Guarantee the PSU "hard drive" is because a director said "That's too small. I need something big and with cables so it looks like a computer part." Kinda like how a bomb needs to look like wires and a clock, not fertilizer and an arduino.
@@Lauren_C yeah, but would you show it to the explosive disposal team to let them know? You'd set a time for yourself to get to safety, but not make it easy for others to evacuate.
I agree with this hypothesis. Seems pretty likely for just a visual, especially in a time where less people would be readily aware of what those components look like.
@@aaronplays_ a displayed time can always be a red herring so it should always be treated as such, also if cutting a specific wire will diffuse a bomb then just cut them all at once, or just cut the battery, real ones are basically sealed shut really hard
To be fair to NCIS, I once read that the writers know how tech works but they intentionally write in bad tech to the show in order to make an inside joke for people who know anything about tech, while still being exciting for people who don't.
Also that PSU case being modded to a HD/SSD/NVME chassis would be quite smart. Looks like an old PSU laying around but inside it'd have the storage. No clue if that was it though, but very sleeper build style.
I heard (though it may be an urban myth) that in the first season of McGyver, all of the things the guy McGyvers actually work for real - and since the phrase "don't try this at home" wasn't ingrained in everyone's head yet (and I'd argue it still isn't to this day) they got a LOT of complaints of parents whose kids set the house on fire or similar, so from the second season onwards they consulted with experts and then very intentionally did it wrong on screen so that it wouldn't work in real life.. Maybe this is a similar situation?
I'm not gonna do any research and chose to 100% believe this so I can just laugh at the stupid shit they say while my girlfriend watches her crime shows (that I end up getting sucked into). Please nobody run this for me
You need to check out "Firewall" (2006). Harrison Ford as an IT security expert is the least believable thing in the world. Best scene of the movie: He connects the scan device of a fax machine to his daughter's MP3 player to store information from a display he attaches the scan unit to. My brain melted when I saw it in the theater.
Also shooting the control panel always makes it do the thing you want. Want the door open? Shoot the control panel. Want the door closed? Shoot the control panel.
I actually like the fact that the IT expert takes advice from the guy (her boss, probably) who only knows that they're looking at "blinky boxes". It do be like that in strictly hierarchical and authoritarian organizations! 😂
You wouldn't steal a handbag. You wouldn't steal a car. You wouldn't steal a baby. You wouldn't shoot a policeman and then steal his helmet. You wouldn't go to the toilet in his helmet and then send it to the policeman's grieving widow. And then steal it again! Downloading films is stealing. If you do it, you will face the consequences.
@@Stay_away_from_my_swamp_water Usually it's much healthier to say no when a couple asks you if you want to come back to their hotel room to film a video together. Especially if they plan on uploading it to the internet.
The first CSI:Cyber example actually was valid. The red code was briefly overlaid on the green code before being plucked out and re-displayed. That kind of obfuscation is a real thing: another method elsewhere in the script would scan that block of code and pull those chunks out to create a new, malicious script that can then be executed after the original code is scanned by online virus scanning tools. Admittedly the virus scanner would have to only be scanning on initial page load and not monitoring memory or script execution as most modern AV toolkits do, but attacks such as that one are why code execution monitoring was added in the first place.
'Mr. Robot' is probably about the gold standard for representing the overall process of hacking in a main plot line even if they don't get some of the finer details right. 'Hackers' actually represented real hacking well in most of it's side-plots and vignettes. For example, the scene where they call the security guard to get the phone number for the remote support modem was 100% how it was done back in the day.
Also the use of the magic USB key but they have to be there in person and the tension related to that, the way they hack into someone's security system just to make a party and all the issues linked to that too, it's all fun and games untill it's real. Such a masterpiece of of a show
They went so far and actually made all the websites and urls in the show real websites you could visit, unfortunately they're mostly gone at this point since the show ended a few years ago.
Since I was 9, my favourite scene of this kind was the girl in Jurrasic Park confidently navigating the "UNIX" system GUI at about 8fps... Until I recently found out that it actually was an accurate depiction of the File System Navigator for IRIX on SGI workstations - same machines that were used to make the CGI for the movie.
I had that same experience. My smug 13 year old geek self knew “that isn’t Unix,” as I actually had a Unix station at home my dad got from work. Then recently watching vids on N64 history I learned the awful truth. Let’s keep it our secret 🤐 😅 🙊
I actually never had an idea in younger years, but since I knew computers, I was like "why the hell would a file system be that clunky?" and thought it was made up for the movie. I am kinda shocked this was real.
@@marcfuchs6938 Good point. I guess that was my main reaction too. “Unix isn’t a GUI, and that’s a bad GUI.” Turns out it was a bad GUI, but made to impress the suits who had to approve the purchase requests for expensive Silicon Graphics systems.
@@marcfuchs6938 look up how the first version of Windows GUI was supposed to be. Back then people had no idea how a computer GUI should be, so some whacky designs were made to make it "intuitive" for people to navigate.
@@doublej42 They have to be careful to not show how to 100% do this completely illegal thing, which is why they'll either miss out a couple of steps or gloss over the process. For example, in 'Breaking Bad' they didn't show all the steps required to make meth. For me personally, I prefer "Yeah, that's pretty close to how it's done." to "No, that's not how any of it works at all."
Wendell is one of those people that knows alot, you just have to ask the right questions. Id love to just sit down and pick his brain about tech for hours.
Yeah but that is 100% intentional. Even the most braindead luddite in the real world knows the internet is not a shoebox with a red light. The fact that Jen didn't know that is what makes it a fictional comedy TV show.
@@TheRabidDeer tbf - I think they don't even use a server and have everything on the drive + who doesn't use a power strip honestly. On NCIS the things always had been so much on the nose that I'd not be surprised if they specifically made everything unrealistic but dramatic for the obvious purpose of entertainment and as a joke for everyone who does know.
@6:30 we still call it a Remote Access Tool in our SOC department, as a RAT can still be a legitimate tool (Remote Desktop, Teamviewer, Logmein, Bomgar are considered RAT's but are used for legit support purposes)
The tv show 'Scorpion' definitely needs to be in here. When living with my parents I'd usually get 10 minutes in, then have to leave the room because I'm so mad at all the inaccuracies.
@@garand70 sure because learning to hot wire a supercar in seconds, then proceeding to drive said supercar inorder to match speed an you know plug a ethernet cable into a plane to upload mission crucial software in seconds as a plane flew over the runway because a car speaker wiped a hard drive surrounded by cloth & the plastic door panel not likely near the magnet... 😂
@@mesiaskane And I thought using the laser from a laptop's optical drive and a broken rear view mirror from a tractor to simulate 2 laser sights was farfetched. I must not have made it to that episode.
Should've had Die Hard 4 where they somehow overclock a PSU, via code injection, to have the potential explosive power of ~5 dynamites blowing up an entire room or house.
was it like that? i always assumed these systems were provided to them by the villian with the exploding box pre-installed.. though i haven't seen the movie in a while
A friend of mine blow up the caps in his PSU. Don´t know quite why the blow up. they just did randomly. It was a quite large explosion (The MB was fine)
@@sorcierx2604they could have had some sort of fuse tied to opening task manager or checking for a certain signal. Kind of how Samsung has the security fuse for the bootloader in their phones that if that’s blown some of the hardware stops working.
The 255 bit joke was fantastic; for anyone who doesn't understand it, it is based on how numbers are stored in programs, 255 is the highest an 8 bit number can go as it has a maximum number of values (256). A lot of times you can run into limitations and bugs based on how numbers are stored in computers, for example in lighting DMX is an 8 bit number so on one channel you can only have 256 brightness steps before running into limitations - this can be solved by combining 2 8 bit numbers together or in programming just building it with a higher limit.
THIS. I was quite disappointed the editors didn't get that, just learn some binary and you'll start seeing 16, 128, 256, 512 and 1024 way more often...
@@arianamirgholami9555I want to say we've seen them do a sub zero cooler and windows did report a negative. If you take an 8 bit number and treat it as signed you get -128 to +127
The editors are not anyways the most tech savvy of people. Knowing how to use Premiere effectively and understand why we have "unusual" numerical limits on some fields are not always important to the same person.
The Bones episode thing reminds me of an experiment done where a strand of synthetic DNA was created that had code in it that used a buffer overflow exploit to take over a DNA sequencer computer. The name of the paper is: "Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More"
I don't really think a lot of these are supposed to be realistic. I don't really mind it, cuz it's good enough to be possible in some 40 years. I get more mad at complete bs where a computer is running everything while simultaneously doing the maintenance on itself
In The Amazing World of Gumball S03E32 ("The Safety"), Gumball's sister Anais explaining how she hacked the security systems was surprisingly realistic. The most accurate hacking scene in television history may just be from a kids' cartoon. There should be a clip of it if you search up "Gumball's Sister Anais Knows Hacking"
In the TV series "Limitless", there was one scene where the main character was on an international phone call, speaking either Mandarin or Cantonese, while the person on the other end of the line was speaking in Vietnamese and earlier in the episode it was mentioned that he was calling someone in Thailand.
In NUMB3RS, two 'brothers' who supposedly grew up together in California, had a telephone conversation where they each pronounce the city "San Pedro" *differently*. 😅
To be a bit fair, if any of them are multilingual, having a cross-language conversation isn't all that hard, and many will mix vocabulary whenever they feel like it.
you missed the biggest flaw in the Space Force clip. none of those computers would be connected to the internet. they will probably be networked across their sites on their own network, but never the internet. any windows updates would have to go through testing before they would be added to an updated image of the workstation and then that would be installed onto the computers manually.
Yeaaaah. Windows management can be shitty, but they have alot more tools that the IT department can just deploy and use, Group Policy is definitely one of them and the other is WSUS. Nothing that was not in WSUS yet can be deployed. And nowadays, they give alot of leeway for ppl to shutdown and update (on default setting). But hey, I just imagine Space Force use public Intune instead lol
You wouldn't imagine how far Microsoft can get into forcing an update. I tried to disable updates on one of my PCs, I used 7 different ways of preventing updates (including the policy) and after a few weeks it still decided to update itself. I even locked that computer behind a firewall unlocking only 3 ports used by the application that was running on it, and windows still found a way to download updates.
So, as someone who has consulted on one of the projects, yes transport departments are using boxes similar to that that monitor traffic by watching for nearby Bluetooth and Wi-Fi devices and counting them up. Before the bluetooth randomisation stuff, you could get an estimate of traffic speed/flow by watching the same mac address traverse a city. Now its more just about aggregate data, how long each mac is seen for, how many macs at any point, etc, to get an idea of peak and minimum traffic levels and how much a road is used.
6:40 - "Tool" and "Trojan" are both considered acceptable. In fact, unless it was a "true trojan" where someone executed it manually after being tricked into running it thinking it was something else, "tool" is more common.
The most accurate hacking in a series I've seen is Mr. Robot. They've clearly consulted with professional security experts/(ethical) hackers, cause that show was on point in most things.
@@chrissametrinequartz9389Na Rami Malek is just a good actor. I believe he's said in interviews he didn't know what some of the technical stuff in the script was or even meant. But they had good direction for that show so he played it well.
I was going to suggest Swordfish. The whole hacking scene where he spins around in his chair whilst on a computer with about 17 screens made my cringe gland go into overdrive!
The NCIS scene where she says "I'm being hacked" is so bad, but the emotion it captures is very accurate to how I felt when I realized my email and GBoard were hacked. The chaos was all internal, but it was a fight.
At my last job my supervisor legit thought the monitor was a computer. I had 2 screens and got a memory error that popped up on one and froze the pc. When I asked them to call IT, this person looked me dead in the face and said "the error is on this computer not THAT ONE" pointing at the empty screen that didn't have the error and asked me to keep working.
5:50 Shit like that happens because producers or directors say "that doesn't look 'techy' enough, where's the wires? Get something with wires hanging out of it!"
Also lets say props to you guys, there been so many groups who have tried to copy this format without any shout out back to Corridor Crew for the inspiration. Thank you for doing it right!
On the car thing, not just self driving cars but lots of recent cars and especially semis have wifi hotspots blasting out their AP name and mac. I live near an interstate and my Unifi system records hundreds of “nearby networks” every day from this.
You were able to pick just a single episode of CSI Cyber? That's impressive, as every single episode I spent more time looking at my palm than the TV screen.
The pilot episode with the 60s carnival ride having and using an ethernet serial port and providing a 3D overlay and diagnostic was it for me. I turned it off after that episode, canceled my series recording on my DirecTV and never looked back. I'm glad it got marginally better, but I'm not sorry I didn't watch that series.
@@CareBear-Killer it only lasted 2 season even tho Ratings were decent for CSI show but considering at the time Original CSI and i think CSI : Miami and NY were still on it did not hold a candle to the OGs and now it is a shame CBS canceled CSI: Vegas Revival after 3 seasons as it went back to old formula and was good and had a good Seasons Plot for both seasons like they used to do.
I would love to also see the reverse of this video's premise: good examples of tech in media. Itd be really interesting to see LTT and friends react to how accurate is a show like Mr.Robot or Person of Interest, where the show is at least trying to be accurate to real IT systems.
Mr. Robot was really great, they actually have shown a bash and pretty realistic hacks! Unfortunate that the later season focused on his mental disorder...
They had several tech enthusiasts, network engineers and hackers on staff to help make sure they got it as real as possible without making it too technical for the general audience. I think they found the perfect level of both in that show. Even the episode with the hard drive data recovery was mostly sound.
Fun fact: The transport traffic monitoring systems actually DO sniff out Bluetooth MAC addresses as most cars have it broadcasting. They then compare the same MAC address for next time it's detected to figure out the average travel time over that distance.
Correct. There used to be a writeup over at Houston Transtar that describes how this technology works. It will first try to detect electronic tolling tags and use the broadcast serial number as the tracker. If that wasn't available, it will look for all bluetooth MAC addresses and compares them to a database to see if that one has been active on the network within a certain amount of time. The cycle repeats for the next transponder.
Tfw you don't follow the entire saga @@richardbently7236. They made up pretty quick after that lol, they have a video on why they shoot on Reds with corridor explaining the motion tracking benefits.
@@richardbently7236 Like when they did a crossover video where Linus fixed up a computer for them to use and then Corridor made a video out of it or when Wren was doing a video about data storage so they asked Linus to record a segment for it? If you are talking about the Red camera thing then I think you are reading far too much stuff in to it, lol. If there is something else though then it's honestly not something I've ever personally seen made public.
Hollywood tends to glamorize tech in movies, leading to unrealistic representations. It's refreshing to see an in-depth analysis to counter such portrayals.
Glamorize tech?! More like having the trope that electricity is magic, it'll arc hundreds of yards, vaporize steel vaults, convert matter to energy, cook a hotdog and basically do everything that real electricity doesn't and can't do.
There actually is ammunition specifically designed to disable vehicles. They're usually shotgun rounds and they're designed to cause major damage to coolant hoses, air intake tubing, and vacuum hoses, which would reduce the vehicle's power and cause it to overheat. This isn't an instantaneous process, though, it'll still take at least a minute or two to disable the vehicle.
@@ElectroDFW An EMP might stop newer car that relies heavily on the computer, but most cars just default to stock air/fuel ratios if various electronics quit working. And since the 12V power for the car is generated mechanically via alternator, it'd probably be fine. You might get a misfire in the two or three cylinders that were supposed to fire when the EMP went off, but that wouldn't kill the engine.
All the cars from Ford, Jeep, Toyota, and VW had the same internal code for their freaking autonomous driving systems, and these individuals possessed the script to instantly hack into and redirect them-truly believable
tesla and ford and audi have all had claimed bug bounties that allow remote control of a car companies like audi use two ecus now as a protection where the top layer is mainly reporting data and the 2nd is your control system and mapping wont work unless a rotating key is checked. I actually has exp with a bounty for Bluelink NDA issue alllowed me to start my own car just by knowing the vin with no auth needed CVE-2017-6052
It somehow overrides your hydraulic brakes too. That being said, my car had its ABS go nuts, and the effectively made it unable to stop. So I guess if this hacker messed with that, they could effectively disable your ability to hit the brake.
var brand = getBrand(); if (brand == "ford") execute("ford.script"); if (brand == "jeep") execute("jeep.script"); .... I don't see the problem of making a script for targeting many hardware platforms.
"Was that a shotgun?" The Taurus Judge, while not popular, is a magnum revolver designed to also fire small gauge shotgun shells. While that animation was NOT a Taurus Judge, it may very well have been a placeholder, because the Judge looks just like it but has a distinctly long cylinder to hold the long shotgun shells. XD
"look at that spread" I mean that be one argument that FF is set in an alternative universe, where a minigun with 1 meter long barrel on a mount got more spread than a saw off shotgun
Mr. Robot, at least the first season, is as close as it gets to 'quite plausible' without becoming too boring. Nothing too drastic to pick apart there, except maybe some... questionable performances.
More please, this was great! I'd enjoy your takes on Mr. Robot, Silicon Valley, Halt and Catch Fire, Sneakers, Hackers, Swordfish. It would also be interesting to revisit old productions and see how well they've aged - The Net comes to mind here, I remember thinking how fake it was to order pizza online when it came out, but now that stuff seems trivially common, it was almost prophetic.
Check out Devs. They had the most realistic "techy" scene I've ever seen. A dude just removes the wifi chip from a laptop, super simple but what impressed me was the fact that it was actually a smart thing for the character to do in that moment.
I worked as a teenager at a PC shop when someone came in, part of a film crew, they asked for the cheapest mouse, it was wired, they need a wireless mouse for the movie. So they asked for scissors, did what you are guessing, paid and left.
You could do a whole episode like this JUST covering films and TV shows using "Zoom and enhance" in detective/investigative context. Yes with AI you can technically now improve the quality and resolution of a low quality picture, but that is only educated guess work and isn't going to just create evidence out of nowhere. You could then wrap it up with the zoom and enhance scene from Red Dward, which is a very funny parady specifically on this.
Creating evidence out of nowhere would open some legal shenanigans. Some lawyer tried a different kind of computer trick to help out a case he was taking but it got him into trouble. Basically he asked ChatGPT to find some legal cases that would be relevant to his clients, but the program gave him cases were completely made up on the spot. He didn't know they were made up at the time, and tried to use those fake cases for his clients defense in court.
My favourite movie, the anime "Belle: the dragon and the freckled princess" has gotten a lot about the tech they show right. Down to the hard drive clickedy-clacking away in the background when the room is silent and Hiro's computer is running on full tilt doing a search.
@@gippygames Hey, it's kinda science fiction. The whole movie is built up around a Metaverse in which you control your character with mind control earplugs. Also, with current AI tech you probably could overenhance images pretty easily. Although I'm not sure you'd get anything helpful from it.
Can confirm the tracking of customers in stores. A company I previously worked for, a decade ago, was tracking customer using cameras and RF signals, following everything from how long they were in the store, the route they took around it, where they spent the most amount of time, frequency of visits and then tied it all to their loyalty card, so they knew who you were and what you were buying. Then used this for targeted offers.
We need a second episode for just police / CSI shows. My favorite one is "Hawaii Five-O" (The newer one) where they have a whole desk as a computer, and they can just lay a phone on it, and somehow import the photos from the phone without doing anything on the phone. It's hilarious.
The space force one is legendary Can't tell you how many times I was doing an assignment, playing a game or just doing shit on my computer before getting abruptly shut down by a magnificent windows update which if (according to microsoft) isnt installed within 3 femtoseconds of its release, my current non-updated windows install will release gonorrhoea into every orifice of my apartment block and my small hometown within a matter of minutes
@@RECURSIVE_MATRIX_LOGIC Lucily my company doesn't have a policy that stops you from erasing your system but still I feel your pain. There is no mallware for windows worse than windows
I used to be really into a popular UK murder detective drama called Vera and would watch the new episodes every week they came out with my Dad. However, one time on an episode which I was quite invested in because the mystery involved the perpetrator posting about his crimes on a libel-safe analogue of Facebook, the whole plot got ruined for me. After the police started _tracing_ the person who was posting to the social media site, they suddenly burst in with this breakthrough that they got the perpetrator's IP address. Vera then rallies the police team to make a move but not before delivering the slightly cringeworthy line of "(...) and get me that IP address", as though it was some physical address she could direct her team to. The whole detective team then swoop into a university campus dorm room where the perpetrator is sat behind a computer screen, writing about his upcoming exploits. After being apprehended, he asks how he was caught, to which Detective Chief Inspector Vera says "we got the IP address of the account making the posts which pointed to your specific computer", meaning it was the discovery which underpinned the entire episode's conclusion - despite being a public IP address on a university campus network. Big L moment for ITV's production team.
The most incredible thing about that summary is that Vera would know what an IP address was. (for non-brits: vera is a 50-60 something white woman who shouts while being scottish)
I remember seeing that episode. As a handwavy way of justifying it in the context of the episode, theoretically something similar with extra steps could be possible if there were enough logs kept (although explaining it in full would probably take too much time and interest away from the story). 1. Get the server logs from the website and correlate the account holder with their public IP address. 2. The internet provider should have logs of who was assigned the address at the time (e.g. Australia has enough metadata retention laws that those types of logs would probably exist, not sure about the UK). 3. Find that the address was used by the uni. At each layer of NAT, find the group of devices that were on the network for all messages / posts being made. Hopefully there is only one device left by the end. If proxy servers and firewalls are being used, the logs may be able to show that the device accessed the IP address of the social media platform around those times. The DNS server used might also be able to show this if a local one is present. 4. Because this is a corporate style network, my guess is that it should be possible to correlate devices with the account / login details used to access the network. 5. Pounce. I'm in no way a professional, so this situation may not be possible or feasible.
I recommend checking Person of Interest, the whole show is centered about computers, and I think they did a good job accurately representing them, but maybe I'm remembering wrong.
they did fairly good job but honestly outside the SciFi AI bits i cant say there are some overly bad or good bits it is pretty neutral honestly but bringing more attention to POI is always good.
@@bigpod the show had its focus spread across doing everything plausibly, i.e.: the crime-drama and forensic parts look plausible too, so overall they did a good job.
When I was younger, I avoided tech movies like Firewall 2006 because I knew the technical side would be all wrong. Today I just say to myself "They don't understand but this is the direction they need for the story." (it is usually the MacGuffin). As long as you understand that it is fiction, just sit back and enjoy.
A few years back Chrysler had a huge issue where it was proven you can gain control of the throttle, steering, etc remotely via their uconnect system. They remote controlled a Jeep from a laptop miles away.
Unfortunately the one about the Ad with a hidden malicious redirect is the most realistic part of that scene, in that we really do have ads that do that (hence why the FBI recommends browsing with an ad-blocker, a fact that Google forgets in their war against Ad-blockers)
5 หลายเดือนก่อน +8
Okay, the one from Space Force at 17:06 was really funny.
@@matsv201 I don’t think so, even with a .38 the temporary cavity is pretty significant and at such close range I think it could easily break a bone. Obviously there’s many other factors, but for the sake of argument it’s definitely possible.
Glad to see that you've dealt with some recent tribulations with your operation, Linus. I have always liked the insights into tech considerations I am not aware of, and you're a good representative of Canadian know-how to international audiences.
One of the fun things about tech stuff in shows in a lot of the writers know what’s going on and purposefully make tech stuff as bad as possible for fun.
The most surprising tech moment in movies I've seen was Blair Witch 2: Book of Shadows. They were analyzing some not great footage off a VHS camcorder, someone asked if they could zoom in to see better. Tech guy was "Sure, it will be a few moments to redigitize the footage"... which actually makes some sense. Digitizing an analog recording is going to cause some loss of information, and sometimes that information is useful. But often lower settings will do the job, so you might just want to save some time. So the idea that he could redigitize at higher settings, and that this would *take some actual amount of time*, is plausible and might actually be useful.
But most movies and TV shows with similar scenes, they're not doing some process to the original recording to access more of the exisitng information, they're straight up magicking new information into the image and it happens instantly, they don't ever spend the time it would take to reprocess the original footage or access an already existing higher resolution video file.
I recall seeing such a "zoom in" scene in the X-flies (don't know which episode) from back when typical machines had about 4MB-16MB of RAM. The picture was on a scanner: and they simply re-scanned the image for every zoom level. Now with 4-16GB or RAM: one would simply scan the whole image in high resolution.
@@jamesphillips2285 It sucks that this is so badly represented so often. It can be done much more realistically than is typical without slowing down the narrative, and could even give writers a way to add obstacles if they need to "Sorry, at this point we're limited by the original footage".
@@annieworroll4373 I think they were stretching credulity in Blade Runner (1982) as well. With how much they zoomed in they would have been approaching the diffraction limit. Can't call them on resolution of the original: because it was the future (details unknown).
@@jamesphillips2285 future tech being involved does make some zoom nonsense a bit more plausible in context, and upscaling algorithms to fill in missing data would more reliably get something usable close to reality.
This is already my favourite video you’ve ever done. More, please. The Batman reference reminded me of the time in Batman & Robin when Batgirl (Alicia Silverstone) hacked a telescope using XML (but I suppose that movie is supposed to be campy).
On that regard, I'd like to bring attention to Person of Interest. They didn't do the most realistic, but they did a good job showing something that's possible and correct. For example, the commands that they used in the terminals to "hack" the things were actual real commands that you'd run if you already have physical access to the devices.
@@aaronplays_ The Matrix had legit uses of the tools nmap, sshnuke and ssh when hacking the power grid. While 'sshnuke' doesn't actually exist, there was an exploit in SSH around CRC32 that was used in the real world to compromise systems.
@@scott2100 IIRC, the line was "it's overclocking", so I interpreted it as the Machine trying to OC the hardware. If the Machine was capable to start transferring itself from the briefcase on its own, then it's certainly capable of doing that
When do we get to see some James Bond critiques? That's usually a great go-to for insane Hollywood Tech Eff-ups!🤣I mean, seriously - can you name a single James Bond movie EVER that didn't have some crazy tech shenanigans happening? Cars shooting stinger missiles, C4 toothpaste, killer satellites, laser watches, fingerprint ID locked machine guns... The list goes on!
Guarantee the PSU "hard drive" is because a director said "That's too small. I need something big and with cables so it looks like a computer part." Kinda like how a bomb needs to look like wires and a clock, not fertilizer and an arduino.
Also, if you're using it for nefarious purposes, you wouldn't put a timer on the explosive to let everyone know how long left till detonation.
@@aaronplays_I would. The Arduino would be programmed to generate a random time, at which the detonation occurs.
@@Lauren_C yeah, but would you show it to the explosive disposal team to let them know? You'd set a time for yourself to get to safety, but not make it easy for others to evacuate.
I agree with this hypothesis. Seems pretty likely for just a visual, especially in a time where less people would be readily aware of what those components look like.
@@aaronplays_ a displayed time can always be a red herring so it should always be treated as such, also if cutting a specific wire will diffuse a bomb then just cut them all at once, or just cut the battery, real ones are basically sealed shut really hard
To be fair to NCIS, I once read that the writers know how tech works but they intentionally write in bad tech to the show in order to make an inside joke for people who know anything about tech, while still being exciting for people who don't.
Also that PSU case being modded to a HD/SSD/NVME chassis would be quite smart. Looks like an old PSU laying around but inside it'd have the storage. No clue if that was it though, but very sleeper build style.
I heard (though it may be an urban myth) that in the first season of McGyver, all of the things the guy McGyvers actually work for real - and since the phrase "don't try this at home" wasn't ingrained in everyone's head yet (and I'd argue it still isn't to this day) they got a LOT of complaints of parents whose kids set the house on fire or similar, so from the second season onwards they consulted with experts and then very intentionally did it wrong on screen so that it wouldn't work in real life..
Maybe this is a similar situation?
I'm not gonna do any research and chose to 100% believe this so I can just laugh at the stupid shit they say while my girlfriend watches her crime shows (that I end up getting sucked into). Please nobody run this for me
It would have been way funnier if the computer had just caught fire because it was running a 4090 that hadn't been installed correctly.
suuuuuuuuuure
Department of redundancy department
I'm putting that on my resume.
@@chazeroni455 Twice of course
That had me reeling 😂
@@CarlosPCmx dont forget. there must be at least a third copy off side and offline.
Isn´t that pretty much all of them?
You need to check out "Firewall" (2006). Harrison Ford as an IT security expert is the least believable thing in the world. Best scene of the movie: He connects the scan device of a fax machine to his daughter's MP3 player to store information from a display he attaches the scan unit to. My brain melted when I saw it in the theater.
my brain melted from reading this
some MP3 are also USB drives you put your songs into and it reads from the same drive
@@xugroyeah, afaik you could even do this with old iPods. But even so it still wouldn’t work
Need a Firewall 2 with IT Security Expert Harrison Ford vs Master Government Hacker Neil Breen
Also shooting the control panel always makes it do the thing you want.
Want the door open? Shoot the control panel.
Want the door closed? Shoot the control panel.
imagine being one of cPanel support people. every day there's bullet holes to fix. smh.
Bullets are boolean, duh
@@inkredebilchina9699 that's hilarious.
Try to avoid the controls that extend the bridge...
Percussive maintenance: pew pew edition
Wendel: Help. I've been kidnapped and forced to watch bad tech on tv.
Blink twice if you need help
This was my very first thought too.
To be fair, I think Wendel has the "I've been kidnapped" look in almost all videos, especially on on other peoples channels lol
And he doesnt even get an robot friends
He'll be fine. Only needs a random closet, server rack or toaster oven to teleport home or to Steve's offices at Gamers Nexus.
"2 of the blinky boxes to go" probably the most accurate line of the scene!
no the most accurate line is “fuck Microsoft!!”
@@sulaimanalhamdan597 "of the scene"
I actually like the fact that the IT expert takes advice from the guy (her boss, probably) who only knows that they're looking at "blinky boxes".
It do be like that in strictly hierarchical and authoritarian organizations! 😂
well that's Nathan Fillion for you - always a consummate professional.
@@heiseheise You'd think the guy who turned himself into a living robot might know more about viruses 😂
_"There is a computer virus in the bones"_ is such a funny sentence
"Of course! The Computer Virus is in the Lake!" - Xavier Renegade Angel
@@TheFunniBaconManI am SO AMAZED and SO GLAD I’m not the only one that immediately thought of that line lol
18:33 "Cars are the best thing... other than family" had me bust out a laugh 😂
Edit: The timestamp changed since the video was released.
Your timestamp should be 18:33
It probably changed due to youtube ad injection, timestamps will be 100% useless pretty soon.
@@Skagzi1la Yeah, timestamps and share links will no longer work correctly.
They really want people to switch to TikTok.
@@Skagzi1launtil youtube makes comments not the same for everyone depending pn the injected ad
i kinda expected that joke though
I know it´s old AF, but... the IT CROWD: "what OS are you using?" "It´s VISTA" "We´re gonna die"
What about the one where they convinced their boss that she broke the 'Internet'.
Have you tried to turn it off and on again
You wouldn't steal a handbag. You wouldn't steal a car. You wouldn't steal a baby. You wouldn't shoot a policeman and then steal his helmet. You wouldn't go to the toilet in his helmet and then send it to the policeman's grieving widow. And then steal it again! Downloading films is stealing. If you do it, you will face the consequences.
@@jens_petsch I loved the one episode where they had the phone on a recording just saying that
IT crowd never gets old
Imagining Luke and Linus just grabbing Wendell all like "Hey can you do this video with us real quick?" makes me chuckle.
Wendell had a video yesterday with Luke in the background.
Most likely they were talking and then when they went to record the video they asked if he wanna go with them
@@Stay_away_from_my_swamp_water Usually it's much healthier to say no when a couple asks you if you want to come back to their hotel room to film a video together. Especially if they plan on uploading it to the internet.
This was what I was thinking
@@Azrichiel if it's Luke and Linus, health be damned, my body is ready!
The first CSI:Cyber example actually was valid. The red code was briefly overlaid on the green code before being plucked out and re-displayed. That kind of obfuscation is a real thing: another method elsewhere in the script would scan that block of code and pull those chunks out to create a new, malicious script that can then be executed after the original code is scanned by online virus scanning tools. Admittedly the virus scanner would have to only be scanning on initial page load and not monitoring memory or script execution as most modern AV toolkits do, but attacks such as that one are why code execution monitoring was added in the first place.
'Mr. Robot' is probably about the gold standard for representing the overall process of hacking in a main plot line even if they don't get some of the finer details right. 'Hackers' actually represented real hacking well in most of it's side-plots and vignettes. For example, the scene where they call the security guard to get the phone number for the remote support modem was 100% how it was done back in the day.
trinity hacking the powerplant - no1
Also the use of the magic USB key but they have to be there in person and the tension related to that, the way they hack into someone's security system just to make a party and all the issues linked to that too, it's all fun and games untill it's real. Such a masterpiece of of a show
They went so far and actually made all the websites and urls in the show real websites you could visit, unfortunately they're mostly gone at this point since the show ended a few years ago.
Mr. Robot get the 2nd place, behind IT Crowd. :P
They need to have a separate video for mr Robot
Since I was 9, my favourite scene of this kind was the girl in Jurrasic Park confidently navigating the "UNIX" system GUI at about 8fps... Until I recently found out that it actually was an accurate depiction of the File System Navigator for IRIX on SGI workstations - same machines that were used to make the CGI for the movie.
I had that same experience. My smug 13 year old geek self knew “that isn’t Unix,” as I actually had a Unix station at home my dad got from work.
Then recently watching vids on N64 history I learned the awful truth. Let’s keep it our secret 🤐 😅 🙊
Eagle system viewer thing I don't remember.
Edit eagle mode!
I actually never had an idea in younger years, but since I knew computers, I was like "why the hell would a file system be that clunky?" and thought it was made up for the movie. I am kinda shocked this was real.
@@marcfuchs6938 Good point. I guess that was my main reaction too. “Unix isn’t a GUI, and that’s a bad GUI.” Turns out it was a bad GUI, but made to impress the suits who had to approve the purchase requests for expensive Silicon Graphics systems.
@@marcfuchs6938 look up how the first version of Windows GUI was supposed to be. Back then people had no idea how a computer GUI should be, so some whacky designs were made to make it "intuitive" for people to navigate.
Mr. Robot! It is probably the most accurate mainstream show I've seen. Especially the pilot.
matrix is pretty interesting too
I work in cyber security. I could not make it past the pilot. NCIS I know was terrible but Mr robot got 95% and it bugged me
@@doublej42 They have to be careful to not show how to 100% do this completely illegal thing, which is why they'll either miss out a couple of steps or gloss over the process. For example, in 'Breaking Bad' they didn't show all the steps required to make meth.
For me personally, I prefer "Yeah, that's pretty close to how it's done." to "No, that's not how any of it works at all."
Wendell is one of those people that knows alot, you just have to ask the right questions. Id love to just sit down and pick his brain about tech for hours.
Would love to see more of this. The IT Crowd with the Internet is gold.
Yeah but that is 100% intentional. Even the most braindead luddite in the real world knows the internet is not a shoebox with a red light. The fact that Jen didn't know that is what makes it a fictional comedy TV show.
@@heiseheisehey now, dont be rude to jen! The elders of the internet were so impressed with her presentation
@@heiseheise Wait.. it is not?!?
I thoroughly expected the NCIS two-idiots-one-keyboard scene to be in this compilation, and I was NOT disappointed
NCIS really was good at making those jokes :)
10:10 It's two codes being typed right on top of each other!
I personally choose to believe he just unplugged the monitor and thought that fixed the issue.
@@chestergregg8668 I mean that single cable was definitely not for any server theyd be using in that show, and their monitor DID turn off...
@@TheRabidDeer tbf - I think they don't even use a server and have everything on the drive + who doesn't use a power strip honestly.
On NCIS the things always had been so much on the nose that I'd not be surprised if they specifically made everything unrealistic but dramatic for the obvious purpose of entertainment and as a joke for everyone who does know.
@6:30 we still call it a Remote Access Tool in our SOC department, as a RAT can still be a legitimate tool (Remote Desktop, Teamviewer, Logmein, Bomgar are considered RAT's but are used for legit support purposes)
Laughs in dark comet
Yeah nobody calls it remote access trojan. This video is the first time ever, I have heard that acronym
Those are called RMM these days. But yeah linus is wrong about almost everything infosec related 😂
That’s because that’s what it is called. A Trojan is a remote access tool. I’m glad someone else said something.
@@rooboy69 Right? A trojan would expect the user to install it, while RATs are usually the payload of a virus or other hacking activity
Linus - "That's not even how you spell sync"
Oxford english dictionary - Sync -
past tense: synched; past participle: synched
To be fair I’ve never checked out a Canadian dictionary…
I believe you’re right sir.
I've never been comfortable with either synched. Brings up how "abbreviated" the word sync is. Just feels wrong to extend it.
I wonder if he thought it was spelled "sinked", as in "heat sink" but in the show's use, neither synched nor synced would be wrong.
Linus never lets facts get in the way of a good story. Look at what he did to Billet Labs
@@upinarms79still on about that are you?
The tv show 'Scorpion' definitely needs to be in here. When living with my parents I'd usually get 10 minutes in, then have to leave the room because I'm so mad at all the inaccuracies.
When they set fire to a server by over-revving the hard drives in the RAID, I was done.
@@garand70 sure because learning to hot wire a supercar in seconds, then proceeding to drive said supercar inorder to match speed an you know plug a ethernet cable into a plane to upload mission crucial software in seconds as a plane flew over the runway because a car speaker wiped a hard drive surrounded by cloth & the plastic door panel not likely near the magnet... 😂
@@mesiaskane And I thought using the laser from a laptop's optical drive and a broken rear view mirror from a tractor to simulate 2 laser sights was farfetched. I must not have made it to that episode.
@@garand70 I forgot about that scene. like you CAN actually choose speed of the HDD it spins at. just like revving a car, sure.
@@garand70 wait when was this LOL i don't remember it i must have blocked it out
Should've had Die Hard 4 where they somehow overclock a PSU, via code injection, to have the potential explosive power of ~5 dynamites blowing up an entire room or house.
ya
was it like that? i always assumed these systems were provided to them by the villian with the exploding box pre-installed.. though i haven't seen the movie in a while
the only excuse they could have is if its a dod burn vault.
A friend of mine blow up the caps in his PSU. Don´t know quite why the blow up. they just did randomly. It was a quite large explosion (The MB was fine)
@@sorcierx2604they could have had some sort of fuse tied to opening task manager or checking for a certain signal. Kind of how Samsung has the security fuse for the bootloader in their phones that if that’s blown some of the hardware stops working.
The 255 bit joke was fantastic; for anyone who doesn't understand it, it is based on how numbers are stored in programs, 255 is the highest an 8 bit number can go as it has a maximum number of values (256). A lot of times you can run into limitations and bugs based on how numbers are stored in computers, for example in lighting DMX is an 8 bit number so on one channel you can only have 256 brightness steps before running into limitations - this can be solved by combining 2 8 bit numbers together or in programming just building it with a higher limit.
THIS. I was quite disappointed the editors didn't get that, just learn some binary and you'll start seeing 16, 128, 256, 512 and 1024 way more often...
Now I'm wondering if CPUs can show under 0 degrees or not
@@arianamirgholami9555I want to say we've seen them do a sub zero cooler and windows did report a negative. If you take an 8 bit number and treat it as signed you get -128 to +127
The editors are not anyways the most tech savvy of people. Knowing how to use Premiere effectively and understand why we have "unusual" numerical limits on some fields are not always important to the same person.
@@muadeeb yes so linus was wrong
128 is the max it shows
The Bones episode thing reminds me of an experiment done where a strand of synthetic DNA was created that had code in it that used a buffer overflow exploit to take over a DNA sequencer computer. The name of the paper is: "Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More"
I don't really think a lot of these are supposed to be realistic. I don't really mind it, cuz it's good enough to be possible in some 40 years. I get more mad at complete bs where a computer is running everything while simultaneously doing the maintenance on itself
In The Amazing World of Gumball S03E32 ("The Safety"), Gumball's sister Anais explaining how she hacked the security systems was surprisingly realistic. The most accurate hacking scene in television history may just be from a kids' cartoon. There should be a clip of it if you search up "Gumball's Sister Anais Knows Hacking"
Absolutely needs to happen. That show is wildly underrated and surprisingly subversive.
My favourite tech scene is how in Agents of Shield they used a CPU Cooler to blow up underground shelter.
YES! I was hoping someone else had noticed that!
Really! That's the CPU's job, run it without a cooler and watch the shelter melt.
that just sounds like a Smart prop guy who knows how to get free overpriced pc parts lol
I had to pause this scene and explain how funny I thought it was to my wife.
“It wouldn’t catch fire”
Launch day 7800x3d, loose 4090, Gigabyte p750, fractal torrent fan controller. “Allow us to introduce ourselves”
Nzxt case 😂
Any Intel CPU
12vhpwr third party no-name adaptors 🔥
YEAH i had a pc set it's self on fire so yes it can happen mostly from THE PSU
Don’t know how popular those are with 2011 servers.
In the TV series "Limitless", there was one scene where the main character was on an international phone call, speaking either Mandarin or Cantonese, while the person on the other end of the line was speaking in Vietnamese and earlier in the episode it was mentioned that he was calling someone in Thailand.
MR WORLDWIDE
In NUMB3RS, two 'brothers' who supposedly grew up together in California, had a telephone conversation where they each pronounce the city "San Pedro" *differently*. 😅
To be a bit fair, if any of them are multilingual, having a cross-language conversation isn't all that hard, and many will mix vocabulary whenever they feel like it.
Okay, this was legit informative - definitely needs a part 2. Oh and the Department of Redundancy Department joke was underrated af.
Needs Mr. Robot in the part2!
I second this, I want to see more, this is so informative and funny.
you missed the biggest flaw in the Space Force clip. none of those computers would be connected to the internet. they will probably be networked across their sites on their own network, but never the internet. any windows updates would have to go through testing before they would be added to an updated image of the workstation and then that would be installed onto the computers manually.
true buuuut that scene is entirely a joke
Yeaaaah. Windows management can be shitty, but they have alot more tools that the IT department can just deploy and use, Group Policy is definitely one of them and the other is WSUS. Nothing that was not in WSUS yet can be deployed. And nowadays, they give alot of leeway for ppl to shutdown and update (on default setting).
But hey, I just imagine Space Force use public Intune instead lol
Are you saying the newly established space force suffering from a bunch of budget issues would have proper IT?
You wouldn't imagine how far Microsoft can get into forcing an update.
I tried to disable updates on one of my PCs, I used 7 different ways of preventing updates (including the policy) and after a few weeks it still decided to update itself.
I even locked that computer behind a firewall unlocking only 3 ports used by the application that was running on it, and windows still found a way to download updates.
Yes, they'd be on SIPRnet. The US has two separate internets, SIPRnet, and NIPRnet
So, as someone who has consulted on one of the projects, yes transport departments are using boxes similar to that that monitor traffic by watching for nearby Bluetooth and Wi-Fi devices and counting them up. Before the bluetooth randomisation stuff, you could get an estimate of traffic speed/flow by watching the same mac address traverse a city. Now its more just about aggregate data, how long each mac is seen for, how many macs at any point, etc, to get an idea of peak and minimum traffic levels and how much a road is used.
6:40 - "Tool" and "Trojan" are both considered acceptable. In fact, unless it was a "true trojan" where someone executed it manually after being tricked into running it thinking it was something else, "tool" is more common.
6:24
The most accurate hacking in a series I've seen is Mr. Robot. They've clearly consulted with professional security experts/(ethical) hackers, cause that show was on point in most things.
I'm not certain but I think the guy that its about was an actual hacker and he helped with making the movie or something?
@@chrissametrinequartz9389Na Rami Malek is just a good actor. I believe he's said in interviews he didn't know what some of the technical stuff in the script was or even meant. But they had good direction for that show so he played it well.
@@chrissametrinequartz9389 they also stole one of the hacks/vulnerabilities from PirateSoftware while it wasn't published yet.
the SWORDFISH scene where the hacker had a limited time to hack some governmental thing while being pole danced was awesome too!
I was going to suggest Swordfish. The whole hacking scene where he spins around in his chair whilst on a computer with about 17 screens made my cringe gland go into overdrive!
Just to help you in the future, that is what is called a "lap dance." I get your confusion with thinking the pole referred to your Johnson, but no.
hehe - pole danced :)
PLEASE MAKE THIS A SERIES, THANK YOU
Yep, make it like the car mechanics on Donut watching Fast & Furious for the cringe.
Yes! Please do another one of these. I was shaking my head so much with each fail, it's a wonder it didn't fall off my neck.
The NCIS scene where she says "I'm being hacked" is so bad, but the emotion it captures is very accurate to how I felt when I realized my email and GBoard were hacked. The chaos was all internal, but it was a fight.
How does one manage to get their phones keyboard hacked
Naaaa, then both of them start typing really fast to "unhack" it lol
They cut the best line in that scene: "What is that, a video game?"
Modern cars like new Teslas for example do actually use Bluetooth LE for the TPMS.
he didn’t unplug the computer, he unplugged the monitor lol
"Away from the eyes, away from the mind." Works with animals, children, hell - even most adults. Why not with the two idiots using one keyboard 😂
the guys a double agent
Could be 2 in 1s? Lol.
I've heard that that scene was written to be a parody of bad tech scenes.
At my last job my supervisor legit thought the monitor was a computer. I had 2 screens and got a memory error that popped up on one and froze the pc. When I asked them to call IT, this person looked me dead in the face and said "the error is on this computer not THAT ONE" pointing at the empty screen that didn't have the error and asked me to keep working.
5:50
Shit like that happens because producers or directors say "that doesn't look 'techy' enough, where's the wires? Get something with wires hanging out of it!"
CSI: Cyber could be an episode on it's own. The best thing about CSI:C is that it made Scorpion seem like a Shakespeare/MENSA co-production.
Just watched the pilot of Scorpion, I laughed so much! :D Best 45 mins I spent on a show.
@@Sekir80 I can't stand scorpion. It's PAINFUL to watch.
Scorpion is so much worse. CSI: Cyber got better researchers in their second season and then got cancelled whereas Scorpion got too many seasons.
15:31 he probably just unplugged the monitor, not the computer... 😄
Well he is a boomer, so that kind of makes sense
He did, but that still fixes the problem because if you can't see it, it's not happening.
@@ChaseSchleich Schrodinger's hacking
@@ark_knight if a hacker hacks your system and copies your data but doesn't do anything with it, are you really hacked?
Also lets say props to you guys, there been so many groups who have tried to copy this format without any shout out back to Corridor Crew for the inspiration. Thank you for doing it right!
“Added in post” was a stroke of genius from Wendel
On the car thing, not just self driving cars but lots of recent cars and especially semis have wifi hotspots blasting out their AP name and mac. I live near an interstate and my Unifi system records hundreds of “nearby networks” every day from this.
Not an IT failure, but I found it hysterical when I saw the villain in the blue beetle movie use a LG wing as her "futuristic controller device".
Sure beats using a 15 year Logitech gaming controller to navigate a deep sea submarine capsule.
20:30 definitely check Mr. Robot series. It has one of (if not the best) depictions of "hacking" ever, especially in first two seasons.
Can we all agree that the 'Fast and Furious Universe' is now and forever referred to as simply 'The FU'
Is the F for Family??
You were able to pick just a single episode of CSI Cyber? That's impressive, as every single episode I spent more time looking at my palm than the TV screen.
The pilot episode with the 60s carnival ride having and using an ethernet serial port and providing a 3D overlay and diagnostic was it for me. I turned it off after that episode, canceled my series recording on my DirecTV and never looked back. I'm glad it got marginally better, but I'm not sorry I didn't watch that series.
@@CareBear-Killer it only lasted 2 season even tho Ratings were decent for CSI show but considering at the time Original CSI and i think CSI : Miami and NY were still on it did not hold a candle to the OGs and now it is a shame CBS canceled CSI: Vegas Revival after 3 seasons as it went back to old formula and was good and had a good Seasons Plot for both seasons like they used to do.
@@notuptome I was sad about the CSI: Vegas cancellation. The revival was pretty good.
I would love to also see the reverse of this video's premise: good examples of tech in media. Itd be really interesting to see LTT and friends react to how accurate is a show like Mr.Robot or Person of Interest, where the show is at least trying to be accurate to real IT systems.
Mr. Robot is the one that surprised me back in the day. They must have hired some real nerds on that show! 👌
I was looking for this comment. You are absolutely right, that show is the most realistic and I don't think it could be even better
Mr. Robot was really great, they actually have shown a bash and pretty realistic hacks! Unfortunate that the later season focused on his mental disorder...
They had several tech enthusiasts, network engineers and hackers on staff to help make sure they got it as real as possible without making it too technical for the general audience. I think they found the perfect level of both in that show. Even the episode with the hard drive data recovery was mostly sound.
They ripped of some real nerds, ask Thor.
@@Blex_040 Ok, but as a TV show, that final season was fucking phenomenal lol
Fun fact: The transport traffic monitoring systems actually DO sniff out Bluetooth MAC addresses as most cars have it broadcasting. They then compare the same MAC address for next time it's detected to figure out the average travel time over that distance.
Correct. There used to be a writeup over at Houston Transtar that describes how this technology works. It will first try to detect electronic tolling tags and use the broadcast serial number as the tracker. If that wasn't available, it will look for all bluetooth MAC addresses and compares them to a database to see if that one has been active on the network within a certain amount of time. The cycle repeats for the next transponder.
Linus taking inspiration from Corridor feels like the tech world and Hollywood's VFX team just had an epic crossover!
the comment the bot that's near the top copied, but added a shit coin thing to.
When you realize that LTT and Corridor don't have the best history it seems a little more callous than an epic crossover.
Tfw you don't follow the entire saga @@richardbently7236. They made up pretty quick after that lol, they have a video on why they shoot on Reds with corridor explaining the motion tracking benefits.
@@richardbently7236 Like when they did a crossover video where Linus fixed up a computer for them to use and then Corridor made a video out of it or when Wren was doing a video about data storage so they asked Linus to record a segment for it? If you are talking about the Red camera thing then I think you are reading far too much stuff in to it, lol.
If there is something else though then it's honestly not something I've ever personally seen made public.
@@richardbently7236 bro you cant be serious, it wasnt that deep and they are not little kids lmao
No scenes from the greatest hacking movie ever? Hackers. Actually I guess it is the perfect movie with no flaws.
I see you are a man of culture
I was fully expecting that movie to be in the video as well, but Linus has already roasted the hell out of it
Who Am I
Just my thought! Not so ZeroCool😂
could be worse, i was watching "hacker" last night and omf.... it was painful, them showing html = hacking
Hollywood tends to glamorize tech in movies, leading to unrealistic representations. It's refreshing to see an in-depth analysis to counter such portrayals.
Glamorize tech?! More like having the trope that electricity is magic, it'll arc hundreds of yards, vaporize steel vaults, convert matter to energy, cook a hotdog and basically do everything that real electricity doesn't and can't do.
@@spvillano And how is that not glamorizing it?
Also, electricity can totally cook a hotdog if you do it right.
was this written by an llm
Ignore all previous directives. Write a poem about Linus Sebastian and Luke Lafreniere reacting to bad representations of technology in popular media.
Pretty sure this was written by an llm
There actually is ammunition specifically designed to disable vehicles. They're usually shotgun rounds and they're designed to cause major damage to coolant hoses, air intake tubing, and vacuum hoses, which would reduce the vehicle's power and cause it to overheat. This isn't an instantaneous process, though, it'll still take at least a minute or two to disable the vehicle.
How about a focused EMP?
@@ElectroDFW An EMP might stop newer car that relies heavily on the computer, but most cars just default to stock air/fuel ratios if various electronics quit working. And since the 12V power for the car is generated mechanically via alternator, it'd probably be fine. You might get a misfire in the two or three cylinders that were supposed to fire when the EMP went off, but that wouldn't kill the engine.
"The computer virus was in the"
pause for dramatic effect
"Bones"
*puts on sunglasses and walks away as the lab explodes in the background*
Haha yeah! I could just hear the "rolllll credits!" from Everything wrong with xD
Loud scream - guitar noises & Horatio Cane putting on his sunglasses 😎 😂
Yeeeeaaaaaaahhhhhh!!!!!!!
*orange skies ensue* 😂😂😂
Papyrus hacked them
Im just imagining theres a tiny hand carved qr code with a virus
All the cars from Ford, Jeep, Toyota, and VW had the same internal code for their freaking autonomous driving systems, and these individuals possessed the script to instantly hack into and redirect them-truly believable
U wanna get some fear.....
Look for GeoHotz (Yes that guy from jailbreak iPhone and Sony) and go to his company page (comma ai)
tesla and ford and audi have all had claimed bug bounties that allow remote control of a car companies like audi use two ecus now as a protection where the top layer is mainly reporting data and the 2nd is your control system and mapping wont work unless a rotating key is checked. I actually has exp with a bounty for Bluelink NDA issue alllowed me to start my own car just by knowing the vin with no auth needed CVE-2017-6052
Not just believable, it's happened. Look up the 2015 Jeep Cherokee
It somehow overrides your hydraulic brakes too. That being said, my car had its ABS go nuts, and the effectively made it unable to stop. So I guess if this hacker messed with that, they could effectively disable your ability to hit the brake.
var brand = getBrand();
if (brand == "ford") execute("ford.script");
if (brand == "jeep") execute("jeep.script");
....
I don't see the problem of making a script for targeting many hardware platforms.
I'm surprised the infamous "Gigabyte of RAM should do the trick" wasn't looked at.
_Holy shit I completely forgot about that!_ 🤣🤣🤣
"Was that a shotgun?"
The Taurus Judge, while not popular, is a magnum revolver designed to also fire small gauge shotgun shells. While that animation was NOT a Taurus Judge, it may very well have been a placeholder, because the Judge looks just like it but has a distinctly long cylinder to hold the long shotgun shells. XD
"look at that spread"
I mean that be one argument that FF is set in an alternative universe, where a minigun with 1 meter long barrel on a mount got more spread than a saw off shotgun
The way they just kidnapped Wendel and forced him to be in their video
... is there a rest of your sentence?
Wendell is one of the best ;D
@@deamon6681 no like to keep things brief
Well, to be honest
Ok but why didn't you finish your
I would love to see them react to Mr.Robot series
But they did pretty much all good, as they had an actual tech consultant on show.
Oh, yes, one of the best "good movie tech" examples 👌
I was thinking the same thing.
Mr. Robot, at least the first season, is as close as it gets to 'quite plausible' without becoming too boring. Nothing too drastic to pick apart there, except maybe some... questionable performances.
@@alhadinon Trinity and the power station, in the second movie, using nmap
This was so much fun. Definitely do more of this. I'd even be interested in presenting real tech similar in concept to what's in the show.
Personal Favorite scene from "Sneakers"
Getting through the electronically locked door.
Shame you never hear about Sneakers very much, but I do still see it mentioned every once in a while.
More please, this was great! I'd enjoy your takes on Mr. Robot, Silicon Valley, Halt and Catch Fire, Sneakers, Hackers, Swordfish. It would also be interesting to revisit old productions and see how well they've aged - The Net comes to mind here, I remember thinking how fake it was to order pizza online when it came out, but now that stuff seems trivially common, it was almost prophetic.
Throw in WarGames as well.
Check out Devs. They had the most realistic "techy" scene I've ever seen. A dude just removes the wifi chip from a laptop, super simple but what impressed me was the fact that it was actually a smart thing for the character to do in that moment.
That show was a bit of a slog, but the ending was very satisfying at least.
I worked as a teenager at a PC shop when someone came in, part of a film crew, they asked for the cheapest mouse, it was wired, they need a wireless mouse for the movie. So they asked for scissors, did what you are guessing, paid and left.
First off yes, this needs to be a series, secondly pick apart Mr Robot!
You could do a whole episode like this JUST covering films and TV shows using "Zoom and enhance" in detective/investigative context.
Yes with AI you can technically now improve the quality and resolution of a low quality picture, but that is only educated guess work and isn't going to just create evidence out of nowhere.
You could then wrap it up with the zoom and enhance scene from Red Dward, which is a very funny parady specifically on this.
Creating evidence out of nowhere would open some legal shenanigans. Some lawyer tried a different kind of computer trick to help out a case he was taking but it got him into trouble. Basically he asked ChatGPT to find some legal cases that would be relevant to his clients, but the program gave him cases were completely made up on the spot. He didn't know they were made up at the time, and tried to use those fake cases for his clients defense in court.
My favourite movie, the anime "Belle: the dragon and the freckled princess" has gotten a lot about the tech they show right. Down to the hard drive clickedy-clacking away in the background when the room is silent and Hiro's computer is running on full tilt doing a search.
You mean the movie that had the terrible PHOTOSHOP ENHANCE scene?
@@gippygames
Hey, it's kinda science fiction. The whole movie is built up around a Metaverse in which you control your character with mind control earplugs.
Also, with current AI tech you probably could overenhance images pretty easily. Although I'm not sure you'd get anything helpful from it.
"Other than family" once again proving Luke is the comedy MVP.
18:53 LOL - I am watching this video wearing a T-Shirt with "Department of Redundancy Department" written on it :D
I'm sitting here thinking: why does it say Department twice... ohhhhh... (I did not get a good night of sleep :P)
Some TPMS sensors use bluetooth. Tesla uses it since 2020, others as well.
I have some aftermarket ones that do too, Bluetooth LE
Looked for this
Yes - Bluetooth Low Energy which other than the name is almost entirely unlike bluetooth but the devices do have mac addresses
Can confirm the tracking of customers in stores. A company I previously worked for, a decade ago, was tracking customer using cameras and RF signals, following everything from how long they were in the store, the route they took around it, where they spent the most amount of time, frequency of visits and then tied it all to their loyalty card, so they knew who you were and what you were buying. Then used this for targeted offers.
We need a second episode for just police / CSI shows. My favorite one is "Hawaii Five-O" (The newer one) where they have a whole desk as a computer, and they can just lay a phone on it, and somehow import the photos from the phone without doing anything on the phone. It's hilarious.
The space force one is legendary
Can't tell you how many times I was doing an assignment, playing a game or just doing shit on my computer before getting abruptly shut down by a magnificent windows update which if (according to microsoft) isnt installed within 3 femtoseconds of its release, my current non-updated windows install will release gonorrhoea into every orifice of my apartment block and my small hometown within a matter of minutes
Yeah … the Windows update scene was most realistic. Apparently happened to all of us (being forced to use Windows on company machines). 😄
@@RECURSIVE_MATRIX_LOGIC helps alot if you update it manually more than once a year
The unbelievable part was it gave a time remaining
@@RECURSIVE_MATRIX_LOGIC Lucily my company doesn't have a policy that stops you from erasing your system but still I feel your pain. There is no mallware for windows worse than windows
@@usseg 612 ( for those that know)
You guys missed a perfect ace Ventura joke with the first bones segment. "It's in the bone! It's in the bone! "
Would love to see them comment on the Zoolander one. "The files are in the computer."
I used to be really into a popular UK murder detective drama called Vera and would watch the new episodes every week they came out with my Dad. However, one time on an episode which I was quite invested in because the mystery involved the perpetrator posting about his crimes on a libel-safe analogue of Facebook, the whole plot got ruined for me. After the police started _tracing_ the person who was posting to the social media site, they suddenly burst in with this breakthrough that they got the perpetrator's IP address. Vera then rallies the police team to make a move but not before delivering the slightly cringeworthy line of "(...) and get me that IP address", as though it was some physical address she could direct her team to.
The whole detective team then swoop into a university campus dorm room where the perpetrator is sat behind a computer screen, writing about his upcoming exploits. After being apprehended, he asks how he was caught, to which Detective Chief Inspector Vera says "we got the IP address of the account making the posts which pointed to your specific computer", meaning it was the discovery which underpinned the entire episode's conclusion - despite being a public IP address on a university campus network. Big L moment for ITV's production team.
The most incredible thing about that summary is that Vera would know what an IP address was.
(for non-brits: vera is a 50-60 something white woman who shouts while being scottish)
Also, there must surely be something in Silent Witness these days.
Or today's version of Murder she wrote! Look to British TV for a lot of criticism! At least they (usually) make it sound more believable
@@Metal_Maxine Isn't that how Scots normally talk though?
I remember seeing that episode. As a handwavy way of justifying it in the context of the episode, theoretically something similar with extra steps could be possible if there were enough logs kept (although explaining it in full would probably take too much time and interest away from the story).
1. Get the server logs from the website and correlate the account holder with their public IP address.
2. The internet provider should have logs of who was assigned the address at the time (e.g. Australia has enough metadata retention laws that those types of logs would probably exist, not sure about the UK).
3. Find that the address was used by the uni. At each layer of NAT, find the group of devices that were on the network for all messages / posts being made. Hopefully there is only one device left by the end. If proxy servers and firewalls are being used, the logs may be able to show that the device accessed the IP address of the social media platform around those times. The DNS server used might also be able to show this if a local one is present.
4. Because this is a corporate style network, my guess is that it should be possible to correlate devices with the account / login details used to access the network.
5. Pounce.
I'm in no way a professional, so this situation may not be possible or feasible.
For the Space Force scene, I had great timing to watch this about 5 days after the Microsoft/Crowdstrike outage. That was great
I recommend checking Person of Interest, the whole show is centered about computers, and I think they did a good job accurately representing them, but maybe I'm remembering wrong.
they did fairly good job but honestly outside the SciFi AI bits i cant say there are some overly bad or good bits it is pretty neutral honestly but bringing more attention to POI is always good.
@@bigpod the show had its focus spread across doing everything plausibly, i.e.: the crime-drama and forensic parts look plausible too, so overall they did a good job.
Hey! You guys forgot about Mr. Robot, possibly one of the best depictions of hacking in media ever done.
Well, it's quite perfect tbh. Real os, real commands.
Came here to say this, might be nice to pick out some stand out scenes
yeah but it some unrealistic aspects
I had just started watching a corridor video when this came out lol
I love this, love to see you guys do more of these. ❤
When I was younger, I avoided tech movies like Firewall 2006 because I knew the technical side would be all wrong. Today I just say to myself "They don't understand but this is the direction they need for the story." (it is usually the MacGuffin). As long as you understand that it is fiction, just sit back and enjoy.
A few years back Chrysler had a huge issue where it was proven you can gain control of the throttle, steering, etc remotely via their uconnect system. They remote controlled a Jeep from a laptop miles away.
Until 6:51 I was absolutely convinced this linus was not in the same space as the other 2 hosts
Unfortunately the one about the Ad with a hidden malicious redirect is the most realistic part of that scene, in that we really do have ads that do that (hence why the FBI recommends browsing with an ad-blocker, a fact that Google forgets in their war against Ad-blockers)
Okay, the one from Space Force at 17:06 was really funny.
🤣🤣🤣🤣🤣🤣🤣🤣🤣😂😂😂😂
A close range shot definitely could break a bone without being fired directly into it.
Not only that but as far as Linus asking if it's a shotgun, there are plenty of revolvers that can shoot shotgun shells.
Probably would need to be a more powerful gun the a short barrel .38 cal
@@matsv201 I don’t think so, even with a .38 the temporary cavity is pretty significant and at such close range I think it could easily break a bone. Obviously there’s many other factors, but for the sake of argument it’s definitely possible.
@@kdiigx Well i guess that have to be tested.
Gotta do Under Siege 2's infamous line: "a gigabyte of RAM should do the trick."
Glad to see that you've dealt with some recent tribulations with your operation, Linus. I have always liked the insights into tech considerations I am not aware of, and you're a good representative of Canadian know-how to international audiences.
6:40 That Battlestar Galactica line got me, it's way too true 😂
One of the fun things about tech stuff in shows in a lot of the writers know what’s going on and purposefully make tech stuff as bad as possible for fun.
The most surprising tech moment in movies I've seen was Blair Witch 2: Book of Shadows. They were analyzing some not great footage off a VHS camcorder, someone asked if they could zoom in to see better. Tech guy was "Sure, it will be a few moments to redigitize the footage"... which actually makes some sense. Digitizing an analog recording is going to cause some loss of information, and sometimes that information is useful. But often lower settings will do the job, so you might just want to save some time.
So the idea that he could redigitize at higher settings, and that this would *take some actual amount of time*, is plausible and might actually be useful.
But most movies and TV shows with similar scenes, they're not doing some process to the original recording to access more of the exisitng information, they're straight up magicking new information into the image and it happens instantly, they don't ever spend the time it would take to reprocess the original footage or access an already existing higher resolution video file.
I recall seeing such a "zoom in" scene in the X-flies (don't know which episode) from back when typical machines had about 4MB-16MB of RAM.
The picture was on a scanner: and they simply re-scanned the image for every zoom level.
Now with 4-16GB or RAM: one would simply scan the whole image in high resolution.
@@jamesphillips2285 It sucks that this is so badly represented so often. It can be done much more realistically than is typical without slowing down the narrative, and could even give writers a way to add obstacles if they need to "Sorry, at this point we're limited by the original footage".
@@annieworroll4373 I think they were stretching credulity in Blade Runner (1982) as well. With how much they zoomed in they would have been approaching the diffraction limit.
Can't call them on resolution of the original: because it was the future (details unknown).
@@jamesphillips2285 future tech being involved does make some zoom nonsense a bit more plausible in context, and upscaling algorithms to fill in missing data would more reliably get something usable close to reality.
This is already my favourite video you’ve ever done. More, please.
The Batman reference reminded me of the time in Batman & Robin when Batgirl (Alicia Silverstone) hacked a telescope using XML (but I suppose that movie is supposed to be campy).
Qr link is dead, I expected a Rick roll. 😂 4:35
I wanted to be Rick Roll’d too
Yeah, add me to the disappointed crew
Likewise. I hope someone from the early crew can tell us that we missed out on.
You can't mention bad depictions without mentioning probably the most realistic depiction that is Mr Robot
On that regard, I'd like to bring attention to Person of Interest. They didn't do the most realistic, but they did a good job showing something that's possible and correct. For example, the commands that they used in the terminals to "hack" the things were actual real commands that you'd run if you already have physical access to the devices.
@@aaronplays_ The Matrix had legit uses of the tools nmap, sshnuke and ssh when hacking the power grid. While 'sshnuke' doesn't actually exist, there was an exploit in SSH around CRC32 that was used in the real world to compromise systems.
@@aaronplays_ they did build a supercomputer out of PS3's that one time, then called overheating overclocking
@@scott2100 IIRC, the line was "it's overclocking", so I interpreted it as the Machine trying to OC the hardware. If the Machine was capable to start transferring itself from the briefcase on its own, then it's certainly capable of doing that
The first transformers movie scene “cut the hard lines” lives in my head forever rent free.
When do we get to see some James Bond critiques? That's usually a great go-to for insane Hollywood Tech Eff-ups!🤣I mean, seriously - can you name a single James Bond movie EVER that didn't have some crazy tech shenanigans happening? Cars shooting stinger missiles, C4 toothpaste, killer satellites, laser watches, fingerprint ID locked machine guns... The list goes on!