Cybersecurity Iceberg Explained

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии •

  • @DZ-vp1uu
    @DZ-vp1uu Месяц назад +80

    are you retarded abortion or why would you make vidoe like this?

    • @BeastyBundy
      @BeastyBundy Месяц назад +21

      LMAO WTF

    • @tekkon404
      @tekkon404 Месяц назад +12

      what the actual fuck

    • @7alen7
      @7alen7  Месяц назад +49

      ​@tekkon404 beats me man, funniest comment I think I've ever gotten tbh

    • @brook-y1s
      @brook-y1s Месяц назад +2

      😂😂😂

    • @Rango-Bot-dq1eu
      @Rango-Bot-dq1eu 27 дней назад +5

      Peak writing ✍️

  • @m4rt_
    @m4rt_ 4 месяца назад +1068

    Fun fact, at my work, if we are dealing with incredibly sensitive information, the protocol is to be in a locked room with no computers, and writing stuff on paper, possibly using a typewriter.

    • @RingZero-j6g
      @RingZero-j6g 4 месяца назад +335

      Great I can hack that by using the fast fourier transform series machine learning and audio recordings of the typewriter button taps to decode any messages

    • @1oneguythat
      @1oneguythat 4 месяца назад +116

      Sounds like a greentext story on 4chan.

    • @aznstride4325
      @aznstride4325 4 месяца назад +63

      ridiculous. Sounds like your company has trust issues and doesn’t trust their existing security protocols.
      Hopefully everyone threw away the papers afterwards and no one talks about the stuff outside that building.

    • @GladiatorWorldChampionsGWC
      @GladiatorWorldChampionsGWC 4 месяца назад +6

      ​@@1oneguythat💀

    • @gabrielepirovano3529
      @gabrielepirovano3529 4 месяца назад +87

      same we write all orders on pen and paper, then bring them to the kitchen staff to be prepared
      It's sensitive because we write user information on the paper (usually comments on their appearance to remember them when we get to the table)
      We also don't have computers, but because they're expensive
      Hopefully we can buy a new spatula before the end of the year

  • @TeighMart
    @TeighMart Год назад +214

    This video was sick, well done. It's pretty hard to fit something as broad as cybersecurity into an iceberg video, but I think you captured it well. Honestly, I think doing a deepdive into some of the more interesting topics from this list would be a good idea if you're looking for what other people are gonna want to watch. I feel like there's not enough channels that dive into the history of cyber.

    • @Lightnang_
      @Lightnang_ 11 месяцев назад +2

      Yeah I agree ☝️

  • @spindafan327
    @spindafan327 3 месяца назад +422

    remember, the "cloud" is just someone else's computer.

    • @spindafan327
      @spindafan327 2 месяца назад +25

      @@ChefDoesntCook your mother

    • @cs_wolke
      @cs_wolke 2 месяца назад +11

      Still a computer​@@ChefDoesntCook

    • @zeusolympus1664
      @zeusolympus1664 2 месяца назад

      ​@@spindafan327technically cloud is just a way to slowly suck the blood out of their users by big tech corporates.

    • @fatlip8315
      @fatlip8315 2 месяца назад +1

      Could be your own or a shared server between a group

    • @FirstaccountGotcensored
      @FirstaccountGotcensored 2 месяца назад +1

      ​@@ChefDoesntCook and what is a server?

  • @ShADOwWIZardMONeYgAnGGG
    @ShADOwWIZardMONeYgAnGGG Год назад +79

    This needs more attention wtf good job bro

  • @zoutewand
    @zoutewand 4 месяца назад +183

    I would like to share a fun fact that is tangential to the five eyes stuff. In the 90s there was a dutch anarchist/squat terrorist group called Rara (only targeting material, not people) that was watched by the dutch security agencies. After a while the dutch BVD (sec agency) realized that their observation squads were being. Observed.
    As it turns out, the group RaRa realised they were being watched and had set up 'contra observation groups', they were able to decode a lot of the BVD communication channels (as in, multiple kinds of devices, used for different forms of communications), had identified safe houses by cross-referencing those communications and they even ended up placing bugs on the observation cars of the BVD. This ended up with the BVD stopping their observations out of fear of Rara aqcuiring even more information.
    Imagine being a CIA agent and getting out CIA'd by a bunch of stinky punks. such a funny story

    • @theorixlux
      @theorixlux 3 месяца назад +6

      Amazing

    • @hyocinn
      @hyocinn Месяц назад +2

      thats honestly really funny

  • @Bloom10
    @Bloom10 4 месяца назад +130

    wait, this was 1 YEAR ago?! Thanks youtube for recommending me this hidden gem, very informative video man

  • @0xAquaWolf
    @0xAquaWolf Год назад +10

    I searched for the ice berg and you delivered.
    Thank you Anon

  • @__BLOOD__
    @__BLOOD__ 10 месяцев назад +14

    Nice. Very nice. You pretty much summed up the most important events of the last decade. What you could add when talking about password hashes in databases is that they are more often salted in respectable enterprise software and then explain what that means.

  • @theguywho4sked
    @theguywho4sked Год назад +5

    bro your channel is so good

  • @ariffadilah7121
    @ariffadilah7121 Год назад +22

    finally The Cybersec Iceberg, been waiting for someone to made this

  • @reflex6588
    @reflex6588 4 месяца назад +226

    “Java is a great language to replace with C#” 🤣

    • @FictionHubZA
      @FictionHubZA 4 месяца назад +17

      Java is pretty bad.

    • @freezafeesh9251
      @freezafeesh9251 4 месяца назад

      ​@@FictionHubZAit isn't actually, it's very safe. You can solve all the issue with Java boilerplate by using Kotlin

    • @dum5247
      @dum5247 3 месяца назад +2

      As someone who took Java for 2 years, I would rather dip my balls in a KFC fryer than use Java again

    • @12crenshaw
      @12crenshaw 3 месяца назад +7

      ​@@FictionHubZA coming out from someone who only ever used Scanner class and got lost writing main method presumably

    • @FictionHubZA
      @FictionHubZA 3 месяца назад

      @@12crenshaw Unfortunately, I use Java every day. I make mobile applications using Java.
      And a few games using the GUI.

  • @Known_as_The_Ghost
    @Known_as_The_Ghost Год назад +21

    This was a well done video!
    Great topics, too.
    Personally, I create videogame 'hacks' to modify things in-game.
    I don't release them to the public, nor do I do it for multiplayer games.
    I usually do it when I'm done with a game, and wanna mess around. Infinite gold! etc.
    Or if I'm stuck, for some reason. Stuck in a wall? Just... teleport out. :)
    It's very interesting to me, because I can guess/see how the developers designed their game, etc.
    (I also have fun making games)
    It's kinda fun, honestly.
    Also nice voice btw.

    • @7alen7
      @7alen7  Год назад +7

      Hacks for single player games are 100% ok by me. I think back to the days of using absurd cheats in GTA to mess around for a bit. If a game doesn't have those options, might as well create your own to get more enjoyment out of it :)

    • @Known_as_The_Ghost
      @Known_as_The_Ghost Год назад +3

      @@7alen7 Exactly!
      As long as it doesn't ruin someone's day, I think it's perfectly okay!

  • @joaoleite5785
    @joaoleite5785 4 месяца назад +370

    it's so weird how most of the people even in Cybersecurity are at insider threat level...

    • @7alen7
      @7alen7  4 месяца назад +33

      @@joaoleite5785 frfr

    • @bot-cz8yo
      @bot-cz8yo 4 месяца назад +6

      sim

    • @ThaKartoffel
      @ThaKartoffel 3 месяца назад +4

      You are either trolling or talking about CISO's which got nothing to do with hands on security

    • @speedymemes8127
      @speedymemes8127 3 месяца назад +4

      Lots of inexperienced folks. We should try to educate them.
      Also these tiers are dumb anyways... I learned about MD5 hash collisions in CSEC 101 lmao.

    • @speedymemes8127
      @speedymemes8127 3 месяца назад +2

      ​@@ThaKartoffelsome of them used to, but yeah I've also been in environments where the CISO role is given to someone out of pure nepotism.

  • @Lightnang_
    @Lightnang_ 11 месяцев назад +6

    You earned a sub! This video is absolutely amazing, this is the only privacy, cybersecurity related iceberg that I’ve found. I watched it from start to end. Loved the information and the way you explained it. Looking forward to more videos made by you! Have a great day! ❤🎉

  • @atomicaqua
    @atomicaqua Год назад +6

    This iceberg was extremely informative and each entry was explained very well. Thank you for making this, I am definitely going to go down a rabbit hole with some these topics lol

    • @Lightnang_
      @Lightnang_ 11 месяцев назад

      Yeah same with me 🎉

  • @ashenrxse
    @ashenrxse 3 месяца назад +7

    Watching this as someone whose general knowledge of this iceberg ended in Level 2 with occasional spots later on, I was reminded of something William Gibson, author of Neuromancer, said. When he was writing the book back in the '80s, he had said he got the inspiration for the slang and lingo present in the now cyperbunk cult classic from listening to people's conversations. He described two of them being when he was listening to an ambulance driver, using the word 'flatline' as a verb to describe someone dying in an ambulance. The other was when he was listening to two computer software employees, and they were talking about some virus program. From there, he created the wonderfully flavorful and exotic slang present in Neuromancer that is now present in nearly all cyberpunk media. Gibson had never even touched a computer until after Neuromancer was published.
    I got the same feeling as Gibson listening to those two software employees watching this video. There were so many acronyms, events, phrases, and terms in the video that sounded like pure sci-fi at times. Excellent video. It was extremely informative. Thank you for taking the time to make this.

  • @AAHyo
    @AAHyo 4 месяца назад +151

    About the Lain attack. There is an anime called "Serial experiment Lain" and the attack was a reference to the anime

    • @7alen7
      @7alen7  4 месяца назад +147

      @@AAHyo oh believe me, I'm familiar lmao, I try not to expose my weebish-ness to everyone

    • @fleurdelice777
      @fleurdelice777 3 месяца назад +22

      ​@7alen7 you just did

    • @7alen7
      @7alen7  3 месяца назад +46

      @@fleurdelice777 😡

    • @occultsupport
      @occultsupport 2 месяца назад

      @@7alen7 yeah the serial experiments of lain is a horrible anime

    • @richter805
      @richter805 2 месяца назад

      @@occultsupport shut up no one loves you

  • @rendain
    @rendain 10 месяцев назад +8

    This was a really interesting iceberg video. You completely deserve more views!!

  • @Deathvoice418
    @Deathvoice418 Месяц назад +1

    Fellow cyber guy here, Pentest/IR professionally. The vid gave me a chuckle, earned a sub. Looking forward to more vids.

  • @atlas3202
    @atlas3202 Год назад +4

    Great job on the video, very suprised it hasn't got more views, very well done.

    • @Lightnang_
      @Lightnang_ 11 месяцев назад +2

      Yeah, very underrated content. Gonna blow up one day ⬆️

    • @turnoff7572
      @turnoff7572 4 месяца назад

      Blowing up rn​@@Lightnang_

  • @destinysaid
    @destinysaid Год назад +52

    Just to correct something. The term “Nigerian prince” and the associated scams are used all over the world and the country “Nigeria” takes the fall for hackers all over the world

    • @Lightnang_
      @Lightnang_ 11 месяцев назад +24

      That’s because Nigeria is one of the top countries for scammers. This is because of Socioeconomic and the limited access to jobs due to poverty, and unemployment. There’s also large organized groups of scammers from and in Nigeria that include necessary infrastructure and resources, as well as protection to carry out there fraudulent activities. Just look at the statistics and then come back to me.

    • @destinysaid
      @destinysaid 11 месяцев назад

      All the stats also power states like north Korea, Russia, eastern Europe states, certain "first world" countries and south asian countries.
      Scamming isn't a new thing and there are large organized crime syndicates everywhere, even in the glorious United States of America.
      None of the top 10 hacker groups responsible for billions of lost funds yeartly are from Nigeria, yet bloggers and the likes continue to churn stats they read from fellow unreliable sites.
      While hackers in north Korea and the likes get less scrutiny for their actions.@@Lightnang_

    • @DaTaskYt
      @DaTaskYt 4 месяца назад +4

      ​@@Lightnang_ oga, he's Nigerian
      Of course he knows that.
      The ratio described by victim countries to be Nigerian Scams is kinda unfair.

  • @kiyo693
    @kiyo693 4 месяца назад +51

    ofc i get recommended this after recent events

    • @7alen7
      @7alen7  4 месяца назад +18

      @kiyo693 hope you're not a CloudStrike customer ;)

    • @kiyo693
      @kiyo693 4 месяца назад +1

      @@7alen7 my work is :(

    • @infernosgaming8942
      @infernosgaming8942 3 месяца назад +4

      @@7alen7I feel bad, my Dad works in IT at a law firm and not only are the lawyers there some of the least tech savvy people he or I have ever interacted with, but nearly every single system, around 400 computers, got hit. Him and like four other IT guys had to go around the entire three floor office space and do the manual fix.

    • @dip9995
      @dip9995 3 месяца назад

      @@7alen7I work at crowdstrike

  • @Rosszy305
    @Rosszy305 8 месяцев назад +7

    Baller video with great quality. Im actually studying for the security plus currently and starting as a Network Admin next month as well. Was actually on a study break when I came across this and found it awesome while also being kinda informative, well done sir.

    • @7alen7
      @7alen7  8 месяцев назад +7

      Best of luck with the exam! Odds are you're gonna do great (bc you watched my video, obviously lmao)

  • @hazimirsyad7663
    @hazimirsyad7663 Год назад +3

    Bro really hoping you end up on people's recommendation. Cool video!

  • @cyndermayhem
    @cyndermayhem 4 месяца назад +4

    as someone who's just getting into the field and grinding certs, this is pretty motivating. great vid!

  • @JLM-y5g
    @JLM-y5g 2 месяца назад

    I've been struggling with my Cybersecurity schoolwork, and I'm almost "done"... but it feels like I didn't know any of the concepts in their simplest form/summary. This video gives me a beautiful foundation to use the other skills they taught me. Thanks.

  • @Kayo4Iife
    @Kayo4Iife 4 месяца назад +3

    The wendigoon music in the background was the cherry on top to this video. Good job :D

    • @7alen7
      @7alen7  4 месяца назад +1

      @@Kayo4Iife glad someone gets it

  • @goldensh0t439
    @goldensh0t439 4 месяца назад +4

    I’m so glad you made an iceberg for cyber!! These are helpful to zoom out and remember why you love this field so much. Thank you for this, it was very well made!

  • @TracksWithDax
    @TracksWithDax 3 месяца назад +2

    This is awesome, I've been following cyber for several years but haven't broken in really. Glad to see I know a lot or most of these entries and that there's a lot in here that's brand new to me
    Would love to see a continuation or maybe individualized icebergs like "red team iceberg" etc

  • @heawin88
    @heawin88 2 месяца назад +1

    This is the coolest thing ever. I love cybersecurity stuff like this that talks high level but takes the time to explain acronyms etc.
    Amazing job, my friend. Definitely worth the like, sub, and share for sure.

  • @H4R4K1R1x
    @H4R4K1R1x 4 месяца назад +21

    Cool vid, the Solomon seal I've often thought about.. We inscribe etchings on motherboards, make crystals think, have daemons that do processes for us, and we conjure light on a black mirror.
    MIT have that programming book too that leans heavily into the magician/conjurer perspective. Truly modern day terms applied to magic.

    • @trejohnson7677
      @trejohnson7677 4 месяца назад

      SICP??? LOL, read it, its just lisp bullshit.

    • @MutleeIsTheAntiGod
      @MutleeIsTheAntiGod 4 месяца назад +5

      What is the book called?

    • @virior
      @virior 3 месяца назад

      @@MutleeIsTheAntiGod ruclips.net/video/t9AZ8_dX6uA/видео.htmlsi=hKsMquDikdfo47te

    • @Cristofer-h6q
      @Cristofer-h6q 2 месяца назад

      @@MutleeIsTheAntiGod "The Art of Computer Programming" de Donald E. Knuth, probably.

  • @cat-rq2mb
    @cat-rq2mb Год назад +4

    Randomly got this in my recommended, good video bro

  • @basvandriel2497
    @basvandriel2497 Год назад +1

    Cool video man, suprised to see that you have so little subscribers, glad that I found you!

  • @Shadow-nx4yl
    @Shadow-nx4yl Месяц назад

    im trying to start my career in IT and hopefully later into cybersecurity, and this video was super insightful, thanks man :)

  • @midnightanna9925
    @midnightanna9925 3 месяца назад

    As someone studying cybersecurity and IT on my own, this video is amazing. Thank you so much! I have so much more to learn now!

  • @kevinr7216
    @kevinr7216 4 месяца назад +8

    Yooo the “wasting time billing hours” comment lemme tell ya…..is the most deeply relatable thing I’ve ever heard 😂😂😂

  • @mechez774
    @mechez774 29 дней назад +1

    We only write our code in sparrow whistles . Works most of the time, but once, there was a sparrow hacker

  • @mtthsgrr
    @mtthsgrr 6 месяцев назад +4

    much love from Brazil buddy, you're a fun dude to watch ❤

    • @7alen7
      @7alen7  6 месяцев назад +5

      Much love to Brazil buddy, thanks for watching

  • @CYBERNETIC-ANGEL
    @CYBERNETIC-ANGEL Год назад +1

    you just earned yourself a new subscriber, keep it up

  • @jedwilliamson5815
    @jedwilliamson5815 3 месяца назад +2

    just got done playing dbd and started watching this and didnt even question it in the background at first lol

  • @Liqweed1337
    @Liqweed1337 3 месяца назад +1

    one of the nastiest attacks are ones that silentinstall a ip tunnel tool and uses your machine as exit node for filesharing... the copyright lawsuit fines aggainst the exitnode user are huge because they think he is the filesharer

  • @SquidIP
    @SquidIP 4 месяца назад +436

    14:17 ha he said fartware

    • @7alen7
      @7alen7  4 месяца назад +436

      IP. 92.28.211.234 N: 43.7462 W: 12.4893 SS Number: 6979191519182016 IPv6: fe80::5dcd::ef69::fb22::d9888%12 UPNP: Enabled DMZ: 10.112.42.15 MAC: 5A:78:3E:7E:00 ISP: Ucom Universal DNS: 8.8.8.8 ALT DNS: 1.1.1.8.1 DNS SUFFIX: Dlink WAN: 100.23.10.15 GATEWAY: 192.168.0.1 SUBNET MASK: 255.255.0.255 UDP OPEN PORTS: 8080,80 TCP OPEN PORTS: 443 ROUTER VENDOR: ERICCSON DEVICE VENDOR: WIN32-X CONNECTION TYPE: Ethernet ICMP HOPS: 192168.0.1 192168.1.1 100.73.43.4 host-132.12.32.167.ucom.com host-66.120.12.111.ucom.com 36.134.67.189 216.239.78.111 sof02s32-in-f14.1e100.net TOTAL HOPS: 8 ACTIVE SERVICES: [HTTP] 192.168.3.1:80=>92.28.211.234:80 [HTTP] 192.168.3.1:443=>92.28.211.234:443 [UDP] 192.168.0.1:788=>192.168.1:6557 [TCP] 192.168.1.1:67891=>92.28.211.234:345 [TCP] 192.168.52.43:7777=>192.168.1.1:7778 [TCP] 192.168.78.12:898=>192.168.89.9:667 EXTERNAL MAC: 6U:78:89:ER:O4 MODEM JUMPS: 64
      (Fake, obviously)

    • @1verse4ll
      @1verse4ll 4 месяца назад +97

      bro is cooked

    • @MandenTV
      @MandenTV 4 месяца назад +1

      @@7alen7real

    • @alsjourney
      @alsjourney 4 месяца назад +79

      @@7alen7 nice try, i dont even own a router

    • @alsjourney
      @alsjourney 4 месяца назад +23

      pls dont expose me

  • @imodexe2646
    @imodexe2646 4 месяца назад +1

    That second to last topic was quite deep, gen pop is spooked, you spittin!

  • @blarblablarblar
    @blarblablarblar 4 месяца назад +1

    Hi! Cool video. Just one thing to clarify, there are ways to make things zero-risk, but it usually involves making the information inaccessible to everyone including yourself, which oftentimes defeats the purpose of having the information in the first place.

    • @7alen7
      @7alen7  4 месяца назад

      @@blarblablarblar no availability, maximum confidentiality

  • @Mat-tg4fk
    @Mat-tg4fk 3 месяца назад +2

    Great video for those that want to get into the field. CS can be a thankless endeavor but its super fascinating if you find comedy in our sad world.

  • @MistaYo9221
    @MistaYo9221 Месяц назад +1

    as an IT student studying Cybersecurity, this is pretty cool

  • @coffeecat086
    @coffeecat086 3 месяца назад

    I absolutely love icebergs because a lot of them are interesting, but if you watch any sort of documentary or investigation, depending on the topic like it’s iceberg so it needs it. I just wish they would add more things sometimes that may not be as well-known.

  • @clanoftheducks1850
    @clanoftheducks1850 4 месяца назад +20

    I was doing a shot game where if I didn't know a term I had to take a shot.
    I'm sitting here at 1 am on a Friday completely sober.
    I may need to touch some grass.

    • @7alen7
      @7alen7  4 месяца назад +3

      @clanoftheducks1850 get some liquor in you brother! ASAP!!

  • @Squinkle
    @Squinkle 4 месяца назад +6

    yo just wanted to say thanks for putting the time and effort to make this video

  • @donny484
    @donny484 3 месяца назад +3

    @22:38 Bitcoin is not an anonymous banking system, every crypto exchange requires your ID and every transaction is on the ledger. The only "true" anonymous way for crypto are the ones you mine yourself and with wallets that have no connection to any PII.

  • @samrichardson3122
    @samrichardson3122 4 месяца назад +7

    @1:00:00 I believe the hacking typewriters refers to the Russian hacking of US type writers in the Moscow embassy.

    • @7alen7
      @7alen7  4 месяца назад +8

      Lol, I made the iceberg so it definitely wasn't a reference to that, but it's cool nonetheless. I'll add the update to the description, thanks!

  • @RoyalReptilePirates
    @RoyalReptilePirates 4 месяца назад +2

    Really appreciate this information, really helps kinda break everything down! You kept me interested the whole time

  • @y2kona
    @y2kona 4 месяца назад +1

    thank you for making this video! im gonna be majoring in cybersecurity engineering, so its cool to learn about the history and interesting tidbits of cybersec lore

    • @7alen7
      @7alen7  4 месяца назад +1

      @@y2kona that was my bachelor's too, best of luck man!

    • @y2kona
      @y2kona 4 месяца назад +1

      @@7alen7 fank yew!

    • @7alen7
      @7alen7  4 месяца назад +1

      @@y2kona anytime!!

  • @konjifx
    @konjifx 3 месяца назад +1

    im back here after several weeks into my cybersec training and i think im doing well because i understand most of what you're saying now 😊

  • @trueagentt
    @trueagentt Месяц назад +1

    Really great video man. Thank you

  • @diegouy8482
    @diegouy8482 2 месяца назад

    Pretty digestible video for good refreshers for exams like Sec+. It touches on Security terminology by associating them with anecdotes.

  • @cobhallagames6997
    @cobhallagames6997 3 месяца назад +12

    As a SWE, the fact that I DONT have a solid foundation in cybersecurity practices is probably not a good thing in the long run

    • @7alen7
      @7alen7  3 месяца назад +12

      You'll be fine - it's what helps keep me in business ;)

  • @BairdJonJ
    @BairdJonJ 3 месяца назад

    I have heard a bunch of every layer of the ice burg as well as a bunch I haven’t heard including on the surface layer

  • @CIPHERFLEX
    @CIPHERFLEX 4 месяца назад +2

    Good pacing, I knew everything up to black badge and I have a CISSP! great format boss

  • @phuqit4u
    @phuqit4u 4 месяца назад +2

    This is so good. Thank you for making this exceptional video about cyber.

  • @coolguy69verycool
    @coolguy69verycool 2 месяца назад

    This was great. I really want to know more about Solomon's Seal. It seems like it's just a meme and no one really talked about it much beyond that, though :(

  • @aggylyf
    @aggylyf Месяц назад

    32:40 I got really excited when you opened the video with saying I could listen in my car, because I listen to yt when I work. Why would showing text on screen so I don't have to listen to it all be appealing?

  • @Quertagon
    @Quertagon 4 месяца назад +1

    this deserves waaaay more views!
    this definitely gave me a better oversight on what to learn next as i want to work in the field myself

  • @LETSGOITOFFICIAL
    @LETSGOITOFFICIAL 4 месяца назад +1

    You did a great job with this ! Looking forward to watching more such created vids!

  • @DJKhalidCrypto
    @DJKhalidCrypto 3 месяца назад

    Dude, this is exactly my type of video to watch. Cybersecurity is a passion of mine - as a software engineer. I like the Reddit approach to talking about the lore of cybersecurity haha.

  • @SirPaulDBD
    @SirPaulDBD 4 месяца назад +1

    I can appreciate the dead by daylight playing in the background. Nice video.

  • @gerritsx9
    @gerritsx9 Месяц назад +1

    Gameplay burning my eyes

    • @7alen7
      @7alen7  Месяц назад +1

      @@gerritsx9 then close them

  • @dysphoricpeach
    @dysphoricpeach 4 месяца назад +1

    49:49 Being Turing complete is different from passing the Turing test. Being Turing complete requires the thing to be able to simulate a Turing machine. And a Turing machine is a simple machine that can implement any computer algorithm. For example, Minecraft and Conway's Game of Life are both Turing complete, but they don't really pass the Turing test.

  • @TomisaMaker
    @TomisaMaker 4 месяца назад

    So, in short, everything is hackable which reminds of: "your chance of X is small, but never 0", which is classic meme of: "so, you are telling me, there is still a chance?". Great video, btw.

  • @chappeyes
    @chappeyes 3 месяца назад +3

    49:55, Turing complete has to do with Turing machines and systems and languages! Not with the Turing test!

  • @Dark001
    @Dark001 3 месяца назад +2

    this was sick

  • @yuck871
    @yuck871 3 месяца назад

    Cool video!
    In my experience, thought the PS3 ECDSA 2011 hack was something pretty niche and e.g. the Five Eyes are pretty well known, but maybe it's different for each bubble :D

  • @outmoon2965
    @outmoon2965 4 месяца назад

    Excellent video to listen too I hope to see more long form content like this because you definitely have talent for it

  • @SPASMODICIND
    @SPASMODICIND Год назад +1

    Dude you should get in touch with Jack Rhysider and share some stories on the podcast.

  • @woaq4486
    @woaq4486 3 месяца назад

    Great video man. As a fellow security worker this was a great listen. Especially the stuff about ICS as I’m interested in pivoting towards industrial defense.

  • @Wickedesu
    @Wickedesu Месяц назад

    Love this video dude :3

  • @JR-ys7bp
    @JR-ys7bp 4 месяца назад +1

    Love this man happy to see cybersecurity getting more attention

  • @internettrash5120
    @internettrash5120 3 месяца назад

    Besides "in Minecraft" there's also "in GTA" but it's mostly used by content creators and twitch streamers to dodge potentially violating terms of service regarding the incitement of criminal acts. In GTA of course.

  • @scotthill1600
    @scotthill1600 3 месяца назад +1

    Well off the bat I’m way past insider threat level & im proud of myself for that at least. Doubt I make it much further, time to learn

  • @heavensplayer
    @heavensplayer 4 месяца назад +8

    Could you place tinfoil around your desktop to stop the NSA from using radio waves to tap into it

    • @7alen7
      @7alen7  4 месяца назад +13

      @heavensplayer you could, but if I do that then the voices stop and I run out of video ideas. Good luck to you though!

    • @heavensplayer
      @heavensplayer 4 месяца назад +3

      @@7alen7 lmfao

  • @meowbriel
    @meowbriel 4 месяца назад

    Great video! So many rabbit holes to explore from now :D

  • @thefrub
    @thefrub 4 месяца назад +2

    Your description gave me a good laugh 😂
    Too many of these "cyber" channels out there are just trying to make a buck by selling pickaxes in a goldrush

  • @Gizelle-dq8ge
    @Gizelle-dq8ge 3 месяца назад +2

    More like the Amazon Rainforest of Cybersecurity... lol

  • @everyfedk
    @everyfedk 29 дней назад +1

    "wasting time and billing hours" is wild ... 🍻

    • @everyfedk
      @everyfedk 29 дней назад

      I'm surprised you didn't mention any involvement of a three letter agency taking over Anonymous, which is why mainly they were away from the public eye... because they were pwnd. There's actually a documentary on it. #LLWeeV

  • @RJ_Games0
    @RJ_Games0 4 месяца назад

    I’ve always had an interest in the world of cyber security. It’s just so incredible what can be done! I give props to anyone that can learn this skill because this shit is hard.

  • @moistydoooood
    @moistydoooood 2 месяца назад

    i'd consider cissp and security+ the same levels. cissp is truly more towards management versus security+ being a base/general knowledge of security. cissp was hard but def not a technical exam. you also need like 5-10 years in all domains before having cissp on your resume.

  • @TopSpeedKertus
    @TopSpeedKertus 4 месяца назад

    26:45 I assume this was simply misspeak, but asymmetric encryption is really only used for the handshake and symmetric key exchange (ECDHE). Once the HTTPS connection is established, it’s all symmetric encryption (AES/ChaCha).

  • @promisinger15
    @promisinger15 Год назад +2

    Loved the vid. You have a nice channel.
    That red shirt survivor in the meat plant from @32:12 to @46:18 was SCHMIXING you though :P

    • @7alen7
      @7alen7  Год назад +2

      If I have to be honest, the juicing I was receiving had my blood boiling in that match fr

    • @delskif1425
      @delskif1425 3 месяца назад +1

      ​@@7alen7 dbd in a nutshell

  • @ivarcturus8120
    @ivarcturus8120 4 месяца назад +1

    this was an amazing source of entertainment and a resource for my career! w vid

  • @PlasmaLantic
    @PlasmaLantic 4 месяца назад +2

    you should include DEFCON/Blackhat

    • @7alen7
      @7alen7  4 месяца назад

      That's the black badge tier, I def should include more about it in the next one lol

  • @tonic316
    @tonic316 27 дней назад

    Dear SEC guys. There's a balance between security and businesses being able to function. No need to lean so hard on draconian policies that don't let businesses function efficiently.
    (And I don't mean having wide open security, etc etc).

  • @ADM.II.
    @ADM.II. Месяц назад

    Nice vid, bro 👍🏾.

  • @tigadirt
    @tigadirt Месяц назад +1

    I love how you pretended everything in this iceberg was just a theory.

  • @XYX_TV
    @XYX_TV 9 месяцев назад

    Learned a lot about Cybersecurity, nice vid!

  • @BlueSquareInWhiteCircle
    @BlueSquareInWhiteCircle 4 месяца назад +1

    53:26 Pegasus would also be worth a mention🐎

  • @LoloisKali
    @LoloisKali 4 месяца назад

    Hey big guy really good work! Much love to all the great content creators like you. I subscribed ! Sharing the love

  • @octam5409
    @octam5409 26 дней назад

    Love it ❤ 100% do another one

  • @SageApocolypse
    @SageApocolypse 4 месяца назад +2

    So this is mental outlaws spam account right? Awesome vid

  • @modernkangal
    @modernkangal Месяц назад

    I'm a little late here, but researchers found a way to copy your fingerprint by the sound it makes when sliding on your phone. Can't remember the accuracy