber security, it is especially important as the world is moving towards Web 3.0. Every developer needs at least the basic understanding of cybersecurity
Clearly for a wider audience with technicalities cut down on, but so well edited, animated and produced that it's a real treat to watch. Unexpected content from Google itself, but amazing.
NGL Google's got some real guts coming out with something like this. I may not trust corporation but I do trust the majority of the employees on whose backs the whole system rests.
Endless inspiration for a Motion Graphics Designer here! Thanks for continuing to develope visual styles. So much more inspiring than Apple's sterile stomp typography style.
I wasn't expecting to like this, I was just gonna check out the video, but the interesting story combined with the incredible audio design and editing hooked me in lol. I am looking forward to watching the rest of the episodes of this.
Overall a very interesting and well-done video with great storytelling and accompanying graphics! One very unimportant issue is the semantics of calling Aurora a battleship. While the difference means nothing to the average person, for some enthusiasts, mistaking a cruiser for a battleship could be a little frustrating. In my opinion, using the more general term 'warship' could've avoided this issue while still delivering the desired imagery. Apart from that, excellent video.
As a cybersecurity student, this video is great motivation! Love it!
What program you learning I wanna get started in cyber security
don't stop, it'll be hard, but we need as many of you as possible in the space (google or not)
mee too
exactly bro i was getting goosebumps all time they mentioned the issues
😆
The audio design was on point! Congratulations to the editing team.
I know, right.
Amazing story telling as well.
The audio was insane and I had goosebumps thrice in this video, huge props to the editing team indeed!
they are a multi billion dollar company i would hope its great
It reminds me of Vox editing
This is why I love motion design. It supports the story by 150%
This is why I wanted to go to college for Cyber Security. Instead I went for a general Computer Science degree. I dropped out at the end of 2020 and joined the Navy trying to go for the rate CTN. They didn't have it available at the time, so I took IT.
Can't wait to try and get into cyber security still in the future.
Props to the animators editors , sound , team on this video and every employee in Google.
This doc deserves some awards. The christmas theme being used with the CGI of Google cleansing the hack from their network? The LED wall? This is so well done.
bet they had a low budget, seems like a pretty small company
@@imEden0 tru tru .
for anyone wondering, the first violin piece you hear at the beginning is the Bruch Violin Concerto No.1 in G Minor, op.26
shout out to the edit team, animation team, sound effect team, and every one who dedicates themselves to this episode. AMAZING WORK
Is it you
i recently graduated with my degree in CS, my job on campus as an "research assistant" actually ended up protecting my campus's infrastructure from cyber attacks. it was honestly eye opening how many attacks we would uncover ended up being from china/russia. proud to have helped my campus get by without a hitch, i miss the adrenaline rush of uncovering compromised hardware on our systems. and it'd be awesome to get a job at a larger company doing that or software developing with protecting software with that in mind.
that's awesome, must be amazing knowing that you saved several important systems :]
Summer did a great job narrating. Jerry and Beths would be proud.
Hahaha I was searching for this comment.
@@Thijs___ same here lol
it was teh only thing i could hear throught the whole narration of the episode. XD
🙂🙂🙂
2:45 One of the cleanest transitions I’ve seen
The editing is like scenes on the game and also the voice of narrator and they way she narrate, very familiar. Wow this series is so good.
The production quality on this is epic! 👍
E
fr
What is so epic this is absolutely nothing special.
It's freaking google
I'd be surprised if it wasn't
the graphics, sound, editing, the whole production is insane 🤯
ikr
holy goosebumps, the 10:38 aurora introduction scene had me on goosebumps.
Great opening to an important series on cybersecurity threats and responses. We are all responsible for security.
yes agreed good observation lyr we are glad to have you
I remember being a hacker late 80s early 90s. I should have joined security instead of programming, oh well. It was fun to hack for a bit. Luckily I never got caught, but I didn't do it to harm anything either. It was more of a study on how computers respond. It is a rush to get in and look around a bit. This brings back memories. Long live the pink shirt book, if you know you know.
Very similar. Was a "hacker" in the early 90's. Mostly just for fun and seeing what was possible. Went to school for computer science and got my BS. Now I'm a carpenter :) Programming just wasn't for me like I thought it would be.
Real bit flippers never lose their skill. You either are or you aren't.
@@ScorpionXXXVII I am interested in what you mean by "wasn't for me like i thought it would be." ?
Do you mind to elaborate on that? If you dont want to do it here, we can also have a chat.
@@murtazafakhry2955 Its more a lifestyle rather than "thing", as you need to always be curious and wanting to sail ik a different direction then what youve learned.
For me, before I started to learn exploiting systems for their intended use, social engineering was my way to go.
I remember that a friend and myself, got a free boat trip as we knew how to persuade them with things as of we belong there. We did this by simply doing some superficial recon online.
But if you really want to start somewhere: TryHackMe is a good site, or HackTheBox.
And its useful to know the basics of coding, start with pyhton as this the easiest one to learn, then switch to web languages like JavaScript, php, as it is a very common entry into the system
@@murtazafakhry2955 maybe starting with hack old websites...
I got goosebumps, i understand the size of operation but it's hard when you are not present in war room to understand the scale. Whatever google decides to do, they do it the best.
Why was this better than the youtube rewinds, this documentary is more entertaining then the annual video you release that’s supposed to be the last cool thing of the year.
As my three year old would say , its just beautiful . Its amazing to see how it all happens to come together .
So many things here.
1. Great Graphics
2. They were phished not hacked
3. They use the term Attack a lot. If I send you a fake bill and you choose to pay it. Did I attack you?
4. The problem when you get this big is that you miss the little things and the little things always bite you.
5. Infiltrating systems can be very complicated. The easiest attack surface is always the human operating them.
Kind of wish there was a more technical episode with the same story it would be super interesting.
This is the most interesting ad I’ve EVER seen. I watched all 18+ minutes of it (before the video I THOUGHT I wanted to see), and was entranced!
This is why i want to be a cybersecurity engineer, these series are exciting, thanks google.
Made me tear up, as a Computer Engineering student, from a smaller country such as Albania, it seems like a dream to be able to work at a company such as Google. Amazing video!
I love how episodes start from 0 and not 1.
They are still programmers, and start thinking by 0.
Fascinating. I'm neither a programmer nor a security expert. I am a Chrome user. War against Google became war on us all. I love that the information was shared with us in this manner, and I'll be following the series.
I will not, however, be following any links responding to my comment, so don't bother.
The storytelling, the visuals, the graphics, the sound mixing was on point.
I got goosebumps watching this... production quality and the way the google security team handled the attack, this is insane
"We were under attack. Then we reset all of the passwords. The attack was over thereafter." Genius!
Amazing, engaging and inspiring. The team at Google is incredible, I'm confident in their abilities to make Google safer. The editing is top notch 👌 👏
As someone who just learned about SQL injection, hacking is so fascinating.
i think google has to start making movies, seriously. it's amazing and really high quality ♥
For those who don't know Colleges across the country and often times international schools compete in competitions to hack other teams from other schools in a tournament it isn't just a job what you think are updates or maintenance is legitimately just another form of hacking there are terms for types of hackers the most common 3 are Grey Hat, White Hat, and Black Hat. Not to mention this is pretty badass I'm going to sub to this series.
"This time, baby, I'll be bulletproof"
- La Roux , "Bulletproof"
A series on cybersecurity by google! A dream come true
This is the most coolest corporate branding/marketing/awareness video I have ever seen.
This is gotta be one of the best short documentaries i've ever seen
Captivating storytelling with superb quality production
Such impressive production quality on this. 👌
*The motion design is simply phenomenal!*
As a former vfx employee, I would love to see the credits for the people that worked on putting those episodes together. :D
I mean, the editing and design language is just on point. Kudos to the creative team behind this.
The video ,the audio ,the story ,that screenplay.....no words to express what i felt watching it.
why do I feel like Vox is behind this
I've never before watched the whole ad with interesting like these _"hacking Google"_ videos
If UA-cam could recommend more of this I’m all for it. Don’t just present this as an ad. Recommend this video. Fantastic work to everyone who was involved in this.
This is an amazing surprise to see this morning I couldnt stop watching this even if there was a fire all around me! What a well made... great information ... truly amazing for anyone to understand how it all happened and how the amazing team at Google worked to solve it... gave me great relief to see that they could figure out the enemy.
This is the best technical documentary series I've ever seen.
Production quality was so good it almost made me switch my specialisation from game development to cybersecurity
Damn... I had to comment to appreciate the Audio design.
Props to the team who made this!
The voxel-style animations are sick!
As someone who wants to be a badass programmer, this is the best video I have seen in years. I must join the Google team of Software Engineers someday.
This is one of the most interesting things I have ever seen; not that I want to become a hacker, whitehat or blackhat, I just like this
*when an ad of an entire video plays and you are too interested to skip it*
I got goosebumps watching this, presentation is insane.
The team behind this CRUSHED every waking moment of this video. Took something that is generally thought of as "dull" and made it highly engaging in every way. Bravo
When google made their own "Drive to Survive"
I was waiting for Disrupt's voice to kick in the whole time, amazing video, great content overall
I'd love to see a documentary series made by @Google.
the no of comments on this video just shows the quality
The way of story telling and the most intresting video editing and sound effects are amzing. I felt excitement, sad , anger ,happy all in 18 minutes only
The fact it took all of these professionals is crazy
As a black hat hacker, there will never be anything 'unhackable'.
I felt like this could be a actual film that plays in movies theaters, I love the music and the temple of this episode, exciting!
Wow, coming from a younger person who can't wait to get into cyber security... this gave me goosebumps!
Absolutely amazing production & I really admire everyone's way of thinking about various different things.
Please continue making these!
Woahhh fighting dude
As a cyber security student thank you for this!!!!
I really enjoyed this video and lemme tell you, the excitement I got from reading EP000: in the title, was insane.
"But if they do try again, I want them to have a very bad day."
Goosebumps. Respect. 🖤
As someone who just started getting into some of this security stuffs at my job, this really is amazing to see, as well as to see a dedication to a job people love. Also, while pointing out newly learned info, friends of mine thought I was hacking, when I was just showing a website's network information (api calls and such). It showed me that they really do go hand in hand.
I have such Watchdogs vibe from it. Thanks for defending Google. I'm not a hacker and probably never will be. I'm just simple programmer and I thank you for holding your part of internet.
The quality of this video is insane. It's like it could be played in the cinema.
Nice... Vox Netflix Quality level 🎉👍
I'll definitely give it a try, thanks Google for inspiring us all!
Now this was pretty awesome. The way they told the story, the edits, the SOUND. Christ. You guys are amazing.
Amazing!! thank you for this series Google!
kudos to the story telling. it didn't sound boring at all. I remained intrigued until the end.
If you want electronic data to be truly secure it certainly cannot be attached to a network. If it is cut off from all networks, it is still "hackable". So it becomes a balance between how communicable the data (or systems whatever it is) needs to be vs potential negative outcomes.
I don't like that phrasing much because it encourages security nihilism and doesn't explain why some networked devices are much more secure than others.
I like to use finite state machines because the concept is easy to explain, can model pretty much any software, shows why real systems are hard to model (lots of components interacting, tons of internal state, your well analyzed program probably runs on a less secure OS/firmware/hardware, rowhammer, timing side channels, etc), and allows defining exploits somewhat concisely.
You can model software as a state machine which takes inputs, updates its own state based on those inputs, and produces outputs. If you have a pin pad lock which only unlocks when the last 6 digits equal its set pin, makes physical tampering as difficult as destroying the lock itself, doesn't reveal information about the correct code (see WPS half PINs, non-constant time string comparison for passwords), and doesn't have some service key for changing the PIN without knowing it, that pin pad would likely be considered secure (users may wish to prevent de Bruijn sequence brute force speedup by erasing the PIN when it checks the value, and 6 digits isn't a lot, someone may record the PIN entry or check wear on the keys, an attacker can carry something heavy to get an authorized person to open the door for them, etc.) Ideally, the software team cares about not revealing the PIN or granting access without it, the product manager also cares about physical issues, and the customer cares about employees ignoring the "no tailgating" sign to be nice (note that this is a non-networked system which can still fail at keeping unauthorized people out and possibly keeping its PIN secret, because the real world is messy.
OK, it's late, that needs some formatting which UA-cam doesn't support, and I'm mostly writing to remind myself of the broad meaning of "security" and maybe tack on my threat model for the above paragraph (which at least doesn't consider coercion).
I never thought google would make something this cool and well edited
What a really interesting series, and the production is epic!
This video was presented to me as an Ad and within the first 5 seconds I decided not to press skip ad and then instead sat through the entire ‘Ad’
This is like a netflix documentary! Love it 🥰 Thank you for bringing awareness to cyber security, it is especially important as the world is moving towards Web 3.0. Every developer needs at least the basic understanding of cybersecurity
What’s Web 3.0?
Cyber security is in my bucket list now. Thanks for the video
Clearly for a wider audience with technicalities cut down on, but so well edited, animated and produced that it's a real treat to watch. Unexpected content from Google itself, but amazing.
production quality on the next level
I am surprised Google is putting this out for the world to see !
NGL Google's got some real guts coming out with something like this. I may not trust corporation but I do trust the majority of the employees on whose backs the whole system rests.
I am an analyst at the state level and going for school too, this is intriguing
On. My gaming aps
stroying telling, modern history its really just lots and lots of motivation and hard work its just storytelling at its peak
Someone tell me why I'm so utterly captivated by this. May make its way into a story I'm writing, just because of how interesting it is.
It's because it's a (relatively) new frontier of warfare with endless possibilities that literature has barely scratched the surface of.
Yep it was like Netflix experience or better, like what a production and specially sounds... ❤️👍🏻
Endless inspiration for a Motion Graphics Designer here! Thanks for continuing to develope visual styles. So much more inspiring than Apple's sterile stomp typography style.
this is INSANELY fun and intreating to watch. What a series
As expected, The editing Is TOPNOTCH!! As well as the content quality.
Cyber sobriety is better than cyber security. Take it from me, Tipsy Robot.
Congrats to the production team. It's great directed, edited and sounddesigned. I love all aspects of it. So well done guys! More please!!🔥🔥🔥
I wasn't expecting to like this, I was just gonna check out the video, but the interesting story combined with the incredible audio design and editing hooked me in lol. I am looking forward to watching the rest of the episodes of this.
Got this as an ad, can’t believe I watched that
the editing on this is insane
Overall a very interesting and well-done video with great storytelling and accompanying graphics! One very unimportant issue is the semantics of calling Aurora a battleship. While the difference means nothing to the average person, for some enthusiasts, mistaking a cruiser for a battleship could be a little frustrating. In my opinion, using the more general term 'warship' could've avoided this issue while still delivering the desired imagery. Apart from that, excellent video.