Why Hacking is the Future of War

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 3.3K

  • @johnnyharris
    @johnnyharris  9 หลายเดือนก่อน +303

    Use code JOHNNYHARRIS at the link below to get an exclusive 60% off an annual Incogni plan: incogni.com/johnnyharris

    • @parillo12
      @parillo12 9 หลายเดือนก่อน +21

      why not 69% off.... just asking the real hard question no one is asking....

    • @El_Cyclista_Desaparecido
      @El_Cyclista_Desaparecido 9 หลายเดือนก่อน

      Wtf ? I can’t comment because of the ad’s . So you are saying that these new cyber weapons are mutual deterrence just like nuclear bombs due to the fact that we have them pointed at them as they do us. The internet is so open how could it not be true. Even the CCP is hacked into .

    • @onepiecebarca
      @onepiecebarca 9 หลายเดือนก่อน

      Read about Iran's cyber attacks on Albania. It has been going on for years now and every now and then they steal super sensitive data and publish it for free online because Albania is hosting a group of iranians that are against the Iran government. Every personal detail of every person in Albania is exposed. But you need to read about it yourself there is much more to the story

    • @sickomode6440
      @sickomode6440 9 หลายเดือนก่อน +16

      That was the fastest title change I've seen on TH-cam. Did the feds threaten you to change it. Blink twice if you need help 💀💀
      Edit: He did it again lmao 💀💀

    • @BlackCeII
      @BlackCeII 9 หลายเดือนก่อน +4

      The guy who leaked the NSA hacking tools has already been charged and incarcerated

  • @williemaxt
    @williemaxt 9 หลายเดือนก่อน +5686

    As a senior software engineer working in the cyber security space. The castle analogy is one of the best explanations I've heard in a while. I'll be using this to explain these to people in the future

    • @cryingwater
      @cryingwater 9 หลายเดือนก่อน +44

      I believe using a house is much better. It's more relatable

    • @blackfoxstudioX
      @blackfoxstudioX 9 หลายเดือนก่อน +176

      @@cryingwater Actually Castle-and-moat analogy model is widely know among those working with network security.

    • @cryingwater
      @cryingwater 9 หลายเดือนก่อน +19

      @@blackfoxstudioX House feels more personal and easier to understand for the layman

    • @faithfulnesstech
      @faithfulnesstech 9 หลายเดือนก่อน +111

      @@cryingwater a home or house is usally much smaller than a castle, and comparing small sites to really big sites is actually not relatable.
      If there's a crack in your home, you'll easily find out,
      but if there's a crack in a castle, it would take long before you find out, cos you cant be everywhere in a little space of time

    • @cryingwater
      @cryingwater 9 หลายเดือนก่อน +5

      @@faithfulnesstech Not necessarily. I'd argue there's lots of cracks hidden behind walls. There's a reason rats get into houses without prior notice. There's probably like

  • @mirceacelbatran1107
    @mirceacelbatran1107 9 หลายเดือนก่อน +1503

    Cyber warfare is cruel. Romanian hospitals recently got attacked via ransomware and many hospitals are unoperable. For instance, my mum suffers from cancer and she had to do her treatment tomorrow, 15th of February, but she can't because the system got hacked...

    • @TylerBigHead
      @TylerBigHead 9 หลายเดือนก่อน +156

      Jesus, prayers for your mother and her treatment

    • @ProjectPatKing
      @ProjectPatKing 9 หลายเดือนก่อน +62

      Wow that's happening real time in sorry to hear that. I'll pray for your mom. ❤😢

    • @JayLim-bn9fh
      @JayLim-bn9fh 9 หลายเดือนก่อน +23

      sorry for your mum

    • @Yourkue
      @Yourkue 9 หลายเดือนก่อน +21

      I am sorry you had to feel the grips of this problem that not enough people talk or care about.

    • @tylerclark2785
      @tylerclark2785 9 หลายเดือนก่อน +24

      My mum also has cancer. Praying for yours.

  • @greghodges2116
    @greghodges2116 9 หลายเดือนก่อน +423

    Back in the 1990s I met a guy who got busted by our university for hacking into the campus computer network. He was given an ultimatum, get expelled or work at the university in the IT department. He took the job but grumbled a lot about the workload. I suspect the USA has hired some hackers in the same way.

    • @garlicsaucespill9482
      @garlicsaucespill9482 7 หลายเดือนก่อน

      There’s been numerous sites on the dark web that seem to challenge people to hack them. It’s highly believed to be someone looking for excellent hackers to hire. I’ve heard speculation the government is looking for hackers before. It makes sense, why wouldn’t they?

    • @car3719
      @car3719 6 หลายเดือนก่อน +16

      Look up the story of the hacker Gummo. If he’s telling the truth, then it’s happened.

    • @NN-oz6rr
      @NN-oz6rr 5 หลายเดือนก่อน +52

      They have done that. Putting these brilliant minds in prison is a waste of their talent and skill sets. Better to give them a slap on the wrist and offer them a high-level job. Decent pay, benefits, interesting work, etc.

    • @o1-preview
      @o1-preview 5 หลายเดือนก่อน +18

      lucky, i only got the option to show how I did it. I asked for free tuition or working for them and they rejected both. Didn't get any punishment, just a 'mark zuckerberg' meeting with all the founders.

    • @eboy4216
      @eboy4216 4 หลายเดือนก่อน +2

      @@o1-previewwait and we’re they going to expel you if you didn’t show it to them?

  • @jameshughes6078
    @jameshughes6078 9 หลายเดือนก่อน +1079

    Nitpick:
    1. Not all vendors have bug bounties anywbere near what google/apple pays out
    2. Sometimes google/apple try not to pay out
    3. Black hat pays much better (which was covered in the video), like 100x more in some cases
    4. Sometimes white/grey hats get flamed or threatened with lawsuits on disclosure, or get the ring around in the pre disclosure period as the company does nothing
    Sorry to only throw mud but security posture and whistleblower peotection are things i'm passionate about improving

    • @felixjochems1238
      @felixjochems1238 9 หลายเดือนก่อน +69

      Yeah if any American company doesn't have a CVD statement, don't even bother. You're more likely to get sued than getting a thank you email

    • @IndelibleNihilist
      @IndelibleNihilist 9 หลายเดือนก่อน +35

      Exactly. Not everyone stays “blackhat” out of malicious intent… yet due to a simple fact that we too must eat.

    • @CormacHolland
      @CormacHolland 9 หลายเดือนก่อน +11

      Good to hear someone working toward protecting us all, thanks man.

    • @RicardoMontania
      @RicardoMontania 9 หลายเดือนก่อน +4

      Improve your writing! You have several typos.

    • @houseplant1016
      @houseplant1016 9 หลายเดือนก่อน +4

      Wait what seriously? C....comp...companies are greedy?

  • @godgige
    @godgige 8 หลายเดือนก่อน +228

    I am network engineer and boy believe me there are attacks happening all over the place all the time. Either by bots or on some specific service in our datacenters. Its constant at this point.

    • @InfoSecMafia
      @InfoSecMafia 6 หลายเดือนก่อน +5

      Good 4 u, NOC

    • @jawwadsabir4620
      @jawwadsabir4620 2 หลายเดือนก่อน +11

      Im a network engineer too and boy believe me, we are just holding dams by straws. I cant even begin to talk about how sophisticated and genius these attacks are. Its just a war between extremely talented ADHD fueled software nerds.

    • @someidiot4311
      @someidiot4311 2 หลายเดือนก่อน +2

      @@InfoSecMafia you do realize this is a comment about cybersecurity on a video about cybersecurity, right?

    • @lockhart1895
      @lockhart1895 หลายเดือนก่อน

      @@jawwadsabir4620😭😂

    • @RafaelSilva-c9w
      @RafaelSilva-c9w หลายเดือนก่อน

      Yeah, everytime you put a new system online it started to be scanned to the more common vulneralibities systematically
      Its not like you need to commit a mistake to get a system hacked, you just need to not do the right thing one time and youre fucked,
      i worked in the telephony provider field and one day testing something an engineer left the password as a easy password, like p@ssword, made his test, and finnish his shift and went home forgetting to streightning the password back, at morning the telephony provider was 100 thousand dolars indebted with fraudlent calls

  • @r.s.fletcher7066
    @r.s.fletcher7066 27 วันที่ผ่านมา +7

    I'm still a Software Engineer student in training, and whilst an uncomfortable amount of this news only barely scrape the surface - we haven't even gotten into the threat of future quantum computer operations yet. The fact that my modules for next year have already changed to accommodate more against cybersecurity threats, now including Quantum Threats, after the South African government suffered an attack on home affairs, comes to show how rapidly this landscape is evolving

  • @thumpertorque_
    @thumpertorque_ 9 หลายเดือนก่อน +474

    This video is more engaging than most sci fi movies because it’s non fiction and Johnny’s ability to narrate and edit serious topics. Any software engineer/ cyber security student should watch this.

    • @jaskaasi
      @jaskaasi 9 หลายเดือนก่อน +6

      well this is partly fiction, it was a water pump installed by erik von sabben at that facility. who died in a motorcycle accident 2 weeks after the installation in UAE.

    • @RoswellianGeorgia
      @RoswellianGeorgia 9 หลายเดือนก่อน +10

      Yeah it's a lot of fiction. Johnny is making assumptions that aren't verified. He acts like he's against something but really all he's standing for is trying to make money.

    • @samstromberg5593
      @samstromberg5593 9 หลายเดือนก่อน

      Seriously, my guy could make CHEMISTRY interesting

    • @jaskaasi
      @jaskaasi 9 หลายเดือนก่อน

      @@samstromberg5593 it wouldn't be chemistry if harris made a video. It would be pure fiction/alchemy video

    • @lzc561
      @lzc561 4 หลายเดือนก่อน

      Agreed. But I think our Military needs to fix their rape crisis if they want a good future. I not only know guys that got raped in real life but the DOD even reported that for year 2022 an average of 45 men and 53 women get raped/sexually assaulted EVERY DAY around the US Military

  • @brilliantroads
    @brilliantroads 9 หลายเดือนก่อน +727

    Fun fact: Recently, a research by a journalist of De Volkskrant in the Netherlands showed that it was a Dutch/Iranian citizen who brought Stuxnet physically into the factiory and installed onto the computers there. It was a collaboration with the AIVD (Dutch intelligence services).

    • @VictorKing144
      @VictorKing144 9 หลายเดือนก่อน +155

      He was not a Dutch/Iranian citizen, he was a Dutch citizen with an Iranian wife. He also died 2 years after the operation in a car accident in Dubai. The Dutch government did not know of this operation at all and even the AIVD, who helped the Americans/Israelis by recruiting him, were not informed that he would be used to implant the virus into the factory. Every single detail of this story sounds fishy to me.

    • @JurisKankalis
      @JurisKankalis 9 หลายเดือนก่อน +3

      KHAN

    • @thegamingwolf5612
      @thegamingwolf5612 9 หลายเดือนก่อน +8

      ​@@VictorKing144 why would they let a dutch national into a factory like that

    • @Korilian13
      @Korilian13 9 หลายเดือนก่อน +57

      ​@@thegamingwolf5612 because they need trained engineers and they had no concept that anything like Stuxnet was possible.

    • @DaDenzelWashington
      @DaDenzelWashington 9 หลายเดือนก่อน

      I got another fun fact.
      The hacking of USA elections and leaking of clintons data was discovered by Dutch intellence who stumbled upon a hackergroup called cozybear. They hacked the group and found out they worked from the kremlin.
      Reported by the volkskrant also

  • @hansmueller4438
    @hansmueller4438 6 หลายเดือนก่อน +23

    I think stuff like this should get a lot more views, so many people are way too ignorant of the dangers of the tools they opt into for no reason that more awarness is crucial to make everyone saver tomorrow.
    Cybersecurity is important and we need to starting treating it like it is.

  • @chupasaurus
    @chupasaurus 9 หลายเดือนก่อน +553

    A side note everyone misses: WannaCry and NotPetya used a vulnerability in Windows that had a fix 1/3 months before the initial deployment respectively. The simple variant of this exploit was founded back in 2009 with Microsoft's employee stating in personal blog that they put a duck tape over a hole in Hoover Dam, the "fix" 8 years later just disabled the vulnerable part completely.

    • @zisaizic4759
      @zisaizic4759 9 หลายเดือนก่อน +38

      Not sure if it's explicitly stated in the video, but that vulnerability is exactly EternalBlue. The NSA has been keeping it secret for some time for their own use. Microsoft found out about it and started patching it when it was eventually leaked by the shadowbrokers, but by that point it was too late, given how powerful it was and how hard it is to update all the vulnerable computers, especially government infrastructure ones.

    • @staylit133klahts3
      @staylit133klahts3 9 หลายเดือนก่อน

      All very interesting and yet also concerning our government cyber weapons were leaked to everyone.. its hard to grasp if your sumone like me

    • @RoofusRoof19
      @RoofusRoof19 9 หลายเดือนก่อน

      Fun fact most of windows is just useless services put there by microsoft. The reason windows takes up 3gb of ram and linux takes up 300mb is because of these "services" microsoft puts in there

    • @BrendanClements
      @BrendanClements 9 หลายเดือนก่อน +15

      An unfortunate pattern that persists to this day. Microsoft has frequently released patches that don't fix the vulnerability, but render the proof-of-concept nonoperational. The person who found the Microsoft Exchange vulnerability was able to tweak his code to use the same exploit after multiple patches.

    • @watchinvids155
      @watchinvids155 9 หลายเดือนก่อน +6

      Honestly, that kind of screw up makes me wonder, did Microsoft leave this vulnerability in place intentionally? There's a precedent for the NSA using big tech companies as a platform for spying (see the Ed Snowden leaks and the PRISM program). Wouldn't be that much of a leap to have some sort of handshake agreement on some sort of vulnerability like this.
      Then again, knowing how most companies work, they'd be too incompetent and divided to pull it off and the more likely culprit is that a proper fix was too difficult/expensive to implement so they just closed their eyes, ignored it, and hoped it wouldn't come back to bite them in the rear end.

  • @ClifBratcher
    @ClifBratcher 9 หลายเดือนก่อน +485

    Very few great infosec folks work for the US government directly. The private sector pays WAAAY more and there's much less regulation. It also gives the public sector plausible deniability.
    Btw "APT" (advanced persistent threat) is the term for what you're referring to at the end. They're a pretty big signature of a nation-state.

    • @sundhaug92
      @sundhaug92 9 หลายเดือนก่อน +10

      Also worth noting "APT" originally meant "Asia-Pacific Threat" (China)

    • @joshiabirdb
      @joshiabirdb 9 หลายเดือนก่อน +4

      The government contracts private organisation for this. They don't be making it all on their own

    • @naziajahan1657
      @naziajahan1657 9 หลายเดือนก่อน +6

      @johnny harris the zero day comparison for Bangladesh bank money heist is not the same. Over simplifying things are not a good journalism. Swift system in the heist was indeed a bulletproof system.

    • @antarcticpenguin42069
      @antarcticpenguin42069 9 หลายเดือนก่อน +1

      I swear I read APT as "Advanced Packaging Tool" then I watched the entire video and realized this

    • @leodler
      @leodler 9 หลายเดือนก่อน +3

      The people working within tailored access operations absolutely should be considered "great" relative to their peers across the industry, along with the developers of tools like Ghidra.

  • @laurenv1223
    @laurenv1223 7 หลายเดือนก่อน +4

    I LOVE the revenue split if we use Tom's music. That's so unbelievably reasonable. I might try to find him on the web and ask him licensing questions. You and your whole team are so awesome!!

  • @FacterinoCommenterino
    @FacterinoCommenterino 9 หลายเดือนก่อน +4426

    Today's Fact: The oldest continuously inhabited city in the world is Damascus, Syria, which has been inhabited for over 11,000 years.

    • @nikkosstorychannel
      @nikkosstorychannel 9 หลายเดือนก่อน +101

      Thought it was jericho

    • @nikkosstorychannel
      @nikkosstorychannel 9 หลายเดือนก่อน +193

      Damascus is a wasteland at this point

    • @ritvikgaba__
      @ritvikgaba__ 9 หลายเดือนก่อน +122

      Bro the 15 min video is released just a minute ago and you already have a opinion about it?😭

    • @felixfonalledas893
      @felixfonalledas893 9 หลายเดือนก่อน +18

      @@ritvikgaba__:Well,it seems tat some people are quite fast!

    • @Dr.SyedSaifAbbasNaqvi
      @Dr.SyedSaifAbbasNaqvi 9 หลายเดือนก่อน +77

      Jerusalem is the second and Varanasi in India is the third in that ranking.

  • @elmerp
    @elmerp 9 หลายเดือนก่อน +755

    The castle animation is the sort of thing a movie would have to show the hackers are getting in.

    • @HeyJuuude-05
      @HeyJuuude-05 9 หลายเดือนก่อน +86

      *frantic keyboard-typing-noises
      Followed by the famous phrase: “I’m in.”

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 9 หลายเดือนก่อน +13

      They took this idea from Google's zero day series..

    • @kingace6186
      @kingace6186 9 หลายเดือนก่อน +6

      It felt like I was watching a spy movie😎🔍

    • @SuperCatacata
      @SuperCatacata 9 หลายเดือนก่อน +2

      Best hacker analogy is from Kung Fury
      Guy surfing his keyboard 😂

    • @Yourkue
      @Yourkue 9 หลายเดือนก่อน +4

      ​@@HeyJuuude-05 He's in the mainframe!!

  • @puneet7768
    @puneet7768 9 หลายเดือนก่อน +238

    dude has changed the title and the thumbnail almost 4 times, was struggling a bit to find the video in my watch later list lol

    • @benayers8622
      @benayers8622 8 หลายเดือนก่อน +3

      frfr

    • @Raderade1-pt3om
      @Raderade1-pt3om 8 หลายเดือนก่อน +3

      It convinced me to watch

    • @furanduron4926
      @furanduron4926 8 หลายเดือนก่อน +6

      Why do people do this?

    • @bilbojenkins5923
      @bilbojenkins5923 8 หลายเดือนก่อน

      because this is also a form of psyop@@furanduron4926

    • @jeffrey7063
      @jeffrey7063 8 หลายเดือนก่อน

      @@furanduron4926it’s called A/B testing. Trying different combinations of title and thumbnail to measure which get high click rates and increase the reach of the video.

  • @xliquidflames
    @xliquidflames 9 หลายเดือนก่อน +287

    Yes, use 2FA and keep your stuff updated but the most important thing is: backup, backup, backup. I've never had one of my computers hit with random ware but my family has. And I fixed it by just rolling back the computer to a previous backup. If you backup your data, it doesn't matter what they do to it. You can just recover it from backup. I keep 3 copies of everything. When I shut down my computer, before it turns off, a script runs to copy the entire hard drive to a compressed, encrypted single file. That file gets transferred to an external hard drive, a cloud storage drive, and secondary hard drive in the same computer. Not only does it protect your data from hackers but it also protects it from hardware failure or a disaster like a house fire or something. Backup your data.

    • @tomaszkarwik6357
      @tomaszkarwik6357 9 หลายเดือนก่อน +40

      3 2 1 is THE RULE of backups. 3 copies. On 2 mediums (ie. One on a hard drive and one on tape). And 1 off site

    • @lexp6589
      @lexp6589 9 หลายเดือนก่อน +14

      as someone with only intro level coding experience, how could i find a script for this?

    • @IbruBoss_no1
      @IbruBoss_no1 9 หลายเดือนก่อน

      @@lexp6589use chat gpt with python or powershell.

    • @abbasuccess3155
      @abbasuccess3155 9 หลายเดือนก่อน +2

      How do I go about this?

    • @ryoukaip
      @ryoukaip 9 หลายเดือนก่อน +1

      do you have the name of the program?

  • @diegomarconi524
    @diegomarconi524 9 หลายเดือนก่อน +378

    The analog oscilloscope behind you connected to the microphone is fantastic

    • @izzynobre
      @izzynobre 9 หลายเดือนก่อน +13

      Took me a while to realized it was! Glad to see I’m not the only one

    • @satishkarki3020
      @satishkarki3020 9 หลายเดือนก่อน +6

      I was about to mention the same.

    • @dan1948
      @dan1948 9 หลายเดือนก่อน +6

      Glad im not the only one lol
      Johnny:
      My brain: "wait is that oscilloscope synced with his voice? Coooooooool"

    • @Rob-mi4jp
      @Rob-mi4jp 9 หลายเดือนก่อน +1

      Tame Impala did this during innerspeaker/lonerism tours with his guitars.

    • @kingace6186
      @kingace6186 9 หลายเดือนก่อน +2

      Yes. Very aesthetically pleasing. I like how immersive his desk setup is.

  • @juanpiss
    @juanpiss 9 หลายเดือนก่อน +48

    i've seen johnny change the title and thumbnail of this video exactly 5 times by now

    • @onakoyatemitayo9915
      @onakoyatemitayo9915 9 หลายเดือนก่อน

      Same here, and I wonder

    • @PillarsofFreedom24
      @PillarsofFreedom24 8 หลายเดือนก่อน +2

      👀 i know. Might have to do the same. He might be doing some A/B live testing 😂

    • @chrisdavisunofficial
      @chrisdavisunofficial 8 หลายเดือนก่อน +2

      He's likely not changing anything. The bigger channels have an A/B testing features in TH-cam.

    • @panzerveps
      @panzerveps 8 หลายเดือนก่อน

      They do this if the video isn't getting the traction they expect. Veratasium did a video on it a couple of years ago.

    • @Virtual_Real_Estate
      @Virtual_Real_Estate 6 หลายเดือนก่อน

      That's because this man has no clue what he's talking about and TH-cam is a platform mainly aimed at entertainment and this video disregarded all scientific geopolitical factual evidence

  • @bloom5086
    @bloom5086 9 หลายเดือนก่อน +368

    I remember "Petya" virus hits us when I was in university, it caused a lot of panic back there. You mostly was put in a hard choice like "do I turn on my PC to save my files risking getting this virus or do I just wait and hope for the best"

    • @__nog642
      @__nog642 9 หลายเดือนก่อน +70

      You could just disconnect your PC from the internet before turning it on, if it was a wired connection. You could take out the wireless card if you were really worried and were using wifi.

    • @bloom5086
      @bloom5086 9 หลายเดือนก่อน

      @@__nog642 Yeah. Well, I remember I didn't have anything important on my PC so just not turning it on was the best idea

    • @armanx2
      @armanx2 9 หลายเดือนก่อน

      @@__nog642 You know for a code to execute it does not necessarily need the internet, all it needs is a terminal basically and it will execute commands.

    • @bobgatewood5277
      @bobgatewood5277 9 หลายเดือนก่อน

      ​​​@@__nog642 dude's acting like there was some sort of "cyber-pandemic" lol
      You could, you know, format a computer and give it a clean slate. Don't install any of the internet card controllers, so it can never access anything on the web, then connect the HDD/SSD (that has the sensitive information, be it internal or external) and download all desired data and files into that isolated PC.
      There, your files are absolutely safe from any malware and you can access them, without worrying about that particular PC, ever being invaded.
      P.D: for an extra level of defense, learn how to partition storage drives and how to encrypt files. AES256 is currently, still a pretty safe and fiendishly difficult cypher to crack.

    • @JustAnotherAccount8
      @JustAnotherAccount8 9 หลายเดือนก่อน

      @@__nog642 Your PC might already have the virus though, and by turning it on, you're giving it the chance to proliferate.

  • @bladej7688
    @bladej7688 9 หลายเดือนก่อน +66

    The difference between cyber warfare and conventional warfare is that cyber attacks can come from anyone. Hackers or Hacker groups not associated with any nation can and do create malicious software as well. Governments have more resources, but a zero day vulnerability can be exploited by anyone.

  • @bittukumarAb
    @bittukumarAb 5 หลายเดือนก่อน +1

    The efficiency of Adrian Ruthnik is next level. Managing walkthroughs from various angles with such clarity is remarkable. Making complex topics easy to understand is really something. Awesome work!

  • @AGENTX506
    @AGENTX506 9 หลายเดือนก่อน +35

    What's not stated clearly enough in the castle metaphor is that essentially everyone uses the same blueprints to build their castle. >90% of people use Windows, and >90% of servers use Linux. In this sense cyberwarfare has this odd symmetry to it: Developing new attack methods often exposes vulnerabilities in your own systems, but in order to patch your own vulnerabilities you must often report them to the developer, for example Microsoft, who will then roll out a fix to *everybody*, including your opponent.
    Then remember that world powers often sit on exploits like these, rather than reporting them. Evidently, multiple people in power sat down and decided that holding on to an exploit to attack some theoretical future enemy was worth more than protecting their own people, hospitals, and power grids from real, known threats.

    • @jdqwerty
      @jdqwerty 3 หลายเดือนก่อน

      Vulns can be very complex and require a lot of conditions to exploit - for example recent regreSSHion vuln where very specific time requirements need to be met. This is not likely be stumbled upon by two different independent researchers and exploits could be coded to look for conditions like regional registry of the IP to target certain states.
      But 100% get your point - discovering a vuln creates opportunity for offense but then you have to weigh up the potential damage that could be done to yourself and if it should be raised for patching (You could also consider workaround patches that could be distributed confidentially to critical infrastructure however this will likely lead to leaks and increase likelihood of other researchers discovering vulnerability - very interesting). This is why I like the fact that a lot of security researches disclose publicly after 90 days of private disclosure even tho majority of sec people protest that it arms script kiddies to do monumental damage to hospitals etc but prevents nation states for holding onto vulns, that are discovered independently, for future leverage in wars or political gain.
      In light of the CrowdStrike stuff and how much damage it caused -I wonder if governments would call on companies like Microsoft to disable functionality for devices in enemy states.
      Really good video tho and has opened up my eyes a bit working in secops about the potential future - no wonder theres loads of schemes to encourage younger people into cyber coming from western governments.

  • @danteregianifreitas6461
    @danteregianifreitas6461 9 หลายเดือนก่อน +153

    gotta appreciate the fact that Johnny actually plugged a microphone into the oscilloscope just to make a small detail in the background

    • @spondoolie6450
      @spondoolie6450 9 หลายเดือนก่อน +2

      Yeah, but now they Russian heckers know his electronic voice signature 😳

    • @duncan.o-vic
      @duncan.o-vic 9 หลายเดือนก่อน +6

      No he didn't, like he said in the end, it was his sound guy who did it and Johny thought it was magic.

  • @Iam.Dilnawaz
    @Iam.Dilnawaz 5 หลายเดือนก่อน +4

    Thank you, Adrian Ruthnik, for your help. Although the video tutorial was challenging, your guidance was invaluable. I appreciate your efforts.

  • @muelleer
    @muelleer 9 หลายเดือนก่อน +49

    Fun fact, the hack at 13:35 ment the saudi oil company had to buy massive amounts of hard drives, massively inflating the global price for a hard drives for a while because it caused a shortage.

  • @clydekaila123
    @clydekaila123 9 หลายเดือนก่อน +30

    Fun Fact: They actually made away with the money from the Bangladesh Swift job and have never been caught since..leaving behind an unsuspecting Filipino bank teller who got imprisoned for the crime..

  • @ReverseCity777
    @ReverseCity777 8 หลายเดือนก่อน +14

    Been in IT for over 20 years. Great video. 2FA can be bypassed very easily. Everything you mentioned is public knowledge but there is so much underground under the table info missing.

  • @TheQuallsing
    @TheQuallsing 9 หลายเดือนก่อน +89

    I normally just listen to youtube videos in the background while playing games on my PC. This is one of those few type of videos where I just have to pause the game and really watch it. I love your content. So interesting and captivating topics, fantastic graphics and music.

    • @bloodlove93
      @bloodlove93 9 หลายเดือนก่อน +1

      same here
      i don't understand people who actually watch most videos, like what are you watching? their mouth moving?

    • @Blueice294
      @Blueice294 8 หลายเดือนก่อน

      While playing fortnite

  • @Crashing_CSS
    @Crashing_CSS 9 หลายเดือนก่อน +178

    The software castle animation was mind blowing------- i just love the editing- it just keeps on getting awesome with every video-- i am so jealous

    • @codycast
      @codycast 9 หลายเดือนก่อน +4

      It’s a wireframe castle. Settle down.

    • @Crashing_CSS
      @Crashing_CSS 9 หลายเดือนก่อน +1

      @@codycast yeah I didn't know what's it's called but I liked it.

    • @ninjabreadgirl
      @ninjabreadgirl 9 หลายเดือนก่อน

      ​@@codycastoi, let people get excited about things

  • @priyambadaswain8931
    @priyambadaswain8931 5 หลายเดือนก่อน

    We need more wise and compassionate individuals like you, Adrian Ruthnik. Your support arrived at the perfect moment, and your contributions are deeply appreciated.

  • @andrewweaver2517
    @andrewweaver2517 9 หลายเดือนก่อน +92

    This is amazing. I didn't want this episode to end. There is so many juicy stories like this. Even though it affects me and is like a train wreck. I want to hear more. I cant look away.

    • @RickyKissoon
      @RickyKissoon 9 หลายเดือนก่อน

      Listen to dark net diaries

    • @Rozenkratz
      @Rozenkratz 9 หลายเดือนก่อน +4

      If you like podcasts check out Darknet Diaries, this video was basically a recap of some of their best episodes.

    • @margaretbrown8627
      @margaretbrown8627 6 วันที่ผ่านมา

      To really shake things up, we should get a redemption arc for anonymous😂

  • @piotrgeist
    @piotrgeist 9 หลายเดือนก่อน +47

    I've been following Johnny's work since his stunt at Borders... never been dissapointed. Wonderful job in making me wanna go change my passwords, store cash in a dark drawer and alleviate my fear of nuclear war. Keep it up!

    • @Zelazella1
      @Zelazella1 9 หลายเดือนก่อน +1

      Just write everything important on paper

  • @Anime.art_961
    @Anime.art_961 5 หลายเดือนก่อน +2

    Your time and effort in this excellent work are deeply appreciated. I had difficulties with the selfie due to a captcha error, but I will ensure the world knows about your good deeds. Thank you, Adrian Ruthnik.

  • @iPadChannel
    @iPadChannel 9 หลายเดือนก่อน +58

    I like the fact that your oscilloscope responds to your voice prompt when you speak. Subtle, but a very smart touch of creativity.

  • @Viviko
    @Viviko 9 หลายเดือนก่อน +95

    As a software developer myself, I have to commend you on the castle analogy. Very accurate (all things considered).

    • @eeyore345
      @eeyore345 9 หลายเดือนก่อน +4

      Hmm .. Maybe not quite. Castles with windows / doors are deliberately left there. When we do build SW, most of us do not deliberately leave holes to be exploited, unless they are infiltrated by bad actors.
      I think it's more like when you pour concrete, there are air bubbles, if they are not well-settled (terminology), then you ended up having a small tiny hole that could get thru the wall.

    • @Aussie-boi
      @Aussie-boi 9 หลายเดือนก่อน

      I’m so jealous that you can understand how to code. My brain just can’t process the lines of code. Some people I guess can’t learn that stuff 😢

    • @silenttripmine4230
      @silenttripmine4230 9 หลายเดือนก่อน

      ​Holes as is Doors or Windows can be seen as Users accessing your frontend of the software, since as a "guest" youre not allowed to access every room. But analogies can also be overanalysed ^^" ​@@eeyore345

    • @Coral_pepe
      @Coral_pepe 6 หลายเดือนก่อน +1

      @@Aussie-boi just keep trying dude

  • @jdjohnson158
    @jdjohnson158 8 หลายเดือนก่อน +14

    If you get a quantum computer with enough compute then all the gates are locked and whoever wins the race locks everyone else out of the castle.

  • @MechPaul
    @MechPaul 9 หลายเดือนก่อน +30

    I have worked in antivirus for the last 12 years. This video nails all the key points. Very well done video.

    • @User9681e
      @User9681e 9 หลายเดือนก่อน +2

      Then help me understand what is the point of a software that waste IO , cpu cycles , ram etc and increases attack surface with it's extraction of malware for behavior , signature analysis to it having root perms
      I don't use anti viruses almost at all any reason to even use those ?

    • @doufmech4323
      @doufmech4323 9 หลายเดือนก่อน +2

      There is not mucv reason to use antivirus software

    • @hazeljust7001
      @hazeljust7001 9 หลายเดือนก่อน +1

      @@doufmech4323who told you this? Antivirus is basic internet protection. Like a seatbelt.

    • @doufmech4323
      @doufmech4323 8 หลายเดือนก่อน

      @@hazeljust7001 wrong. Antivirus really doesn't help that much. Most anti virus will not even be able to mitigate malicous websites or ads. It just wastes performance and honestly acts like malware itself. Basic internet protection is adblock.

  • @ManoharOfficial
    @ManoharOfficial 9 หลายเดือนก่อน +22

    I just love that you cut up headphones and wired it into the oscilloscope for a waveform.... great production design Nick and Alex!

  • @Nancysinghdancer
    @Nancysinghdancer 5 หลายเดือนก่อน

    As a Maldivian living in the UK, I despise these scammers. It warms my heart to see efforts like Adrian Ruthnik's. Keep up the excellent work.

  • @GTaichou
    @GTaichou 9 หลายเดือนก่อน +53

    Some of these smaller attacks are exactly what cold/warm war is - little indications that "yes, we're here, and we can do this to you." And all of these developments are the reason why I am less and less on social media. If the internet is the new warzone (especially with botnets running influence schemes) then my most powerful move is to shut them out. I do not need to live my life in a war zone.

    • @a.b.8606
      @a.b.8606 9 หลายเดือนก่อน

      Well said,
      I keept pushing the same agenda for years, but unfortunately, it is always ignored 😮

    • @thewhitefalcon8539
      @thewhitefalcon8539 9 หลายเดือนก่อน +7

      If you have a bank account you're on the Internet

    • @lorenabueno8620
      @lorenabueno8620 9 หลายเดือนก่อน +3

      It’s other things too like bank info, gov agencies you’ve possibly applied to
      Ssi
      Ui
      Medicare/medicaid

    • @GTaichou
      @GTaichou 9 หลายเดือนก่อน +3

      I'm aware other things are on the internet. I just don't need to have my eyeballs glued to it. The rest can be planned around.

    • @BruhNo-e4l
      @BruhNo-e4l 9 หลายเดือนก่อน

      ​@@thewhitefalcon8539better buy you're net worth in gold and penny pinch at this point

  • @Kaputznefreble
    @Kaputznefreble 9 หลายเดือนก่อน +55

    Most important: Shadow brokers are people that used to play Mass Effect

  • @Habeeb6106
    @Habeeb6106 5 หลายเดือนก่อน +2

    Respect should not be underestimated. Your mature and thoughtful actions are commendable. Thank you, Adrian Ruthnik.

  • @MrGlitch888
    @MrGlitch888 9 หลายเดือนก่อน +23

    He listened and is at least trying videos with no excessive background music. Much Thanks :-). Also makes creating videos simpler

  • @osamudiameh_sama
    @osamudiameh_sama 9 หลายเดือนก่อน +39

    As a software developer,this was really a great and enjoyable video. The castle analogy is spot on and the geopolitics of it all is really interesting and informative

  • @ZERODAY8
    @ZERODAY8 8 หลายเดือนก่อน +2

    Make a part 2 about this documentary, it was superb

    • @johnnyharris
      @johnnyharris  8 หลายเดือนก่อน +1

      Wow thanks!

  • @davidkovar7486
    @davidkovar7486 9 หลายเดือนก่อน +29

    Thank you for the video, Johnny. I really appreciate what you do. Each of your videos gives me a new kind of perspective on the world, its connections, functionality, dependencies, and geopolitics. Many people aren't even aware of things like cyber warfare or the hidden files waiting for their time to disrupt the infrastructure, thus making them more vulnerable to these kinds of attacks. You and your team are doing great work!

  • @szarmeign1723
    @szarmeign1723 9 หลายเดือนก่อน +21

    This is more than we can ask for. Kudos to the production team and researcher. especially to Mr. Johnny!

  • @peterbainard
    @peterbainard 5 หลายเดือนก่อน +18

    Johnny! No shoutout to Darknet Diaries / Jack Rhysider? He’s covered all of this years ago. Would highly recommend to anyone that finds this interesting.
    Episodes that cover what Johnny is talking about (in greater detail):
    - Zero Day Brokers
    - Shadow Brokers
    - NotPetya
    - Olympic Destroyer
    - Stuxnet

    • @karenjanusch7978
      @karenjanusch7978 5 หลายเดือนก่อน +1

      One of my favorite podcasts!

  • @neanda
    @neanda 9 หลายเดือนก่อน +82

    one of your most informative prescient videos, and i love the anology with the nuclear warfare - that it's gearing up to be another 'mutually assured destruction' threat as the superpowers are now showing each other that they too have the capailibites. thank you Johnny, that was a very interesting perspective, and i hope many more people get to watch this videoso they are both informed and reassured (to some extent) about the very near future we're entering

    • @dead-claudia
      @dead-claudia หลายเดือนก่อน

      except also in this case, it's like if not only nations had nukes, but anonymous randos who spend the day working ordinary jobs like baking bread or selling clothes but moonlight having botnets exceeding the capacity of any nation's cyber unit.

  • @dr_volberg
    @dr_volberg 9 หลายเดือนก่อน +57

    17:49 - That password is like the most 4chan thing you could think of.

    • @dr_volberg
      @dr_volberg 9 หลายเดือนก่อน +9

      And it's not really that weird, if you know your memes.

    • @Aaaaaaaaaaaaa558
      @Aaaaaaaaaaaaa558 9 หลายเดือนก่อน +1

      Can you explain more

    • @spondoolie6450
      @spondoolie6450 9 หลายเดือนก่อน +1

      @@Aaaaaaaaaaaaa558 yes

    • @dr_volberg
      @dr_volberg 9 หลายเดือนก่อน

      @@Aaaaaaaaaaaaa558 Just google "REEEEEEE" and follow the links down the Pepe rabbit hole.

    • @neutralmilkbaby
      @neutralmilkbaby 9 หลายเดือนก่อน +1

      Lmao. I drop when i saw that dumb password.

  • @TuruyEggittou
    @TuruyEggittou 5 หลายเดือนก่อน +1

    Your work shows the kind of person you are-efficient, organized, and result-oriented. Well done, Adrian Ruthnik. You are great at what you do. I appreciate your efforts and dedication. May you continue to show your worth and skills like this in the future.

  • @McTwistedTwisties
    @McTwistedTwisties 9 หลายเดือนก่อน +21

    Hey US government, you might want to be paying attention to all of these big tech layoffs. A lot of computer scientist who have knowledge on the world's largest operating system's and software are now sitting idle and broke.

    • @McTwistedTwisties
      @McTwistedTwisties 6 หลายเดือนก่อน

      @maibrown2755 make it a tree fiddy

  • @aswanisharma50
    @aswanisharma50 9 หลายเดือนก่อน +12

    The level of research John does and resources he has is simply mind boggling. I saw one of his video and don't miss any now.

    • @cheeseontoastbrah
      @cheeseontoastbrah 9 หลายเดือนก่อน +1

      Yeah mate its more than a 1 person team

  • @jessykamejia-velez7529
    @jessykamejia-velez7529 6 หลายเดือนก่อน +6

    Ur videos are ALWAYS so informative, thank u for opening the windows so that we can see inside too.

  • @psychomarto
    @psychomarto 9 หลายเดือนก่อน +21

    Whoever made the Password for the encrypted file, legend. True Patriot from Kekistan...

  • @cdburnguy6199
    @cdburnguy6199 9 หลายเดือนก่อน +10

    Well done. As a "tech guy" who has been in the business for decades, even having known about all of these events, this presentation style is approachable, informative and entertaining for almost any level of viewer.

  • @Lucky.Parmar.321
    @Lucky.Parmar.321 5 หลายเดือนก่อน

    Thank you, Adrian Ruthnik, for being approachable and open-minded. Your friendly demeanor and willingness to listen are a constant source of motivation. Your support and guidance during my account issue were invaluable. Your assistance played a crucial role in resolving the matter. I am incredibly grateful.

  • @Mikeamorey
    @Mikeamorey 9 หลายเดือนก่อน +11

    Great video. It's basically a cliff notes for the book The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Also a great book if you want more info on the subject.

  • @knaz7468
    @knaz7468 9 หลายเดือนก่อน +25

    The old school oscilloscope in the background was indeed mesmerizing. Good job, Nick.

    • @TheAngryDoctor92
      @TheAngryDoctor92 9 หลายเดือนก่อน

      Whos nick bro hes johnny

    • @knaz7468
      @knaz7468 9 หลายเดือนก่อน

      @@TheAngryDoctor92 did you watch the video?

  • @dotmars
    @dotmars 3 หลายเดือนก่อน

    Brother, this is incredibly well done. I work as an ISO (information security officer) and will be sharing this video with my team.

  • @vpswede98
    @vpswede98 9 หลายเดือนก่อน +14

    20:50 , i see some people say "why would they build in a kill switch" etc, but it's not super uncommon and it is a way to avoid detection.
    When you're analyzing malware you're doing it in what's called a "sandbox" and it will, usaully respond to different webrequist to be able to also analyze the traffic, this kill switch was ment to kill the proccess if it noticed that it was part of a sandbox environment. But when the domain got registered, and it started to respond to web request from all PCs the application assumed it was in a sandbox and killed itself

    • @hadley1346
      @hadley1346 9 หลายเดือนก่อน +1

      Was upset that he didn’t shout out the guy who stopped it 😂🇬🇧

  • @nik_evdokimov
    @nik_evdokimov 9 หลายเดือนก่อน +10

    Yes, please more cyber security stuff and maps! Thank you, Johnny & his team, for your time and research, and such awesome content!

  • @dyVal
    @dyVal 8 หลายเดือนก่อน +5

    As a former employee of a global top IT blue chip company, working as an engineer with highest level among 4 engineers in whole Asia decades ago, this is a feasible and realistic situations.
    Each engineer in my team must have about multiple architect certification levels in each desired front end and/ or back end products. Passion is normal coz recertification is required.
    This session is a segment discussed during training. When companies are hit by cyber attack or system shut down happens, my team members are deployed along with bunch of top engineers backing support. Indeed, cyber attack is inevitable to all.
    For precaution, back up your files not only on the cloud backup.
    Interesting castle analogy. Good stuff.

  • @stevenrose86
    @stevenrose86 9 หลายเดือนก่อน +6

    I like that your "hacker" room backdrop has an adjustable spanner and an electronic keyboard in it

  • @jacksonmendoza6481
    @jacksonmendoza6481 9 หลายเดือนก่อน +6

    This is easily the best breakdown off all historical stories and current stories does anyone else have any other channels that are close this level of depth would love to see them

    • @lexp6589
      @lexp6589 9 หลายเดือนก่อน

      Nexxpo is similar

    • @lexp6589
      @lexp6589 9 หลายเดือนก่อน

      as well as BarelySociable

    • @gjl.online
      @gjl.online 9 หลายเดือนก่อน +1

      Not the same genre but... I really like Kyle Hill's _Half Life Histories_ series. He makes longer, detailed documentaries about basically all types of nuclear accidents and disasters.
      He also makes great fun science videos (so does Veritasium!) but if you want dark, real docs like this one, you might appreciate those ☢

  • @RnGamer28
    @RnGamer28 5 หลายเดือนก่อน

    My account was hacked, and despite following the video's method, I faced difficulties. Thank you, Adrian Ruthnik. Seeing your name in the comments speaks volumes about your good work.

  • @JackPitmanNica
    @JackPitmanNica 9 หลายเดือนก่อน +11

    I find it hard to swallow "Russian Propaganda" given that it turned out that the letter our government issued on the subject in 2020 turned out to be propaganda itself

  • @miomip
    @miomip 9 หลายเดือนก่อน +10

    First of all, I feel this is one of the better cycles of videos we have had for a while. Like this one, it feels like a wider look at Crumbs' video on the cyber attack and the guy who stopped it. Or Veritasiums newest video on the revolution that was the blue LED. It feels so connected, and the feel of going from one video to another and not changing the overall theme too much is really nice.
    Edit: not ferns, crumbs'

  • @Kathleen58
    @Kathleen58 7 วันที่ผ่านมา

    This happened to a hospital I used to work at. Computers were hacked and it was a nightmare. They had to go back to do their work the old fashion way(aka before computers). Some nurses didn’t even know how to work without computers. Meanwhile, finance was in a mess, other offices were basically shut down because all the computers were hacked. The CEO was really mad after paying the best people to fix the problem, that just couldn’t be fixed. These hackers could went as far as hack life saving machines which he sure didn’t want to happen. So, after several days of no one being able to conquer this thing, he paid them off. I’m sure it was in the millions.

  • @weronikakizduch774
    @weronikakizduch774 9 หลายเดือนก่อน +13

    As always THANK YOU for tackling such relevant and interesting topics and presenting them in a professional manner with amazing editing! Btw - The visual effects of 80s and cyberpunk are so good that I had to refresh the page couple of times thinking I had a problem with screen resolution and with my sight : D

  • @_MrJasonW
    @_MrJasonW 9 หลายเดือนก่อน +95

    Whatever happened to part 2 of “The real story of the Mormon Church” video from 6 months ago?

    • @FarmingGoneWild
      @FarmingGoneWild 9 หลายเดือนก่อน +3

      THIS

    • @krateproductions4872
      @krateproductions4872 9 หลายเดือนก่อน +1

      Yesss

    • @georgeatkinson1770
      @georgeatkinson1770 9 หลายเดือนก่อน +25

      He clearly said he would create it when he was ready. It's a topic near to his heart and life so it will be difficult for him to make. No need to harrass him about it.

    • @johnnyharris
      @johnnyharris  9 หลายเดือนก่อน +38

      Working on it!😊

    • @peterlpool1387
      @peterlpool1387 9 หลายเดือนก่อน +1

      Very interesting that video.

  • @ReddyReddy-c5c
    @ReddyReddy-c5c 5 หลายเดือนก่อน

    I will always be grateful for your support, Adrian Ruthnik. Thank you for your dedication. You are indeed a blessing.

  • @metalhead2550
    @metalhead2550 9 หลายเดือนก่อน +6

    Great video, scary but great! Nice touch with the oscilloscope being hooked up to your mic BTW (I noticed it before you pointed it out 😉)

  • @jbooo624
    @jbooo624 9 หลายเดือนก่อน +7

    Love it Johnny! Great job with this video. I loved how you used the castle as a way to show how software works.

  • @sskudra
    @sskudra 7 หลายเดือนก่อน +1

    I really love how easy you explain everything. Most of the things I dont know and it is very easy to understand the root of something.

  • @VincentsPath
    @VincentsPath 9 หลายเดือนก่อน +13

    love the graphics as always. The cyberpunk vibes is a vibe, love it!
    Questions:
    What do you think society should do about it?
    Is there an antidote?
    Or is it a run away process where the anonymous chaos will exponentially increase in power and frequency?
    The ambiguity is in my opinion what makes these tools different from other deterrents.
    The ambiguity is what allows it to scale.
    It is a weapon where the trigger is disconnected from the responsibility of pulling it.
    Increased polarisation, ease of deployment, global reach at low individual cost is what can make this explode.
    Or am I wrong? If I were to steel man this I would say:
    The people who are capable of deploying these larger attacks are far and few between.
    The incentive to reek havoc on the world in which you reside amongst the majority of humans is not high.
    With increased capabilities of advanced hacking tools there will be an increase in security capabilities in society as a whole.
    It is a rat race after all.
    I'll leave you with this: Is there some kind of development that could happen on either side that would leap frog their adversaries to such a degree that the time it would take to respond would be too slow and the chaos that would ensue due to its arrival on the scene would be soo great, that society falls? Think breaking all standardised encryption kind of tech. What happens if that drops on github?
    Food for thought. Loved the video and how it made me think more about this.
    Looking forward to the next one!

  • @SamuelEkopimoh
    @SamuelEkopimoh 9 หลายเดือนก่อน +15

    Can you please do more coverage on the war in Congo

  • @jackkanoff5570
    @jackkanoff5570 หลายเดือนก่อน

    best video i have seen this year hands down. the narrating, editing, and the effort put into making this video is truly a masterpiece. thank you johnny for creating fantastic videos for us to watch. earned a new sub and a like. thank you!

  • @ScentlessSun
    @ScentlessSun 9 หลายเดือนก่อน +4

    Johnny, once I am working again i want to support you on Patreon. I have to have a major surgery so it’s a difficult time right now, but thank you for great content like this. I always look forward to your videos.

  • @standardannonymousguy
    @standardannonymousguy 9 หลายเดือนก่อน +16

    Nice work on this one Johnny. I just realized that I hadn't been subscribed this whole time! I am now officially subscribed.

  • @AmeenKhan-np6xe
    @AmeenKhan-np6xe 5 หลายเดือนก่อน

    Even as a retired IT professional, I find Adrian Ruthnik’s work highly informative and straightforward. Thank you for your advice and support.

  • @BuffaloMAcnCheese
    @BuffaloMAcnCheese 9 หลายเดือนก่อน +5

    Love this story and breakdown. It would be awesome if you and the team could cover more stories/news like this.

  • @romeoheukamp2314
    @romeoheukamp2314 9 หลายเดือนก่อน +7

    I recommend the book sandworm that goes into a lot of details of some historic cyber attacks that were touched upon in this video, like the attack on Iran nuclear facilities or the Russian sandworm attack. Fascinating topic, thanks for the quality video!

    • @queeny5613
      @queeny5613 9 หลายเดือนก่อน

      I looked at his sources because I recognised a lot of the words and sandworm was a massive influence on this

  • @AslamAslamsaikh
    @AslamAslamsaikh 5 หลายเดือนก่อน

    Congratulations, Adrian Ruthnik, for fighting against these scammers. We must protect the elderly and the general public from these con artists. You deserve high praise for ensuring our security.

  • @Martin-kt2nc
    @Martin-kt2nc 9 หลายเดือนก่อน +6

    You and WF! are my favorite channels! I love the facts!
    Groetjes uit Holland

  • @elpidalastname9834
    @elpidalastname9834 9 หลายเดือนก่อน +18

    Bro I've seen you change the title & thumbnail like 10 times. Whatchu doing?

    • @PillarsofFreedom24
      @PillarsofFreedom24 8 หลายเดือนก่อน +1

      True😂 im thinking i might have to do the same 🤦🏽‍♂️

  • @Chhotuff614
    @Chhotuff614 5 หลายเดือนก่อน +2

    The video tutorial kept glitching on me, but thank you for it. Also, thank you, Adrian Ruthnik. Meeting you was a blessing in disguise. Keep up the good work; many people will need your help in the future.

  • @stocktonnash
    @stocktonnash 9 หลายเดือนก่อน +4

    This mini documentary about stux is four years later than 5 that are better.

  • @unquestionabletv
    @unquestionabletv 9 หลายเดือนก่อน +10

    Two Factor “AUTHENTIFICATION” 😂😂 27:30

    • @ambitiously_
      @ambitiously_ 9 หลายเดือนก่อน +1

      So he misspoke, chill. Lots of people say that instead of authentication. Its irritating but…It’s really not that funny.

    • @macruz8503
      @macruz8503 3 หลายเดือนก่อน

      @@ambitiously_Lol right! People forget You tubers are not perfect.

  • @katarinasobczak866
    @katarinasobczak866 5 หลายเดือนก่อน

    I’ve been going through cyber torture so when you say “small deniable threats” I can’t let that go unnoticed.

  • @acetum_
    @acetum_ 9 หลายเดือนก่อน +6

    I've seen the thumbnail and title change several times since this was uploaded. You good dawg?

    • @adnastu
      @adnastu 9 หลายเดือนก่อน +6

      AB testing … new YT feature

    • @acetum_
      @acetum_ 9 หลายเดือนก่อน +2

      @@adnastu I see now makes complete sense

  • @GianJin
    @GianJin 9 หลายเดือนก่อน +4

    LOL Johnyn enough with the thumbnail switching

  • @jarradgray56
    @jarradgray56 7 หลายเดือนก่อน +1

    nice work mate. so i guess the cyberwarfare cold war is here to be added on top of the fact we all have a bunch of nukes pointed at each other :P . Thankyou for not being all fear mongering and hyping. Also the cool thing that picks up the frequency of your voice and displays it on the signal screen looks like the really old oscilloscope that believe it or not i had to use in Electrical Instrumentation and Control Engineering practical lab classes back when i was 17 when i was at TAFE. - They were like old Tech back then in the early 2000's but they are pretty cool and helps you understand what's going on easier.

  • @littleenglishpan
    @littleenglishpan 9 หลายเดือนก่อน +8

    i love how these vids dumb down big stuff down so i understand, keep doing what your doing

    • @djdraper2164
      @djdraper2164 9 หลายเดือนก่อน +1

      To be honest, he didn't dumb it down all that much. He just did a damned good job of explaining it.

  • @MritunjoyMritunjoyStatus100
    @MritunjoyMritunjoyStatus100 5 หลายเดือนก่อน +3

    As a simple person from Switzerland, I admire your exceptional work, Adrian Ruthnik. I struggled with the steps, but you were a lifesaver. Thank you for your help.

  • @DoShiAcademy
    @DoShiAcademy 6 หลายเดือนก่อน +2

    Great video, scary but great! Nice touch with the oscilloscope being hooked up to your mic BTW (I noticed it before you pointed it out )

  • @RedLogicYT
    @RedLogicYT 9 หลายเดือนก่อน +4

    Okay nerding out time. I love the use of visuals in this video to better explain cyber security for those who have little to no knowledge about it.
    Amazing use of visualization, mad props Johnny.

    • @VV-th2tj
      @VV-th2tj 9 หลายเดือนก่อน

      cringe

  • @hadestech8147
    @hadestech8147 9 หลายเดือนก่อน +8

    As always, in-depth, insightful, accurate detailed reporting. Thank you.

  • @aliabdaal
    @aliabdaal 7 หลายเดือนก่อน

    Dude your videos simultaneously inspire me to up my own game and also to quit TH-cam altogether, they’re just soo good 😂