The fun fact about the radio-stop "attack" is that it's almost 50 years old, and they didnt secure it to this day, 40 years ago it was secure, because regular people didnt have access to radio equipement. Also regarding the quote from 4:02 , I think they said the same thing in 2019 but with the difference that it was supposed to be ready in 2023.
its wild its a crime, unless the frequencies are very obscure or specific and out of range of most use, then its possible some dummy could do it by accident, but of course. Slow Down NATO go to jail for no reason. They gots a war to siphon money from the west for.
@@banksarenotyourfriends Yeah, true, but radio equipement that was able to transmit on that frequency wasn't available for regular people at this time, so there was no way to do this. The issue became known in 1989, because people had radio equipement that was able to transmit on this frequency at this point.
@@artondzn8463 There's always the option of modding existing RF circuit to transmit at a different frequency. Though I guess hams are pretty law abiding so nobody really did anything nefarious with their knowledge.
As somebody into radio, I find the trainstop one very interesting. Those cheap radios can actually transmit a surprisingly long distance, especially with an upgraded antenna. Record and play back the trainstop signal using a mobile phone.
I'd imagine if you limb on the top of very high tree and then hold it above tree height with some 10 meter stick it should go far even without upgraded antenna? And also what's the chance of getting busted? I'd imagine that if you were to climb back down again as soon as you have finished and not boast about it in social media and never use this radio again, the chances of getting busted would be pretty much zero I imagine?
this is smarter than anything the russian military has ever done, to stop the NATO equipment in poland temporarily as it tries to reach ukraine. kinda like how ukraine blew up the first car in all their convoys during the whole war
@@test-rj2vl Yes. The biggest threat in doing this as part of a group is the fact that most people can not keep their mouth shut, can not keep a secret. If you have even two co-conspirators, the chances are good that one of you tell a friend, girl friend, family member, etc. And, that is before we consider that this generation has this compulsion to put their life on social media.
tor with an option to use randomx instead of equix to mine even a little bit during startup as a way to "donate" would be pretty neat of course the default would be the equix and a option to switch to randomx would be hidden somewhere in the settings menu
*attacks (err at str[2] , missing “t”) **oftenly (err at str[2] , missing / incorrectly placed “t” later in string) The Ts did nothing to you, don’t be afraid
If RadioStop was used in a modern-day James Bond movie, fans would dismiss it as lazy writing or a lack of imagination. It's just too stupidly simple and convenient!
It's important to note that the PoW isn't for all Tor traffic; Just for making a rendevous circuit to an onionsite It was added because it was very easy to DoS an onionsite by making a ton of rendevous circuits because it's expensive for the onionsite's guard nodes The Proof of Work is basically just "solve this sudoku THEN I'll make the circuit"
@@Seytonic YOU MUST ANSWER OR DEATH PENALTY !!!!!!!!!!!!!!1 LISTEN TO ME!!!!!!!!!!!! YOU ARE EXPRESSLY FROBIDDEN FROM EVER POSTING VIDEO ADS OR SPONSORED SECTIONS AGAIN!!!!!!!!!! I CANNOT STAND THEM!!!!!!!!!!!!!! ADS MUST END!!!!!!!!!!!!!! IT TRIGGERS ME PANICH ATTACKS!!!!!!!!!!!!!!!! ADS ARE ILLEGAL!!!!!!!!!!!!!!! DEATH PENALTY APPLICABLE!!!!!!!!!!!! YOU MUST STOP OR IF I EVER SEE ANY AD AGAIN I TAKE LEGAL ACTIONS!!!!!!!!!!!!!!!!!!!!!!!!!!!
@@98LuckyLuk Not since 1945. In any case, while the exact origin of the name is unclear, it is generally assumed to be of Slavic origin. So really, Stettin is just the Germanized version of a formerly German city. Szczecin is the correct current name.
I want to see them trying this in Germany. Hiding in a bush somewhere with their walkie-talkie, not realizing the train they want to stop is delayed for two hours anyway😂
Genius. This was my first idea for TOR as well. Proof of work is exactly how you solve these sorts of problems. Its probably not gonna be as strong as you think it is. Even a very low power proof of work substantially reduces the threat from someone DDoSing, since they would need so many devices to make a substantial effect. A small proof of work scales with the number of devices you need doing it. So a normal user doesn't even notice it, but a mid size botnet slows down by a decent chunk. Has a good effect the more bots you are dealing with, but if your fighting what is described as a large scale botnet in this video your gonna have a hard time no matter what. Its simply impossible at that point to scale accordingly, because your proof of work would have to be as slow as the botnet would make you slow down - basically rendering your efforts useless, because if you don't use the PoW its gonna be slow from the attack, and if you match and use an equivalent to current load PoW no normal person is going to be able to use your network. An appropriate scaling algorithm would need to be in place, to perhaps logarithmically increase to a set cap (asymptote) which is the maximum tolerable PoW for normal users. I would look into it more, maybe make a video on it.... if I thought anyone would watch lmao
It's always interesting to consider when hacktivist become cyberterrorists. For me, it's when their damage impacts the lives of unaffiliated civilians.
Then the question becomes, what is "innocent civilians" You could think hacking a massive corporation that's "evil" is just hacktivism, but that could possibly affect their employees, making them work overtime to fix the security issue, when they just work there to pay the bills. Who is innocent and who is not is just another personal lens.
@@Aura_Mancer That's quite interesting to think about. Yes, the line is very thin. But I would draw the line at if you attack a public service people's lives could depend on (and I mean literal lives, like it's a situation between life and death), then it's pretty obvious where to draw the line. Things like trains or healthcare are out of question, because people use those services and need them daily. For banks, I guess people can survive some mild inconveniences like online banking being down or something, but obviously you wouldn't steal people's money. So the line is really at public services that people are using for necessity.
And if you're asking "why trains" - then imagine if someone hacked into your car and could theoretically do anything. Some stunts like this have been demonstrated before, and it was a Jeep model that connected to the Internet. Attackers were able to remotely shut down the engine, while the car was at full speed on the highway! They could easily take over steering and send the car flying down a cliff. Scale that up to trains, or railways in general. Imagine being able to control the railway crossings, sending one train directly into another one moving in an opposite direction. Hundreds or even thousands of people riding the trains. That would definitely count as cyber terrorism.
@@CZghost Car hacking attacks aren't even theoretical since we already know they can be done, the only speculative part is whether they've been used to "make it look like an accident" yet.
That kind of incidents have happened multiple times in past. Kids using cheap radios and playing back recordings of a signal used to trigger radiostop. Playing Russian anthem and Putin's speach could have been part of a prank. People sometimes do stupid stuff for fun and internet is full of those idiots.
If these radio hackers got on top of a mountain they could cause some real chaos and all trains in their line of sight would come to a halt. They probably weren't tracked as it's really hard to be tracked if you're on the move. Especially if you transmit then hide the transmitter away.
Yes, we have lots of speed trap cameras. Train stations, passenger trains itself and train crossings often have cameras as well. However speed trap cameras are useless against radio pirates, they are used against road pirates instead ;-)@@waterandafter
Anyone understanding the basics of RF circuits can build a powerful transmitter that can fit in a lunchbox or backpack. Hopefully there won't be a lot of those bastards because they give a bad name to radio amateurs, which is an amazing hobby.
As someone who has experience with radio and railway and also lives in Poland, it's nothing new. It got so much attention from media because National Railway Administration, PKP PLK, decided to post it about it on social media, not they try to fix the leaking sewage that is leaking since. Radiostop was abused way, way earlier by people. I also speculate that it wasn't done by Pro-Russian sabotages, but by a group of young people that like trainspotting and find this type of “fun” entertaining. When it comes to GSM-R there's still a lot of to do, especially after one of the consortium companies went bankrupt. Tl;dr It's rather just annoying type of fun for someone and everyone will forget about it in a week or two.
i think authentication for radiostop should be done by the hardware not someone entering a password. in an emergency the train needs to be stopped now not 30 seconds later as soon as a password is entered. if it isnt being done already polands fcc should have a system of radio signal tracers so they can trace the signal so the authorities can trace them. imagine a scenario like this where there is a train sharing the same track and the train in front only a couple miles away is on fire and is stopped and evacuating and it is on a high speed track with another train behind only a couple miles away. if they had to login and authenticate in the few seconds it takes to verify the identity the train could have moved a good part of the mile or so and if not done fast enough the train could crash into the one being evacuated. maybe even leave the system as is and as long as no one can get hurt outside of inertia induced bruises by the pranks then just charge them with calling in false emergency or something.
As a Radio Amateur in the UK, I've seen these 20 dollar radios everywhere (Baofangs). The range can be miles even kilometers. With a big antenna and other more powerful radio, you can do this from your home. Also, did you change your microphone? :)
Wow, that's impressive! But whether or not such radios were easily available at the time, one has to wonder whether it didn't cross the designers' minds that the system might be abused. By the way, I'm not sure what you mean by "miles even kilometers", but miles are longer than kilometers ;)
You can buy them at ANY chinese store online. And, most radios are cheap. I have a 25w, only use 10w and can get up to 100 miles. For 100£@@AlexanderVatov
This is the best example of a system that is safe but not secure. You can't do any real harm by triggering the signal, but you can incour costs and disturb the service.
It was nor hackers it was 2 police officers.people arrested already.Mentioned in news. It must be bigger operation as trains still stopping despite people were detained
5:50 Wei Dai's b-money paper mentions another reason that the POW can't be used to generate crypto-currency tokens: "1. The creation of money. Anyone can create money by broadcasting the solution to a previously unsolved computational problem. The only conditions are that it must be easy to determine how much computing effort it took to solve the problem and the solution must otherwise have no value, either practical or intellectual. ..." This implies that merged mining is not a great idea long-term.
I mean how would a Tor crypto token even retain any value, unless you also financialise other aspects of the Tor network. So it's good Tor didn't jump on the crypto train.
2:55 I mean, technically they could. If you forked out the money to buy an RF attachment that uses that frequency, you could use the flipper to do this attack.
Wouldn't a proof of work token be unique, and identifiable to that one browser. If that could be used to identify Tor users that would not be good. Is that possible?
I regularly use the Tor network for privacy reasons (tl;dr: awful family + stalker ex, who's also definitely a hacker), and while I understand why they're implementing the proof of work feature, I already hate it. I can't afford a computer built even within the last few years, and use Tor 95% of the time on mobile devices. Like you said, it's gonna affect people in my situation.
The biggest reason tor doesnt protect you, is using it on the same machines you log in to all your other stuff, then it can easily be figured out thats your traffic. If someone got in your computer to a degree they could easily associate your traffic. FYI. it all depends what your doing.
@@nwerd7584 I use Tails on my laptop and desktop along with Proton's Tor VPN, and I don't use my regular phone and tablet whenever I need to use it on a mobile device. Nice job assuming I don't know what I'm doing, though.
🎯 Key Takeaways for quick navigation: 00:00 🚂 Pro-Russian hackers used a simple method involving a cheap radio to stop Polish trains, causing disruptions. 04:30 🔒 The TOR network has faced DDoS attacks, and now users will need to complete a proof-of-work task to access it, aimed at reducing malicious traffic. 07:18 🎣 The notorious phishing platform 16shop was shut down by Interpol due to opsec mistakes by its creator, impacting thousands of users. Made with HARPA AI
On 6:08 you imply china has a problem with crypto and Tor could not implement it because of China. As it turns out, just having Tor is a crime, so it's not a big deal.
So we're all using housing have you ever tried to look at the old rotations releasing from housing to new energy how it releases and what it depths through
(train stop story) sdr listening stations... handheld identifiers... reciept of transaction for said handhelds with the identifiers. (tor) creating a flag that identifys that your not a bot... making a flag that isnt a flag all while being a flag... give it time 🍿. (malware as a service) todays tools tomorrows weapons used against the creator. are you ok with making a tool that will be used eventually against you???
The fun fact about the radio-stop "attack" is that it's almost 50 years old, and they didnt secure it to this day, 40 years ago it was secure, because regular people didnt have access to radio equipement. Also regarding the quote from 4:02 , I think they said the same thing in 2019 but with the difference that it was supposed to be ready in 2023.
its wild its a crime, unless the frequencies are very obscure or specific and out of range of most use, then its possible some dummy could do it by accident, but of course. Slow Down NATO go to jail for no reason. They gots a war to siphon money from the west for.
The first directory of amateur radio users was published in 1909.
Who is it that you think didn't have access to radio equipment?
@@banksarenotyourfriends Yeah, true, but radio equipement that was able to transmit on that frequency wasn't available for regular people at this time, so there was no way to do this. The issue became known in 1989, because people had radio equipement that was able to transmit on this frequency at this point.
@@artondzn8463 There's always the option of modding existing RF circuit to transmit at a different frequency. Though I guess hams are pretty law abiding so nobody really did anything nefarious with their knowledge.
@@artondzn8463ah ok, thanks for the clarification
As somebody into radio, I find the trainstop one very interesting. Those cheap radios can actually transmit a surprisingly long distance, especially with an upgraded antenna. Record and play back the trainstop signal using a mobile phone.
I'd imagine if you limb on the top of very high tree and then hold it above tree height with some 10 meter stick it should go far even without upgraded antenna? And also what's the chance of getting busted? I'd imagine that if you were to climb back down again as soon as you have finished and not boast about it in social media and never use this radio again, the chances of getting busted would be pretty much zero I imagine?
this is smarter than anything the russian military has ever done, to stop the NATO equipment in poland temporarily as it tries to reach ukraine.
kinda like how ukraine blew up the first car in all their convoys during the whole war
I suppose you could "upgrade" your antenna by hoisting a wire up a flagpole?
@@test-rj2vl Yes. The biggest threat in doing this as part of a group is the fact that most people can not keep their mouth shut, can not keep a secret. If you have even two co-conspirators, the chances are good that one of you tell a friend, girl friend, family member, etc. And, that is before we consider that this generation has this compulsion to put their life on social media.
@@WilcoVerhoef en.wikipedia.org/wiki/Random_wire_antenna you mean like this?
8:50 "proving that it is still possible to become rich as a freelance web designer" 💀
🤣
Lmao I chuckled at that one too
Knew it was some random ass people with a $10 radio stopping our trains. Wasn’t far off…
its what you deserve for your government arming literal Nazis who hate democracy
tor with an option to use randomx instead of equix to mine even a little bit during startup as a way to "donate" would be pretty neat
of course the default would be the equix and a option to switch to randomx would be hidden somewhere in the settings menu
Those types of "atacks" happen every day. People are just that, just people and trolls actually do that quite ofently
*attacks (err at str[2] , missing “t”)
**oftenly (err at str[2] , missing / incorrectly placed “t” later in string)
The Ts did nothing to you, don’t be afraid
I have no idea what this comment is trying to say. Maybe you should just type it in your native language and translate it with Google Translate
Yeah it's all good until an accident happens. Moronic naZ's.
@@waldolemmerit's pretty good English.
Bro he forgot to upload those Facebook live videos done by those polish attacker 😂😂they are so dumb and laughing
If RadioStop was used in a modern-day James Bond movie, fans would dismiss it as lazy writing or a lack of imagination. It's just too stupidly simple and convenient!
It's important to note that the PoW isn't for all Tor traffic; Just for making a rendevous circuit to an onionsite
It was added because it was very easy to DoS an onionsite by making a ton of rendevous circuits because it's expensive for the onionsite's guard nodes
The Proof of Work is basically just "solve this sudoku THEN I'll make the circuit"
You are so based for pronauncing polish city name actually well, kudo's
I made sure to look it up : )
@@Seytonic YOU MUST ANSWER OR DEATH PENALTY !!!!!!!!!!!!!!1
LISTEN TO ME!!!!!!!!!!!! YOU ARE EXPRESSLY FROBIDDEN FROM EVER POSTING VIDEO ADS OR SPONSORED SECTIONS AGAIN!!!!!!!!!! I CANNOT STAND THEM!!!!!!!!!!!!!! ADS MUST END!!!!!!!!!!!!!! IT TRIGGERS ME PANICH ATTACKS!!!!!!!!!!!!!!!! ADS ARE ILLEGAL!!!!!!!!!!!!!!! DEATH PENALTY APPLICABLE!!!!!!!!!!!! YOU MUST STOP OR IF I EVER SEE ANY AD AGAIN I TAKE LEGAL ACTIONS!!!!!!!!!!!!!!!!!!!!!!!!!!!
The real name is Stettin btw.
@@98LuckyLuk not real, but original german name
@@98LuckyLuk Not since 1945. In any case, while the exact origin of the name is unclear, it is generally assumed to be of Slavic origin. So really, Stettin is just the Germanized version of a formerly German city. Szczecin is the correct current name.
I was in Szczecin yesterday, but the worst I seen on the trains is some white noise played from the speakers.
That train bit is more of a wake up call then anything
I want to see them trying this in Germany. Hiding in a bush somewhere with their walkie-talkie, not realizing the train they want to stop is delayed for two hours anyway😂
This won't work, since german trains are usually not equiped with this system.
all these "hackers" can do is delay trains by a few minutes and annoy train drivers
Genius. This was my first idea for TOR as well. Proof of work is exactly how you solve these sorts of problems. Its probably not gonna be as strong as you think it is. Even a very low power proof of work substantially reduces the threat from someone DDoSing, since they would need so many devices to make a substantial effect. A small proof of work scales with the number of devices you need doing it. So a normal user doesn't even notice it, but a mid size botnet slows down by a decent chunk. Has a good effect the more bots you are dealing with, but if your fighting what is described as a large scale botnet in this video your gonna have a hard time no matter what. Its simply impossible at that point to scale accordingly, because your proof of work would have to be as slow as the botnet would make you slow down - basically rendering your efforts useless, because if you don't use the PoW its gonna be slow from the attack, and if you match and use an equivalent to current load PoW no normal person is going to be able to use your network. An appropriate scaling algorithm would need to be in place, to perhaps logarithmically increase to a set cap (asymptote) which is the maximum tolerable PoW for normal users. I would look into it more, maybe make a video on it.... if I thought anyone would watch lmao
wow you just said a whole lot of nothing
Radio stop overuse is a common problem.
It happens (on average) a few times per day, at least since 2015 (around 500 times per year).
This was one of the most interesting and well made cyber security news episodes yet! Thank you!
$20 radio? Must be the _Baofang._
> Be pole
> Shut down a train
> Play russia_national_anthem.mp3
> Escalate into ww3
Just a little bit of trolling
It's always interesting to consider when hacktivist become cyberterrorists. For me, it's when their damage impacts the lives of unaffiliated civilians.
Then the question becomes, what is "innocent civilians"
You could think hacking a massive corporation that's "evil" is just hacktivism, but that could possibly affect their employees, making them work overtime to fix the security issue, when they just work there to pay the bills.
Who is innocent and who is not is just another personal lens.
@@Aura_Manceroften the line is very thin
@@Aura_Mancer That's quite interesting to think about. Yes, the line is very thin. But I would draw the line at if you attack a public service people's lives could depend on (and I mean literal lives, like it's a situation between life and death), then it's pretty obvious where to draw the line. Things like trains or healthcare are out of question, because people use those services and need them daily. For banks, I guess people can survive some mild inconveniences like online banking being down or something, but obviously you wouldn't steal people's money. So the line is really at public services that people are using for necessity.
And if you're asking "why trains" - then imagine if someone hacked into your car and could theoretically do anything. Some stunts like this have been demonstrated before, and it was a Jeep model that connected to the Internet. Attackers were able to remotely shut down the engine, while the car was at full speed on the highway! They could easily take over steering and send the car flying down a cliff. Scale that up to trains, or railways in general. Imagine being able to control the railway crossings, sending one train directly into another one moving in an opposite direction. Hundreds or even thousands of people riding the trains. That would definitely count as cyber terrorism.
@@CZghost Car hacking attacks aren't even theoretical since we already know they can be done, the only speculative part is whether they've been used to "make it look like an accident" yet.
That kind of incidents have happened multiple times in past. Kids using cheap radios and playing back recordings of a signal used to trigger radiostop. Playing Russian anthem and Putin's speach could have been part of a prank. People sometimes do stupid stuff for fun and internet is full of those idiots.
If these radio hackers got on top of a mountain they could cause some real chaos and all trains in their line of sight would come to a halt. They probably weren't tracked as it's really hard to be tracked if you're on the move. Especially if you transmit then hide the transmitter away.
Probably not tracked but there's cameras everywhere now a days. Does Poland use speed trap cameras?
Yes, we have lots of speed trap cameras. Train stations, passenger trains itself and train crossings often have cameras as well. However speed trap cameras are useless against radio pirates, they are used against road pirates instead ;-)@@waterandafter
or hacked or raided an actual radio station
Anyone understanding the basics of RF circuits can build a powerful transmitter that can fit in a lunchbox or backpack. Hopefully there won't be a lot of those bastards because they give a bad name to radio amateurs, which is an amazing hobby.
As someone who has experience with radio and railway and also lives in Poland, it's nothing new. It got so much attention from media because National Railway Administration, PKP PLK, decided to post it about it on social media, not they try to fix the leaking sewage that is leaking since. Radiostop was abused way, way earlier by people. I also speculate that it wasn't done by Pro-Russian sabotages, but by a group of young people that like trainspotting and find this type of “fun” entertaining. When it comes to GSM-R there's still a lot of to do, especially after one of the consortium companies went bankrupt.
Tl;dr It's rather just annoying type of fun for someone and everyone will forget about it in a week or two.
As a Pole I can assure everybody that that attack was futile since PKP would shut itself down anyway 12hours delay or 58hours delay is a norm
Maybe in your brain. For me, PKP works fine.
I liked the analogy to those flipper zero kids
Hope you cover the Qakbot take down from the FBI!
It’s funny, the radio tones can be downloaded online for free as a ringtone mp3 lol. Took me two mins to find it.
8:50 Nice joke there 😂😂😂
always a well done production. Thanks!
thanks for putting the ad at the end of the video and not in the middle
Ringway Manchester also covered this too. Civilian Transport Services hacked is a huge burden on people who use public transport.
Set up a radiostop network over the entirety of Europe to do some trolling
I appreciate your very good attempt to pronounce the name "Szczecin" ❤
5:32 its not about stopping all bot traffic, its about making it cost-ineffective to send a lot of traffic.
3:18 a real payphone, Cap’n Crunch whistle dodge here
i think authentication for radiostop should be done by the hardware not someone entering a password.
in an emergency the train needs to be stopped now not 30 seconds later as soon as a password is entered.
if it isnt being done already polands fcc should have a system of radio signal tracers so they can trace the signal so the authorities can trace them.
imagine a scenario like this where there is a train sharing the same track and the train in front only a couple miles away is on fire and is stopped and evacuating and it is on a high speed track with another train behind only a couple miles away.
if they had to login and authenticate in the few seconds it takes to verify the identity the train could have moved a good part of the mile or so and if not done fast enough the train could crash into the one being evacuated.
maybe even leave the system as is and as long as no one can get hurt outside of inertia induced bruises by the pranks then just charge them with calling in false emergency or something.
As a Radio Amateur in the UK, I've seen these 20 dollar radios everywhere (Baofangs). The range can be miles even kilometers. With a big antenna and other more powerful radio, you can do this from your home. Also, did you change your microphone? :)
Wow, that's impressive! But whether or not such radios were easily available at the time, one has to wonder whether it didn't cross the designers' minds that the system might be abused. By the way, I'm not sure what you mean by "miles even kilometers", but miles are longer than kilometers ;)
You can buy them at ANY chinese store online. And, most radios are cheap. I have a 25w, only use 10w and can get up to 100 miles. For 100£@@AlexanderVatov
Watching this on my Train Ride rn
0:32 he could've played to serve Russia or something but he missed the opportunity
As a Polish person i'm surprised i never heard of radiostop and it being abused
As a Pole, you don't know many things.
Polskie
Koleje
Powolne
In the UK they could bring the entire country to a halt by just sprinkling the wrong sort of leaves on the track.
Yo im here in a timely manner no way. Hello from Australia!
This is the best example of a system that is safe but not secure.
You can't do any real harm by triggering the signal, but you can incour costs and disturb the service.
Finally Indonesia in the news where Indonesia wasnt the victim! Hooray!
the mere suggestion of asking tor to mine on client systems is absolutely disgusting(maybe it would be ok as an opt in thing)
nerd
Im from Poland and I didn't hear about the train sabotage😮
There is nothing so secure that cannot be broken
We need to change this on trains.
Just like opening the garage with a toy
3:30 lmao I was just thinking if youre limited by range and they're cheap walkie talkies just setup some relays and have coverage
It was nor hackers it was 2 police officers.people arrested already.Mentioned in news. It must be bigger operation as trains still stopping despite people were detained
that TOR thing is very exciting, although it pretty much makes tor a less secure i2p
How did you miss the French taking down the UK's entire atc system?
Little known fact, the train signals were secretly encrypted. The sequence of tones had to be played backwards.
The Tor proof of work is pretty interesting.
Tor being slower than usual... yep, felt that when using it for my work
what are you even doing in tor? o_O
@@GoldbergToastyBredselling children
@@GoldbergToastyBredjust honest work 👀
With the Tor proof of work challenge, how well will that likely work with an older (2016) laptop?
It will likely take few seconds. Like he said, it would be mainly in place to prevent iot devices (e.g. your smart light-bulbs) from accessing
@@sturmpelz1277 thanks
They're not hackers. Such situations are repeated every few years because the GSM-R system on the railway has not yet been introduced in Poland.
Baofeng strikes again
And I have a few.
73 M7TUD
It's always luxury cars- the worst investment
5:50 Wei Dai's b-money paper mentions another reason that the POW can't be used to generate crypto-currency tokens:
"1. The creation of money. Anyone can create money by broadcasting the
solution to a previously unsolved computational problem. The only
conditions are that it must be easy to determine how much computing effort
it took to solve the problem and the solution must otherwise have no
value, either practical or intellectual. ..."
This implies that merged mining is not a great idea long-term.
I mean how would a Tor crypto token even retain any value, unless you also financialise other aspects of the Tor network. So it's good Tor didn't jump on the crypto train.
2:55 I mean, technically they could. If you forked out the money to buy an RF attachment that uses that frequency, you could use the flipper to do this attack.
Was waiting for this 😊
Homelab nerds googling stuff: Digital fort-knox in their basement
Government agencies, public service and cybercriminals: Encryption, what's that?
Disturbing a nations public transport is more harmfull than turning off TVs in a store with your flipper zero. So yes we can call this a cyber attack
Wouldn't a proof of work token be unique, and identifiable to that one browser. If that could be used to identify Tor users that would not be good. Is that possible?
If proof of work is added to TOR, my phone wont be able to run it anymore, it can barely run browsers as is. sad
As a programmer i say this is a grave error of the company that made the system. Security by obscurity is NOT security.
Messing with safety systems might have some heavier penalties than doing something else to interupt train service
8:51 lmfao
WHY IS IT ALWAYS LUXURY VEHICLES
I regularly use the Tor network for privacy reasons (tl;dr: awful family + stalker ex, who's also definitely a hacker), and while I understand why they're implementing the proof of work feature, I already hate it. I can't afford a computer built even within the last few years, and use Tor 95% of the time on mobile devices.
Like you said, it's gonna affect people in my situation.
but after app launches then pages gonna load faster
The biggest reason tor doesnt protect you, is using it on the same machines you log in to all your other stuff, then it can easily be figured out thats your traffic. If someone got in your computer to a degree they could easily associate your traffic. FYI. it all depends what your doing.
I'm fine with waiting a while so long as ddos botnets have to wait too.
@@nwerd7584 I use Tails on my laptop and desktop along with Proton's Tor VPN, and I don't use my regular phone and tablet whenever I need to use it on a mobile device. Nice job assuming I don't know what I'm doing, though.
🎯 Key Takeaways for quick navigation:
00:00 🚂 Pro-Russian hackers used a simple method involving a cheap radio to stop Polish trains, causing disruptions.
04:30 🔒 The TOR network has faced DDoS attacks, and now users will need to complete a proof-of-work task to access it, aimed at reducing malicious traffic.
07:18 🎣 The notorious phishing platform 16shop was shut down by Interpol due to opsec mistakes by its creator, impacting thousands of users.
Made with HARPA AI
You can achieve greater distance using an Yagi antenna.
2:45 an easy solution is just to use some old ass steam train like a px48
Could you have not extended the reach with simple radios in relay mode?
6:30 WTF phones CPU computing power is as good as pc if implemented correctly. For example Snapdragon 8 Gen 1 CPU is better than Apple M1
lol most people in the countries its banned in are subject to shitty phones and computers.
🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5 🇵🇱 ARTICLE 5
Could you do about data leaks in Thailand?
The fact that you said Szczecin perfectly makes you a god
is this about Poland
On 6:08 you imply china has a problem with crypto and Tor could not implement it because of China.
As it turns out, just having Tor is a crime, so it's not a big deal.
But let's not give them another source of prosecutor abuse
my grandpas job was to search such ilegally sent radio signal
So we're all using housing have you ever tried to look at the old rotations releasing from housing to new energy how it releases and what it depths through
Also why they pro ratio the new concepts that they put on housings because then it's still going to have that backlash ain't it
Nice now we want more vedios but this time with actuall cyber scammer
“proving it is still possible to become rich as a freelance web designer”
smiled, laughed, then started crying
I went to Realme Service center and Save some of there electricity bill by turning there television off via my Xiaomi phone.
Amazing news
Why does your and Jack's voice sound similar?
NICE!
(train stop story) sdr listening stations... handheld identifiers... reciept of transaction for said handhelds with the identifiers. (tor) creating a flag that identifys that your not a bot... making a flag that isnt a flag all while being a flag... give it time 🍿. (malware as a service) todays tools tomorrows weapons used against the creator. are you ok with making a tool that will be used eventually against you???
ada indonesia coy
Wait railroad frequencies? BWAHAHAHAHAHAHAHAHAHAHAHAHAHA
Did u hear about umich cyber attack? Wifi has been down for a week already
Hmmm...
Oh yeah another doze of propaganda
Based.
SKM(T) train
❤❤❤❤
The fucking goat back at it with some more, great content 😤❤️