Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? | Insider

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 4,6 тыс.

  • @BMoore556
    @BMoore556 3 года назад +15182

    she's got fingerless gloves, I'll believe everything she says about hacking

    • @kemolowlow
      @kemolowlow 3 года назад +349

      Probably carpal tunnel syndrome and not a fashion statement...LuLz

    • @BMoore556
      @BMoore556 3 года назад +261

      @@kemolowlow you're probably right buuut I stand by my joke tho

    • @IGamingStation
      @IGamingStation 3 года назад +54

      @@BMoore556 Do hackers really wear gloves? Just wondering.

    • @BMoore556
      @BMoore556 3 года назад +130

      @@IGamingStation nah, pretty sure it's a movie/TV trope you see a lot

    • @leandrolaporta2196
      @leandrolaporta2196 3 года назад +21

      LMFAO you made my day with this comment

  • @InariAlchemist
    @InariAlchemist 3 года назад +6289

    I think the most realistic hacking scene ever is in Archer, where he correctly guesses the password is "guest"

  • @valhallenx
    @valhallenx 3 года назад +7632

    You should bring a regular guy review The Office

    • @assembled1855
      @assembled1855 3 года назад +338

      More like Office worker rate Office scene in movies and tv shows.

    • @ZOB4
      @ZOB4 3 года назад +83

      I'd watch that

    • @chuckhoyle1211
      @chuckhoyle1211 3 года назад +147

      As someone who worked in Big Corporate for years, it is pretty spot-on if you dial back the nonsense a couple notches. There is always drama and stupid corporate crap going on. There is a Dwight in every office. There is always a short-timer around that won't do anything.

    • @Cramblit
      @Cramblit 3 года назад +36

      @@chuckhoyle1211
      Depending on the place, you even have those oddball bosses that don't seem to do anything worthwhile but still get all the promotions and rewards too.

    • @nalediserunye4073
      @nalediserunye4073 3 года назад +2

      That real funny

  • @mrkiky
    @mrkiky 2 года назад +1193

    I like that she has actually seen all shows the scenes are from and she knows the context. Many other experts criticize the scene without knowing that the context explains away some of their critique.

    • @MrWarrenRB
      @MrWarrenRB Год назад +25

      You can’t expect every expert to watch every movie and tv show of their own job.

    • @mrkiky
      @mrkiky Год назад +60

      @@MrWarrenRB Yea but it's nicer like this anyway.

    • @andmicbro1
      @andmicbro1 Год назад +9

      Yeah, quite refreshing! I also found her ratings pretty good, like she gave good points for the stuff that was done well, and properly rated the bad ones low. Though her criticism of the time is a hard one, most movies have time compressions because they can't sit there and show you a real hack in real time or that would be the whole movie's runtime. Even for "based on a true story" scenarios, thye often have a lot of time compression for events that happened over a longer space of time. If it's comically short, then yeah, it should be low rated. But for a real life hack that is show to take a few hours as opposed to a few more hours, I think we can cut them some slack.

    • @Bunny99s
      @Bunny99s 8 месяцев назад +3

      Also she's glossing over the fancy 3d fly-by math formula, greek character screen-saver effect in Hackers because it's clear that this is just a mental image for the audience and should explain the thought process in his brain which of course you can't really visualize.
      Many often claim that Hackers was soo unrealistic, but some parts were just a bit exaggerated. I started programming 30 years ago and I have to confess that I actually did write some fancy visual tools back then, just for fun. I dived deep into OpenGL around 2000. I always was and still am a sucker for technology. About a year ago I wrote my own DNS server in C# just for fun. I do actually run it with mono on my raspberry pi to this day. So it is in use, but not really for important stuff. I'm more interested in how things work. I read so many specifications. One of my favourite ones was the GIF specification. I wrote a gif loader and I was impressed by the format design. Especially that it was actually really extensible. PNG kinda followed the footsteps and is also "chunking" the file so a parser could simply ignore chunks it does not understand. It's kinda sad that animated gif support was better back then. Nowadays the Graphic Control Extension is always interpreted as a sequance of frames to conduct an animation. However back then it was actually possible to create gif files with images with more than 256 colors by splitting the colors up into several frames which were painted on top of each other. Gif actually uses a virtual canvas and contains write instructions for pixel image data but also could render text.

    • @imitenotbe
      @imitenotbe 5 месяцев назад +1

      @@MrWarrenRB I'd expect someone agreeing to do a piece like this to have context and background of what they are about to comment on as an "expert", yes. It's obviously not live, so there isn't any excuse for on the spot reactions without context

  • @akomocombine3357
    @akomocombine3357 3 года назад +6504

    "Hackers dont break in we login" - TRUE.

    • @cooperthegrandkid5639
      @cooperthegrandkid5639 3 года назад +51

      Yeah buddy

    • @BacklTrack
      @BacklTrack 3 года назад +23

      @@cooperthegrandkid5639 what do you read header files for fun lmao? Usually all preprocessor variables are all caps... it's not just in your favorite header file

    • @Kenionatus
      @Kenionatus 3 года назад +8

      @@BacklTrack That's what Eliot does to wind down.

    • @Shenaniganz_z
      @Shenaniganz_z 3 года назад +1

      600 likes. Congo 🎊 🤣 🤣

    • @mebasically9193
      @mebasically9193 3 года назад +7

      Script kiddie

  • @madcat1865
    @madcat1865 3 года назад +2987

    Nothing like listening to a really enthusiastic hacker that knows what they’re doing to really make you want to change your passwords

    • @joejacko1587
      @joejacko1587 3 года назад +17

      she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol

    • @codyeble0713
      @codyeble0713 3 года назад +20

      Doesn't have to hack me, I'll just give her my password

    • @lucasng4712
      @lucasng4712 3 года назад +24

      @@joejacko1587 stroke

    • @JLilliquist
      @JLilliquist 3 года назад +4

      @@joejacko1587 Yep. all her ratings are too high.

    • @purplewine7362
      @purplewine7362 3 года назад +48

      @@joejacko1587 lmao armchair coders commenting on an experts opinions if the best description of youtube comments

  • @kaamilmirza6963
    @kaamilmirza6963 3 года назад +4690

    Her standards for critiquing Mr Robot is just absolutely wonderful to watch. Just shows how good Mr Robot is.

    • @disco.lemonade
      @disco.lemonade 3 года назад +286

      Yeah, but it should've been 10/10. The "should take longer" is so obvious, I don't think you should know about programming and hacking to figure that out. 9.5 at least, and even 9... The whole show is that well curated when it comes to programming details

    • @kaamilmirza6963
      @kaamilmirza6963 3 года назад +76

      @@disco.lemonade I completely agree with you, I too expected a solid 10 but don't know why she didn't give.

    • @disco.lemonade
      @disco.lemonade 3 года назад +33

      @Untitled 1 Welcome to Mr. Robot. It'll be an interesting ride for four seasons

    • @philosophicalearthworm6819
      @philosophicalearthworm6819 3 года назад +34

      @@disco.lemonade Mostly agree. The same is kinda true of the whole show, it's pretty much all possible but probably wouldn't be done by such a small group and/or in such a short amount of time. Points to consider though, firstly that nation-state threat actors were involved and there was a lot going on the background, and we don't exactly get every piece of the story. Second, as far as getting rid of the backdoor, wasn't the Mr. Robot alter already aware of this information? That was probably more a hole in the plot than in the technicals, though that also is not necessarily a hole...the show was riddled with bizarre internal conflicts between the alters(Tyrell: "You, as a person, make no sense").
      Ultimately if the show was any more realistic, it'd be a documentary.
      Aside from the hacking portions, I'd also like to see different aspects of this show rated by intelligence officials, law enforcement officials, and psychologists. Like the creepy personnel tactics of the Dark Army("Have you ever cried during sex?" "Have you ever cheated on your wife?"), law enforcement procedures("Green! FBI! Don't shoot!" "We call it the python approach."), and the nature of dissociative identity disorder.
      Seems like one of these Hollywood realism clips mentioned Dom keeping her gun and badge in a locked safe at her house but I can't remember.

    • @cheesecakelasagna
      @cheesecakelasagna 3 года назад +10

      @@disco.lemonade I have the tendency to put pause watching intense shows (I think the issue is that I binged, so getting burnt out is quicker). I enjoy the S1 and half of S2, but there are certain subplots that I just roll my eyes on.

  • @Enrique-Garcia
    @Enrique-Garcia Год назад +478

    There's actually a very good reason why they'd use "impossible" IP addresses in movies, and that's to simply avoid accidentally posting someone's actual IP address and setting them up for potential cyber-harassment. It's the same reason they used to use "555" for everyone's phone number, because people were actually attempting to call those numbers. Nowadays it's easy to buy a phone number used in a movie, the studio will use it as a marketing tool or simply not activate it, and for URLs mentioned in movies they'll do the same, register it and then use it as a marketing site or simple redirect to their studio website. Can't really do that with IP addresses.

    • @_Tomon
      @_Tomon 8 месяцев назад +23

      Was wondering if there would be this comment about the IP addresses already and wasn't dissapointed.
      Honestly that's one of the mistakes I think actually shows that they know what they're doing (or don't and got lucky :-D )

    • @Enrique-Garcia
      @Enrique-Garcia 8 месяцев назад

      @@_Tomon I know for sure, bigger productions do a thorough search on anything that can be mistaken or misused. They even check character names, they don't want to risk getting sued because anyone of note with the same name as someone in the movie might be defamed. So I'm sure they also check things like IPs and phone numbers (remember until recently, all movie phone numbers started with 555. Now, studios buy the phone numbers mentioned in the movie and use them as marketing).

    • @aracoixo3288
      @aracoixo3288 6 месяцев назад +3

      Yeah she's 👽

    • @crazyg666
      @crazyg666 6 месяцев назад +3

      well, you can try resetting your router and after many times, you're gonna eventually get the right ip address lmao

    • @auturgicflosculator2183
      @auturgicflosculator2183 5 месяцев назад

      @@crazyg666 Depending on the ISP, this may or may not work. On most ISPs, you'd have to turn the router off for like a full day or more to have the IP recycled, and even then the ISP might choose specifically not to do so, whether or not your IP is dynamic.

  • @alexandravisnick
    @alexandravisnick 3 года назад +3086

    The Mr Robot data center UPS scene was so detailed that companies depicted on screen actually reviewed their designs after the episode aired.

    • @arturszatkowski8062
      @arturszatkowski8062 3 года назад +42

      Can you direct me to the article about it, I can't find anything

    • @alexandravisnick
      @alexandravisnick 3 года назад +393

      @@arturszatkowski8062 I worked for one of those companies at the time. This was not published but something I saw myself.
      I should probably add that we concluded the hardware systems in place would have prevented it. Their commitment for accuracy was stunning though.

    • @Anna-bk8el
      @Anna-bk8el 3 года назад +34

      I loved mr robot

    • @Fredaxter
      @Fredaxter 2 года назад +21

      @@justincruz5720 Season 2 Episode 12.

    • @00bean00
      @00bean00 2 года назад +9

      What happened with the UPS es, I forget?

  • @b326yr
    @b326yr 3 года назад +2883

    I love how she explain everything in details...
    I'm still confused

    • @re43p3raod3
      @re43p3raod3 3 года назад +21

      coming from a red hat, some of it even after a few years is really confusing XD you are not alone

    • @originalunoriginal4055
      @originalunoriginal4055 3 года назад +13

      Hahaha.
      I'm guilty of trying to kid my own self that "I am understanding everything she is staying" Even though my mind, attention was completely in kuku land and would refocus on the video which lasted a few seconds, to then only go back to kuku land for the next couple of minutes, after a few seconds of coming back to reality! Hahaha

    • @suppoy10
      @suppoy10 3 года назад +1

      Lmfao

    • @JimBob1937
      @JimBob1937 2 года назад +6

      Which parts did you find confusing? I may be able to explain some areas better. She never went too deep into the topics due to time and the audience this video is for, but I think if you give some specific aspect I can write a more in-depth explanation that may help.

    • @iamwisdomsky
      @iamwisdomsky 2 года назад +1

      I'm not even a self-proclaimed hacker even though I've hacked things before, but I do understand most of what she's talking about and I can say that she is indeed a "legit" hacker.

  • @jitxhere
    @jitxhere 3 года назад +5850

    "I have been in cybersecurity... for more than 25 years"
    I thought she is just 25.

    • @savsaga4991
      @savsaga4991 3 года назад +101

      D u think she is hacker? or is she lying for youtube?

    • @orngjce223
      @orngjce223 3 года назад +474

      You'd be surprised what moisturizer and hair dye can do.

    • @yessum15
      @yessum15 3 года назад +834

      @@savsaga4991 Dude don't be silly. She's well known and her resume is easy to verify. Also, she's 41 years old (dob: 1980). Good genetics & self care. "Hackers" movie came out in '95 and targeted teenagers.

    • @PrototypeHQ1
      @PrototypeHQ1 3 года назад +381

      @@bm_wuratli6883 you know that she can be a white hat hacker....not a black or red hat

    • @munster1404
      @munster1404 3 года назад +56

      I can say she looks her age. Obvious from the first glance that she was at least in her later thirties to early forties.

  • @Yvaelle
    @Yvaelle 2 года назад +258

    I love that her only complaint about Hackers was the lack of seeing the code. Thank you, people rip on it all the time for being inaccurate - but we're never actually shown enough code to know if its accurate: instead we experience what it Feels Like for the hackers, not specifically the steps they go through. Also, because we don't see them taking specific actions, the movie is timeless - it doesn't date itself to the early 90's. Hackers is arguably the best hacker movie ever made, it doesn't teach you anything about How To hack, but it explores why and why not.

    • @screminmemes
      @screminmemes Год назад +8

      It is one of my all time favorite movies with one of the greatest soundtracks (why I still listen to The Prodigy and Orbital to this day.) My gripe though was always the silly scenes where they are flying through this computer landscape representing the company's network and stuff. I know, it's Hollywood Hacking but they could have at least off set that with some actual code.

    • @McCuipandKitty-qw1wj
      @McCuipandKitty-qw1wj Год назад +3

      I still love the movie Hackers as it shows them actually going into buildings to line in rather than just sitting there.

    • @Ken.-
      @Ken.- 10 месяцев назад +1

      Hackers was a silly joke that only little kids that never seen a hacker movie before thought was 133t when it came out. It was embarrassing in every way possible. Literally nothing accurate at all.
      WarGames was the only movie that was any good.

    • @jfbeam
      @jfbeam 4 месяца назад

      People rip on it because it *isn't* accurate. But it's not supposed to be. It's entertainment, not educate or documentary. And yes, it very much dates itself to the 90's... payphones, "686", "RISC", BBS's, hacking the cable company's _VCR!_ ... And the f'ing "gibson". No computer has EVER looked like that. Computer operation rooms are not black f'ing pits. (until midnight when we took over the NOC to watch movies / TV on the wall-o-monitors - rear projection monitors.)

    • @KasumiRINA
      @KasumiRINA 3 месяца назад

      I think it exposes Angelina Jolie's boobies too so extra points for that (Imma girl, she's just too much of an icon to not appreciate).

  • @frankzeppelin
    @frankzeppelin 3 года назад +1685

    Excellent presentation skills, good sense of humor, knows not only what's going on in the scenes but able to put them in context. She gets 10/10.

    • @akashnag3879
      @akashnag3879 3 года назад +24

      And she is very beautiful

    • @Far1988
      @Far1988 3 года назад +50

      She also makes this a fun experience and doesn't take the clips too serious. She respects that Hackers or Matrix for example are movies with a lot of goofy stuff happening that are nowhere near realistic - but she's focussing on the things that might or might not be accurate, which is very nice.
      If you've seen certain expert reacts episodes on gameology you know what I'm talking about.

    • @jondunmore4268
      @jondunmore4268 4 дня назад

      and she's a cutie too

  • @g-nonymousgems3047
    @g-nonymousgems3047 3 года назад +2377

    Didn't know Aunt May is a hacker.

    • @interstellarastronaut712
      @interstellarastronaut712 3 года назад +43

      Lmfaoo

    • @tink6225
      @tink6225 3 года назад +97

      there's a lot of things May keeps a secret

    • @TigerGreene
      @TigerGreene 3 года назад +12

      She's not. Her much fatter kid sister is.

    • @ken-ne3ei
      @ken-ne3ei 3 года назад +44

      So I guess I'm not the only one who thought of that 😂😂

    • @SonOfAFridge_
      @SonOfAFridge_ 3 года назад +18

      Maybe she learnt it from peter

  • @screenshottactical5201
    @screenshottactical5201 3 года назад +2322

    Plot twist: The CIA is now monitoring fingerless glove sales in order to go on a phishing expedition.

    • @edwardc48
      @edwardc48 3 года назад +18

      Hahahahah punny humor!

    • @kriss3d
      @kriss3d 3 года назад +44

      Thats gonna flag alot of bicyclists.

    • @screenshottactical5201
      @screenshottactical5201 3 года назад +26

      @@kriss3d and motorcyclists, european sports car drivers, and mma fighters!

    • @AramatiPaz
      @AramatiPaz 3 года назад +6

      Oh my.
      I have a story of programing courses, IT degree, and have a lot of notes for writing that makes me loot like a psychic.
      Now my fingerless gloves are totally make me look suspicious!

    • @Far1988
      @Far1988 3 года назад +5

      You joke but I bet intelligence services are monitoring some crazy things around the world. Not just the obvious, like amonium nitrate sales and such.

  • @Ceares
    @Ceares 2 года назад +204

    This was great. I love that Hackers actually influenced her to become a Hacker. Please bring her back for more. I would have loved to see Die Hard 4...wanna know how much of the Fire Sale is real. Also Leverage and some of Hardison's hacks, like the car theft hack or against the Sterenko.

    • @HusniArsyah
      @HusniArsyah 2 года назад +6

      Oh my, yes I remember Die Hard 4, the Fire Sale hack, I'm also curious about the real aspect of this thing...

    • @Roguechan
      @Roguechan Год назад +3

      I want to see her comment on that infamous NCIS scene lol

  • @Survivor-ng4te
    @Survivor-ng4te 3 года назад +2652

    “We can tell she’s a hacker shes got all those stickers on her laptop”
    I sense some sarcasm

    • @UnoriginalElephant
      @UnoriginalElephant 3 года назад +153

      I'm a software engineer and my laptop is actually covered in stickers 😂 It's a pretty common practice, and some companies even give employees stickers to put on their laptops. Granted, my hacking skills are somewhat lacking.

    • @rustybolt_
      @rustybolt_ 3 года назад +88

      I am a programmer but I don't like stickers on my laptop.

    • @ThatGuy-vp3un
      @ThatGuy-vp3un 3 года назад +63

      I am not a programmer and don't like stickers on laptop.

    • @oxbunnehxo
      @oxbunnehxo 3 года назад +58

      I am not a programmer but I like stickers on my laptop

    • @andreshyh
      @andreshyh 3 года назад +201

      I'm not a laptop but I like programmers on my stickers

  • @Mister_Laughs
    @Mister_Laughs 3 года назад +1263

    I didn’t know it was actually possible to have “hacker gloves”

    • @johntucker3695
      @johntucker3695 3 года назад +71

      Probably for really bad carpal tunnel

    • @JKTCGMV13
      @JKTCGMV13 3 года назад +55

      @@johntucker3695 Cold environments too, maybe? I used to have my comp sci class as the first class of the day in high school and on cold days I could barely type for a good portion at the beginning of class.

    • @johntucker3695
      @johntucker3695 3 года назад +24

      @@JKTCGMV13 This sounds sarcastic but that is actually very interesting. I never really thought about how cold hands would make it harder to type.

    • @Mell0wY3ll0w
      @Mell0wY3ll0w 3 года назад

      Shows whos not a hacker then.

    • @AgentWuT
      @AgentWuT 3 года назад +7

      It's needed because of hand sweats

  • @captainfactoid3867
    @captainfactoid3867 3 года назад +1298

    “Why is this air freshener connected to the internet”

  • @Narsil31
    @Narsil31 8 месяцев назад +21

    Mr. Robot is the best IT/Hacking show or movie that's been made. It's combination of the technical elements and the psychological complexity of the characters with Elliot being one of the best written characters I've ever seen. A brilliant show and if your a tech nerd you need to watch this.

    • @JohnRiley-r7j
      @JohnRiley-r7j 8 месяцев назад

      True,only because creators of Mr.Robots are smart people who want to create realistic hacker show.
      They are backed with elite hacking team of top security engineers and IT specialist that perform all Mr Robots hacks for them in real life,everything that team was doing was build in a flash animations that are later played on the show so it seems that eliot or other characters performed them.

    • @auturgicflosculator2183
      @auturgicflosculator2183 5 месяцев назад

      @@JohnRiley-r7j An elite hacking team built animations using flash? Something doesn't add up here.

    • @jfbeam
      @jfbeam 4 месяца назад

      Sure, for people who don't know any better, it's very entertaining. But for me and my "tech nerd" friends, it's infuriating how things are trivialized, and the otherwise hatchet job done in the name of hollywood. (sure thing Deviant... many doors can be slipped, and once inside the water treatment plant f'ing nothing has a password; no one is watching the cameras, and the drive in the NVR has been full or broken for years.)

    • @quantumblurrr
      @quantumblurrr 3 месяца назад +1

      @@jfbeam Hey, it beats NCIS two people typing on the same keyboard hacking, looking like they just downloaded something dodgy from early 2000's Limewire and getting flooded with popups. It's progress!

  • @johnf7332
    @johnf7332 3 года назад +3332

    Finally, they got a hacker who REALLY knows what she’s talking about

    • @gavinvelez1468
      @gavinvelez1468 3 года назад +38

      They have done 3 other of these pieces with other Hackers.

    • @garethwood1139
      @garethwood1139 3 года назад +134

      @@gavinvelez1468 OP is saying that those three didn't know what they were talking about.

    • @JAnx01
      @JAnx01 3 года назад +27

      The video was boring af.

    • @JAnx01
      @JAnx01 3 года назад +18

      @Nybbl er The content of this video is for kids, though.

    • @TroyLonie
      @TroyLonie 3 года назад +118

      @Nybbl er It's actually kind of perfect for those with adhd if it interests them enough for them to hyperfocus on it.

  • @lanewaldon6450
    @lanewaldon6450 3 года назад +1321

    I feel like Mr. Robot has some of the most realistic examples of hacking to date

    • @wedmunds
      @wedmunds 2 года назад

      ​@G T Or the FBI paid Microsoft to keep the backdoors open. It literally happened with Wanacry.

    • @ghostabastard2208
      @ghostabastard2208 2 года назад +7

      Also some of the most idiotic and boring tv shows ever.

    • @Vagabond-Cosmique
      @Vagabond-Cosmique 2 года назад +65

      @@ghostabastard2208 What's idiotic about it?

    • @snowyshivas
      @snowyshivas 2 года назад

      @@ghostabastard2208 you really are a high school drama enjoyer, go watch your vampire diaries and call it entertaining

    • @andresurdaneta8249
      @andresurdaneta8249 2 года назад

      @@ghostabastard2208 You justify your answer.

  • @yutro213
    @yutro213 3 года назад +590

    Very proud of Mr. Robot. Its attention to realistic hacking is very much appreciated.

    • @Peter_Cordes
      @Peter_Cordes 3 года назад +14

      In some ways, the errors in the terminal session graphics in Mr. Robot (season 1) bothered me more (or in different ways) than shows which don't even try to be realistic. Like, if you're seriously trying to be realistic, actually get the fine details right. Stuff I remember included having the command prompt printed at the left of the output of the command, so you know they didn't actually set up a test network that would let them just run `nmap` or whichever command it was. Like, you were so close, but clearly just made this image in an image editor, not on a real terminal session.
      Or another scene had the arguments backwards to ln for making a symlink. It's
      ln -s target_name link_name_to_create
      not the other way around. I've used GNU/Linux as my desktop OS for about 25 years, mostly with the command line other than a web browser.
      Plot-wise I appreciated the accuracy of what hacks can/can't do, but the expectation of accuracy made things like that break suspension of disbelief for me for a few minutes each time, and made me want to double-check every other screen image.

    • @fishyc43sar
      @fishyc43sar 3 года назад

      @@Peter_Cordes hi, fella nerd

    • @justincruz5720
      @justincruz5720 3 года назад +16

      @@Peter_Cordes Even if the hacking isn’t completely accurate, you can see the effort that was put into those sequences. This is also entertainment, so some creative liberties must be taken. It’s a bit like _Breaking Bad_ . The show looks like it’s teaching you how to perform these cool illegal things, but if they showed you how to do it verbatim, it could potentially be very problematic.

    • @Peter_Cordes
      @Peter_Cordes 3 года назад +5

      @@justincruz5720 - My issue wasn't with any "hacking commands" or techniques, instead with the basic appearance of the UI sometimes, or with a basic command like `ln` (similar to file-copy, a bit like DOS `copy`).
      As an analogy, imagine if Top Gun had had incredibly realistic dogfighting techniques, but occasionally they left the landing gear down while doing so. (More people know about planes than about Unix/Linux, and it's not a perfect analogy.)
      Or maybe a Windows analogy: if somebody ran a program, and its window appeared behind the desktop icons instead of on top. People who use Windows regularly would be saying "WTF" the one time that happened; people who don't might not notice.
      If the things that bothered me don't bother other people, that's great. It wasn't a showstopper for my enjoyment of the show, but it did bug me and stick in my memory.
      The realism of the actual hacking was great, just an occasional error in the super basics, like having the command prompt appear at the left of output lines of a command. So if they had a Unix/Linux user reviewing the screen images, that one slipped through the cracks.
      As for getting `ln` args backwards, that's more understandable; I sometimes have to think about it when I use it, and from some perspectives it seems backwards. So that's just an amusing reminder that they mock this stuff up in an image editor instead of actually running it. Easy to imagine someone getting that backwards even if they do know Unix/Linux command line tools. But still, if you notice it, it's a clear reminder this isn't real. :/

    • @justincruz5720
      @justincruz5720 3 года назад

      @@Peter_Cordes Is any of it real? 😂 In all seriousness, I heard Sam had some programmers as consultants to help work on the show.

  • @maverickcreations8864
    @maverickcreations8864 2 года назад +67

    For a layman, one of the most fun educating, eye opening things about hacking in 25 minutes. Would love to have more of her with such equally good movies.

  • @OriginalPiMan
    @OriginalPiMan 3 года назад +280

    I'm surprised that so many competent scenes were found for analysis. I didn't realise this many existed.

    • @manchesterunitedno7
      @manchesterunitedno7 3 года назад +13

      Watch the Mr. Robot series. Arguably the best show about a hacker so far.

  • @capp00
    @capp00 3 года назад +3305

    I really enjoyed this, nice to see at least a chunk of them are making efforts to get it marginally correct.
    But, I got a 2-ad-break after every single scene she analyzed. Skippable ads, but dear God it's annoying to see a cluster of ads every 3 minutes.

    • @fuckoffwithnovideoschallen2456
      @fuckoffwithnovideoschallen2456 3 года назад +46

      haha noob

    • @xyc350
      @xyc350 3 года назад +115

      @@NX-gw7wg adblooooooooooocker is worth the price

    • @kerrim508
      @kerrim508 3 года назад +3

      @@NX-gw7wg how much does it cost?

    • @kerrim508
      @kerrim508 3 года назад

      @@Itaygaming311Xx thanks! 🙂

    • @Fastwinstondoom
      @Fastwinstondoom 3 года назад +87

      @@kerrim508 ublock origin extension for chrome is free, free and free. Not seen ads for the last 10 years myself.

  • @ManteIIo
    @ManteIIo 3 года назад +448

    I had zero surprise when she said that Hackers (1995) movie was her absolute love... c'mon, it's every hackers holy grail and in most cases inspiration to become one.

    • @peterjeffery8254
      @peterjeffery8254 3 года назад +26

      I am older for me it is "wargames"

    • @hackerx7329
      @hackerx7329 3 года назад +8

      Even when it came out everybody I knew that knew anything about computers loved that movie, but as an ironic comedy rather than a thriller. The music was spot on and clearly somebody did research lots of real stuff involving hackers. But then hollywood got ahold of that info and just threw it around all slapdash and made a complete mess of it. The scene where they are using acoustic couplers in phone booths for VR rigs is just peak absurdity. For reference, assuming you have the world cleanest connection you might maintain a connection of a few hundred bits per second. A decent typist can type faster than you can transmit on a connection like that and the machine will start beeping at you because the keyboard buffer is full.

    • @stolzilp2407
      @stolzilp2407 3 года назад +3

      @@peterjeffery8254 both for me.....

    • @Glitch-qj3nj
      @Glitch-qj3nj 2 года назад

      Doubt

    • @user54389
      @user54389 2 года назад +6

      @@peterjeffery8254 yep. Wargames, Sneakers, and Hackers are why I am in infosec now.

  • @BuckeyeStormsProductions
    @BuckeyeStormsProductions Год назад +47

    My brother works in IT, more on the hardware side. He was tasked once with helping do a security audit. He was basically given a hi-vis vest, a hard hat, clipboard, and fake ID, and told to see what he could access without question. He said it was amazing how many places he could get without even showing an ID...and how many more he could get just flashing a badge. People will always be the weakest link.
    Edit: SQL for the foreseeable future. I work at a corporation running emulations of 60 year old hardware for chunks of their operations because they've never decided to update. We call it going greenscreen, because the software emulates the old green CRT terminal monitors. Everything we do is command line based. We basically have an emulation of the whole network (server and terminals) on each device, and they all regularly sync to make sure everyone is on the same page.

    • @sgtGiggsy
      @sgtGiggsy 3 месяца назад

      Okay, but Star Trek doesn't take place in the foreseeable future. Also, SQL injection barely works today. Basically you need VERY sloppy developers to have a site or service that is vulnerable to SQL injection. Discovery is set 230 years from now. Even if SQL will be used then, it's highly unlikely SQL injection could work.

    • @TheNeo349
      @TheNeo349 3 месяца назад

      @@sgtGiggsy practices turn to nouns all the time. maybe SQL injection is a type of hack in the future? tho imo they should have used better terms, there are systems, languages etc. which have survived since a long time in tech. some of the basic code and the things that make tech work are still used today as OP posted (I've seen it myself after working in tech for 7 years).

  • @H76Pro
    @H76Pro 3 года назад +768

    Being an ex white hat hacker myself I understood everything she said as I get frustrated sometimes with hackers in movies but you must understand it is done for entertainment. Real hacking is boring and tedious, well until you hack something then it gets exciting.

    • @00bean00
      @00bean00 2 года назад +33

      Script goes brrr

    • @mrkiky
      @mrkiky 2 года назад +45

      Except Mr Robot is not boring at all. Granted he is supposed to be a super genius and almost all of his attempts are immediately successful.

    • @powertrip6426
      @powertrip6426 2 года назад +50

      Ex-white hat hacker AKA current black hat 🤣😜

    • @satyaki4058
      @satyaki4058 2 года назад +1

      Teach me.

    • @MrHaggyy
      @MrHaggyy 2 года назад +17

      😂 id love to see a movie where the hacker says i need a month, start researching for 2 weeks, build some hard and software for another 2 weeks and than just simply fries the target because he accidently made a ground loop xD

  • @lucysrz3496
    @lucysrz3496 3 года назад +453

    Can't believe you didn't show her the iconic NCIS scene

    • @ZombieWilfred
      @ZombieWilfred 3 года назад +139

      The part where they're both typing on the same keyboard is one of the dumbest things I've ever seen... 😆😂🤣

    • @orye09
      @orye09 3 года назад +38

      Would be hilarious if she confirmed it was real

    • @manchesterunitedno7
      @manchesterunitedno7 3 года назад +26

      That's low-hanging fruit to pick. So obvious even to someone slightly familiar with computer.

    • @TigerGreene
      @TigerGreene 3 года назад +15

      Can you imagine the sheer volume of mockery that actress gets for that scene? That is like, her whole life! lol

    • @ZombieWilfred
      @ZombieWilfred 3 года назад +44

      @@TigerGreene Personally, I don't put most of the blame on the two actors, I also blame the writers, directors, editors, etc. Someone should've pointed out that it was dumb and nobody did! It's crazy to me that so many people had to be involved, like with any scene, and that made it on the show. Also, I doubt anybody gives her too much grief, cuz Abbie was everybody's goth tech bae fantasy, that some didn't even know they had. It's universal, even people who aren't into goth love Abbie! 😍😆

  • @mleise8292
    @mleise8292 3 года назад +441

    When she said you can do beautiful things with code, she didn't mean graphics, she meant elegant code that a master of the art looks upon with tears of joy.

    • @gbalfour9618
      @gbalfour9618 3 года назад +16

      It really is like looking at a piece of fine art when someone does a nice code. I’m not a coder but man is it beautiful.

    • @petertrudelljr
      @petertrudelljr 2 года назад +20

      You guys and your 'nice code'. Spaghetti is a feature, not a bug! if it was hard to write, it should be hard to read!

    • @spiral83
      @spiral83 2 года назад +1

      @@petertrudelljr 😂

    • @torres9807
      @torres9807 2 года назад +4

      ​@@petertrudelljr You can also claim that the spaghetti code is a form of "obfuscation"

    • @emperorpalpatine6080
      @emperorpalpatine6080 2 года назад +4

      yes but , if I wrote a beautiful program whose aim is to produce spaghetti code , would it still be beautiful ?
      would that program be spaghetti complete ?
      what if I wrote a spaghetti meta code , to produce spaghetti code , would that be considered a spaghetti machine ?
      would goldon ramsay's brain halt ?

  • @jamesfobar4368
    @jamesfobar4368 2 года назад +90

    One of the things that I'm disappointed that she didn't mention is social engineering, which is also used in Hackers where he takes over the TV station by calling up the guard to get the number to the modem. It is a real thing that was also used to gain access to different places by pretending to belong there and someone willingly gives you the access you want.

  • @michaelcooper3633
    @michaelcooper3633 3 года назад +454

    14:58 *remote hack starts driving a car*
    Me: haha ridiculous 1/10
    Keren: "This is a real-world hack..."
    Me: ah yes I love the realism

    • @gbalfour9618
      @gbalfour9618 3 года назад +18

      I was at one of those demo where they did it (with a bunch of other tech me). At first everyone was searching for a cheat thinking it was a trick then everyone started hacking and doing it themselves. Ended up being the show stopper event of that conference. Haha

    • @Totally_Not_A_Haxxer
      @Totally_Not_A_Haxxer 2 года назад +2

      its pretty real, maybe not in the exact points but CAN exploitation or Controller Area Network exploitation is very very real, CAN is the interface often used in cars, all it is is finding the CAN address and Network, Sniffing the data off of that interface, making a bluetooth logger hang onto the card ( Most CAN interfaces have bluetooth ), dumping the information and exploiting the device if there is a working or current vulnerability that has not been patched yet or has been abandoned by the developers

  • @stealthhumor
    @stealthhumor 3 года назад +461

    Bogus IP addresses might be a movie thing like putting "555" in a phone number. An actual IP address probably belongs to a computer and will undoubtedly get unwanted attention from real hackers and unnecessary litigation for filmmakers. So, I wouldn't take points away because of the fake IP as it's an entertainment-inspired legal deal, possibly.

    • @nonyabidness6492
      @nonyabidness6492 3 года назад +3

      Doubt they are smart enough to think about that

    • @Mo-gg5fj
      @Mo-gg5fj 2 года назад +10

      Doesn't really matter if you use private IPs

    • @androgynousmaggot9389
      @androgynousmaggot9389 2 года назад +20

      It's to make sure not to use real IP address, same as tel number and avoid getting sued! Maybe there are laws, or rules, about it! ¯\_(ツ)_/¯

    • @l3zl13
      @l3zl13 2 года назад +34

      @@androgynousmaggot9389 If they showed a real IP address in a scene and then that IP address got DDOSsed afterwards the owner of the IP would sue for sure.

    • @WelcomeBackMeHere
      @WelcomeBackMeHere 2 года назад +65

      @@nonyabidness6492 They used the number 256 in an ip address in the picture, which is exactly 1 higher than allowed. So it seems pretty deliberate, hard to imagine that they would have picked that number randomly.

  • @PaoloFSpina
    @PaoloFSpina 3 года назад +639

    Me: *takes one single computer science class in college*
    Also me: “You know I’m somewhat of an hacker myself”

    • @lePoMo
      @lePoMo 3 года назад +17

      considering you need zero computer science classes to be a hacker, that is ok.
      You mostly need an interest in understanding how things work and a will to look up it up until you do. Hackers are creative tinkerers.
      A computer science education does help in getting a broad set of basics and get them right. Some things you might otherwise not even know you would want to look up.

    • @bobnoob1467
      @bobnoob1467 3 года назад +1

      More like the "hacker" reacting to this is: "Considered somewhat of a hacker" lol.

    • @valelelentin
      @valelelentin 3 года назад +6

      @@lePoMo it's gonna take you a lot if you didn't finish some kind of computer science degree. There's just so much to learn. It takes a lot of work in college with mentors that can teach you. Think about what would it take if you were to learn it alone...

    • @CG-ej8nu
      @CG-ej8nu 3 года назад +2

      @@lePoMo bruh you just can't "Look up" stuff related to hacking, it's not that easy.

    • @IGamingStation
      @IGamingStation 3 года назад

      @@CG-ej8nu What about those textbooks and reddit? I can't be a hacker? :C

  • @Yvaelle
    @Yvaelle 2 года назад +22

    In Trinity's full-finger glove defense, she's inside the Matrix, she doesn't actually need to touch the keys to type, it's her mind injecting commands into the simulated machine: she may not even be touching the keys, she's just making the gesture of typing to signal that she's doing it.

  • @patrickmalec8419
    @patrickmalec8419 3 года назад +145

    It’s no surprise that David Fincher’s movies are some of the highest rated. His attention to detail translates to showing off real world hacking techniques

    • @Manuel.jimenez
      @Manuel.jimenez 3 года назад +5

      In fact, I expected 10/10. Even the Linux version the character uses looks like the the one we had then!

  • @alexnorth3393
    @alexnorth3393 3 года назад +321

    Elliot isn't simply set up to be above average intelligence, he's basically portrayed as a genius of I.T!

    • @manchesterunitedno7
      @manchesterunitedno7 3 года назад +34

      He is a savant in the hacking world.

    • @Anonymous-mz9un
      @Anonymous-mz9un 3 года назад +9

      Na he is a 1337

    • @disco.lemonade
      @disco.lemonade 3 года назад +31

      Yeah, above average is like... some guys working at FB or something like that. Elliot definitely is in the top 1% of the top 1% programmers.

    • @randomuser5237
      @randomuser5237 3 года назад +8

      Alex North That's why it's being called unrealistic. It's simply not possible for any human to do what he did in basically 2 mins. That was a poor execution by the show's writer and directors, kind of ruined the hard work that the security consultant put in.

    • @w1z4rd9
      @w1z4rd9 3 года назад +1

      @@randomuser5237 Well he could have done a preview of the CTF. Or maybe just lucky on solving things out, considering his proven skills since he was a kid. But I do agree if you are pointing ot other scenes on the series where they are extremly lucky or you just notice a plot-tool, by the percentage not likely but technically yes the exploits and ways on Mr.Robot is great.

  • @sugabud
    @sugabud 3 года назад +325

    I really can’t suggest mr robot any more. It’s an absolute masterpiece.

    • @moonpie7982
      @moonpie7982 3 года назад +9

      It’s slow and not for everyone

    • @LordiGFX
      @LordiGFX 3 года назад +7

      @@moonpie7982 I agree,I watched the first few episodes with my friends and they quickly got bored.

    • @keepinitkawaii
      @keepinitkawaii 3 года назад +2

      It is AMAZING

    • @LordSevla
      @LordSevla 3 года назад +8

      It's basically the 4chan version of Fight Club.

    • @billzidis2656
      @billzidis2656 3 года назад +9

      Mr.Robot is like watching ART. My favourite series ever

  • @nikoblading
    @nikoblading 2 года назад +8

    In Mr. Robot he could have noticed some easy to spot defect like SQL injection, saw an input argument to a function which just got invoked as a DB statement as is. That kind of a defect can be spotted quickly an no need to dig into the code. Enjoyed the video, thank you!

  • @shivanshsaini5275
    @shivanshsaini5275 3 года назад +305

    She said she had been in cybersecurity for 25 years,lol, I would believe if anyone said to me she is just 22 yrs. Old

    • @ajay4319
      @ajay4319 3 года назад +81

      She's 41 years old

    • @joshjosh2842
      @joshjosh2842 3 года назад +43

      @@ajay4319really ? but she looks young tho

    • @ajay4319
      @ajay4319 3 года назад +7

      @@joshjosh2842 yep.

    • @swirlandtwirl5417
      @swirlandtwirl5417 3 года назад +8

      @@pet.me102 she's fit too

    • @atfsgeoff
      @atfsgeoff 3 года назад +21

      this is what happens when you never see daylight lol

  • @fustigate314159
    @fustigate314159 3 года назад +165

    "... using open source intelligence, which is a fancy term for 'the internet.'" 😄 Love it, Keren!

  • @jalabi99
    @jalabi99 3 года назад +82

    Five seconds in I knew this would be a great episode when Keren shouted "This is terrible!" and "YIKES" at those scenes. We need a part 2, and she needs to be in it!

  • @bamachine
    @bamachine 2 года назад +61

    The IP address with 256 in it, is probably similar to them using 555 as the city code for telephone numbers in TV and movies, to keep people from trying those numbers and successfully reaching some random person. Don't want them trying to reach Jenny's laptop, only to accidentally to to connect to something like a server at the NSA, which gets your own IP logged for potential cyber crimes, when you are just a kid playing around with something they saw in a movie.

    • @derleonator2232
      @derleonator2232 Год назад +3

      Came here to say that, they probably didnt want to accidently use someones actual IP Adress so they took one that isnt possible

    • @someguy4915
      @someguy4915 Год назад +2

      @@derleonator2232 They also show at least one real valid IP owned by Level3, the way they use leading zeros so inconsistently shows that whoever designed that scene has heard about IPv4, over the phone.
      Definitely not done on purpose to prevent DDoS/spamming against real IPs. If that were the concern (which it should be), they would use local IP addresses (RFC1918) or APIPA addresses which would guarantee nobody would ever be affected by it.

    • @Nina-cd2eh
      @Nina-cd2eh 7 месяцев назад

      @@someguy4915 It's done for legal liabilities, as every legal IP is borrowed by a company, and they could be liable to the owner, even if there was no attacks against it. The most appropriate IPs to use are probably those reserved for documentation besides private and zeroconf addresses. I'm guessing they like to use big and random numbers instead because they look "cooler", and because they don't have to think too much about it.

    • @jeremyschulthess63
      @jeremyschulthess63 5 месяцев назад +1

      There are also a lot of times where they will use an IP from the Private IP Ranges for a Public IP.

  • @anthonymonge7815
    @anthonymonge7815 3 года назад +329

    I am a automobile security researcher. Everything she depicts is accurate. Even with driverless vehicles, I would be hard pressed to make the vehicle perform the maneuvers depicted in the movie. Just FYI, your vehicle’s computer systems are incredibly insecure. It is frightening just how insecure they are.

    • @fightingfalconfan
      @fightingfalconfan 3 года назад +4

      It's only certain models that can do the remote thing. The factory has to install the 'On Star' feature. It usually comes with a price tag to the end user who purchases the vehicle. But what she stated in the scene about computing power; that's real. You maybe able to hack in to the system. But that's really as far as your able to go. You would need some top of the line servers to make that all happen that quick.

    • @snazzypazzy
      @snazzypazzy 3 года назад +30

      I don't own a car, but I do not like that all appliances and even cars are becoming smart. Give me my stupid fridge and a car that just needs a key to open it. It only creates weak spots where things can break (or be broken into).

    • @anthonymonge7815
      @anthonymonge7815 3 года назад

      @@fightingfalconfan servers have nothing to do with it.

    • @mechanomics2649
      @mechanomics2649 3 года назад +7

      @@snazzypazzy The fact is, things much more vital than your car or fridge are already potentially vulnerable to hacking. Interconnectivity goes hand in hand with globalization. Cyber security is, and always has been, an arms race and will continue to be for the foreseeable future.

    • @Ebondeath22
      @Ebondeath22 3 года назад

      @@anthonymonge7815 You would need processing power. I'm not sure how similar it would be to running a brute force attack. I've seen computers with 4,6, even 8 PCIe slots that house as many GPU's to utilize their processing power for password cracking. I would have to assume you would need something similar but on steroids to manage that type of attack. Even so, I doubt the NICs in self-driving cars are broadcasting their network traffic in plain text. Thats just something you dont see anymore with AES. I think self-driving cars use GPS and proximity sensors to navigate and I'm sure theres some kind of AI that processes the information in real time. Im sure we will see self-driving car hacks happen with greater frequency in the coming years.

  • @prestonroe268
    @prestonroe268 2 года назад +97

    On the topic of Elliot, I assume anytime we see something happen too fast, it's because we're seeing it from his perspective. We already know he doesn't process things well and hyperfocus is a pretty common trait that causes people to "lose time". He might be spending an hour on a task, but only really processing it as a few minutes. Since we follow his perspective we process time the way he does.
    This probably isn't right, but I like it as a head canon.

    • @wisteela
      @wisteela 5 месяцев назад +1

      That is perfect.

  • @vinnieg6161
    @vinnieg6161 3 года назад +151

    ''Hey, why does that air freshener have an internet cable plugged in?
    - ''Don't worry about it''

    • @miranina1585
      @miranina1585 3 года назад +4

      -It's a POE powered air freshener.

    • @xeridea
      @xeridea 3 года назад +10

      There used to be a big problem with people just picking up any random USB stick and plugging it in. Hackers would leave malicious USB sticks lying around at banks, offices, etc, and a surprising amount would get plugged in. Policies on USB sticks have changed, especially at banks, this is a huge no no.

    • @gbalfour9618
      @gbalfour9618 3 года назад +3

      You’d be surprised on how many times people don’t question that type of thing.

    • @desfoley6335
      @desfoley6335 2 года назад +2

      It's for the Fragrances DLCs

  • @paderborner5213
    @paderborner5213 2 года назад +11

    Regarding the last one:
    My guess is that they deliberately used an invalid IP address, just like all phone numbers in US-movies that start with 555.
    Being off by a single digit indicates to me that they knew exactly what they were doing there.

  • @phoenixcreations5797
    @phoenixcreations5797 3 года назад +168

    Me who can't even print hello world in C language- hmm..looks interesting

    • @cjcjxxx4404
      @cjcjxxx4404 3 года назад +1

      (TT)O_o:-O:-)^_^8-)B-)ᕙ( • ‿ • )ᕗᕙ( ͡◉ ͜ ʖ ͡◉)ᕗ

    • @cjcjxxx4404
      @cjcjxxx4404 3 года назад

      9WHQ+8M Boston, MassachusettsTap on a clip to paste it in the text box.

    • @TheShinySnivy
      @TheShinySnivy 3 года назад +9

      As a 2nd year CS student currently working with C and C++, I wouldn’t hold that against yourself. C is hell. Try python instead.

    • @AramatiPaz
      @AramatiPaz 3 года назад

      I was "alphabetized" in Java. I hate C so much. I'm learning C# but Python sure is a given of the Heaven

    • @akashnag3879
      @akashnag3879 3 года назад

      I think Python is way to go for hacking

  • @kroven009
    @kroven009 3 года назад +37

    Hollywood hacking: *Frantic typing at a 3D visual effects animation* "I'm in."

  • @MrSparda1989
    @MrSparda1989 3 года назад +313

    Needless to say this is one the many reasons why I keep my Laptop Camera covered with tape.

    • @rdarkmind
      @rdarkmind 3 года назад +16

      While leaving the one on you cell uncovered I would pressume.

    • @MrSparda1989
      @MrSparda1989 3 года назад +14

      @@rdarkmind nope got that covered too.

    • @alexgigelu
      @alexgigelu 3 года назад +14

      @@MrSparda1989 I have a lot of co-workers and friends with laptop cameras covered but you're the first person I hear to have your phone camera covered as well. Kudos to you! Too bad you can't 'cover' your microphone if you want to actually use your phone for talking with people.

    • @codyherring3895
      @codyherring3895 3 года назад +4

      mine came with a cover built in to the case B)

    • @IGamingStation
      @IGamingStation 3 года назад +1

      @@alexgigelu Just turn off your phone, lol

  • @SamanthaMagdalena
    @SamanthaMagdalena 2 года назад +6

    The most informative video I have seen on this channel! Never knew what the backdoor operation meant, even after research. She explained it so well with the "secret handshake" analogy. On point 👌

  • @TheMule71
    @TheMule71 3 года назад +56

    In all fairness, Trinity is in the Matrix when she's hacking. Given the powers she has about bending the rules of the simulation, including jumping across streets from building to building and kinda flying thru tiny windows w/o a scratch, outrunning Agents, typing correctly with leather gloves doesn't strike as unbelievable... I think we can grant her the 0.5 back :)

  • @waasar
    @waasar 3 года назад +71

    I'm shocked they didn't review the most powerful hacker of all time: Hackerman from Kung Fury.
    You won't ever catch him on rookie mistakes like wearing fingered gloves. I learnt everything I know from that guy.

    • @vanflyheight8487
      @vanflyheight8487 3 года назад +4

      Damn you just brought back so much nostalgia

    • @Misadventures_85
      @Misadventures_85 3 года назад +2

      [ synth wave soundtrack intensifies ]

    • @00bean00
      @00bean00 2 года назад

      // _HACKERMAN_ //

  • @Ganiscol
    @Ganiscol 3 года назад +202

    They were generous in picking the scenes to analyze, simply because there are many more examples to bury under a 1/10 than there are worthy of a 5+/10 🤭

    • @kallyb1998
      @kallyb1998 3 года назад +5

      So true, I'm not a huge tech wizard for a 22 year old, but I know most hack scenes are b.s. This was a fun episode for me to learn something new.

    • @scottwallbank4794
      @scottwallbank4794 3 года назад +1

      Swordfish is the film that comes to mind.

    • @kc5997
      @kc5997 3 года назад

      Blackhat was horrendous. On par with swordfish.

    • @joejacko1587
      @joejacko1587 3 года назад

      she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol

    • @craigcrissman4651
      @craigcrissman4651 3 года назад +6

      @@joejacko1587 bro can you stop spamming this shit all over the comments

  • @reprovedcandy
    @reprovedcandy Год назад +2

    As a software developer, I hate how movies make coding out to be this thing that can be done in a breeze with no time needed at all.
    Idiots try to contract me to build super complex software and say "this should be easy if you know what you're doing" ... Hollywood and the American education system are to blame.

  • @juggerfox
    @juggerfox 3 года назад +214

    Technically the Matrix Reloaded would be a 10 since when Trinity is doing the hack with the gloves, she is within the matrix, where she has learned to go beyond certain limits that would otherwise impede her performance, for example, doing those really high jumps. Had she done this outside of the Matrix then yes, there we could have judged her in comparison to "reality".

    • @grahamstrouse1165
      @grahamstrouse1165 3 года назад +34

      If someone is able to long jump 50 feet & run along walls I’m gonna assuming that typing with gloves on isn’t too much of an issue... 😁

    • @juggerfox
      @juggerfox 2 года назад +8

      @@LinkinVerbz44 Yes, hence why I said, technically, since in all the Matrix movies we can see and tell the difference between the digital and the real realms. Neo for example can fly within the Matrix, but not outside of it. Trinity can hack with gloves flawlessly within the Matrix, not outside of it. So for that scene, as she is within the Matrix, techinically should be a 10.

    • @MikkoRantalainen
      @MikkoRantalainen 2 года назад +5

      @@juggerfox Good points. And the Tank in the first Matrix movie living in the real world does use fingerless gloves.

    • @laprimaverrra
      @laprimaverrra 2 года назад

      Plot twist: You didn't watch a RUclips video of a white hat hacker reviewing a Matrix scene. You are not even reading this comment of your own free will. You are in the Matrix. 😅

    • @juggerfox
      @juggerfox 2 года назад

      @@laprimaverrra can't argue against that, but still a 10! ^^

  • @brownbearedurardo
    @brownbearedurardo 3 года назад +46

    As a computer engineering student, I am having fun learning this kind of video

  • @thegirlsedit1598
    @thegirlsedit1598 3 года назад +262

    She explains those things so perfectly even tho I'm not a hacker but I learned more from her than my math teacher.

    • @JLilliquist
      @JLilliquist 3 года назад +5

      32 x 32 =

    • @asimplenight8220
      @asimplenight8220 2 года назад

      @@JLilliquist lmao

    • @asimplenight8220
      @asimplenight8220 2 года назад

      I'd say you're biased as we all are.
      Also,math and computer science despite being interdependent don't necessarily equate in knowledge of one amounting to knowledge of another.

    • @vincentvega5686
      @vincentvega5686 2 года назад +1

      Your math teacher was teaching you how to hack? lol

    • @2684dennis
      @2684dennis 2 года назад

      im curiouse, what did you learn from her in this vid?

  • @siahillshire3040
    @siahillshire3040 23 дня назад +1

    I saw this just as I was about to give up studying Cybersecurity. I guess the universe doesn't want me to stop, maybe its my calling. This video just gave me the push to study hard and be as cool as her knowing all these stuff.

  • @_Lucas.
    @_Lucas. 3 года назад +153

    As a hacker I can confirm she is very knowledgeable - good job 👍

    • @darkgenie3167
      @darkgenie3167 3 года назад +17

      Hacking and slashing those Minecraft sheep

    • @raulrus9026
      @raulrus9026 3 года назад +1

      Are You really a hacker?

    • @theSwomry
      @theSwomry 3 года назад +5

      @@raulrus9026 i doubt it

    • @orye09
      @orye09 3 года назад +4

      Indeed I too am a real hacker and can confirm

    • @RandalReid
      @RandalReid 3 года назад +12

      @@orye09 I can vouch that this dude is really a hacker

  • @Barnacules
    @Barnacules 3 года назад +661

    This was fun to watch, I disagree with her critique of Trinity from Matrix resetting the root password after gaining root access being unnecessary. It’s very smart to reset the password when you gain access to keep the actual root out while you’re working 😎

    • @Subsistence69
      @Subsistence69 3 года назад +89

      Also when she deducted points for phony ip addresses, they did it cuz its a movie like “555” in phone numbers

    • @FeduGina
      @FeduGina 3 года назад +70

      if you want to be inconspicuous, you don't touch the pw. If you need to be fast, there ain't no time for that. If the girl just wanna hv fun... oh yeah 🥳

    • @YungFrenchToasty
      @YungFrenchToasty 3 года назад +13

      What's funny is she said it was based on an actual program and vulnerability found in it yet a hacker in another wired video said this scene's program was fake lmao

    • @ThisGuyDakota
      @ThisGuyDakota 3 года назад +11

      @@FeduGina too bad we didn't see the nmap triggers. Maybe we could've determined if she was being sneaky or aggressive

    • @sysbofh
      @sysbofh 3 года назад +53

      @@YungFrenchToasty He is wrong - that vulnerability was quite real. I remember patching my systems, and looking through logs, when this came out. Got quite impressed that the movie used it too.

  • @hylianchriss
    @hylianchriss 3 года назад +70

    Great video! But I am missing Swordfish's infamous scene where Hugh Jackman is doing a weird 3d puzzle to hack something 😂

    • @Lucy-dk5cz
      @Lucy-dk5cz 3 года назад +1

      😂😂😂

    • @TigerGreene
      @TigerGreene 3 года назад +4

      Wait. Hackers don't actually have chiseled pecs and a muscular a$$ and look like models?

    • @jojotwice8918
      @jojotwice8918 3 года назад +4

      lol i thought u were gonna say halle Berry's sunbathing scene

    • @Violet-Spark
      @Violet-Spark 3 года назад +5

      @@jojotwice8918 Halle Berry: *goes topless*
      “I’m in.”

  • @ashwinbhargava3011
    @ashwinbhargava3011 Год назад +27

    Blackhat (2015) is the most hack accurate and underated movie i ever watched. I wanted it be in the list 😭

    • @mizar_copernicus138
      @mizar_copernicus138 Год назад +1

      Its so fuckin boring. I forgot its about hacking several times throughout the movie

    • @Darkes336
      @Darkes336 Год назад +3

      @@mizar_copernicus138 Because hacking is boring, if it was so entertaining everyone would be a hacker. Moreover, hacking requires social ingenieering capacities that most geeks don't have.

    • @mizar_copernicus138
      @mizar_copernicus138 Год назад

      @@Darkes336 no that wasnt the case as i mentioned there was hardly any hacking and it was boring without it

    • @mizar_copernicus138
      @mizar_copernicus138 Год назад

      @@Darkes336 did you even see the movie?

  • @theelvenwtich
    @theelvenwtich 3 года назад +48

    I am SOOO glad that most of my IT work was done before ransomware. In all honesty that is the main reason I stopped. It was fun keeping things running, but it is not fun having to play defense 24/7. May the gods bless all you brave souls that picked up the torch.

    • @digitalcyclone7218
      @digitalcyclone7218 3 года назад +7

      tbh securely backing up your data and not installing HappyFunTime.exe from some random USB stick in the parking lot should be enough to play defense.

    • @theelvenwtich
      @theelvenwtich 3 года назад +5

      @@digitalcyclone7218 In the old days I had one of my users request a new 3.5-inch boot disk every day. One day I followed her and noticed that after she used it she secured it by using a magnet to hold it to her desk drawer. After that I put NOTHING past the masses. Also, the number of times I came into a new client only to find that there backups were not working properly for years is only surpassed by the stars in the sky. Hopefully these newer generations of techno-savvy users will mitigate some of these issues, but I spent decades teaching Luddites not to click on spam links.

    • @digitalcyclone7218
      @digitalcyclone7218 3 года назад +2

      @@theelvenwtich fair enough tbh.

  • @crub4906
    @crub4906 3 года назад +17

    Evolution of RUclips Ads.
    2010: No ads.
    2015: Skip ads.
    2018: Skip ads after 5 seconds.
    2020: Video will play after ads.
    2030: Video may play
    2040: Video unavailable, watch ads.
    2050: RUclips renames AdTube".

  • @remo394
    @remo394 3 года назад +84

    serial killers rating killing scenes
    "hey, that's actually good"
    takes out notebook

  • @Beegrene
    @Beegrene 2 года назад +13

    A lot of the points deducted were for things happening faster than they would in real life. I'm willing to be a bit more forgiving about those because screenwriting is all about hitting your story beats as quickly as possible. Nobody wants to watch a hacker stare at a monitor for hours on end. You can do it with a montage like Hackers did, but even montages get tedious if you use too many.

    • @deathtrap5556
      @deathtrap5556 Год назад +2

      To be fair a way I would get around that is show something else that is simultaneously going on. And if not that, a quick cut to an outside shot showing light being at a deeper angle also helps. It will be subtle, but people watching Mr Robot would probably notice

  • @ichiroutakashima4503
    @ichiroutakashima4503 3 года назад +367

    When you realize she says that the Matrix is real, you know the world has gone to deep hell right now.

    • @simplylethul
      @simplylethul 3 года назад +8

      It's plausible that we do exist in the matrix.

    • @Likexner
      @Likexner 3 года назад +24

      She doesnt say that though.

    • @simplylethul
      @simplylethul 3 года назад +1

      The world is going to a made up place? 😂

    • @ByAnyMeansNecessary.
      @ByAnyMeansNecessary. 3 года назад +17

      She didn't say that. She said Nmap is real. The commands Trinity types into the terminal are real.

    • @MrTheDarku
      @MrTheDarku 3 года назад +5

      the tools were real, the exploit used was real and so on, not the matrix. that was the whole point of what she was saying

  • @kaushalnandan7187
    @kaushalnandan7187 3 года назад +27

    We need Keren Elezari to react to Watch Dogs and Cyberpunk!! 😭 Please do a special episode on this

  • @jazz_meh
    @jazz_meh 3 года назад +93

    "we can tell she's a hacker. She's got all those stickers on her laptop"
    Me: looks over at my laptop. I'm a hacker! 🙌

  • @chad1755
    @chad1755 2 года назад +31

    For anyone who loves real life hacking stories, "The Cuckoo's Egg" was a great read, a true account in the very early days of the internet about an astronomy grad student who got roped into chasing a hacker around through various school and military networks.

    • @jackkraken3888
      @jackkraken3888 Год назад

      That book was amazing and the author Clifford Stoll is on RUclips but he usually talks about his other pursuits like his klein bottles.
      Not only is the book good but it might be the first time someone laid the groundwork on how to deal with a digital intruder instead of just kicking them off the network.

    • @mojoblues66
      @mojoblues66 Год назад

      Your comment currently has 23 likes, so I will not click the like button now.

  • @vex_ahlia7
    @vex_ahlia7 3 года назад +126

    Those are not "Cool Hacker Gloves."
    If I had to take an educated guess.. Those are probably doctor prescribed carpel tunnel bandage - gloves.

    • @TigerGreene
      @TigerGreene 3 года назад +7

      Hey now! Those gloves are totally radical to the max! You just need a time machine to travel back to 1985 to be in the 'Beat It' music video.

    • @AramatiPaz
      @AramatiPaz 3 года назад +39

      As a fingerless gloves user and a IT person I say those are great if you have Renaud syndrome or spend much time typing in cold rooms.

    • @AramatiPaz
      @AramatiPaz 3 года назад +8

      Also they help keep the hand moisturized.

    • @Wynner3
      @Wynner3 3 года назад +5

      @@AramatiPaz I wish I had known (or thought) about them two years ago. My old office had an hvac system that dumped cold air down my back every day. My hands were always cold and stiff. In some especially cold server rooms I do jumping jacks, wall push ups, and squats to stay warm.

    • @imonymous
      @imonymous 3 года назад +3

      @@Wynner3 i Actually bought two mini heaters that i placed on both sides behind the keyboard! I switched to fingerless gloves but these look more appropriate. Going to try to find some i can buy.

  • @neolyth
    @neolyth 2 года назад +41

    this was great! 2:45 when she says "unfortunately mr. Bond" like a villain. hackers are too clever for their own good :)

  • @leslauner5062
    @leslauner5062 3 года назад +45

    I was hoping she'd look at "Goldeneye" to see if Boris' SPIKE program was possible....

    • @Prototyp3m1nd
      @Prototyp3m1nd 3 года назад +2

      Slug head!

    • @HeroicBrando
      @HeroicBrando 3 года назад +6

      Even she wouldn't be able to stop it, because he is INVINC-EE-BLE!

    • @tomarnold7284
      @tomarnold7284 3 года назад

      I think she would start with what terrible typist both Boris and Natalya were.

    • @joejacko1587
      @joejacko1587 3 года назад

      might be a way to keep the relay on over buffering but it wouldn't work on all modems i doubt it would really work on any modem tracert is a thing but yea there is so much wrong there

  • @emo_galaxy9413
    @emo_galaxy9413 Год назад +5

    I absolutely love season 1 of Mr. Robot. There has never been a mind ducking of that level for me. I was so looking forward to new episodes with extreme excitement and enjoyment. No other show has done that for me. I miss the characters.

  • @T1Oracle
    @T1Oracle 3 года назад +16

    This one is the best of these. Not everything decent is an automatic 10, and point deductions are well explained. Good job!

    • @michaelcooper3633
      @michaelcooper3633 3 года назад +1

      It's almost as if she was in a profession that requires you to be very logical, organized and detail-oriented.

  • @gbalfour9618
    @gbalfour9618 3 года назад +105

    I’m a digital forensics and network security tech and she is so right on a lot of these points. When I did a security training for a bank I handed out password generators just so people did reuse passwords.
    I have done several CTFs and got to do Def Con once. So much fun. I’m terrible at them I score around the low 1000s, best I got was mid 500s (complete luck and a leap of faith). The team ones are so much more fun then the solo ones (at least for me). Was team leader twice and we had a monitor where I watched what everyone else was doing, again only scored low 1000s.
    I’m just not a great hacker, haha.
    As for PIN number sounds, there was a book that told you what numbers to hit to play songs.

    • @MRAYAN-uv6cq
      @MRAYAN-uv6cq 2 года назад +3

      Help me start a career in hacking.

    • @denbot.cycling
      @denbot.cycling 2 года назад +1

      The tones are know as DTMF tones 🤦🏻‍♂️ should know that being a security boffin, it's part most compliance audits for phone system these days
      As for physical password generators 😵 hopefully none have been flashed with dodgy firmware with set passwords preloaded so hackers know what password will bs issued by the generator for any given month 🤦🏻‍♂️

    • @lastninjaitachi
      @lastninjaitachi 2 года назад

      I feel like shes wrong about the password cracking box tool. I feel this very much is likely a real thing that could easily go through 1000's of pws. Im not sure why she is claiming it couldnt exist.

    • @vergilmontiero2558
      @vergilmontiero2558 2 года назад +1

      @@lastninjaitachi there's a reason that she would

    • @Ruintheus
      @Ruintheus 2 года назад +6

      @@lastninjaitachi she's referencing that the computing power required to brute-force hack or even using rainbow tables far exceeds not just the best supercomputers around rn, but around in the foreseeable next 50 years. It's a mathematical/physics issue and not a clever engineering one.

  • @Name-zo2ts
    @Name-zo2ts 3 года назад +37

    3:59 He is super inteligent. Remember the bluetooth car hacking scene? "Did i make a mistake? No. I dont make mistakes." He is like a computer.

  • @pmanolak
    @pmanolak 2 года назад +5

    Keren is adorable, smart and expert. I have followed her for years. Great video!

  • @ivybrandyn
    @ivybrandyn 3 года назад +143

    I love her. She's amazing at communicating her ideas and has a great sense of humor. :) I want to buy her a drink and learn from her!!!!

    • @jayantkumar159
      @jayantkumar159 3 года назад +9

      She is hella smart and not a alcoholic 😂

  • @THMILLER
    @THMILLER 3 года назад +43

    Remember when the FBI played the game with Apple by "asking them" for some access to a device as if it wasn't very easy.
    As a Network administrator i was surprised at how many people thought and still think Apple has some sort of super security and android doesn't when they are both Linux.

    • @sundhaug92
      @sundhaug92 3 года назад +5

      iOS is not based on Linux, it's derived from OSX (which is BSD/UNIX with Mach)

    • @joejacko1587
      @joejacko1587 3 года назад

      i didn't think anybody had hacked that version yet when they asked them

    • @permafrosty
      @permafrosty 3 года назад

      @@sundhaug92 Unix is just discount Linux, change my mind

    • @jokangpua2152
      @jokangpua2152 3 года назад

      @@joejacko1587 - come to South East Asia. just about any roadside phone repair shop can do it for you. For a fee.

    • @marckiezeender
      @marckiezeender 5 месяцев назад

      Unix existed first and Linux was based on it.

  • @ArmyK9
    @ArmyK9 4 месяца назад +1

    I have years of practical experience with corporate IT infrastructure. When I started out on mine hacking journey, I felt very discouraged and down because I would take days or even weeks to figure out how to crack a box. After awhile, I realized its because I've been watching too much Hollywood hacker movies where hackers could crack boxes in seconds and I had been benchmarking myself too much to these illusions. It does take alot of effort, time and incredible depth of technical knowledge to pull off stuff like that. Keep studying guys! 😀

  • @stillakilla
    @stillakilla 3 года назад +85

    I was expecting a "This episode was brought to you by today's sponsor, express vpn.."

    • @Astraeus..
      @Astraeus.. 3 года назад +1

      I've actually seen 2 popups for Express VPN that show my IP address and location as a way of showing how "insecure" my information is. They told me I was in New Jersey, but I think I should be pretty safe. I'm in Canada, already using Express VPN :/

    • @vinnieg6161
      @vinnieg6161 3 года назад

      thanks to those ads I looked up free VPNs, and obviously downloaded malicious bullshit.

  • @johnpiernicky8674
    @johnpiernicky8674 3 года назад +52

    I could listen to her talk shop all day. She could teach me so much and I really understand what she's talking about now that I have my Cybersecurity degree. Would love to meet her at Def Con and work for her. Awesome stuff.

    • @gbalfour9618
      @gbalfour9618 3 года назад +1

      Mind if I join in? Digital forensics degree and work in cyber security; I just want to be a fly on the wall and take notes. I’ve done so much but still feel like there is so much more to know, haha.

    • @MrPhilbautista
      @MrPhilbautista 2 года назад

      @@gbalfour9618 Why don't you just hack in on their conversation?

  • @cappadocius9379
    @cappadocius9379 3 года назад +256

    Trust me you aren't the only one who turned off Star Trek Discovery in disgust.

    • @David_Quinn_Photography
      @David_Quinn_Photography 3 года назад +5

      I sure did

    • @ashtonsalazar3731
      @ashtonsalazar3731 3 года назад +5

      Lol I did

    • @alexnorth3393
      @alexnorth3393 3 года назад +11

      Lots of people liked it. In fact it is liked enough to have had multiple seasons and a decent critical reception. Picard is good also.
      Not suitable for the alt-right or the crazy anti-sjw brigade though as it causes them panic.

    • @BigBear--
      @BigBear-- 3 года назад +1

      Not panic...just general disgust at the amount of force-fed SJW nonsense. Star Trek was about the story and exploration, now it’s just how many woke characters and topics can we squeeze in an episode w/ Star Trek uniforms.

    • @jeffreymonsell659
      @jeffreymonsell659 3 года назад +28

      @@BigBear-- Star Trek was always kind of woke though? The Federation was implied to be a post-scarcity socialist society. The original series had a diverse cast for the time, and it even depicted the first interracial kiss on American TV. Like, are you even a Star Trek fan?

  • @dustinhxc
    @dustinhxc Год назад +1

    Awesome video! Hackers is what made me want to be in Cybersecurity.

    • @johncoyne1642
      @johncoyne1642 3 месяца назад

      Is Cybersecurity cool or good? I want to know because It look Interesting for a Job

  • @hftgcdefh7669
    @hftgcdefh7669 3 года назад +122

    Why do all hackers in Movies are wearing those gloves without fingers

    • @chrys9256
      @chrys9256 3 года назад +25

      9:52

    • @MikeB12800
      @MikeB12800 3 года назад +19

      Because the hacker in real life on your screen is wearing them

    • @hftgcdefh7669
      @hftgcdefh7669 3 года назад +4

      @@chrys9256 haha lol

    • @dbach1025
      @dbach1025 3 года назад +11

      To hide their palm prints. Duh. After burning off finger prints,they realized itt hurt way more than they thought it would and they give up before destroying palm prints. Hey, it sounds good anyways. Besides, she is super hot and has a super sexy accent. I'll forgive the nerd gloves. LOL

    • @damionlee7658
      @damionlee7658 3 года назад +22

      Not sure if this was rhetorical, but it is harder to type with cold hands. Your fingers becomes stiffer, and slower. Gloves that also cover your finger tips are (as mentioned in the video) generally terrible to type in; as you lose dexterity and feeling.
      Of course some people wear them just for the style points...

  • @schitflowsdwnhil
    @schitflowsdwnhil 3 года назад +32

    "👌 One does not simply hack a registrar in two seconds 👌"

  • @assembled1855
    @assembled1855 3 года назад +33

    Hope they make a part 2 of her rating hacking scene. They need to show Thomas Gabriel's hacking in Live Free Or Die Hard.

  • @notta3d
    @notta3d 5 месяцев назад +1

    This woman is great. Great explanations as opposed to others I've seen.

  • @TheManOfTomorrow
    @TheManOfTomorrow 3 года назад +11

    *Mr. Robot* shows the most realistic, accurate and the best hacking ever shown in all of movies, series or whatever.
    On the basis of the reason she told for giving Mr. Robot hacking scene the 9/10, I think it should have been 9.5 instead of 9 as it's almost equally big mistake as in The Matrix Reloaded.

  • @kparsa1
    @kparsa1 3 года назад +55

    I took cyber security in college for my master's degree. I had so much fun doing the lab assignments but the amount of forms we had to sign really sucked. Oddly enough, I do development now and not so much security.

    • @UnoriginalElephant
      @UnoriginalElephant 3 года назад +5

      Huh. They didn't make us sign any forms in my cyber security class, they just told us never to do anything we learned without permission from the owner.

    • @gbalfour9618
      @gbalfour9618 3 года назад

      @Nate McGrew
      They did the same with us. No paper work but we’re told to only do it with permission or to our own networks at home.

    • @JimBob1937
      @JimBob1937 2 года назад +4

      "I do development now and not so much security"
      In theory you should be utilizing some of those skills in your development. Defenses to vulnerabilities start with knowing what classes of attack vectors exist and developing software to (ideally) not have them.

    • @kparsa1
      @kparsa1 2 года назад +2

      @@JimBob1937 I use more of the concepts when I do designing and testing. In Salesforce development, we often to do code reviews and validations to find vulnerabilities that would be rejected when going through federal guidelines. Some people tend to be very lax when coding and as a release management I've dinged them for it.

    • @JimBob1937
      @JimBob1937 2 года назад

      @@kparsa1 , yep, that sounds like a good process. Have knowledge of vulnerabilities, code defensively with those vulnerabilities in mind, then a code review and validation of known vulnerabilities. In general we're seeing a tighter integration and cross-disciplinary approach to security these days towards security for hardware and software developers and engineers. Tacked on security is most usually weaker than a proper implementation from the start.

  • @bailey3209
    @bailey3209 3 года назад +30

    I am completely shooketh that the matrix was a nearly perfect score

    • @joelcastro-reyes1667
      @joelcastro-reyes1667 3 года назад +6

      The Wachowskis are no slouches when it comes to computer knowledge. They had to rewrite the original script in order to make it more accessible to laypeople. Humans weren't supposed to be batteries, but sub-processors that gave the machines more power.

    • @digitalcyclone7218
      @digitalcyclone7218 3 года назад +2

      @@joelcastro-reyes1667 I'm actually still salty about that because it wasn't even their choice. they only did it because the higher-ups wanted it to be more "easier to grasp". now because of that, the matrix has one gigantic logical flaw poked into it.

    • @nonyabidness6492
      @nonyabidness6492 3 года назад

      It's for fun, chill

  • @dex1lsp
    @dex1lsp 8 месяцев назад +18

    If only she would use those skills AGAINST her government, maybe she could actually save some lives.

    • @cjvipinosa3328
      @cjvipinosa3328 3 месяца назад

      Lol what she's an Israeli
      And Israel is literally a Cybersecurity powerhouse
      If she's that good there's another one even better than her

  • @abhijithmohan8664
    @abhijithmohan8664 3 года назад +85

    I'm gonna pretend "I understood everything she said and explained.."😐

  • @RPG_Angie
    @RPG_Angie 3 года назад +8

    Great job from the Insider on selecting meaty examples, and great job from the expert on having seen the movies and coming prepared with props and information about comparable hacks that really happened.

    • @JLilliquist
      @JLilliquist 3 года назад

      I have not even heard of some of these.

  • @B0TFrosty
    @B0TFrosty 3 года назад +20

    Cybersecurity sounds really cool to learn, but also really difficult to get into

    • @jasont587
      @jasont587 3 года назад +2

      It is...

    • @MinecraftMasterNo1
      @MinecraftMasterNo1 3 года назад +9

      Eh, setting up firewalls and authentication is easy enough. The hard part isn't the software. The hard part is keeping the human factors in check. Most hacks are done by exploiting the users.
      You can have the most secure system in the world but a dumbass employee can bring it all down by accidentally leaking his login info.

  • @tiikoni8742
    @tiikoni8742 6 месяцев назад

    Great video and nice to see so many high ratings. I'm glad movies have moved toward more realistic hacking scenes.
    Only thing I'm surprised is at 10:25. Is there really access-giving keypads that makes different sounds on different digits? In phones that happens because historical reasons, but other than phones?

  • @asg8813
    @asg8813 2 года назад +13

    Wow, she explained all the things so well and in detail. Love to see more of her videos.