I'm a cyber security student about to enter the professional work force. Let me tell you, it is SHOCKINGLY easy to have your data taken. Most of the times, it exploits human weakness or vulnerability. Rarely is it someone brute forcing (or what most people would think of when you hear the word "hacking") by sitting behind a computer.
@WildfireX true. But if it was truly common knowledge, there wouldn't be any scam emails or phone calls. People still fall for them regardless of age, but its often the elderly.
@@kellenwalburn5238 Well, common knowledge amongst people who would even remotely know this stuff I guess is more appropriate. & Yep, I've had tonnes of dickhead Nigerians call up the house of my grandparents over the years, fortunately I've always been there to intervene. Even though I've taught them how to handle most things, they're still a generation that's easily manipulated & fearmongered into things
The scale of fuckupery in the Microsoft case is actually quite epic: the hackers acquired a Microsoft account key (a normal everyday key) and used it to sign certificates (a thing that normal everyday keys shouldn't be able to do). The code running on the certification server has literally *ONE* job: don't issue certificates to keys who shouldn't be able to sign stuff. Aaaand they fucked it up. Worse yet, those who noticed that they got hacked only noticed it because of weird activity in their audit logs. Guess what you don't get if you don't pay Microsoft extra? That's right, audit logs. In other words, not even Microsoft noticed this hack until a US government entity notified them "I think -we- you've been hacked"
That’s not quite accurate. What happened is the signing key for authentication tokens for MSA (the consumer authentication system for Microsoft) were able to be used with Azure AD (the business authentication system for Microsoft). Normally that wouldn’t work but a misconfiguration on the business Outlook side of things meant it allowed the tokens when it should not have. If the misconfiguration wasn’t present, even with the tokens signed they wouldn’t have been able to get in. Or if the misconfiguration was present but the signing key for MSA didn’t leak, they wouldn’t have been able to get in. Sadly two things went wrong just right to enable this.
@@JollyGiant19 Ah, thanks for the detailed explanation. I'd say the misconfiguration is the epic part of this fuckup then. Also, the second paragraph still stands: you have to pay Microsoft almost twice as much per month per user to get access to the telemetry that Microsoft is most likely collecting anyway, the data hoarders that they are, but evidently isn't doing anything with.
I think a lot of individuals online have the mindset of "I'm not that important, so it's alright if I don't protect my services/data as securely as I should". Hacking is a much more widespread problem than people realize, and I think some people don't even realize that they are often not the final goal. Hackers routinely use lower tier employees or associates as initial vectors of attack. Overall, being conscious of hacking is an important part of tech literacy that most people just don't even have the mindset to imagine yet, and it definitely needs to talked about and taught more across the board.
Yeah and in the same sense it's weird coming from university where you learn about all these super complex attacks, and most of the time none of that matters because some dude will open a random untrusted file or fall for a phishing attack.
I was one of those persons... and the last month I've been updating a lot of security stuff and setting authenticator on everything. This is the sad world we live in
personally, I think decent tech literacy and basic cybersecurity skills should definitely be taught in school and required for graduation, because at this point the world relies so heavily on tech that this kind of knowledge needs to be as common as possible
@@faceboy1392 I agree wholeheartedly, it is quickly becoming a requirement with how many services are becoming available online. especially for the average office worker, "tech literacy" no longer includes just being able to use excel and powerpoint
The issue is the same state of Louisiana that is requiring to provide this kind of personal information, but then the state of Louisiana confirmed they had a data hack with a lot of information has been leaked. So no one in government realized about this potential issue.
There is a very easy way to download discord chats too, so anything those hackers had access to, they will always be able to see the old conversations in there.
I did Corporate IT work from 1995 to 2022. I am mostly retired from it now, with only one small client remaining. At the large accounting firm I worked at, one of the employees opened one of the bogus shipping emails, and had their workstation encrypted and a pile of files on the server. I do rigorous backups, so I was able to restore everything. At the government office that I worked at, one of the people got one of the fake Microsoft virus emails, and they actually called the 800 number and started installing all of the software that the "tech" on the other end of the phone told them to. That is only two stories of many. Pure user stupidity is why I quit most IT work. I used to be totally stressed out for years, waiting for the next bungling idiot employee to get the entire server shared folders encrypted. My stress level really dropped once I semi-retired.
@@techno1561 - It wasn't federal or provincial government, it was a government funded financial organization. The general manager figured she knew more about computers than me, so she would just hire new people and tell them to go buy a new $2000 laptop without passing anything by me. She would hire the stupidest people. It wasn't until the government security division did an audit of all of the offices that I was able to force her to follow government guidelines. I quit there a while ago because it was just too stressful.
The reason to target a group like a mod's discord server is not to target the project _per se_ , but to target (or fish for) someone in the community. Either someone with access to something important, or just to harvest crypto wallets or other valuable information.
I was getting a bunch of authenticator requests on my Outlook account back in mid-June that went away when I changed my password, so I'm under the belief that Microsoft doesn't know the full scale of this hack yet, because that password wasn't that old.
Normally is people trying to brute force your password. Microsoft says that if it wasn't me, i should not worry because someone might have. Typed the wrong email address instead of warning you that it might be an attack
@@economicprisoner They don't, but Microsoft only sends authenticator requests if you try to log in, and succeed. If password is no longer correct, they don't get the authenticator requests.
Hey the same thing happened to a discord server that I and my SO were admins on, it happens all the time. Nobody is above getting hacked and they come up with new shit every day. In our case it was somebody saying 'hey I'm making a game, could you try the demo for me and give me some feedback?' It's ever evolving, and the best thing is to share and be aware of new methods and shit they do. Never ever shame somebody for this shit, its like shaming somebody for getting mugged or something. Share the methods, look out for each other, and be very very careful even when you get things from friends or coworkers.
Yeah, that game scam is a pretty common recent one. Along with the "I accidentally reported your steam account" scam. Ticks me off slightly that they prey on people's goodwill instead of their greed or something. Although it is also worth pointing out that some people do get shamed for being mugged or assaulted, by being told that they shouldn't be said or done something provocative, been in such a dangerous area, etc.
This is why I have self hosted password managers running in my network that can only be access if I'm connected to my wifi, if I'm out and about I just connect to my vpn which is just a proxy to my home network. Currently learning how to selfhost my own emails, if I can host it myself, I'm going to do it.
This may be a dumb question but here goes: Does that mean that if the internet at your home goes down (perhaps due to a fiber cable being cut by road works or whatever), that you then cannot use your phone to access your password manager on your server?
Unfortunately with the emails, new domains, like a home network would have low trust, and outgoing would be blocked, or put into spam by the providers.
Additionally there’s a risk that comes with self hosting, you have to make sure your network sec is solid, and that you’re making sure all of your self hosted software is up to date. That’s not to say don’t do it, just make sure you stay vigilant and always on top of patches.
Linus: "Dont imagine that jus because you're cool and no one should hate you, that someone wont come along and wreck your stuff." Ark/Rust players: "is... is he talkin about us?"
Why have one honeypot, when you can Raid1 and off-site them? If only there was some remedy, one that *wasn't* at the gateway but rather the propensity. Y'know. Education and resources. Propensity is one of the things that law only mitigates and doesn't solve, when it comes to behavior/regulation.
This is NA, the governments here don't really care enough about educating the public for the public's benefit, just enough to be a consumer, 😅 sad but funnily true 😂
Not too be pedantic, but honey pots are things that appear interesting and full of data but are actually used by NetSec to discover bad actors. What limits is trying to say is that building big databases of user data makes them targets for hackers.
Dont even need to watch the vid to know this is true. Anything that can be done with a computer can be undone by a computer. Just needs desire, time and patience.
@@user-zi8hj5ne1z I believe that they did realise, but weren't expecting so many overseas people to start going and ordering, since they usually stream the WAN show at a time when NA is most active.
Everything. If youre an IT snr/security involved and even with all measures your organisation can STILL get hacked and no matter how good you did in the attack you can still get axed for it.
Slightly related to the Microsoft issues, I really wish they’d support requiring 2 different factors. They have a setting to require the Authenticator app when you use your password, but there’s no way to have that on without also allowing passwordless sign in using just the Authenticator app, so I get push notifications from people on the other side of the planet attempting to sign in to my account when all they have is my email address. I just want to require both. And controls to block certain countries I will never go to from logging in wouldn’t hurt.
A game I help with had its discord server hacked a year ago. The game was literally 100% free and there was nothing to gain financially. If that doesn't scream "nothing is safe" I don't know what does.
As convenient the internet is for a lot of things, can we agree that maybe sensitive sutff shouldn't use the internet or like use it's own private network? Stuff like the computer that control the power grid for example.
Normally, they would, but that costs money, and not the entire thing would be able to go offline. That's a lot of cost that many companies won't be willing to shoulder. Consider the not-so-recent hack that shut down an oil pipeline in the USA. The actual pumping and oil infrastructure was fine, the hackers got into the Billing system, and the company's automated processes wouldn't pump oil if the customer hadn't paid. But a billing system isn't usually considered critical enough to be segmented off like that, and it might not be possible at all, without making it impossible to access.
took over a day and a half to get that discord server back? bro that's lucky with how bad discord's support is, a server I was admin had the owners account hacked and we never got it back
Damn, and I missed it live. Would have LOVED free shipping to europe. I'm ready to spend a few hundred bucks on merch, but I'm not ready to more than double that for shipping costs
6:04 Luke, would totally chuck you a resume if Floatplane would be cool with hiring somebody remote from Australia! But I'm guessing timezones would be too hard on top of the general messiness of international hiring. Still, if you need an software infra engineer with NodeJS and Kubernetes experience...
@@techno1561 Eh, it takes a lot of energy to submit an application for a job when you know external circumstances mean it's super unlikely to get it, and as somebody who doesn't have much if any spare energy right now, gotta put it where the most value is
I believe some of my country's medical infrastructure might have gone thru that way, social engineering and system setup be damned , no matter how much they said... it was not...
I admire companies, able to be able to host microsoft services. The amount of money they have to have in banks to pay the fines on data breaches here in the EU must be massive.
The EU fines are better than the US, but still just a tiny mosquito bite compared to the size of their wallets. Like fining speeders $0.50 per each mile driven over the speed limit, so you can go as fast as you want and pay per mile driven...would just be seen as a "ticket to ride" and not a violation of law at all.
@@freedustin Nah, 2000 does actually is too much. 100% of yearly revenue would be great, 2% however is also fine as we talk about revenue (that is not earning but the amount of money which was moved) Problem tho is that this does not really affect companies like google that much
@@X39 You have no chance of making it hurt like that. Make it hurt like larceny charges hurt a regular person or just admit you like that companies can exploit the law.
You are missing a huge point Luke, The infrastructure should be improved by IT, BUT not on line. Make every critical system a island and only use manual monitoring on line, not the system critical monitoring just "result reporting" and make technicians bring a highly secured laptop to the building if ANY changes are to be done manually. That way no amount of online hacking would do squat. Best way to never get hacked, don´t be online!
ปีที่แล้ว
then there's things like Stuxnet, specifically made to attack offline networks and systems
someone on my discord server has a private dc server (where I am part of) and she has a channel there where she posts all her login credentials for the funnys. in total 6 other have access to it too... also i don't think she knows what the concept of 2fa is, too complicated i guess. some people _really_ want to get hacked...
You know why there are so many hackers? Because it's part of their hiring process 😆 Imagine if physical stores do the same "BREAKING: A man caught robbing a mall. He got hired as the head of security the very next day"
Password protected cookies! Why passwords in browser can be protected this way, but cookies can't? That way any software that copies your browser files/profile would still need a password to take advantage of them.
is he actually asking seriously tho why someone would take over volunteraly projects massive discord. the reason is to push massive scam links to get their fanbases money.
Very true, had malwarebytes premium and avast on windows machine, no detections but somehow it was hacked and the only reason I knew is because I get notifications of failed ssh logins. It was trying hundreds of default logins. Always set stuff like this up guys!
Seems like they had free worldwide shipping special (maybe for the first time ever worldwide) during the show and it was in convenient enough time that people oversees actually watched live. Their shipping costs anywhere but US and Canada are insane so whoever wanted some of the LTT merch but didnt want to pay up their nose for shipping jumped at the opportunity.
Yes indeedy - they are out to get you. But, it is nothing personal. They are just after low lying fruit. If you let them they will pluck you. It's not paranoia. It's prudence to act in a paranoid manner. {^_^}
Let's be clear, this email issue is only a serious issue, because the emails were not encrypted! If you don't use PGP to sign and encrypt your emails, you deserve what you get! The technology is decades old, trusted, solid, open and free, so the excuse? You don't have one, if you don't use PGP, then your crying and concern get set to 0, and no one should feel bad when your emails get exposed.
I hope nobody hacks my website. I spent way too long making everything secure compared to RealZoo which can be hacked by literal children by just sending an API request with the amount of coins you'd like to have. People just send in 100 quadrillion coins and beat the game on the first day if they can remember which combinations they have already tried or mess around with a spreadsheet.
I'm a cyber security student about to enter the professional work force. Let me tell you, it is SHOCKINGLY easy to have your data taken. Most of the times, it exploits human weakness or vulnerability. Rarely is it someone brute forcing (or what most people would think of when you hear the word "hacking") by sitting behind a computer.
This has been common knowledge for basically 20 years at this point
@WildfireX true. But if it was truly common knowledge, there wouldn't be any scam emails or phone calls. People still fall for them regardless of age, but its often the elderly.
@@kellenwalburn5238 Well, common knowledge amongst people who would even remotely know this stuff I guess is more appropriate.
& Yep, I've had tonnes of dickhead Nigerians call up the house of my grandparents over the years, fortunately I've always been there to intervene.
Even though I've taught them how to handle most things, they're still a generation that's easily manipulated & fearmongered into things
@@WildfireXcommon knowledge for you but not for most
@@WildfireX Common knowledge to whom?
The scale of fuckupery in the Microsoft case is actually quite epic: the hackers acquired a Microsoft account key (a normal everyday key) and used it to sign certificates (a thing that normal everyday keys shouldn't be able to do). The code running on the certification server has literally *ONE* job: don't issue certificates to keys who shouldn't be able to sign stuff.
Aaaand they fucked it up.
Worse yet, those who noticed that they got hacked only noticed it because of weird activity in their audit logs. Guess what you don't get if you don't pay Microsoft extra? That's right, audit logs.
In other words, not even Microsoft noticed this hack until a US government entity notified them "I think -we- you've been hacked"
So an intermediate certificate authority (CA) cert?!
If so, that's a colossal screwup of epic proportions.
@@Reahreic It's not an SSL cert, it's for a Microsoft-specific authentication protocol. But yeah, basically that.
That’s not quite accurate. What happened is the signing key for authentication tokens for MSA (the consumer authentication system for Microsoft) were able to be used with Azure AD (the business authentication system for Microsoft). Normally that wouldn’t work but a misconfiguration on the business Outlook side of things meant it allowed the tokens when it should not have.
If the misconfiguration wasn’t present, even with the tokens signed they wouldn’t have been able to get in. Or if the misconfiguration was present but the signing key for MSA didn’t leak, they wouldn’t have been able to get in. Sadly two things went wrong just right to enable this.
@@JollyGiant19 Ah, thanks for the detailed explanation.
I'd say the misconfiguration is the epic part of this fuckup then.
Also, the second paragraph still stands: you have to pay Microsoft almost twice as much per month per user to get access to the telemetry that Microsoft is most likely collecting anyway, the data hoarders that they are, but evidently isn't doing anything with.
I think a lot of individuals online have the mindset of "I'm not that important, so it's alright if I don't protect my services/data as securely as I should". Hacking is a much more widespread problem than people realize, and I think some people don't even realize that they are often not the final goal. Hackers routinely use lower tier employees or associates as initial vectors of attack.
Overall, being conscious of hacking is an important part of tech literacy that most people just don't even have the mindset to imagine yet, and it definitely needs to talked about and taught more across the board.
Yeah and in the same sense it's weird coming from university where you learn about all these super complex attacks, and most of the time none of that matters because some dude will open a random untrusted file or fall for a phishing attack.
I was one of those persons... and the last month I've been updating a lot of security stuff and setting authenticator on everything. This is the sad world we live in
personally, I think decent tech literacy and basic cybersecurity skills should definitely be taught in school and required for graduation, because at this point the world relies so heavily on tech that this kind of knowledge needs to be as common as possible
if you have a bank account, you qualify as "important enough"
@@faceboy1392 I agree wholeheartedly, it is quickly becoming a requirement with how many services are becoming available online. especially for the average office worker, "tech literacy" no longer includes just being able to use excel and powerpoint
That renault logo on Linus's shirt is cool
Cheeky advertisement
It's a case 🤣
@@mateobouchet *whoosh*
They actually talked about how they can't release that shirt due to the possibility of a C&D, even though it's demonstrably different.
It's a seagway to today's sponsor
The issue is the same state of Louisiana that is requiring to provide this kind of personal information, but then the state of Louisiana confirmed they had a data hack with a lot of information has been leaked. So no one in government realized about this potential issue.
There is a very easy way to download discord chats too, so anything those hackers had access to, they will always be able to see the old conversations in there.
6:55 this is really indicative of how many people want to buy your merch but haven't because of the shipping costs.
I think so
I know i want to and it costs way too much to get stuff here
Tried to buy a mousepad once...70$ + customs
I did Corporate IT work from 1995 to 2022. I am mostly retired from it now, with only one small client remaining. At the large accounting firm I worked at, one of the employees opened one of the bogus shipping emails, and had their workstation encrypted and a pile of files on the server. I do rigorous backups, so I was able to restore everything. At the government office that I worked at, one of the people got one of the fake Microsoft virus emails, and they actually called the 800 number and started installing all of the software that the "tech" on the other end of the phone told them to. That is only two stories of many. Pure user stupidity is why I quit most IT work. I used to be totally stressed out for years, waiting for the next bungling idiot employee to get the entire server shared folders encrypted. My stress level really dropped once I semi-retired.
I'm surprised that a government office would just let people install anything on their work machine.
@@techno1561 - It wasn't federal or provincial government, it was a government funded financial organization. The general manager figured she knew more about computers than me, so she would just hire new people and tell them to go buy a new $2000 laptop without passing anything by me. She would hire the stupidest people. It wasn't until the government security division did an audit of all of the offices that I was able to force her to follow government guidelines. I quit there a while ago because it was just too stressful.
The reason to target a group like a mod's discord server is not to target the project _per se_ , but to target (or fish for) someone in the community. Either someone with access to something important, or just to harvest crypto wallets or other valuable information.
The only "secure" computer is encased in cement and lying at the bottom of the ocean.
And even then, I'd watch for scuba divers with chisels!
I was getting a bunch of authenticator requests on my Outlook account back in mid-June that went away when I changed my password, so I'm under the belief that Microsoft doesn't know the full scale of this hack yet, because that password wasn't that old.
Normally is people trying to brute force your password. Microsoft says that if it wasn't me, i should not worry because someone might have. Typed the wrong email address instead of warning you that it might be an attack
@@nene71286 How would they know that password changed if that was the case?
@@economicprisoner They don't, but Microsoft only sends authenticator requests if you try to log in, and succeed. If password is no longer correct, they don't get the authenticator requests.
@@techno1561Depends on how it's configured.
Quite often password less login is enabled and only email and MFA is needed.
Hey the same thing happened to a discord server that I and my SO were admins on, it happens all the time. Nobody is above getting hacked and they come up with new shit every day. In our case it was somebody saying 'hey I'm making a game, could you try the demo for me and give me some feedback?'
It's ever evolving, and the best thing is to share and be aware of new methods and shit they do. Never ever shame somebody for this shit, its like shaming somebody for getting mugged or something. Share the methods, look out for each other, and be very very careful even when you get things from friends or coworkers.
Yeah, that game scam is a pretty common recent one. Along with the "I accidentally reported your steam account" scam. Ticks me off slightly that they prey on people's goodwill instead of their greed or something.
Although it is also worth pointing out that some people do get shamed for being mugged or assaulted, by being told that they shouldn't be said or done something provocative, been in such a dangerous area, etc.
7:00 "I will never financially recover from this" realization point
This is why I have self hosted password managers running in my network that can only be access if I'm connected to my wifi, if I'm out and about I just connect to my vpn which is just a proxy to my home network. Currently learning how to selfhost my own emails, if I can host it myself, I'm going to do it.
Good luck with the emails. That dream is mostly dead, if you care about reaching most hosted users 😞
This may be a dumb question but here goes:
Does that mean that if the internet at your home goes down (perhaps due to a fiber cable being cut by road works or whatever), that you then cannot use your phone to access your password manager on your server?
@@MrNicoJaczero day discovered 🤣
Unfortunately with the emails, new domains, like a home network would have low trust, and outgoing would be blocked, or put into spam by the providers.
Additionally there’s a risk that comes with self hosting, you have to make sure your network sec is solid, and that you’re making sure all of your self hosted software is up to date. That’s not to say don’t do it, just make sure you stay vigilant and always on top of patches.
Linus: "Dont imagine that jus because you're cool and no one should hate you, that someone wont come along and wreck your stuff."
Ark/Rust players: "is... is he talkin about us?"
"...and everyone."
Why have one honeypot, when you can Raid1 and off-site them?
If only there was some remedy, one that *wasn't* at the gateway but rather the propensity.
Y'know. Education and resources.
Propensity is one of the things that law only mitigates and doesn't solve, when it comes to behavior/regulation.
This is NA, the governments here don't really care enough about educating the public for the public's benefit, just enough to be a consumer, 😅 sad but funnily true 😂
Not too be pedantic, but honey pots are things that appear interesting and full of data but are actually used by NetSec to discover bad actors.
What limits is trying to say is that building big databases of user data makes them targets for hackers.
7:00 Congratulations, you played yourself
Dont even need to watch the vid to know this is true. Anything that can be done with a computer can be undone by a computer. Just needs desire, time and patience.
Sounds like there's an interesting story behind that whole "free global shipping" thing. :)
Anything with free shipping usually has the shipping costs built into the price. Louis Rossman made this point ages ago.
@@zeberto1986 i think theyre were doing a special deal. and didnt realize that it was global instead of the americas
@@user-zi8hj5ne1z youre right. I hadnt watched the whole vid before commenting so I thought it was about something else.
@@user-zi8hj5ne1z I believe that they did realise, but weren't expecting so many overseas people to start going and ordering, since they usually stream the WAN show at a time when NA is most active.
as an australian the wan show usualy starts at like 11 on a saterday
Everything. If youre an IT snr/security involved and even with all measures your organisation can STILL get hacked and no matter how good you did in the attack you can still get axed for it.
"I almost never see a dot in India"
Clearly Linus has never seen/met people in/from India :P
You can scramble eggs and back up problems, back the risky troubler up, and eggs only need 3 minutes to scramble.
Slightly related to the Microsoft issues, I really wish they’d support requiring 2 different factors. They have a setting to require the Authenticator app when you use your password, but there’s no way to have that on without also allowing passwordless sign in using just the Authenticator app, so I get push notifications from people on the other side of the planet attempting to sign in to my account when all they have is my email address.
I just want to require both. And controls to block certain countries I will never go to from logging in wouldn’t hurt.
A game I help with had its discord server hacked a year ago. The game was literally 100% free and there was nothing to gain financially.
If that doesn't scream "nothing is safe" I don't know what does.
A honeypot is a trap that *looks* like an attractive target, but isn't.
I grew up in an era where people used sound to hack phone lines. Yes. Really.
I understand that NOTHING is 100% secure.
BRB running a loop of Simon and Garfunkel singing Silent Night over Lukes reading of the news.
Put everything online they say, link everything they say, it is safe they say, We want to go digital they say. I say we are not ready !
How the F does Discord keep getting hacked, and by the same exploit?
The only digital security is data NOT Existing Digitally.
As convenient the internet is for a lot of things, can we agree that maybe sensitive sutff shouldn't use the internet or like use it's own private network? Stuff like the computer that control the power grid for example.
Normally, they would, but that costs money, and not the entire thing would be able to go offline.
That's a lot of cost that many companies won't be willing to shoulder.
Consider the not-so-recent hack that shut down an oil pipeline in the USA. The actual pumping and oil infrastructure was fine, the hackers got into the Billing system, and the company's automated processes wouldn't pump oil if the customer hadn't paid.
But a billing system isn't usually considered critical enough to be segmented off like that, and it might not be possible at all, without making it impossible to access.
Why would anyone want to hijack a game mods discord what is there to gain?
took over a day and a half to get that discord server back? bro that's lucky with how bad discord's support is, a server I was admin had the owners account hacked and we never got it back
Coincidentally just finished watching Mr. Robot. Great show
Damn, and I missed it live. Would have LOVED free shipping to europe. I'm ready to spend a few hundred bucks on merch, but I'm not ready to more than double that for shipping costs
This whole segment illustrate the fact that nothing is really important until your wallet is affected: free worldwide shipping?
The main way you get in is stupid employees who dont no any better
6:04 Luke, would totally chuck you a resume if Floatplane would be cool with hiring somebody remote from Australia! But I'm guessing timezones would be too hard on top of the general messiness of international hiring. Still, if you need an software infra engineer with NodeJS and Kubernetes experience...
It doesn't hurt to try on their site. If they don't mind remote work, or you're too far, they could probably let you know.
@@techno1561 Eh, it takes a lot of energy to submit an application for a job when you know external circumstances mean it's super unlikely to get it, and as somebody who doesn't have much if any spare energy right now, gotta put it where the most value is
Why did people get free shipping on stuff?
So is that through the Microsoft kms keys?
I believe some of my country's medical infrastructure might have gone thru that way, social engineering and system setup be damned , no matter how much they said... it was not...
I admire companies, able to be able to host microsoft services. The amount of money they have to have in banks to pay the fines on data breaches here in the EU must be massive.
The EU fines are better than the US, but still just a tiny mosquito bite compared to the size of their wallets.
Like fining speeders $0.50 per each mile driven over the speed limit, so you can go as fast as you want and pay per mile driven...would just be seen as a "ticket to ride" and not a violation of law at all.
@@freedustin GDPR allows for up to 2% of the annual revenue being fined. so yeah, kinda
@@X39 makes no sense. should be up to 2000% if they want any chance of making it hurt.
@@freedustin Nah, 2000 does actually is too much. 100% of yearly revenue would be great, 2% however is also fine as we talk about revenue (that is not earning but the amount of money which was moved)
Problem tho is that this does not really affect companies like google that much
@@X39 You have no chance of making it hurt like that. Make it hurt like larceny charges hurt a regular person or just admit you like that companies can exploit the law.
Everything can and WILL be hacked. If there is a will there is a way.
So.... Watch dogs is becoming more and more real life, just hack with a single button.
Little known fact is that even trees can be hacked.
I have 6 firewalls that stand between me and the internet 😎
You are missing a huge point Luke, The infrastructure should be improved by IT, BUT not on line. Make every critical system a island and only use manual monitoring on line, not the system critical monitoring just "result reporting" and make technicians bring a highly secured laptop to the building if ANY changes are to be done manually. That way no amount of online hacking would do squat. Best way to never get hacked, don´t be online!
then there's things like Stuxnet, specifically made to attack offline networks and systems
someone on my discord server has a private dc server (where I am part of) and she has a channel there where she posts all her login credentials for the funnys. in total 6 other have access to it too... also i don't think she knows what the concept of 2fa is, too complicated i guess.
some people _really_ want to get hacked...
SSH and the Signal protocol and are aight.
probably money laudering/stealing money/ something to do with money
wreaking havoc
not wrecking havoc....
That’s not what a honeypot is.
You know why there are so many hackers? Because it's part of their hiring process 😆
Imagine if physical stores do the same
"BREAKING: A man caught robbing a mall. He got hired as the head of security the very next day"
Password protected cookies! Why passwords in browser can be protected this way, but cookies can't? That way any software that copies your browser files/profile would still need a password to take advantage of them.
is he actually asking seriously tho why someone would take over volunteraly projects massive discord.
the reason is to push massive scam links to get their fanbases money.
And that's how Linus Meida Group goes bankrup, with worldwide free shipping
if only weren't poor af I'd have ordered sth already too! :D
gereetings from Sauerkraut-Land
Hack the planet!
Systems are secure, people are not
hack the planet!
Everything can be hacked. Well, duh!
Awesome!
Very true, had malwarebytes premium and avast on windows machine, no detections but somehow it was hacked and the only reason I knew is because I get notifications of failed ssh logins. It was trying hundreds of default logins. Always set stuff like this up guys!
Alright whats the context, dots, blue, white, free shipping. Whats the story?
Seems like they had free worldwide shipping special (maybe for the first time ever worldwide) during the show and it was in convenient enough time that people oversees actually watched live. Their shipping costs anywhere but US and Canada are insane so whoever wanted some of the LTT merch but didnt want to pay up their nose for shipping jumped at the opportunity.
@@satzmann666 Damm nice thx for explaining
WAIT, FREE EUROPE SHIPPING???
I believe I saw shipping fee when I wanted to order, maybe I was late to the sale lol
Great Jobs
HACK ALL OF THE THINGS
God's Eye: You guys came to know about this NOW?!!! Pathetic!!!
It's a joke everyone
Was about to click off then I heard skyblivion . Any other clips with skyblivion talk?
Yes indeedy - they are out to get you. But, it is nothing personal. They are just after low lying fruit. If you let them they will pluck you. It's not paranoia. It's prudence to act in a paranoid manner.
{^_^}
Probably good time to remind that there are amazing tools like Sandboxie which can prevent stuff like this.
Let's be clear, this email issue is only a serious issue, because the emails were not encrypted! If you don't use PGP to sign and encrypt your emails, you deserve what you get! The technology is decades old, trusted, solid, open and free, so the excuse? You don't have one, if you don't use PGP, then your crying and concern get set to 0, and no one should feel bad when your emails get exposed.
No one uses it because PGP absolutely SUCKS!!!
@JollyGiant19 why? It's simple, easy, and it's support is excellent. People don't use it because their lazy.
Az uuuure or A zure. Canadians sure say words weird.
Luke's laugh is just the best
But can I be hacked?
If you have Neurolink in the near future, you could be hacked. Wierd.
HACK THE PLANET
FOSS ftw
They do it for the lulz
Microsoft Ah-zoor? 😂
I've heard it both ways
HackingDramaImma1st
Yeah? Hack me. Go ahead. Try it.
AI hacking...
Your mom
I hope nobody hacks my website. I spent way too long making everything secure compared to RealZoo which can be hacked by literal children by just sending an API request with the amount of coins you'd like to have. People just send in 100 quadrillion coins and beat the game on the first day if they can remember which combinations they have already tried or mess around with a spreadsheet.
Hack the planet!