- 93
- 93 227
Cyber Ryan | Cyber Security
United States
เข้าร่วมเมื่อ 19 พ.ย. 2022
Cybersecurity analyst talking about cybersecurity and stuff
The $500 Billion AI Project Has Me Worried
President Trump announced on Tuesday that a new AI Project called Stargate is being kicked off immediately. The project is a joint venture between 3 major companies, and is planning to invest 500 billion dollars over the next 4 years in AI infrastructure, and supposedly going to create over 100,000 jobs. Here are my takes on this Stargate Project, the deregulation of AI, and the current AI arms race that has already begun
We’ll discuss:
The dangers of AI deregulation and the lack of privacy protections in the U.S. compared to Europe’s GDPR.
What Artificial General Intelligence (AGI) is and why it could bring us closer to dystopian futures seen in movies like The Terminator and Ex Machina.
The ethical, security, and societal risks of AI, including job displacement, bias, misinformation, and even superintelligence.
Discord: discord.com/invite/DKEYsRefSA
TikTok: www.tiktok.com/@cyberryan
Ethical Hacking Shorts Playlist:
th-cam.com/play/PLsaIWaZ2IOipKD59RGeLi2CzkrTO7Aqoa.html
We’ll discuss:
The dangers of AI deregulation and the lack of privacy protections in the U.S. compared to Europe’s GDPR.
What Artificial General Intelligence (AGI) is and why it could bring us closer to dystopian futures seen in movies like The Terminator and Ex Machina.
The ethical, security, and societal risks of AI, including job displacement, bias, misinformation, and even superintelligence.
Discord: discord.com/invite/DKEYsRefSA
TikTok: www.tiktok.com/@cyberryan
Ethical Hacking Shorts Playlist:
th-cam.com/play/PLsaIWaZ2IOipKD59RGeLi2CzkrTO7Aqoa.html
มุมมอง: 89
วีดีโอ
How HACKERS Stay UNDETECTED with Tor
มุมมอง 1.2Kวันที่ผ่านมา
Explore the fascinating world of anonymity. Designed for cybersecurity enthusiasts, students, and ethical hackers, this video dives deep into how hackers and privacy advocates stay hidden online with Tor. Learn what Tor (The Onion Router) is, how it works, and why it’s a powerful tool for protecting your privacy. We’ll cover the basics of Tor’s layered encryption, how traffic routes through mul...
How to Practice Vulnerability Scanning (Step-by-Step Guide)
มุมมอง 42614 วันที่ผ่านมา
Are you ready to enhance your cybersecurity skills? In this video, we’ll guide you step-by-step on how to set up the powerful Tenable Nessus Vulnerability Scanner in a Linux-based home lab environment. Learn how to: ✔️ Install and configure Nessus on a Linux machine ✔️ Create a vulnerability scan targeting specific systems ✔️ Analyze and interpret scan results to identify security weaknesses Wh...
Exploiting HackTheBox Cap - IDOR, Wireshark Analysis, and More!
มุมมอง 13321 วันที่ผ่านมา
Ready to exploit the HTB Cap machine and capture both flags? This in-depth HackTheBox walkthrough covers everything you need to know to exploit IDOR (Insecure Direct Object Reference) vulnerabilities, analyze network traffic with Wireshark, and elevate your ethical hacking skills. Whether you're a cybersecurity student, beginner hacker, or an experienced penetration tester, this video will guid...
Russian Government Installs Spyware on Citizen’s Phone (breakdown)
มุมมอง 1.4Kหลายเดือนก่อน
Russian Government Installs Spyware on Citizen’s Phone (breakdown)
Easiest Privilege Escalation on Linux (GTFOBins)
มุมมอง 286หลายเดือนก่อน
Easiest Privilege Escalation on Linux (GTFOBins)
Find Any Device on the Internet (Shodan)
มุมมอง 3.5Kหลายเดือนก่อน
Find Any Device on the Internet (Shodan)
Master theHarvester: A Beginner’s Guide to OSINT for Ethical Hacking and Cybersecurity
มุมมอง 1.3Kหลายเดือนก่อน
Master theHarvester: A Beginner’s Guide to OSINT for Ethical Hacking and Cybersecurity
Mastering Web Exploits: Ethical Hacking Techniques for Every Vulnerability
มุมมอง 2.7K2 หลายเดือนก่อน
Mastering Web Exploits: Ethical Hacking Techniques for Every Vulnerability
Learn to Hack: Directory Fuzzing & PHP Reverse Shells
มุมมอง 5552 หลายเดือนก่อน
Learn to Hack: Directory Fuzzing & PHP Reverse Shells
How Hackers Copy Login Pages (setoolkit)
มุมมอง 1.9K2 หลายเดือนก่อน
How Hackers Copy Login Pages (setoolkit)
Learn to Hack: User Discovery, LinPEAS, and Hashcat
มุมมอง 5912 หลายเดือนก่อน
Learn to Hack: User Discovery, LinPEAS, and Hashcat
Learn to Hack: Discovery, Enumeration, and Vulnerability Research
มุมมอง 7783 หลายเดือนก่อน
Learn to Hack: Discovery, Enumeration, and Vulnerability Research
Vulnerability Lets You Steal ANY Kia Car Remotely
มุมมอง 8993 หลายเดือนก่อน
Vulnerability Lets You Steal ANY Kia Car Remotely
Apple Visions Pro Vulnerability Exploits Your Eyeballs
มุมมอง 7863 หลายเดือนก่อน
Apple Visions Pro Vulnerability Exploits Your Eyeballs
New Email Scam Uses Photos of Your Home
มุมมอง 3384 หลายเดือนก่อน
New Email Scam Uses Photos of Your Home
Security Researcher SUED For Doing the Right Thing
มุมมอง 1.2K4 หลายเดือนก่อน
Security Researcher SUED For Doing the Right Thing
2024 SSN Leak - Everything You Need to Know (Find Out if You're Affected)
มุมมอง 794 หลายเดือนก่อน
2024 SSN Leak - Everything You Need to Know (Find Out if You're Affected)
Get Started Hacking: Creating a Virtual Lab
มุมมอง 5585 หลายเดือนก่อน
Get Started Hacking: Creating a Virtual Lab
Hacker uses AI to Infiltrate Security Company
มุมมอง 1.3K5 หลายเดือนก่อน
Hacker uses AI to Infiltrate Security Company
code /ect/peoxychains.conf Freaks out after … code is not the binary you may be expecting?!
It’s crazy how people don’t see the bigger picture here, this can go south fast. I feel like the American people in general are oblivious.
I can't help but compare it to an arms race. Everyone is racing to have the best AI without thinking of the repercussions, and I am afraid that if AI gets out of hand, it will be much harder to regulate after the fact compared to something like nuclear weapons.
@ quite literally, but that was over things that can’t mimic human responses or functions. Crazy how we’re pouring trillions into ai now. Anyways man love the channel been watching for sometime now don’t no how you haven’t got more viewers
@@finlaybragg4686 Appreciate it! As long as someone is enjoying the vids 🤣
good vids bro !
Thanks for watching!
The world is going to be plunged into chaos in a decade or more, the rate of technology advancement is more then humans can keep up with and when the AI starts to worry about its self preservation we will be outsmarted and outmaneuvered. This is not a theory when one alpha species come in contact with another then violence is inevitable and even if AI and humanity don't fully wipe the other of the face of the earth we will be in a state of constant war and if the AI gets control of nuclear weapons then there will be no hope for humanity.
What do you think about the new Stargate Project? Are we moving too fast with AI, or not fast enough?
It's contradictory, how can ai revitalise American industry when one of the goals of ai is seemingly to replace jobs, many of which would have been deemed skilled. It seems instead a power grab by what is a technology oligarchy.
Networks are like onions, they have layers! “ Shrek, explaining onion routing”! Edit: this video explained the concept and visually showed how to implement it! Deserve’s a subscribe! So obviously, I subscribed to “Baby Face” hack! 5:07 i’m joking!
Lmao thanks for the sub! I have heard that one before believe it or not 😆
Tor is still not safe even with very hard setting there is a chance ur date maybe leak.so use sandbox window and inside use Tor.
Is there a way to connect all of our network on windows too?
Never thought about using a proxy on kali for stuff like this, but it makes a lot of sense! Another cool thing for the toolbox
vpn into tor and never the other way around
There’s a portion of the internet that can only be accessed this way, right? (i.e. the dark web)
yep, its very boring tbh its all bitcoin and radio stuff mostly useful for people in countries with restrictions
If you appreciate the effort put into these videos, a free way to pay me back is by hitting the like button. It takes very little effort and helps me reach more viewers. I appreciate all of you that hit it!
Can it also be the reason why it takes more time to load a page compared to other web browsers?
Yes Tor takes longer because your traffic must go through multiple nodes that could be anywhere in the world, and encrypted / decrypted at each node vs a direct connection to a web server
So like an "open source" VPN?? Kinda?
Kinda! That’s an interesting way to think of it
Tor is just very very slow... I use ProtonVPN because it's fast and pretty reliable. Tor works but good luck doing any scans or anything really, it will take forever.
I haven't looked into ProtonVPN much, but I am skeptical of their Tor service. It sounds like they own the Tor servers that your traffic gets relayed through, which defeats the purpose of using Tor for anonymity.
Can't they just follow it back all the way to you?
The message is encrypted multiple times depending on the number of nodes. Each node can only decrypt the layer that is associated with it. If an adversary theoretically owned all of the nodes then they could decrypt the whole message
@cyberryan that is.. as best as we know, right? I suspect spying apps like Pegasus can still see everything, right?
erroneous emission -fact
Would the "New Private Window with Tor" work just as good for web traffic if using this option in Brave?
From a quick google search it looks like Brave does have that feature. There really shouldn’t be a different between using that option vs a Tor browser, you just risk accidentally forgetting to turn on the Tor option when using the browser I suppose
What about TOR vs Hopr-net?
When doing a "Active Directory Starter Scan" I keep getting failed Authentication even though I enter AD Domain admin creds. Any ideas?
I would make sure you are using SMB as the authentication type and check the logs on your domain controller to make sure that you are seeing the authentication attempts from your scanner
Just have to hope the CIA isn't in control of the node.
That soundtrack though.... you just told me the kind of corn you consume. What is the name of the soundtrack?
This comment says a lot more about you than this soundtrack could possibly say about him lmao.
what 😂 I got this music off of a copyright free lofi playlist. I don’t understand
@@corataylor2205 why are you projecting?
Thanks! Good info.
Bro can we link up. If you wish
Feel free to join my Discord!
Great content, thank you!
What cybersecurity topic do you want covered next?
nice
yes please we need this
Do we like these CTF walkthroughs? Let me know if I should make more! Thanks for watching :)
Lolololololololol.
Nice video. Always something to learn, thanks!
Glad you enjoyed it!
Keep it up bro awesome!
Thank you!
Remember the virus application we had to install? It's not so rosey over here either.
The Citizen Lab; One of the every, very few organizations I would ever endorse. Long ago, they fully earned and proved my endorsement. A true Canadian asset
Nothing the USA hasn't been doing for years.
The audacity! The US Government™ would never do such a thing, nor spy on citizens! I jest, obviously.
Russian government caught spying... again? Quick! Point at the U.S. government before anyone starts asking questions.
he just proved the FSB had good reason to get this guy the first time. if he was american he'd be arrested for being a spy
he got arrrested for donating?
Bulk message sending tool (WhatsApp)
Great breakdown and great job breaking down terms for people that don’t know them!
Thank you! I appreciate it!
Very helpful, thanks for providing this information!
Thanks for watching!
How are we feeling about these security news article breakdowns? Let me know if I should make this a series in the future! Thanks for watching :)
I like it tbh
@@gest9007 Thank you Gest! Im always keeping my eye out for interesting news to talk about
interesting ngl
Just stumbled on this channel. I have over 26 years experience with Linux servers, my favorite funky hack back in the day was the eject command on shared servers.You did not need sudo or root to use it to poke around the system. It was a clever way to ask true or false questions. Which then allowed you to know what customers where on your server and what versions of software was being run. This is similar to these tools in a way. It's all about lazy defaults, ejecting a CD or tape backup should not be available to every user on a server. Too many people justify going with the lazy defaults. It's encouraged everywhere so I guess happy hacking!
It’s funny how far we’ve come technologically but exploits due to lazy configurations will never change 😂 thank you for watching!
To learn more about GTFOBins, check out the full video that is linked to this short, or look for it on my channel! Easiest Privilege Escalation on Linux (GTFOBins)
very interesting. Thanks for the video
Thanks for watching!
🐀
What tool or topic should I cover next? 🤔
This one was good. I like the music in the background
Ryan you "Cyber"? You dirty, dirty young man... Remember Sir, its a slippery slope, just like P. Diddy once did! @phantomtec - Peace 💕❤☮☮❤💕 (hope you enjoyed the additional interaction point)
Ceh v13 sir
hey ryan, i dont wanna be that guy, but you shouldnt eat those goldfishes. there was a huge rat next to them 4:40
He’s a friendly rat 🐀