Chris Domas: The 1s and 0s behind cyber warfare

แชร์
ฝัง
  • เผยแพร่เมื่อ 11 พ.ย. 2024

ความคิดเห็น • 285

  • @ziggyjuarez8544
    @ziggyjuarez8544 หลายเดือนก่อน +10

    This is going to be a popular video today.

    • @TotalImmort7l
      @TotalImmort7l หลายเดือนก่อน +1

      coming from /g/?

    • @allencummings7564
      @allencummings7564 หลายเดือนก่อน

      I'm coming cuz I remember this video and being horrified at the implications way back when. Looks like the implications are becoming much more explicit :(

  • @trapenoone6904
    @trapenoone6904 4 ปีที่แล้ว +9

    I don't why people talk about this guy sarcastically, but this man is a same man who found vulnerability in x86 Intel processor back in 2015 and at that time people never really thought about the possibility. He show the potential that the vulnerability could be weaponize to gain highest privilege access deep inside the processor fully undetectable by the OS, even full memory forensic is never going to detect it. It's basically a GOD MODE backdoor.

  • @ratache
    @ratache 10 ปีที่แล้ว +29

    He was very careful not to mention the other areas of applicability this piece of technology has that affect civilian privacy and citizen integrity.

    • @justinlavine9209
      @justinlavine9209 ปีที่แล้ว

      Unfortunately, the truth is that cyberwarfare looks nothing like the shock violence in this movie.
      From my experience, it has more to do with torturing, raping, and involuntarily lobotomizing civilians, and inciting civil unrest so as to turn families against each other in order to turn people against their better interests as a society. It turns out that the same tools that are used to steal intellectual property are used with equal ease by terrorists and nations to reassign blame in ways that make Hitler's pograms look tame by comparison.
      The scientists who put this branch of study together should be ashamed of themselves, as it is very clear to me the organizations and countries presently using and investing in these techniques and technologies have little interest in handling them responsibly or for the greater good. The massive and largely unregulated expansion of the cybernetics industry has caused more problems in the West then these groups will ever admit to, and unfortunately, those problems are far outside of their ability to control or rectify as the victims themselves are the only ones facing any consequences.

  • @MrKrooper
    @MrKrooper 10 ปีที่แล้ว +18

    I do not understand how all of you can comment on this sarcastically without having any idea about what you (or the hacker for that matter) are talking about. The core concept of the talk is translating binary code and the appliances of such an action. He explained that the current process is taking ages and is the complete opposite of efficient, whilst he is offering a revolutionary method that would help the specialists read and translate raw code virtually a hundred times faster! This is the first step to creating a universal interface for analysing and translating binary.

    • @danguolestrumilaite2597
      @danguolestrumilaite2597 10 ปีที่แล้ว

      if to stop means to stop but if not to stop that kind madness like kenedy chaos ,becourse its working still where in danmark people raped by the id so its kind they have what tomake with compures even biology or chemic did you se they try to find genies to be terrorist like kenedy run awy up thre when kil by this her family so acahemed

    • @MrKrooper
      @MrKrooper 10 ปีที่แล้ว +5

      Danguole Strumilaite I'm sorry, what?

    • @justinlavine9209
      @justinlavine9209 ปีที่แล้ว +1

      Unfortunately, the truth is that cyberwarfare looks nothing like the shock violence in this movie.
      From my experience, it has more to do with torturing, raping, and involuntarily lobotomizing civilians, and inciting civil unrest so as to turn families against each other in order to turn people against their better interests as a society. It turns out that the same tools that are used to steal intellectual property are used with equal ease by terrorists and nations to reassign blame in ways that make Hitler's pograms look tame by comparison.
      The scientists who put this branch of study together should be ashamed of themselves, as it is very clear to me the organizations and countries presently using and investing in these techniques and technologies have little interest in handling them responsibly or for the greater good. The massive and largely unregulated expansion of the cybernetics industry has caused more problems in the West then these groups will ever admit to, and unfortunately, those problems are far outside of their ability to control or rectify as the victims themselves are the only ones facing any consequences.

  • @KPPunKReloaded
    @KPPunKReloaded หลายเดือนก่อน +5

    happened in lebanon

    • @nacholibre134
      @nacholibre134 หลายเดือนก่อน

      Herding humanity bro... But yeah it's all coming together

  • @tware1721
    @tware1721 8 ปีที่แล้ว +5

    I found this very intriguing, what was more interesting was how in the presentation he demonstrated how our minds are able to recognized patterns in mere seconds. At least for those who caught it .

  • @SC2warms
    @SC2warms 10 ปีที่แล้ว +35

    I don't trust this guy. He looks and sounds just like Cypher from the Matrix!

  • @CVDPDNB
    @CVDPDNB หลายเดือนก่อน +5

    😅 This aged well.

  • @SAsgarters
    @SAsgarters 10 ปีที่แล้ว +36

    "unlocked the means to stop the bad guys"
    Or the good guys.

  • @TheTheads0
    @TheTheads0 10 ปีที่แล้ว +18

    Whenever he talked about cyber attack, i can only think of Kim Jong Un challenging Obama to a starcraft 1v1.

    • @justinlavine9209
      @justinlavine9209 ปีที่แล้ว

      Unfortunately, the truth is that cyberwarfare looks nothing like the shock violence in this movie.
      From my experience, it has more to do with torturing, raping, and involuntarily lobotomizing civilians, and inciting civil unrest so as to turn families against each other in order to turn people against their better interests as a society. It turns out that the same tools that are used to steal intellectual property are used with equal ease by terrorists and nations to reassign blame in ways that make Hitler's pograms look tame by comparison.
      The scientists who put this branch of study together should be ashamed of themselves, as it is very clear to me the organizations and countries presently using and investing in these techniques and technologies have little interest in handling them responsibly or for the greater good. The massive and largely unregulated expansion of the cybernetics industry has caused more problems in the West then these groups will ever admit to, and unfortunately, those problems are far outside of their ability to control or rectify as the victims themselves are the only ones facing any consequences.

  •  10 ปีที่แล้ว +46

    Take one shot of Jaeger each time he says CYBER!

    • @Sebastian_Gecko
      @Sebastian_Gecko 10 ปีที่แล้ว +8

      Jäger*

    • @TheCryztalmeth
      @TheCryztalmeth 10 ปีที่แล้ว +6

      *****
      I think you mean above. Oh wait! Dammit!

    • @MarcGroefsema
      @MarcGroefsema 10 ปีที่แล้ว +2

      TED variant of the "Hackathon" drinking game from "The social Network " x]

    • @HaakonHawk
      @HaakonHawk 7 ปีที่แล้ว

      I'm gonna take a shot everytime he says 1's and 0's.

    • @peeetew
      @peeetew 6 ปีที่แล้ว

      hahaha!

  • @kosmique
    @kosmique 5 ปีที่แล้ว +9

    watching this video "hmmm we sure have some smart people on this planet"
    reading the comments "hmmm we sure dont...."

  • @ricktardif
    @ricktardif 10 ปีที่แล้ว +1

    I hope this guy never dials the wrong number...

  • @yurikolovsky
    @yurikolovsky 10 ปีที่แล้ว +4

    This is fantastic! Now I want this pattern technique used in an image detection program

  • @chaosjacky
    @chaosjacky 10 ปีที่แล้ว +46

    Why just think of terrorists when you discover that kind of potential ? Man, I'm beginning to think that in order to convince an american, just mention that you've found a way to protect from terrorism and they'll be throwing dollars at you

    • @7Dimensi0ns
      @7Dimensi0ns 10 ปีที่แล้ว +15

      Welcome to the fear mongering post 911 world friend.

    • @Vidar_Odinson
      @Vidar_Odinson 10 ปีที่แล้ว +5

      It's the new Russians post-Cold War. Sadly this time around, the money isn't going to NASA and space exploration.

    • @rajvinjamuri7
      @rajvinjamuri7 10 ปีที่แล้ว +1

      As 7Dimensi0ns said, this is the world after 9/11. Don't forget that the Pentagon was hit too, and China stole the design data of our latest-gen fighter jet, the F-35. The world of cyber-warfare is terribly real and present, not something that is upcoming.

    • @Popsickles1493
      @Popsickles1493 8 ปีที่แล้ว

      +chaosjacky Bc thats what cyber security is about lmfao

    • @Popsickles1493
      @Popsickles1493 8 ปีที่แล้ว

      +chaosjacky Bc thats what cyber security is about lmfao

  • @RalphDratman
    @RalphDratman 10 ปีที่แล้ว +13

    Is Chris Domas serious when he says it is bad that we have to defend against a new kind of attack, but GOOD that we can attack others, such as "terrorists"?
    Does he think we are living in a cops and robbers TV show, where good guys only do good, bad guys only do bad, and we always know which is which?

    • @rajvinjamuri7
      @rajvinjamuri7 10 ปีที่แล้ว +1

      Attacking known hubs of cyber attacks against you can slow them down. How do you take down people attacking you?
      At the same time, we cannot assume that all the people in American authority using this has perfect motivation and targeting either.

    • @SebastianAudet
      @SebastianAudet 10 ปีที่แล้ว +1

      VinjaNinja
      He said it himself - bullets and police chases.
      Who gave those in 'authority' their authority anyways? Chris Domas is a pretty good example of why these people are trash - they are so caught up with themselves they fail to see just how harmful they really are. People in positions of power are never to be trusted, especially the ones, like himself, who 'happen' across it.
      There have been studies done, as well as millennia of history that show just how (and how badly) power corrupts.

  • @jordangourley3955
    @jordangourley3955 หลายเดือนก่อน +2

    How is the “visual abstraction” generated?

    • @allencummings7564
      @allencummings7564 หลายเดือนก่อน

      Trade secret maybe?

    • @jordangourley3955
      @jordangourley3955 หลายเดือนก่อน

      @@allencummings7564 possibly. Or it could be total bullshit. Binary language is a digital concept. Abstract visualization is an analog concept. At no point did he explain how he crossed that bridge.

    • @allencummings7564
      @allencummings7564 หลายเดือนก่อน

      @@jordangourley3955 yeah, could be total bullshit I agree

  • @karagiannisboris
    @karagiannisboris หลายเดือนก่อน +2

    LIKE WHAT THEY DID IN LEBANON? 18/9/24

  • @Overonator
    @Overonator 10 ปีที่แล้ว +8

    There us something perverse about discussing blowing up cell phone batteries and possibly killing their users and juxtaposing cute kittens.

  • @Vidar_Odinson
    @Vidar_Odinson 10 ปีที่แล้ว +17

    "Blonde, brunette, redhead..."

    • @willhendrix86
      @willhendrix86 10 ปีที่แล้ว +2

      Probably thinks he looks like Cypher also... lol

  • @Raisin_Girl
    @Raisin_Girl 10 ปีที่แล้ว +3

    Did anyone else catch themselves giving their phones or computers a suspicious look while listening to this?

  • @mhtinla
    @mhtinla 10 ปีที่แล้ว +12

    What does CYBER mean?
    Well, let's do "CYBER" and I'll show you ;-)

  • @Illasera
    @Illasera หลายเดือนก่อน +1

    does it work on pagers and walkie talkies?

  • @MrViveksingh11
    @MrViveksingh11 หลายเดือนก่อน +3

    Well well well

  • @MrFucius
    @MrFucius หลายเดือนก่อน +1

    So now we know "cyber is a real domain of power" - Bibi

  • @timetuner
    @timetuner 10 ปีที่แล้ว +6

    Screw cyber security. Get this man working on ways to visualize genetic code.

  • @unchaynd7266
    @unchaynd7266 9 หลายเดือนก่อน +1

    Couldn't help but notice that there is no link to Christopher's software that he uses to visualize the data. Where might one find that software?

  • @kevinwestrom4775
    @kevinwestrom4775 9 ปีที่แล้ว +4

    That is a brilliant new way to use the human ability of our analog-based vision, to take the digital binary language and analyze it in mere seconds. Other types of information could be visualized for instant analysis as well, for much quicker malware analysis of viruses, worms, cyber weapons, etc.

  • @Dloc47
    @Dloc47 3 ปีที่แล้ว +1

    He never said how did he changed binary pattern into visual abstract!

    • @Gameboygenius
      @Gameboygenius 2 ปีที่แล้ว +1

      Search for "cantor dust binary visualization" and "veles binary visualization".

  • @GonzoooderGuertel
    @GonzoooderGuertel 10 ปีที่แล้ว

    "To stop the bad guys" it's kind of a naive ending, but what mindblowing idea !!

  • @CursedJoker
    @CursedJoker 10 ปีที่แล้ว +8

    Am i the only one thinking that he could at least use hexadecimal instead of looking at endless pages of binary?

  • @InayetHadi
    @InayetHadi 10 ปีที่แล้ว +2

    The video is chopped up.
    Btw - cyber war fare is the new level playing field, allows individual or group of individuals to act with the resources of state.

    • @rkkm67
      @rkkm67 3 ปีที่แล้ว

      Wdym by chopped up?

  • @MoerreNoseshine
    @MoerreNoseshine 10 ปีที่แล้ว +6

    I lost some espresso that was in my mouth (and subsequently had to clean the desk) when he started talking about "evil people doing evil things". A relative of the Bush family? Evildoers, beware! The level of this talk is kept insultingly stupid. Unfortunately his masters seem to have a point, judging from the amount of upvotes he still gets. And you know, I *could* actually agree with at least some of the thoughts behind it, if only they wouldn't treat the population like (the) total idiots (they are?).

  • @LeonidasGGG
    @LeonidasGGG 10 ปีที่แล้ว +2

    This is a really good talk and a very innovated idea.
    I just didn't like the example of "exploding batteries" because, I'm pretty sure that they would use it to blow up every phone in a determinated area just to get the terrorist, regardless of if it could harm civilians...image if a kid was talking on his phone and it blew up in his face?

    • @JohnPaton3
      @JohnPaton3 10 ปีที่แล้ว +3

      Your assumption that a strategic attack of that skill level would carelessly deploy a weapon, that could be more accurate, with less proficiency than is necessary simply because they haven't gathered specific intelligence is indicative of your skewed perception from pop-journalism media. I blame fox news; it's not your fault.

    • @rajvinjamuri7
      @rajvinjamuri7 10 ปีที่แล้ว +1

      "I'm pretty sure that they would use it to blow up every phone in a determinated area" I highly doubt an authoritative figure would indiscriminately blow up several phones when they can easily target the one phone in question. Unless others are in extremely close proximity, blowing up others is not only illogical but pointless.

    • @JohnPaton3
      @JohnPaton3 10 ปีที่แล้ว +2

      VinjaNinja
      I already said that, but thanks ?

    • @RalphDratman
      @RalphDratman 10 ปีที่แล้ว +1

      VinjaNinja Doing things that are not only illogical but also pointless is the specialty of desperate people everywhere. In a moment of life or death, doing something illogical and pointless has the tremendous advantage of being entirely unpredictable. The U.S. military is no exception.

  • @cheeseisgreat24
    @cheeseisgreat24 10 ปีที่แล้ว

    I'm seeing a lot of comments that either show the people only watched half the video, or have absolutely no idea what he is saying and commented anyway. To reiterate his point, he is converting an arduous but important task into a task that our brains pick up and do naturally so that he can sift through mountains of 1s and 0s in a tiny fraction of the time it would normally take. Yes, it is effective, and yes, it will totally assist in the later portions of reverse engineering and hacking. It makes your starting point only a few hours or days long instead of a few weeks or months long. Also, the data he is analyzing is not at all random, not even in the slightest. He is analyzing the code of a machine made by humans and written by humans. That is not at all random. That's not even Pseudo-random. Monumental? yes. random? no. Especially when you look at it through his nifty visualizations which allow you to see precisely what the code is regardless of what the code actually does or says. He can use that visualization to determine whether he's looking at an english text file, a russian text file, a picture, an audio file, or machine language, all in a few moments compared to how long it would have taken before.

    • @justinlavine9209
      @justinlavine9209 ปีที่แล้ว

      Unfortunately, the truth is that cyberwarfare looks nothing like the shock violence in this movie.
      From my experience, it has more to do with torturing, raping, and involuntarily lobotomizing civilians, and inciting civil unrest so as to turn families against each other in order to turn people against their better interests as a society. It turns out that the same tools that are used to steal intellectual property are used with equal ease by terrorists and nations to reassign blame in ways that make Hitler's pograms look tame by comparison.
      The scientists who put this branch of study together should be ashamed of themselves, as it is very clear to me the organizations and countries presently using and investing in these techniques and technologies have little interest in handling them responsibly or for the greater good. The massive and largely unregulated expansion of the cybernetics industry has caused more problems in the West then these groups will ever admit to, and unfortunately, those problems are far outside of their ability to control or rectify as the victims themselves are the only ones facing any consequences.

  • @unclejeezy674
    @unclejeezy674 5 ปีที่แล้ว +1

    Having seen this guys other videos... I need to develop a program that looks like a meme when he loads it into the visualizer.

  • @XNAforyou
    @XNAforyou 9 ปีที่แล้ว +1

    I use disassemblers and debuggers to reverse engineer binary files... yes it is time-consuming but effective... Not sure about this, but I welcome work that aims to address this issue

  • @JodsLife1
    @JodsLife1 10 ปีที่แล้ว

    know your strengths

  • @MarcusMorgan
    @MarcusMorgan 10 ปีที่แล้ว +5

    Still have to wonder why your smartphone can be made to remotely explode. Sounds like a product liability to me. Can I sue the manufacturer if my hand is burned?

    • @nacasius
      @nacasius 10 ปีที่แล้ว +1

      Its your job to be educated about anything you buy.
      Your phone has a battery.
      Batteries create Heat.
      Don't like it?
      Simply don't buy anything with a battery.
      Welcome to the stone age.

    • @MarcusMorgan
      @MarcusMorgan 10 ปีที่แล้ว +4

      nacasius A flashlight can't be made to explode by remote control. It can fail if poorly constructed or if damaged by impact. While it is important to be knowledgeable about devices you buy, the manufacturer has substantial responsibility to provide a reasonably safe device instead of a remote control controlled remotely. I solve this particular problem by turning my cell phone off and wrapping it in a Faraday shield. Reduces the attack space to almost zero.

    • @nacasius
      @nacasius 10 ปีที่แล้ว

      Sounds sane.
      Congrats.

    • @adrianbarum3372
      @adrianbarum3372 10 ปีที่แล้ว

      ***** True, now we have Ida!

    • @annoloki
      @annoloki 10 ปีที่แล้ว

      Poorly made lithium ion batteries have been known to explode and cause injuries during charging. Properly made batteries have heat regulators on them which cause them to stop charging if they become too warm. Laptop batteries have the code that controls this on a chip in the battery pack itself, so the battery can shut itself down if it gets too hot. It's possible phone batteries don't, hence why plugging newer phones in to charge, while turned off, half turns them on first. Seems pretty far fetched though.

  • @HubbaRock84
    @HubbaRock84 10 ปีที่แล้ว

    Amazing! True pioneer

  • @ArsalanJawaid1
    @ArsalanJawaid1 8 ปีที่แล้ว +1

    Very nice

  • @FredMF
    @FredMF หลายเดือนก่อน +3

    not to theoretical anymore

  • @paulmertens5522
    @paulmertens5522 10 ปีที่แล้ว

    Awesome stuff

  • @lbgstzockt8493
    @lbgstzockt8493 ปีที่แล้ว

    The camera has a stuck pixel in the top left of the frame.

  • @bign00bs
    @bign00bs 10 ปีที่แล้ว +1

    The majority of comments seem to be from people disappointed at what they wanted this presentation to be about and not what it actually is about. Cut a hole in your boxes and climb out.

  • @frankblangeard8865
    @frankblangeard8865 8 ปีที่แล้ว

    'We' have a whole new way to prevent evil people from doing evil things. But...what if we become the evil people doing evil things. 'If the light that is in you is darkness, how great that darkness is'.

  • @bryanlavigueur7181
    @bryanlavigueur7181 5 ปีที่แล้ว +2

    That kitty pic could of been steganography encryption which had a message in it

  • @matthewgrimsley4506
    @matthewgrimsley4506 7 ปีที่แล้ว +2

    For a much more technical (and satisfying) version of this talk watch: th-cam.com/video/4bM3Gut1hIk/w-d-xo.html

  • @numbah12time
    @numbah12time 10 ปีที่แล้ว

    They should have Jacob Appelbaum do a Ted presentation. :)

  • @crazzzik
    @crazzzik 10 ปีที่แล้ว

    TL;DW version: It helps to visualize data in different ways while reverse engineering it.

  • @jessicapennell5252
    @jessicapennell5252 10 ปีที่แล้ว

    So was the greyscale picture of a kitten a pgm file, and the color picture a pnm file, and that's why laying out the raw data in a grid and zooming out on it actually meant anything?

  • @metaedward8011
    @metaedward8011 10 ปีที่แล้ว

    Take a lesson from this guy: If you're going to explain technology to noobs, start off with talk of exploding cellphones.

  • @zephy777
    @zephy777 10 ปีที่แล้ว

    Thats so cool!

  • @WMfin
    @WMfin 10 ปีที่แล้ว +12

    Interesting talk but I hate that talking about terrorists.
    And I wouldn't like to see this battery exploding thing used against protesters etc.. So if US gov owns this technology then I am worried and Chris wouldn't be talking about terrorists if US gov would play it's cards right with other nations and not create more terrorists with pointless wars..

    • @luisdanielmesa
      @luisdanielmesa 10 ปีที่แล้ว

      His talk has this hypothetical situation to divert the attention from a real world use... he needs to have the terrorist's phone or else he wouldn't be worrying about kittens... he means he can grab an electronic device (imagine you cross the border into the US (border crossing, airport, etc) where the law allows for all your electronics to be seized indefinitely, scanned and copied) and they don't need to have your phone's password to know what's inside. They can see your contact list, messages, pictures, etc.

  • @orsonincharge4879
    @orsonincharge4879 10 ปีที่แล้ว

    Pretty sure the phone would heat up to the point you would drop it or throw it before it blew up . Theoretically .

  • @Kenckaplus
    @Kenckaplus 10 ปีที่แล้ว

    My dream of reverse engineering byte code into source code is near.

    • @algebraist1997
      @algebraist1997 10 ปีที่แล้ว

      That can already be accomplished... The IDA Pro disassembler has been around for years and can take as input an executable binary and display the assembly code. The HexRays decompiler can also produce pseudo-code or in some cases compilable C code. There are also free tools that can help you such as the Hopper disassembler and OllyDBG.

    • @Kenckaplus
      @Kenckaplus 10 ปีที่แล้ว

      MrLamaj123
      Wow thanks to let me know it.
      I think disassembling code might be easy, given you know what the architecture is. But decompiling byte code into C code again is really awesome.
      But still C is a low level programming language. Imagine how hard it should be to transform binary files to C++ source code, with code clarity, following standards, etc...
      This would certainly redefine software engineering...

  • @weeniehutjr8316
    @weeniehutjr8316 8 ปีที่แล้ว +4

    Life hack #7363: Easier way to blow up a phone, get a galaxy note 7

  • @crazyconstanta6807
    @crazyconstanta6807 7 ปีที่แล้ว

    Am I the only one who's first thought was
    "Wait what?! My cell-phone could blow up? And I'm carrying this in my front pocket near... you know... dang it... O_o"
    ?

  • @shway1
    @shway1 10 ปีที่แล้ว

    TED if i wanted to watch TEDx talks I would subscribe to the TEDx channel. please only upload relevant stuff to this channel.

  • @AirskiiMusic
    @AirskiiMusic 10 ปีที่แล้ว

    Wish someone without a military agenda gave this talk: it always feels wrong to hear the word terrorist thrown about so freely. Also I hope the NSA gets hold of this tech, I hear their track record is rather exemplary.

  • @jannovak7187
    @jannovak7187 10 ปีที่แล้ว +1

    Only thing I see is the Matrix and Cypher talking about it.

  • @tshwarelojoelmooke4351
    @tshwarelojoelmooke4351 8 ปีที่แล้ว

    This would be me, Understanding binary is the base of this modern technology. Understanding how a computer handles data sount interesting. I think it's time to take my binary understanding to the next level

    • @yambone635
      @yambone635 8 ปีที่แล้ว +1

      It's probably better to start with Assembly. Nobody directly reads binary. Assembly is about one level above that, and it is as "close to the metal" as you would ever reasonably need to get.

  • @FredMF
    @FredMF 10 ปีที่แล้ว

    are there any papers on this ?

  • @RDHeath
    @RDHeath 10 ปีที่แล้ว

    An interesting talk, but i don't like the obvious implications for military use. Are there not non-military, friendly uses for this?

    • @allencummings7564
      @allencummings7564 หลายเดือนก่อน

      I think something similar is used by companies like youtube, to find out if you're posting other people's intellectual property. That's why you see people posting shows and movies with a wierd border around them and garbled audio, to change what the "visual abstraction" looks like. Tho in this case it isn't just a visual abstraction it's a compressed signature of the data itself that can more easily be detected than finding the entire video

  • @mperritoz
    @mperritoz 10 ปีที่แล้ว

    This get's kind of interesting past the middle, though only kind of.

  • @ArjanKC
    @ArjanKC 10 ปีที่แล้ว +1

    I do not think you can explode batteries! Remotely!! That's just science fiction!

  • @MichaelSHartman
    @MichaelSHartman 10 ปีที่แล้ว

    If a language can be recognized or differentiated from other data forms, even distinguished from other languages then has anyone applied this to the study of animal sounds/language?

  • @Apvatar3000
    @Apvatar3000 10 ปีที่แล้ว +5

    Shouldn't computers of the future be reinvented and redesigned to be run on some other variables other than 1's and O's ?

    • @JoelPeltonen
      @JoelPeltonen 10 ปีที่แล้ว +5

      Look up quantum computers, they are basically an attempt to add a third option. The problem is that the issue is hardware-level, which makes it very difficult to overcome. all of the 1's and 0's are still switches that are on or off. And all the hardware that we have relies on those assumptions.

    • @Odin31b
      @Odin31b 10 ปีที่แล้ว

      Joel Peltonen well put. .

    • @idogtv
      @idogtv 10 ปีที่แล้ว

      ... what?

    • @rajvinjamuri7
      @rajvinjamuri7 10 ปีที่แล้ว +5

      1s and 0s are an abstraction above what is happening in the hardware, which is high and low potential voltages, which is likened to high/low concentration/flow of electrons. Even quantum computers won't replace this "traditional" tool, as they are only better at certain types of calculations.

    • @jackinsf
      @jackinsf 10 ปีที่แล้ว +1

      Google "quantum computing". As I understand it; its still 1's and 0's but instead of being either/or sometimes it is both a 1 and a zero at the same time. Technology gets more complex as it evolves not less complex. The point he made about translating raw data to a visual representation (we are pattern seeking animals) takes a non native format and puts it into our brains native format. Brilliant. Don't get me started on the whole terrorism is a tool deployed by government to keep us all in fear so not only do we not protest losing our rights; people demand random searches and cell phone spying to " keep us safe"! Orwell was an optimist it turns out. Big brother is watching!

  • @CodeAsm
    @CodeAsm 7 ปีที่แล้ว

    His tools are on Github and you can use GIMP to see image data in binairies. I use this to disect firmware and games to find hidden code or images.

  • @RamJamSky
    @RamJamSky 10 ปีที่แล้ว +2

    Right... I have NEVER encountered a cyber security expert who works on a binary level. Binary is the LAST STEP of raw data with many layers in between. Getting back actionable functionality from binary is like figuring out what movement your elbow can make looking at nucleotides. It's extremely far removed. i.e. NOBODY looks at nucleotides to figure out how elbow's move. You look at the muscle, joints, etc.

  • @xGCPiE4SaQ0Lbc
    @xGCPiE4SaQ0Lbc 10 ปีที่แล้ว

    might be an interesting way to detect stenography

  • @oniricPrj
    @oniricPrj 10 ปีที่แล้ว

    Ok, sooooo...
    1. I'm supposed to still be walking around with a potential bomb
    2. I'm supposed to be walking around without any privacy in my life (well: knew that already)
    3. If we fight terrorists, we blow them up instead than trying to capture them?
    AWWWW look at me! I got so "ethical, and stuff"! Silly me, silly me.
    Anyway thanks for spreading this idea: always good to know Big Brother is looking after us ;)

  • @Zander101084
    @Zander101084 9 ปีที่แล้ว

    Half the commenters on this page who are calling bullshit on this guy think they're smarter than him and probably haven't ever written a single line of code, but those will be the same people rioting in the streets in protest after agencies like the NSA infringe on their privacy. There is no hope for humanity.

  • @TheTrafiz
    @TheTrafiz 10 ปีที่แล้ว

    So who developed the algorithm to convert the binary into visual data? Was it him or is he using an algorithm that's already in use but just publicising it on TED?

    • @godthisisannoying
      @godthisisannoying 10 ปีที่แล้ว

      He seems to be taking credit for it, so he was probably part of the team that came up with these visualization tools.

  • @haarmegiddo
    @haarmegiddo 10 ปีที่แล้ว +2

    And congratz. For a computer science professionalist, you've discovered an binary image converter really late in your carrer.

    • @randomuser5237
      @randomuser5237 5 ปีที่แล้ว +2

      Congratz to you too, for an average youtube commenter, you've discovered that you're a moron really late in your life.

    • @nikolagrujicic6112
      @nikolagrujicic6112 5 ปีที่แล้ว

      I think that this guy is a fraud, i mean ho sits on the computer for 30 hours reading binary pure code and finally finds out that it was a picture of a cat, i mean for real is this guy crazy

  • @danguolestrumilaite2597
    @danguolestrumilaite2597 10 ปีที่แล้ว

    what about kenedy

  • @Koreanmasitda
    @Koreanmasitda 10 ปีที่แล้ว

    That was a hard one for me :((
    I'm not sure what his point is...
    Visual perception on complicated codes or problems for cyber engineers are useful...?

  • @millsmotion
    @millsmotion 7 ปีที่แล้ว

    This guy looks just like Cypher from the matrix 😮

  • @Owyss
    @Owyss 10 ปีที่แล้ว

    He took the red pill. Now it's your turn.

  • @privatetutor1
    @privatetutor1 10 ปีที่แล้ว

    Who would want to do this as a job?

  • @Laou41
    @Laou41 10 ปีที่แล้ว +41

    5 minutes in and I hate it.
    He is a perfect representation of the paranoia, violence and global conflict that dominates American political policy.

    • @rajvinjamuri7
      @rajvinjamuri7 10 ปีที่แล้ว +5

      It isn't paranoia. America's F-35 fighter jet, the latest in air-domination force we have, has had design data stolen by cyber attacks from China. Target just lost thousands of people's credit card data from a cyber attack. It's fact that there are people out there that want your information, and the information of the national security of your country.

    • @P00P0STER0US
      @P00P0STER0US 10 ปีที่แล้ว +12

      Focus not on his task but on his solution. Really impressive! The "stop the bad guys" thing is just a bright ribbon, don't be distracted by that. The use of our astonishing visual processing capabilities is the triumph here.

    • @TheRealFufuchs
      @TheRealFufuchs 10 ปีที่แล้ว +1

      Can't agree more. It was a good talk nevertheless.

    • @TheRealTannerThoman
      @TheRealTannerThoman 9 ปีที่แล้ว +4

      +Matthew Zunder
      If you knew how often our Critical Infrastructure was attacked by what are obviously state-sponsored hackers you would probably feel different about the use of the word "paranoia".

    • @twistedsim
      @twistedsim 6 ปีที่แล้ว

      The guy found backdoor in processor but hey, he is the one who paranoïd..

  • @randyadamlloyd
    @randyadamlloyd หลายเดือนก่อน +1

    Turns out it's really easy

  • @jt2456
    @jt2456 10 ปีที่แล้ว

    How did sypher get into the matrix?!

  • @mctm1221
    @mctm1221 10 ปีที่แล้ว

    The talk was about 0 and 1 as patterns for visual recognition watch it again. it could possibly make any information over cyber space be decoded . may be some what far fetched but then again the anything is possible

  • @ShredCo
    @ShredCo 10 ปีที่แล้ว

    Where's the evidence for unmodified phones being detonated at the push of a button " from a thousand miles away"? I know american defence contractors are all about fear-mongering but that's new... We'd better pay him to protect us from this threat we've never heard of.

  • @serahiever
    @serahiever 10 ปีที่แล้ว

    Seriously they can remotely control my phone and demand it to explode? This is EVIL!!!

  • @Jon-qv1ib
    @Jon-qv1ib 5 ปีที่แล้ว

    What a domas

  • @ZestyCrunchy
    @ZestyCrunchy 10 ปีที่แล้ว

    So, you are saying you can make any arbitrary phone explode, remotely? Come on!

  • @iFistCats
    @iFistCats 10 ปีที่แล้ว

    so someone can hack my phone and make it explode while one talking?

    • @theyreheretokillus
      @theyreheretokillus 10 ปีที่แล้ว +5

      yes, they can also send you pictures of cats

    • @Azmodaeus49
      @Azmodaeus49 10 ปีที่แล้ว

      also you didn't know that

  • @thewwefan57
    @thewwefan57 10 ปีที่แล้ว

    Is this the ubisoft Watch_Dogs panel?

  • @xsto01
    @xsto01 10 ปีที่แล้ว

    thank god i can read binearie

  • @RyuhoKudo
    @RyuhoKudo 10 ปีที่แล้ว

    Sounds like a pitch for a bad cyber criminal Hollywood movie. I wish he went into the algorithm behind the binary visualizer instead of just hand-waving it.

  • @robyrobster12
    @robyrobster12 10 ปีที่แล้ว

    Mind blown... And I'm a cyber guy :(

  • @meltingEyeballs
    @meltingEyeballs 10 ปีที่แล้ว +3

    Nice kitty! :)

  • @zirbat16
    @zirbat16 10 ปีที่แล้ว +1

    *I really don't see what the problem is here he explained that hes work is cyber defense and offence what else he should have talked about? You cannot satisfy a people these day ha.*

  • @liquidtrick187
    @liquidtrick187 10 ปีที่แล้ว

    That alghorithm dies as soon as encryption is implemented, just saying.

  • @swatsaw6
    @swatsaw6 10 ปีที่แล้ว

    You really should not blow people up because after 30 hours in basement you think they might be terrorists or maybe kittens ...

  • @elminz
    @elminz 10 ปีที่แล้ว +2

    I do some reverse engineering and similar stuff, but this talk sounded so stupid. Well obfuscated code would have almost no discernible pattern that could be used between separate cases on the same architecture (Main exceptions being when encrypted using the same set of tools). Tools like IDA Pro already offer vast amounts of power in decrypting and understanding encrypted executable files.
    If you're looking for visual patterns, you're probably looking at something that could easily be algorithmically identified without having to visually see the pattern.
    What makes viruses/trojans etc difficult to analyse isn't the patterns, but the fact that hardware and code can execute things in very unintuitive and non-standard ways over a huge number of steps very quickly. It's not just a simple data pattern that's hard to spot.

  • @georgesjc
    @georgesjc 10 ปีที่แล้ว +1

    Futur

  • @Orinslayer
    @Orinslayer 10 ปีที่แล้ว

    That darn kitten.