The Stuxnet Story: What REALLY happened at Natanz

Поделиться
HTML-код
  • Опубликовано: 22 янв 2025

Комментарии • 254

  • @reedsexton3973
    @reedsexton3973 2 года назад +122

    One of the best documentaries I've seen. I hope this gets way more views because you deserve it, Mr. Langner

    • @aliabbaswadia3974
      @aliabbaswadia3974 2 года назад +2

      Thankyou.

    • @robbienorton9522
      @robbienorton9522 Год назад

      it's great but don't heed to much to the technical involvement. The US does not and never has used siemens step anything in the US except a few german auto manufacturers and suppliers. This is mossad

    • @mrhassell
      @mrhassell 4 месяца назад

      I second that. Brilliant analysis and investigative work there, Mr Ralph Langner!
      You also seem to have inspired another documentary (or two), from this, and from your original research.

    • @Dreamer66617
      @Dreamer66617 Месяц назад

      I agree. im 1 minute in and ive already learned more then i did in wtached the 10 others ive seen

  • @ImARealHumanPerson
    @ImARealHumanPerson Месяц назад +11

    Praise the algorithm for bringing me to this great video.

    • @Garthritis
      @Garthritis Месяц назад +1

      All hail!

    • @ryanphelan6861
      @ryanphelan6861 26 дней назад

      zero days is great by alex gibney gives perspective from all over

  • @gregs6403
    @gregs6403 10 месяцев назад +14

    Thanks for putting this together. All the other videos are just overviews but this gets deep into the working principles and demonstrates the type of clever thinking the creators of Stuxnet had. This is exactly what I was hoping to find.

  • @sdadasdadsada2993
    @sdadasdadsada2993 3 года назад +37

    I have long been intrigued and interested in this topic, can’t have a better source explaining the story than mr langner himself. Thank you!

  • @marekant7776
    @marekant7776 4 года назад +57

    Excellent, You covered the topic very well. Everything was presented clearly, in every detail. Just what I was looking for

    • @OTbase
      @OTbase  4 года назад +8

      Thank you!

    • @marekant7776
      @marekant7776 4 года назад +3

      ​@@OTbase Did every single one of those centrifuges contain a PLC? Do we have any pictures of damaged units?

    • @OTbase
      @OTbase  4 года назад +11

      No, and no. You can find details on the automation system, including number of PLCs, in "To kill a centrifuge" (just google it).

    • @marekant7776
      @marekant7776 4 года назад +1

      @@OTbase I'm gonna have a read, then. Thank You, have a good day

    • @gibonsamuel2365
      @gibonsamuel2365 3 месяца назад

      Dangerous world. Once more.

  • @Peacefulsummersafternoon
    @Peacefulsummersafternoon 2 года назад +4

    This was the best documentary I've seen on RUclips ever. Thank you so much Sir

  • @Meru732
    @Meru732 3 года назад +31

    This video report was very elaborate, to the point and informative.
    Top-notch quality.
    Thanks to the everyone involved in this video report

  • @johnmoore8599
    @johnmoore8599 Год назад +2

    Thanks! One of the best write ups on the "weapon" I've ever seen or heard. I knew your group was one of the first to reverse engineer the "weapon" and analyze it. I'm very glad you made this as I did not know there were two campaigns.

  • @NordicAxe
    @NordicAxe Год назад +8

    Ausgezeichnetes Video. Danke schön.

  • @nycrsny3406
    @nycrsny3406 Год назад +5

    Such great breakdown, thorough explanations and I loved the chronicling of the events dating back 1975.

  • @Kaio7
    @Kaio7 3 года назад +41

    This was a pleasure to watch, thank you Ralph for this thorough analysis, 10 years+ after the fact. It's even more interesting now, as time goes by, to understand the complexities of these issues, from the geo-political perspective all the way to the pure technological one.
    I truly hope you could make this type of video into a series, in which you explain the different malware threats that pop up and dissect them in this fashion.
    In this day and age ransomware seems to be quite prolific all over the world, that would make for another amazing video, going through what has been happening in the last decade or so...

  • @FredrickEliyas
    @FredrickEliyas 3 года назад +11

    Thanks Langner for explaining it so well, the details of the 2 stage attack campaign were so perfect.

  • @zappaNRW
    @zappaNRW 3 года назад +8

    Messerscharfe Analyse, hochinteressant und wirklich hervorragend dargestellt. Danke!

  • @SolarWarden88
    @SolarWarden88 3 года назад +6

    Excellent. I've always loved your analysis and distillation of what occurred. I like how in Zero Days, you cheekishly knew what you could and couldn't talk about, alluding to it throughout your interview.

  • @elimgarak3597
    @elimgarak3597 3 года назад +9

    This documentary is excellent, brilliant. Good work.

  • @Receptor1
    @Receptor1 11 дней назад

    what and incredible outro.... you are an artist in the craft of journalism.

  • @bertmeza8673
    @bertmeza8673 3 года назад +2

    Great video..very in-depth without bogging the viewer down

  • @superola01
    @superola01 3 года назад +3

    Very informative, thx. I also enjoyed the swipe at the public press in the end. And of course the (almost) happy ending.

  • @28russ
    @28russ 3 года назад +3

    Very well done. I've heard of stuxnet and watched vids about it but never seen such an in-depth analysis of what was actually going on before.

  • @Ashtree81
    @Ashtree81 3 года назад +1

    This video is a gold standard template for how to properly present a subject.

  • @nikolasdahl5620
    @nikolasdahl5620 4 года назад +6

    excellent video! the level on details is just fantastic. very informative. thanks.

    • @OTbase
      @OTbase  4 года назад +3

      You're very welcome!

  • @datag1199
    @datag1199 2 года назад +4

    Fantastic video. I'm reading a Cyber Security book that mentions Stuxnet and decided to see what videos or documentaries were available. Great work by the team at Langner.

  • @Arthur-dl1jj
    @Arthur-dl1jj 2 года назад

    That was more enlightening than I was expecting. Great video.

  • @danielchristopher9809
    @danielchristopher9809 2 года назад +1

    Very well done analysis of Stuxnet. Thank you for your very clear explaining.

  • @TUTOUNITYFR
    @TUTOUNITYFR 4 года назад +6

    Great video. Very interesting subject presented very clearly, thank you !

  • @flyguy2919
    @flyguy2919 2 года назад +1

    Excellent work gentlemen. Thank you.

  • @motopapi48
    @motopapi48 3 месяца назад +1

    Fantastic and resourceful video. Well done

  • @rafael.adorna
    @rafael.adorna 4 месяца назад

    Got totally hooked on this subject that I've seen several times before.
    Absolutely amazing documentary

  • @Dreamer66617
    @Dreamer66617 Месяц назад

    I've watched everysingle stuxnet video this went 100x past all of them. subbed!

  • @adytech5788
    @adytech5788 11 месяцев назад +2

    i love top level explanation like this, thx a lot

  • @tomhekker
    @tomhekker Год назад

    Just got this recommended by RUclips, two years late… great vid! Subbed as well!

  • @baruchben-david4196
    @baruchben-david4196 2 месяца назад

    How wonderful to hear a voice of reason about cyber security! Thank you.

  • @nadjacp
    @nadjacp 3 года назад +1

    Great work and video... thanks for bring it to public.

  • @ApeX2411
    @ApeX2411 2 месяца назад

    That is just soothing to watch. Thank you for this great video! :)

  • @johnstrumm2690
    @johnstrumm2690 2 года назад +5

    I just wanted to say this was an outstanding explanation. I can't imagine the amount of brainpower and preparation that must have went into developing Stuxnet. Did the analysis team know much about Iran's nuclear enrichment program before trying to decipher what the binary did? I'm absolutely amazed that you guys were able to discern the specific system that the worm targeted with how little the world knew about Iran's program at the time.

    • @OTbase
      @OTbase  2 года назад +7

      The developers of Stuxnet knew EVERYTHING about the internal systems at Natanz. They may have known it better than the Iranian operators.

    • @v19torrent4
      @v19torrent4 Год назад

      @@OTbase Does that mean that spies were involved in the development of Stuxnet? How could they know everything if not more than the Iranian people who worked on it?

    • @OTbase
      @OTbase  Год назад

      @@v19torrent4 it does

  • @VerdadTrasLaVerdad
    @VerdadTrasLaVerdad 10 месяцев назад +1

    Thank you for the documentary! I'm studying cyber security and this video was really worthy and interesting to watch

  • @ashoknr4079
    @ashoknr4079 2 года назад +1

    This must be one of the more beautifully scripted topic on cyber warfare. Very clear representation

  • @spaul_
    @spaul_ 3 года назад +3

    Very well detailed ! Thanks a lot :)

  • @nicksundby
    @nicksundby 3 года назад +1

    Outstanding presentation.

  • @Dreamer66617
    @Dreamer66617 Месяц назад

    i was wondering if i would sub to ou or not but within 1:16 i decided yes. very rich information i was looking for. I have seen the gloss overs. cant watch to watch the rest!!! 36 mins left how exciting

  • @tobalaba
    @tobalaba 3 года назад +2

    Excellent report. thanks!

  • @attacksec
    @attacksec 3 года назад +3

    Being a vulnerable researcher myself this I can say was the most complete description of the events.. what a great documentary 👏 👌 👍 🙌 ❤

  • @kp8989
    @kp8989 3 месяца назад

    Super interesting issue. German engineering quality analysis. Most appreciated. Thank you!

  • @asingh6947
    @asingh6947 3 года назад +3

    I want to start learning about technical side of cyber security. Where does one start as a beginner? Great video!

  • @WJWeber
    @WJWeber 3 года назад +1

    I wish they used a lot of this info in the zero day documentary. They really needed to provide more info on te centrifuge process. As well as the decisions to do the various updates. I still don’t understand the problems or lack of implementation for manual shutdown. The illustration of the sound helped a lot.

    • @danielherschell3688
      @danielherschell3688 Месяц назад

      It's actually quite funny the man speaking as the narrator is in the zero day documentary and he was less than forthcoming with the information he was willing to provide but yet in this documentary he's basically explaining everything

  • @JulienBaut
    @JulienBaut 2 года назад

    That's what I was looking for. Thank you very much!

  • @fernandocardoso7102
    @fernandocardoso7102 2 года назад

    excellent video very well produced and explained

  • @mateobravo9212
    @mateobravo9212 2 месяца назад

    Very good, and a good note to end on!

  • @andrewschuschu3499
    @andrewschuschu3499 2 года назад

    The documentary “Zero Days” by Alex Gibney does a great job of almost naming names and outlining its development. Very interesting watch I’d recommend.

  • @marcuswinsnes
    @marcuswinsnes 2 месяца назад +1

    Awesome video!

  • @Disconnected.Reality
    @Disconnected.Reality 3 года назад +1

    amazing and well put together

  • @josephbf-le1wo
    @josephbf-le1wo 4 года назад +7

    This was honestly a fantastic video for all sorts of viewers. Thanks to The Langner Group for putting this together. I learned a ton and can't praise it enough. I am very interested in how the state of cyber-physical attacks evolve over the ext decade or so and how the end-goals of these attacks change. For example, ransomware like EKANS, etc (I'm no expert here by any means)...will these sets of malware ultimately hold our critical infrastructure for hostage rather than blow things up or cause physical harm?Will cyber-physical attacks ramp up in damage slowly over time? Almost like pushing a glass further and further towards the end of a countertop... It may be just my paranoia but with the amount of funding certain nation states are allocating to cyber defense, it makes me wonder what may be going on in regards to the offensive side of things... Once again though, great video!

    • @OTbase
      @OTbase  4 года назад +3

      Thanks!

  • @dunneyd
    @dunneyd 3 месяца назад +1

    Great vid.enjoyed it.

  • @IgneousRain177
    @IgneousRain177 6 месяцев назад +1

    God thank you, this video was so much better than the vice video on stuxnet

  • @gregknipe8772
    @gregknipe8772 Месяц назад

    subtracting from our fears by adding to our knowledge. thank you.

  • @crescentworks6855
    @crescentworks6855 Год назад

    Question - did stuxnet accelerate and decelerate all centrifuges in a cascade at once? If it was more selective (a few here, a few there), wouldn't the sound difference have been masked by other centrifuges operating at normal rpm?

    • @OTbase
      @OTbase  Год назад +1

      All centrifuges in six cascades at once. Impossible to miss.

  • @OneSingleCheezIt
    @OneSingleCheezIt 2 месяца назад

    Perfect narration and use of background music.

    • @OTbase
      @OTbase  2 месяца назад

      Damn! Finally we have someone who appreciates the music which has caused others so much grief! 🙂

    • @OneSingleCheezIt
      @OneSingleCheezIt 2 месяца назад

      @@OTbase They obviously haven’t heard the numerous other videos where the music is not tailored to the content as the subject changes, or how those videos have the music completely overpowering the narration. Your music is obviously tailored as the subject changes. Work most aren’t willing to do.

  • @izzate7
    @izzate7 2 года назад

    Some of the most sophisticated and effective sabotage ever committed. Insane.

  • @IBITZEE
    @IBITZEE 3 года назад +1

    Thanks for this exhaustive explanations... the best I saw yet...
    but... I have a small doubt--- since we do not know for sure what was the vector for the first 'infection'---
    and the software was binaries for the Siemens PLCs... ?what software was submit to Virustotal???

  • @ulrichulrich5810
    @ulrichulrich5810 8 месяцев назад +1

    lieber Herr Langner, besten Dank für Ihre Darstellung der möglichen Ereignisse, die allerdings einige fundamentale Fragen offen lässt. davon abgesehen, würde ich mich freuen, sie würden den Text gleich auf Deutsch vortragen und die hochproblematische Tonspur reinigen.

  • @manamsetty2664
    @manamsetty2664 2 года назад

    Thank you this was really helpful for me to understand the situation

  • @fredjones554
    @fredjones554 2 месяца назад

    Excellent content

  • @boxclever8030
    @boxclever8030 4 года назад +4

    Interesting. How did the developer know how the systems work in such detail ?

    • @OTbase
      @OTbase  4 года назад +3

      That's the right question to ask. They must have had an insider.

    • @William_sJazzLoft
      @William_sJazzLoft 4 года назад +2

      @@OTbase the way you explained it I thought it might have been a vulnerability in the supply chain to the Iranians. After all, i thought that you had indicated that in the beginning at least they were exposed to some industrial espionage.

    • @OTbase
      @OTbase  4 года назад +4

      @@William_sJazzLoft Sure the infiltration came through the supply chain. That's how you jump an air gap.

    • @William_sJazzLoft
      @William_sJazzLoft 4 года назад +3

      @@OTbase and it can be certain that the intelligence organizations involved knew that Siemens PLCs were being used.

    • @OTbase
      @OTbase  4 года назад +2

      @@William_sJazzLoft They had full insider knowledge of the automation details

  • @tombuckley91
    @tombuckley91 7 месяцев назад

    Fantastic video, really appreciated the information on the additional systems they were forced to build to mitigate the failures they were already dealing with. I wonder how they (the attackers) knew enough about those systems to target them, I understand they intercepted the Libyan shipment to understand the centrifuges, but not their over pressure systems.

    • @OTbase
      @OTbase  7 месяцев назад +2

      You are correct, the attackers could not have known the details of the cascace protection system from the Libyan installation. They must have had an insider at Natanz or one of the contractors.

  • @EQ_EnchantX
    @EQ_EnchantX 8 месяцев назад +1

    The noise would have been masked by the other running centrifuges. It only targeted a few cascades at a time (164 centrifuges each) and it was over 50 mins. So 164 centrifuges at a time in a room full of 5,000 to 8,000 running.

    • @OTbase
      @OTbase  8 месяцев назад

      Wrong. The attack code did not target a few centrifuges at a time. It targets 984 centrifuges at a time. Look at the code.

    • @EQ_EnchantX
      @EQ_EnchantX 8 месяцев назад

      @@OTbase That is incorrect, the logic targets cascades which house 164 centrifuges each. Nowhere in the code does it target 984 centrifuges because they are controlled as a group and can not be individually targeted.

  • @jtveg
    @jtveg 2 года назад +1

    Thanks for sharing. 😉👌🏻

  • @jamesa4958
    @jamesa4958 2 года назад +1

    Great video

  • @milkaaiwako
    @milkaaiwako Год назад

    I am glad i stumbled on this

  • @richardgoebel226
    @richardgoebel226 4 месяца назад +1

    Intensely interesting subject presented so that a layman can understand. Thank you. But perhaps there is something I missed. If the centrifuges are spinning at such a high RPM, above the human hearing, then how is such a low frequency produced that can be heard? As an additional comment the Iranian technicians may have become tone deaf after being bombarded with those frequencies for a long time.

    • @OTbase
      @OTbase  4 месяца назад

      No and no. The video simulates the actual acoustic representation of IR-1 centrifuges in normal operation (taken from video footage), and the frequency range that they were taken through in the rotor speed attack. What you hear is what Iranian operators would have heard. Case in point: If you spend prolonged time in the cascade hall, you will become used to the sound of normal operation and phase it out of perception. BUT you will notice any deviations EVEN STRONGER.

    • @richardgoebel226
      @richardgoebel226 4 месяца назад

      @@OTbase Thank you for clarifying this and so much more.

  • @William_sJazzLoft
    @William_sJazzLoft 4 года назад +5

    Mr Langner I had first seen you in the documentary, Zero Days. It seems like your interview was largely overshadowed by those of the NSA analyst and the gentlemen from Symantec. Zero Days was rather melodramatic and so much of the events and facts were smothered by rhetoric and profanity. But your detached, straightforward presentation made you memorable. So of course when i saw this presentation chronicling the events of those three or four years, i clicked. I haven't taken a physics course in years but i followed along as best i could. It was time well spent. You spoke with authority. Your presentation was thorough and clinical ( as much as it could be managed in a fifty minute seminar ). In the most general definition weren't both payloads zero day intrusions? Was it the second one that attacked the Siemens motor controller or the first? Thanks -
    William; Hampton, VA U.S.

    • @OTbase
      @OTbase  4 года назад +6

      The only zero day exploits that were used in this attack were in the dropper of the second version. The irony is that zero days are quite unsubstantial for the Stuxnet story -- something I tried to explain to Alex Gibney, but obviously without success.

    • @William_sJazzLoft
      @William_sJazzLoft 4 года назад +3

      @@OTbase okay that answers my question. This is all so fascinating. Thank you for the effort that you put into this

  • @JosipMiller
    @JosipMiller 2 года назад

    What here and on many other occasions is real problem are the standards. M$ Window$ and standard industry PLC. For this kind of highly critical purpose development of custom systems pays off (and that is an understatement).

  • @carfo
    @carfo 3 года назад +1

    this guy is the paul harrell of cybersecurity and i love it

  • @petrolhead9702
    @petrolhead9702 2 месяца назад

    sixty three thousand!!?! what kind of a bearing can withstand that load for months if not years?

    • @OTbase
      @OTbase  2 месяца назад

      Modern centrifuges operate at much higher speeds

  • @NickolasKosatka
    @NickolasKosatka Месяц назад

    I think you just connected me to another dimension with the rotor sound 😂

  • @kenfreymureti9563
    @kenfreymureti9563 2 года назад

    Great work

  • @arturlangner9371
    @arturlangner9371 3 года назад

    Great video. Some story.

  • @shockthemuscle3810
    @shockthemuscle3810 4 года назад +4

    This guy is a G

  • @jascam1
    @jascam1 2 года назад +1

    If Stuxnet can be used to target the dedicated centrifuges used by Iran, then it's just a matter of time that a worm/virus is developed to attack a specific component in any/all electric vehicles.

  • @adilsonchrestani
    @adilsonchrestani 4 года назад

    Great video! One question that remains : within all the connection between machines that the 4.0 revolution has been bringing to us, will these cyber attacks be more frequent?

    • @OTbase
      @OTbase  4 года назад +4

      So far we have no reason to assume that they will be more frequent. But we must recognize that they can be more severe. More connectivity means more complexity means higher risk that a lot of things go wrong at the same time.

    • @Just.A.T-Rex
      @Just.A.T-Rex 3 года назад

      @@OTbase this hasn’t aged well. Definitely more frequent.

  • @GeorgeTsiros
    @GeorgeTsiros 7 месяцев назад

    What I find weird is that the two domains that were used for updates, SUPPOSEDLY could not be determined to whom they belonged. Like. Every domain in existence is strictly documented. Unless ICANN _itself_ was compromised, it should be dead simple to find who had those two domains.

  • @DaMattyIce
    @DaMattyIce 3 года назад

    Got any theories for how or why Stuxnet found its way into Virus Total in 2007? Seems odd that the developers with a limitless budget would have used a public tool like that to check for detections and seems weird that they were able to carry on with the operation without Iran catching on for two years if one of its victims thought something was fishy enough to check it out on Virus Total

    • @jascam1
      @jascam1 2 года назад

      Israel likely had a mole in Iran to plant the virus. The Mosad are masters at infiltration that is how they won the seven day war, by HUMIT.

    • @DaMattyIce
      @DaMattyIce 2 года назад

      @@jascam1 I'm asking how it ended up on Virus Total, not how it got into the lab. Virus Total is basically a giant repository of malware samples scrutinized by the entire netsec industry. Seems unlikely that someone involved in a classified operation would upload it themselves. I'm just curious who did it, was it a mistake made by someone involved in the development or did one of their targets have some passing suspicion about a file on their computer and uploaded it to scan against every AV before moving on? The first sample was uploaded a couple years before the Iranians found out what was going on

    • @cruelolol
      @cruelolol Год назад

      It's explained in the Zero Days documentary. A later version of Stuxnet started shutting down PCs, which is how it was discovered initially.

    • @DaMattyIce
      @DaMattyIce Год назад

      @@cruelolol that doesn't explain how it ended up on virus total a year before its discovery though, that's what I'm curious about

  • @uTestTarget
    @uTestTarget 8 месяцев назад +3

    "The stealthy cyber weapon had been turned into a prank."
    "After that little concert in the cascade hall..."
    lol These funny statements actually show the high quality of technical expertise in this video. Seriously, other videos breathlessly report, with mysterious background music, how amazing it was to control the speed. This is the first explanation I've seen that described the resulting sound and how obvious it would be to the Iranians.

  • @mrsjupiter9310
    @mrsjupiter9310 3 года назад

    At 24:40....l experienced ; Unease , dissociation ...and value 6...inconfidance....
    The occilations are being disturbed @ 12 %... throughout this video.
    ( Occilations producing musical note 440- middle C...are now producing b-flat... undoubtedly protocol has been tampered with'''''''')

  •  3 месяца назад

    Just wondering, how was there no component that requires some secret information like password or at least serial number. The sorry that someone could replicate nuclear enrichment faculty in testbed with exact hardware does not sound real. Just one secret information is enough to prevent replication from photos and visits and only leave "inside job" as the option.

    • @OTbase
      @OTbase  3 месяца назад

      Wrong. No passwords or serial numbers necessary. What was necessary was a replica IR-1 cascade or multiple, and it's clear where the attackers got that from. Check "To Kill a Centrifuge".

    • @projectsspecial9224
      @projectsspecial9224 2 месяца назад

      Technically, without security specific detail, due to known standards and design methods, you can reconstruct and simulate systems for stress testing and attack vectors (Breach Attack Simulations). Even proprietary systems can be reverse engineered to exploit as long as you/or red team dedicated resources and time. This applies to exploiting privacy devices, surveillance cameras, vehicle computers to cellular Interceptors and satellite systems! Whew! 😅

  • @shreddagorge
    @shreddagorge 4 года назад +3

    While it's true there are vendors who gain on exaggerated concerns about industrial cyber warfare, it's also true that funded actors are still launching campaigns designed to prey on weaker links to conduct reconnaissance and potentially pivot into more valuable assets. We are aware of phishing campaigns preying on smaller energy providers exhibiting TTPs not unlike Ukraine, with many of these providers connected to grid providers who control larger 'backbones' of regional grid connectivity. In other words... past performance is no indication of future activity when it comes to cyber warfare, let alone the financial disruption already seen in stories like Go Daddy, Marriott, Sony, Home Depot, Garmin, etc.

    • @OTbase
      @OTbase  4 года назад +3

      I'm aware of this situation and have commented it extensively -- see www.cirsd.org/en/horizons/horizons-autumn-2016--issue-no-8/cyber-power-an-emerging-factor-in-national-and-international-security. That doesn't change the fact that we didn't see successful & substantial cyber-physical attacks in the ten years after Stuxnet.

    • @shreddagorge
      @shreddagorge 4 года назад

      We haven't seen a big earthquake hit northern California in a while... are we safe, or are we due?

    • @OTbase
      @OTbase  4 года назад +2

      I haven't said that we are safe. I said that we have the means to stay safe.

  • @SincereSentinel
    @SincereSentinel 3 года назад +1

    Good stuff.

  • @iyeetsecurity922
    @iyeetsecurity922 3 года назад +3

    It's difficult to take this guy seriously without him wearing a black hoodie and a Guy Fawke mask.

  • @allwheeldrive
    @allwheeldrive 2 года назад

    Great piece! Thank you. It's unfortunate, though, the optimistic closing comments simply don't represent the very real, pretty much unavoidable, potential for significant destruction at some point in the near future. Humans do not have the greatest track record for avoiding self-inflicted disasters. While the tech will undoubtedly advance, humans won't. There will always be a percentage of the population that will only be happy when everyone else isn't, and they are immortalized forever in their version of a heaven.

  • @alexandermuller5143
    @alexandermuller5143 3 года назад

    Thank you.

  • @itsunova9807
    @itsunova9807 3 года назад

    Can I say the blurry intro was fucking with my head I started looking around and blinking a shit ton just to make sure lol

  • @sandrocavali9810
    @sandrocavali9810 3 месяца назад

    Excelente thanks

  • @marbles7177
    @marbles7177 2 года назад

    this guy doesnt blink

  • @_thefiddlestck1838
    @_thefiddlestck1838 2 года назад +1

    Just imagine what these great minds could do with their knowledge if they weren't engaged by their nations to build weapons designed to destroy civilized, innocent people and their children, society and traditions..

  • @kickassvideos5469
    @kickassvideos5469 4 года назад

    ralph du bist der geilste ober eber, bitte mach weiter dein ding

  • @fredsoda3034
    @fredsoda3034 4 года назад +1

    I can't believe that i found the guy who figured all of this out...
    There is one big question remaining though. Why is a German company helping the Iran gaining material to potentialy build nuclear weapons?

    • @OTbase
      @OTbase  4 года назад +7

      Well I think that one is easy: Because it pays well. The deeper question that puzzled me is: Why didn't CIA & Mossad pull the plug when they probably could have?

    • @dronestrikejr
      @dronestrikejr 3 года назад +1

      @@OTbase great question well never know the answer to unfortunately

  • @marfiuss
    @marfiuss Год назад

    All thanks to the Red White and Blue, thanks to Erik van Sabben!

  • @hassansyed5661
    @hassansyed5661 3 года назад

    Still StuXnet is is active but with new signature and new tasks

  • @Nitishksupport822
    @Nitishksupport822 3 года назад

    China is very proactively using its cyber offensive capability against many country.
    Please mke a video on that based on your view and reserach.
    Anyways it was a very informative video.

  • @bigcheezmoe
    @bigcheezmoe 3 месяца назад

    Many know what really happened...but does anybody know what the real intent was?

    • @OTbase
      @OTbase  3 месяца назад

      It's suggested in the video, without going into mind reading. For more info you may want to check "To Kill a Centrifuge".

  • @OpenCarryUSMC
    @OpenCarryUSMC 3 месяца назад

    Not sure why but the historical timeline of STUXNET is absolutely not what is being said. I received an unclassified debriefing in Stuxnet before retirement and I retired in January 1999.
    So why Wikipedia and other sources are now saying it was in the 2000’s makes me wonder WTF is going in.

    • @OTbase
      @OTbase  3 месяца назад

      Well you just draw your own conclusions