КОМЕНТАРІ
@ChaplainDaveSparks
@ChaplainDaveSparks 9 годин тому
That DF antenna array looks a lot like the _"LoJack"_ stolen car finder that many police agencies (at least here in Southern California) use. If I remember correctly, there is one antenna in the center and four at 90 degrees around a circle.
@DemocracyManifest-vc5jn
@DemocracyManifest-vc5jn День тому
Great talk but these talkers were fighting for attention and need to work on their teamwork. Geez how old are they. Maybe they’re just excited about their talk?
@florencetown4024
@florencetown4024 7 днів тому
02:00
@dedricklewis7168
@dedricklewis7168 10 днів тому
Thank you for this presentation. Because of this, I was inspired and created my own proton pack. But seriously, this is awesome and much appreciated.
@KaerioMika
@KaerioMika 13 днів тому
The teacher is cool and know his stuff, but the incessant mostly inaudible questions makes this a complete mess. It took one hour to learn something I learned in 5 minutes elsewhere with a better visual and clearer presentation, and the whole video is confusing as hell and all the time going into every possible direction before the teacher can finish his starting point. Not beginner and "ages 4" friendly at all.
@eplus341
@eplus341 19 днів тому
Imagine how AI can handle YOUR metadata and find everything about you without having to listen to your conversations and without technically having to break the law... the same effect for you as if it was breaking the law. The future of mankind lies within knowing what you are fighting for but not what you are fighting AGAINST. This is both terrifying and in a way optimistic.
@millionsubz3943
@millionsubz3943 22 дні тому
Thanks
@Dje4321
@Dje4321 25 днів тому
The primeagen really fucked things huh
@ramsaybolton9151
@ramsaybolton9151 Місяць тому
It's sad that people do this to destroy the experience for other players. This is why I believe in violent punishment.
@Talel_kraiem
@Talel_kraiem Місяць тому
Considering the time of publishing this lecture this a truly eyes opening lecture for me who want to get into audio programming
@DragoNate
@DragoNate Місяць тому
actually, the concept of things being stored on your SIM card that you can easily pop out and move to another device isn't awful in itself. i see the issue of where that _would_ have led things, but if we could just use it to simply move important data around, it would be nice.
@harryman11
@harryman11 Місяць тому
underrated talk
@klausstock8020
@klausstock8020 Місяць тому
I expected a video about hacking RFZs vie radio; all I knew so far were wired RFZs (high-performance RFZs which need quite a bit of electrical power). No mentioning of RFZs in the video...
@Reichstaubenminister
@Reichstaubenminister 2 місяці тому
On Linux, running "ldd hello" gives you "ldd: warning: you do not have execution permission for `./hello'" if the binaary doesn't have the execute bit set.
@Creapture
@Creapture 2 місяці тому
1.2k views??? fuck you internet.
@mudspringer
@mudspringer 2 місяці тому
This is great stuff. I just bought The Analog Thing - can't wait for it to arrive!
@kevinmcnamee6006
@kevinmcnamee6006 3 місяці тому
It's been over 10 years since I gave this presentation. I'm very pleased with the number of views, but somewhat disappointed with some of the comments that imply that this was a marketing presentation. It was certainly not a marketing presentation. While it is true that we developed "Very Angry Birds" demo to help promote a mobile malware detection product, the product was not mentioned at all in the presentation. The purpose presentation was two fold. First it shows how easy it was to inject malicious code into a legitimate Android application, and I think the presentation does an excellent job in showing the technical details of how to do this. Second, I wanted to wanted to show that mobile spyware was a major threat and demonstrate what it could do. This was three years before Pegasus Spyware was in the news and I think the presentation provides an insightful forward looking view of the potential for spyware apps in mobile phones. I may have got the bit about the age of the Rovio certificate wrong and there was a glitch with recording playback during the demo. For these I apologize. I can't do anything about the audio quality. I think it went quite well for a live demo that required a mobile phone, a laptop, and a remote server to all work flawlessly during a presentation to over 1000 people. It scared the heck out of me. The presentation was well received and got quite a bit of coverage in the media. I was interviewed by CNN's tech reporter Laurie Segall. My kids thought it was cool to seem me on TV. Kevin.
@johnkoury1116
@johnkoury1116 3 місяці тому
Absolutely Fascinating!!
@zabdas83
@zabdas83 3 місяці тому
FDM... lol does he mean MDF 😊😂😅
@alfredoneves3976
@alfredoneves3976 3 місяці тому
nice
@JP-os7ph
@JP-os7ph 4 місяці тому
AI is going to kick even hackers butts? Right?
@Dread_Pirate_Roberts_2013
@Dread_Pirate_Roberts_2013 4 місяці тому
Very current presentation, yet it is 10 year old
@SovietTechnocracy-fy6xg
@SovietTechnocracy-fy6xg 4 місяці тому
@20:25
@user-zf9dv8kg7q
@user-zf9dv8kg7q 4 місяці тому
by way collins nats nz he killed him self im last person he spoke to likely sitution his sister life why not my fault.
@brashcrab
@brashcrab 4 місяці тому
Guys....pour iced coffee on your computer 1:01
@Adhil_parammel
@Adhil_parammel 4 місяці тому
27:20
@BraveLittIeToaster
@BraveLittIeToaster 4 місяці тому
Is that vista?!
@heyheyhophop
@heyheyhophop 5 місяців тому
Brilliant talk, but no 72p option for that extra blurry juicyness though? ;)
@lalanotlistening
@lalanotlistening 5 місяців тому
“mean phrases will make people dislike you” - guy who put the R-slur in a powerpoint
@datvuong7420
@datvuong7420 5 місяців тому
I had hard time trying to understand how the distributed hash table works on UKposts, this video just helped me that other videos can't
@dereisenadler6717
@dereisenadler6717 5 місяців тому
Taking notes rn. Hopefully one day we can implement a superior version in the United States and stop the spread of degeneracy through the internet.
@sassycat77
@sassycat77 5 місяців тому
Very funny
@Mixer-he2wb
@Mixer-he2wb 5 місяців тому
Just thinking on the authentication error. Send bad ASCII. Bell tones?
@Q7SZuRt4
@Q7SZuRt4 6 місяців тому
Thank you for being honest and upright , stay postive sir.🙏
@user-yc4hy4mf1p
@user-yc4hy4mf1p 6 місяців тому
Funnymen CBD gummies reviews lololol 🤣
@deanvangreunen6457
@deanvangreunen6457 6 місяців тому
"Free for indie developers" did not age well, with the #2023Chaos
@deanvangreunen6457
@deanvangreunen6457 6 місяців тому
only issue is that if it had low video quality , when pausing or freezing the image, you will notice that from the user side that there are no artifacts, meaning that the user could detect that the image has been paused, such things which would add noise to a basic low video quality camera are nearby computers, other machines, maybe cleaning machines, or noise from the outside...
@andremapp6121
@andremapp6121 6 місяців тому
Paul Graham is awesome.
@ClassicRiki
@ClassicRiki 6 місяців тому
@HackersOnBoard what does everyone think of this theory about the Probers being predictably reliable and predictably unreliable? - I hypothesise that the sequence numbers being derived from the timestamp is the cause of the Prober failing every 25 hours. You’ll notice that the successful blocking by probes does not alter at the 25 hour intervals. So, thinking about it; once it successfully blocks a connection they might be getting automatically added to what essentially equates to a list of blacklisted connections. A presumption of guilt type of thing because the safest way for them is to presume it’s going to remain a ‘bad connection’ However, if it passes the initial probe…perhaps it is whitelisted; unless the sequence changes. You might think that if we think about 1-24 hours…why 25 hours? Well I’m thinking that because they are simply numbers (remember, once used for a sequence, it’s not understood by the network as a time value…it’s simply numerical) it’s not how we would think of it being 1-24. In reality it would be be 0,1,2,3….22,23,24. So how many sequences are generated using this method in 1 day? Well, 25 right? 00:00, 01;00, 02:00…and so on. So that’s 25 separate ‘seed times’ resulting in 25 sequence numbers. So I theorise that it’s the conversion from time value to pure numeric value that perhaps is generating repeating sequences. The pattern shows a repeating sequence and so it’s not even pseudo random. Does anyone have any thoughts on my theory?
@BeamerE30
@BeamerE30 7 місяців тому
Fantastic presentation!
@RaimundPopp
@RaimundPopp 7 місяців тому
thank you
@abitofyourbrain
@abitofyourbrain 7 місяців тому
Oh, I forgot about this talk Absolutely pristine, well spoken wonderfully given talk on the subject Somehow, even as we reach DEFCON 31 somehow every part of this is still very very astute in regards to current affairs and Internet management Nothing changes really does it What a Time to be alive To this day, my absolute favorite lecture I do hope to find more by this man-he seems to be ahead of his time or conceptually people that make browsers don’t move with the times either way what a gem of a human So glad UKposts suggested it
@IGM_Dex
@IGM_Dex 7 місяців тому
Brilliant presentation even three years on.
@Roman.Joshua
@Roman.Joshua 7 місяців тому
19:30 why? Why do you need to make sure you don't make the same mistake in return? Because "an eye for an eye means eventually everyone will be blind?", but feeding them their own medicine is an effective way to make them stop too. Because then the enemy might become disgusted of themselfs. Mirroring someone like a police officer is an effective way of "not braking the law and making them realize how stupid they sound". OK let's say you avoid their mistakes, how does that make you win? What even is there to win? Do you want to make them stop saying things that way? Is there a real threat behind their words of actions? Let's say I copy them and avoid mistakes, now I've created Michaelangelo with a "good sized D", and nice hip proportions and a sixpack and without weird hand postures and with a more deterministic look in his face and possibly without carved in pupils, OK still what I've done was only copying and adding my own touch of necessity. I still did not understand what your reasoning was, why you can't make their mistake. I mean I did answer it myself but still. Always giving a good argumentative reason to make others understand your point is necessary. To be a better example and to have the argument of truth in your side and to win by creating understandings and thus create the necessary paths of people waning to replicate or follow you in thought. 22:10 no, this is wrong. I don't have to replace my new stolen tech with newer and supposedly better tech. Why do you assume "newer equals better"? Maybe "old equals better" and "new might be damaged and only half of what it was, still missing what has been stolen". Maybe I think Michaelangelo has an ugly body and I actually do want Arnold Schwarzenegger in his prime with my face, but maybe I also think my biceps and R-Triceps/Double triceps genes are superior, then I don't have to copy them but create a statue of my own body fixing what I don't like about it by exercising the muscles which aren't in the same shape the statue is, into it's. So: what I do have to do is bugfixing. And the Bugfix here is "not allow them to steal my tech". Because if I do "who says my replacement isn't going to be stolen too? - I mean they have learned they can steal from me without punishment, right?! Not good." I call this "logically forcefully necessary vengeance (definitely a better ram than "fury")". I can get my vengeance and my old tech back and cripple them by taking it back and removing it from their inventory and progress by staying the old me that's still evolving but not replacing but buildings ontop of it.
@johnsausage
@johnsausage 7 місяців тому
7:32 If the SIM applet can run arbitrary commands on the phone, doesn't this basically mean that this is some way to "listen" to a phone? I mean arbitrary commands could also mean it can run commands in the background probably without showing anything to the user and therefor activate the microphone and transmit the data to the carrier (or to whomever).. right?
@xiaxiao7567
@xiaxiao7567 7 місяців тому
When I had a shadowsocks sever I got over 200 000 thousand probes
@sbibbity_bobbity_bup
@sbibbity_bobbity_bup 7 місяців тому
haha little nig boy jinping, loyal to the party of nubs i bet my chat bots i wrote in c++ in 15 minutes with my googie goog can out post chinese censor niggas haha im about to ddos all china
@lbgstzockt8493
@lbgstzockt8493 8 місяців тому
This video is a great resource for those who wish to exfiltrate data.
@bossmen6665
@bossmen6665 8 місяців тому
Bruh any higher res?
@OracleOfSages
@OracleOfSages 8 місяців тому
At 3:16 I knew I could stop watching this lol. What 4 year old has used Git?
@mrfbach
@mrfbach 8 місяців тому
I came from the future to say that popup and screensaver problem are fixed on X and X still faster than wayland, but wayland is almost there...