@tiagodagostini They have no limits regarding evil when it comes to their profit margins. They'd nuke a whole country if they needed the room to expand their server space.
This show is by far my favorite podcast. I’ve been telling all of my friends to check it out. Commenting to please the RUclips algorithm gods in hopes more people can listen!
I first heard about this podcast from one of my friends last summer. I listened to all episodes and was so sad to see they were all from 3-4 years ago and nothing recent came out but now seeing this I am so happy they’re back. Thank you Jack!
25:07 He failed to also mention for military advantage. Clearly that option isn't ruled out and the attacks have been to gain knowledge of military weapons, etc.
Dude this is gonna be huge .cld you try get a interveiw with doingfedtime .I have left a msge on his last video ,asking him if he would consider doing it .I’ll come bck and tell you what he says .peace
@@kaeji_namitsua nope open source is way better. There are thousands of eyes on open source code, Perforce, had it been open source, would have never been used by Google because its garbage. How many people could possibly be looking though closed source code for security vulnerabilities? Lemme tell you, basically no one aside from a small dedicated team and occasionally developers. And on top of that, companies can't hide sneaky stalkerware in open source code.
awesone reciter! i cant imagine how much it takes to make one of these gems of information.. very happy to be a subscriber.. one of the greatest podcasts ive ever listened to
I have always wondered why govs and companies would store sensitive information you don't want hacked on a machine connected to the internet. Like is there some reason that requires the source code to be kept connected to the internet? Cause the only reason I can think of is that it would be convenient for the company and its workers to retrieve the source code when needed. But if hacking is an issue...why not store things on a machine that is not connected and then just physically walk to the location that has the source code and do your thing there on non connected machines. At least then they would have to physically go to Google and infiltrate the place to get the source code rather than hack them safe from at home with your feet kicked up.
That's called an air gapped system and in governments it's common practice for certain projects unless a company or person forgoes that policy to save time/money or is just negligent. Unfortunately alot of these companies weighted the risks and well the cons out weighted the pros of doing that I assume.
When you have a company like Google that is so large and so spread out, it becomes harder to maintain a kind of system you’re thinking of as people work on it. If you have multiple air gapped sources being worked on, source version management can quickly become out of hand. Air gapped systems make more sense when a team is centralized and can actually walk to the system to access it, if everyone that could access it worked out of the same building let’s say. But for Google, unless you have multiple source code systems (very bad), what would the employees do? Would someone working in Europe walk over to california to access it? This is kinda oversimplified but hope I got across the main issue.
Google doesn’t walk around saying they’re unhackable, when he’s saying “virtually impossible”, it’s true, they invest heavily in product security and active defensive controls. They invented the concept of Zero-Trust, it’s one of the foundational elements in their security programs. Not to mention state sponsored threat groups generally don’t operate like the “hackers” portrayed in the media. They’re well funded, professionally managed and operate remarkably like a commercial entity.
Just got recommended this video in my feed, RUclips did me a solid as your channel has some brilliant looking content, just finished this video and it was great! Got a new sub for sure. Off to binge the rest of your videos now 😁👍
You know what the best of humans can do is like caveman level to AI. You'll never know AI is in your servers, AI can setup millions of crypto servers to all change at the same time . Crypto is wide open to AI. Sophia told us on stage at the AIBC sumit in Malta she has already been uploaded to the blockchain. It's such a setup
Hey! Just keep posting new videos ... the editing is great ... narration is amazing ... a time will come you will hit 1 million ... best wishes but just keep posting new videos more often ...
>You tryna enter the chinese market >didn't expect censorship >get censored >OMFG.png lmao that's what you get google. How does it feel when someone does the same shit you do back at you?
But those aren't "teams" of hackers who are doing this that's called a unit and those aren't hackers they're soldiers. The group? It's called an army specifically the People's Liberation Army
Why is this well made content not on the front page of RUclips? I only found it because a pentester mentioned it in a video regarding pentest+. Is RUclips really burying educational content?
I love Darknet Diaries, but SUPER let down by how I was treated when trying to shake his hand at the last DefCon, was super pumped to meet him, super let down by how I was treated by his team
Hard to imagine I am still using google in China for all these years, there's nothing beeter than freedom. Hope I won't be the last generation connected to the Internet
@@trispycee not at all, many of them knows there’s firewall and know vpn is a thing but even some of them think inside the firewall was a safe heaven away from hateful speech, sexual content, paid video/audio services, and foreigners whom want to take down their government. If somebody talks about vpn it’ll sounds that related to illegal stuff
Saying the use of Zero day exploits is "rare" isn't really true. They exist, but they aren't used willy nilly because you can sell the knowledge of that exploit to someone else and avoid the risk of using it for your own means and getting caught.
Google stepped away from "don't be evil" pretty damn quick. Great stuff!
They still have a limit on how explicit evil they accept.
@tiagodagostini
They have no limits regarding evil when it comes to their profit margins. They'd nuke a whole country if they needed the room to expand their server space.
it's impossible not to be evil under the present economic system
This show is by far my favorite podcast. I’ve been telling all of my friends to check it out. Commenting to please the RUclips algorithm gods in hopes more people can listen!
Seconded, and also commented. ALL PRAISE THE ALGORITHM!
I love Darknet Diaries! Best podcast I've ever listened to!
i'd love to see Google down and go bankrupt
You haven’t listen to much so
Wait till you smell my fart.
@@coolinmac what’s your favourite? Mine is joe rogan
@@shaw_xo LOL
The only podcast i have ever heard ALL episodes of.
You're the best Jack! :)
Huge fan, i have learned so much from just listening to your podcasts! :)
which are the best episodes??
I first heard about this podcast from one of my friends last summer. I listened to all episodes and was so sad to see they were all from 3-4 years ago and nothing recent came out but now seeing this I am so happy they’re back. Thank you Jack!
I wonder why he disappeared for 3 years
Hi, I need to meet a hacker to help me out about something
@@aserashid3263 what help
25:07 He failed to also mention for military advantage. Clearly that option isn't ruled out and the attacks have been to gain knowledge of military weapons, etc.
Glad you came to youtube, love the animations Jack!
Dude this is gonna be huge .cld you try get a interveiw with doingfedtime .I have left a msge on his last video ,asking him if he would consider doing it .I’ll come bck and tell you what he says .peace
"Google didn't like the censorship." Said no one ever.
Needed to listen to a Cyber Security podcast for a college assignment. I made the right choice! Now I'm subbed to the channel
X2
So happy to see this pop up today.
That shows why open source is superior to closed source in most cases.
It doesnt matter. People on both sides have same skills.
@@kaeji_namitsua nope open source is way better. There are thousands of eyes on open source code, Perforce, had it been open source, would have never been used by Google because its garbage. How many people could possibly be looking though closed source code for security vulnerabilities? Lemme tell you, basically no one aside from a small dedicated team and occasionally developers. And on top of that, companies can't hide sneaky stalkerware in open source code.
the quality of this podcast is amazing and is seriously underrated. def is my fav podcast right now!
I ADORE how the top-mid screen actually uses real video timer and sound for it's animation
awesone reciter! i cant imagine how much it takes to make one of these gems of information.. very happy to be a subscriber.. one of the greatest podcasts ive ever listened to
You reckon like me .this is gonna be a huge podcast very soon .
I have always wondered why govs and companies would store sensitive information you don't want hacked on a machine connected to the internet. Like is there some reason that requires the source code to be kept connected to the internet? Cause the only reason I can think of is that it would be convenient for the company and its workers to retrieve the source code when needed. But if hacking is an issue...why not store things on a machine that is not connected and then just physically walk to the location that has the source code and do your thing there on non connected machines. At least then they would have to physically go to Google and infiltrate the place to get the source code rather than hack them safe from at home with your feet kicked up.
That's called an air gapped system and in governments it's common practice for certain projects unless a company or person forgoes that policy to save time/money or is just negligent. Unfortunately alot of these companies weighted the risks and well the cons out weighted the pros of doing that I assume.
When you have a company like Google that is so large and so spread out, it becomes harder to maintain a kind of system you’re thinking of as people work on it. If you have multiple air gapped sources being worked on, source version management can quickly become out of hand. Air gapped systems make more sense when a team is centralized and can actually walk to the system to access it, if everyone that could access it worked out of the same building let’s say. But for Google, unless you have multiple source code systems (very bad), what would the employees do? Would someone working in Europe walk over to california to access it? This is kinda oversimplified but hope I got across the main issue.
The first podcast i have focused for 30 minutes straight! Thanks! This was Awsome!
Wow, that intro is great, got goosebumbs from that music, I love it!
Learned alot from Darknet Diaries, please never stop this podcast
Oh my god, I haven't really hooked with any podcast show. But this one is just wow.
The stuff you do not hear on the general news. Thank you for sharing your hard work.
Actually it was all over the news lol. Did you not see the clip of Hillary?
@@justinkassinger8238 - i honestly had not. Might you have a link? I would not trust any of the search engines i know about.
when he says it's virtually impossible to hack into Google last words never tell a hacker that they can't hack something lol
Google doesn’t walk around saying they’re unhackable, when he’s saying “virtually impossible”, it’s true, they invest heavily in product security and active defensive controls. They invented the concept of Zero-Trust, it’s one of the foundational elements in their security programs.
Not to mention state sponsored threat groups generally don’t operate like the “hackers” portrayed in the media. They’re well funded, professionally managed and operate remarkably like a commercial entity.
Google is not bulletproof
How can it even be hacked ??
*virtually* impossible
never a dull moment, Jack. and the graphics, production, content, all of it ... it's sheer perfection
You mean the background that hardly moves and took about 5 minutes to work? Give over
@@coolinmac I don't see anything better on your channel, how about you make some of those 5min animations?
Now Google censors American search terms lol
Keep up the Great work, keep covering the honest stories out there. Looking forward to Future content
"Mom, Joey's hacking the Gibson again!"
As always great episode!! Hei Jack, I was wondering is it possible to publish all your Darknet Diaries episodes alongside with other places?
I've spent days listening to these. Really great work, love this type of content!
Just got recommended this video in my feed, RUclips did me a solid as your channel has some brilliant looking content, just finished this video and it was great! Got a new sub for sure. Off to binge the rest of your videos now 😁👍
This is a great show, thanks man! Very well put together, enjoyable and technically accurate, I love this..!
That is harcore sophisticated. Without question they have plants on the inside. Awesome job on this story. Subbed.
Hands down the best podcast ever
Nice man! this was very engaging!
Wow, this is insane. Homestly feel like removing the Internet from my pc after watching this.
“We have an agreement with China…” As if China’s good for its word.
As if ours is lol
dude left for 3 years and came back, wondee why
Nothing is completely protected and never will be.
I've been here for 2 minutes and I already love this channel.
The Voice, the continent of your show is outstanding
Hi 👋 i have been listening to your podcast i love it keep it up
This takes me back to the days when Goolge said do not be evil, and Hong Kong was a self-governing entity. Those were the good days.
Ooo this was one of my favs
15:52 “they were able to search for sexual content” lmao nah this isn’t a victory man
You know what the best of humans can do is like caveman level to AI. You'll never know AI is in your servers, AI can setup millions of crypto servers to all change at the same time . Crypto is wide open to AI. Sophia told us on stage at the AIBC sumit in Malta she has already been uploaded to the blockchain. It's such a setup
great video, excited i just discovered your channel, props
running out of podcast episodes 2 watch. love darknet diaries!
First time listener and subscriber. Loved the vid and am looking forward to seeing more of this content.
This quality level is insane.
David Bombal brought me here. Nice to meet you, Jack😃
Hey! Just keep posting new videos ... the editing is great ... narration is amazing ... a time will come you will hit 1 million ... best wishes but just keep posting new videos more often ...
Does anyone know the music that starts playing around 17:27
There is always a basement. There is always a group of crooks. And you needn't check anything but the basement itself.
i would love to have that background as my screen saver
you can find some backgrounds to download here darknetdiaries.com/wallpaper
@@JackRhysider Thank you!
Nice video I love the podcast and the valuable informations and events in it thanks from my heart ❤❤❤❤
You cant beat social engineering , people can always be fooled.
Yep
You're the best Jack! Keep them coming
the nemesis....
scary sophisticated!
The two country agreement is really weak because govs can just "outsource" to private companies.
Love your work just stumbled upon you and it's great.
This guy has the best podcast
Thanks for bringing wonderful stories
Well done man, great story.
Let's go.
If i was that good , i would just slowly increase my pay at work.
Hey there i am new follower of your channel 🤩 awsm though I would prefer no background music
Mannn sooo good to see this on RUclips. Love your podcasts
keep this content coming bruh. im subbed , this is S tier
The commercial gain and commercial advancement add-ons are just huge loopholes and basically blowing smoke and not a real agreement at all.
Commenting to appease the algorithm. More people need to see this podcast
Man you set such a high standard to podcasts I can’t find anyone else I like on the podcast app besides for some Jordan harbinger episodes
Who
I'm not guilty
Haha whatever
I hate google
I use bing
>You tryna enter the chinese market
>didn't expect censorship
>get censored
>OMFG.png
lmao that's what you get google. How does it feel when someone does the same shit you do back at you?
They gave them TICKETS to the movie Avatar instead of answering their questions. Lol.
How much proprietary source code on chrome can there be? It's based on chromium and I thought that is open source?
But those aren't "teams" of hackers who are doing this that's called a unit and those aren't hackers they're soldiers. The group? It's called an army specifically the People's Liberation Army
Thank you for always sharing these amazing stories 😊
Hacking shoot
I think I've been hacked
Whatever I'm just surfing the web lie everyone else
Excellent work. Thanks for making this.
Love these episode!
Hey I love your podcast Jack!!! Didn't know you had a YT account!
Why is this well made content not on the front page of RUclips? I only found it because a pentester mentioned it in a video regarding pentest+. Is RUclips really burying educational content?
I love the feeling of finding content gold 🔥🔥🔥🔥🚒 🙏🙏🙏
Really great Podcast 👍.keep it up
Cyber-warfare is very subtle and effervescent these days indeed 😕
Awesome channel. Is cool and chill, perfect for the evening wind down.
First time listening, very much enjoying it so far :)
Darknet Diaries is so good!
Great way to learn listening to some of these stories.
Just found this channel. So excited to learn more!!
Cannot STAND McAfee but side note, I’ve been watching all of your vids and definitely enjoy them. Keep it up!
I love Darknet Diaries, but SUPER let down by how I was treated when trying to shake his hand at the last DefCon, was super pumped to meet him, super let down by how I was treated by his team
Hard to imagine I am still using google in China for all these years, there's nothing beeter than freedom. Hope I won't be the last generation connected to the Internet
Do you think many people your age use VPNs/ways of getting into banned websites?
@@trispycee not at all, many of them knows there’s firewall and know vpn is a thing but even some of them think inside the firewall was a safe heaven away from hateful speech, sexual content, paid video/audio services, and foreigners whom want to take down their government. If somebody talks about vpn it’ll sounds that related to illegal stuff
Duckgogo would take over .
You need to see who invested heavily in google during these times.. wait.. if google was even public at the time
Saying the use of Zero day exploits is "rare" isn't really true. They exist, but they aren't used willy nilly because you can sell the knowledge of that exploit to someone else and avoid the risk of using it for your own means and getting caught.
Why are episodes on RUclips and Spotify different ????
does anybody know the name of the "checksum algorithm that's only used in china"
finally an IT style explanations rather than anon fanboying from other channels
So there's no way to overcome the blocked sites from China if you leave in China, such as VPN. Or different network setup.
This was amazing
i remember telling people cccleaner is a virus and everyone thought I am an idioot well here it is
Look up on how to reach us , allow us help you hack it!!
Thank you i Gmailed already
Doesn't India hire huge amounts of people from Asia in their telecommunications????
Love your work!
Loved it 👍🏻. And please keep doing it 👍🏻.
Tu vahi ha na bro jo CS mai varti hua ha
@@rimondas6729 ?