Hacker VLOG

  • DEEP WEB

    You have in front of you a crossroad to sort out.

    Read it and hear what you are served up by someone who doesn’t understands nothing and doesn’t want to let you understand a thing, or hear what I have to say.

    This story is full of elements you have already heard about or, you will hear about it for the first time.

    My task is to make these thinks more understandable to everyone, so that everybody understands the range of what is happening.

    Simplicity is the key, so I’ll try to keep it simple.

    Let’s start from Deep Web.

    What is it?

    Imagine a city with shops open to everyone, with their window shops, public offices, maps, with the “you are here” info, information offices, roads.

    That’s the web how you know: it can have more or less dark sides, slum areas, residential neighbourhoods and luxury ones.

    Under the city is the tube, which accesses are visible from the outside.

    To use the tube you need a ticket, a subscription or a permit.

    Imagine inside the tube station, there’s a door easy to open, but it leads to a totally dark corridor. Many stare at it without opening it, others don’t see it, others prefer to mind their business, many others enter but don’t have a clue how to move around and how to see something, others decide to proceed gropingly and discover that inside there’s a subterranean city, but it has no maps, roads traced, no lights or streetlights, there’s no one guiding you, there are no laws.

    That’s the Deep Web.

    So, a net parallel to the one we use everyday, inside which there isn’t a Google or Facebook nor Twitter, no navigable websites if you don’t have the right browser, TOR, easily contactable even on the original web. This browser working through a server network, allow us to view pages without .it, .com, .net extensions, but instead on pages with an extension created on purpose: .onion, yes “onion”, to give the idea this parallel web is made “in layers”. As these are unconventional websites and pages on an unconventional network, it’s obvious it has no indexation on a browser like Google.

    So, how do you know which is the address of a website in Deep Web?

    Through a conventional word of mouth, forums, and the address can also be easily found in the “disclosed” web.

    The most well-informed journalists say that Deep Web is a web without controllers, where hackers keep in touch, where drugs and weapons are sold, where child pornography can be found.

    Regarding the accuracy of information is somehow as if you were said that Earth is a water and sand bundle roaming around in space: it’s not wrong in absolute terms, but trivial like a scratch made by a child.

    And these are those more informed.

    Things are much more complex and simple.

    Deep web has no control?

    Wrong. It has. The thing is it’s more ingenious for authorities, because as mentioned there is no content indexation.

    Do you only find illegal content in Deep Web?

    Also, but not always. In this, it is exactly the same as the “normal” web.

    It’s populated such as the web we all know, by around 99% of useless stuff and 1% of interesting information. In the 99% of useless stuff is included the mass of idiots who think they are living an anonymous way of navigation and therefore, share opinions to put up frauds, drug deals, illegal sales and to satisfy some sexual appetite.

    Is deep web the place where hackers organise their moves?

    Wrong. But to explain this point, I must clarify what a hacker is, what it was thirty years ago and what it is now, mixing up ideas overloading the cart. We will talk about it on another video.

    Deep web is a means, just like the web. The one you are living is NOT a result of the Deep Web, but it flows exactly like it flows on the web you know.

    It’s the web you know, it’s 1% of the city of the light of sun we mentioned before, though.

    This is the first piece and on this piece is written: if you have first hand information, then you should trust.

    Otherwise, be suspicious of everything, starting from what you think you know.

    HACKER

    There was a time when hackers were just technicians.

    The best there were, those who took machines to their limits and sometimes even further.

    There was a time when there was a huge difference between a hacker and a criminal, while today everything has been mixed up.

    Imagine you don’t know the word “mechanic”. Imagine it’s a word only a few practitioners know.

    Mechanics have fun disassembling machines to understand the secrets underneath, maybe to make it go faster.

    There are those who do it to damage machines, but they aren’t worth of the word “mechanics”, in this field they are called “screwdrivers”.

    Ok, imagine anyone who little by little put their hands on an engine to modify it, just for the money or for the pleasure of breaking it and damaging it, and being entitled “mechanic”.

    Press, politicians, and everyone start talking of these mechanics that are messing with engines and breaking them.

    And then the word mechanic loses its meaning, not only its sense but also the “real one”.

    That’s what happened to the word “hacker”.

    Once, a hacker was someone curious.

    I have never met a hacker, if we take the real meaning, which has damaged a system for the fun of doing it.

    There’s nothing fun in breaking a system.

    The biggest hacker companies, let me tell you, have never came to light, simply because those were intellectual challenges: you enter a system, leave a message to the administrator to let him know how you have entered and what can be done to improve its safety, and exit it without a trace.

    This is… was, being a hacker.

    Damaging might be fair, if you have an ideal: in the past, I believe I have put some child pornography servers out of action.

    Just to give an example.

    I have never met a hacker working for a government, or an economical system.

    I met people with hacker abilities, even of high calibre, selling their own abilities without an ideal in the background.

    Here, this is it.

    But, please don’t call them hackers.

    Because they are employees.

    HACKING FACEBOOK, TWITTER OR EMAIL ACCOUNT

    The weak element of security in all accounts in social accounts social is always the same.

    It’s between the chair and the keyboard.

    It’s you.

    It’s you who chose the password.

    It’s you choosing a trivial password.

    It’s you who is afraid to forget the password and write it on a post-it placed under the keyboard, or in a drawer of your desk.

    It’s you who give no significance to your laptop webcam.

    It’s you who while working and if someone call you saying he/she is a technician from your home banking, is ready to give him/her any personal data asked for.

    It’s you who click on all attachments you receive by email, if the sender’s address seams familiar.

    Computer technology, encryption systems or antivirus, they will all do their work, always.

    But these are only tools.

    You are the one using them wrongly.

    So, dear policemen, journalists, politicians, don’t just ask if defences or systems should be reinforced, if you should spend money on consulting, hardware, firewalls, words you hardly understand the meaning, or if “freedom should be removed” to the web, another expression with no meaning at all.

    Do not masturbate on this stuff, because the problem is you.

    It’s true there are IT tools to spy, to steal passwords and identity, but these tools are served to you, real people.

    So, keep on spreading your personal data around socials and then chose a password like your partner’s name and his/her date of birth.

    And proceed by using this same password for everything.

    Remember, all big technical words can be written to tell you that bad and harmful hackers have violated an IT system, but reality is the only universal technique valid is social engineering.

    The one persisting on the only certain fact: you are the weak link of your IT security.

    BIT COIN

    What’s Bit Coin?
    In many places you will read this is a virtual currency, many websites describe how to get it, others will explain that in the deep web it’s used to buy weapons, drugs and so on.
    As usual information simplifies to complicate.
    Let’s start from the beginning.
    Bit Coin, many years ago, was firstly born as a written concept, then it became a reality thanks to an anonymous group of an IT technicians.
    The basic concept is of a window to a possible future: on how a world without the USA or Central Authorities issuing and managing currency could work, but where the economical and monetary system is anarchic and free?
    The answer to all the ongoing discussions and algorithms for several years, at least for now, is Bit Coin.
    It shouldn’t be thought as a currency, if you want to understand it.
    It should be seen as a raw material.
    Just like gold or silver.
    In fact, it has all the characteristics of a raw material:
    – it can be “extracted”
    – there’s a countable amount
    – to extract it, it should be “mined”.
    We will explain thoroughly these points. Where is the mining site? We are talking about IT, therefore the mining site is maths: the software to “extract” bitcoins connects through the Net to all others working on it in the world. All together take advantage of the calculation power of computers where they are installed to, to solve these complex math operations. These operations are like stone blocks. Imagine your computers, as miners trying to solve these math problems randomly generated by the Net every few minutes. When the math problem is solved is as if a stone was spit. That stone has a certain amount of Bit Coins, which are distributed to who has contributed spitting the stone.
    Every time a block is solved or split, the next will be harder.
    The same happens when you are digging a vein of gold in depth, you will always get less and less and it will always be harder.
    These Bitcoins are saved in a virtual “pocket”.
    It was a game until the first person accepted a payment in Bit Coins for a good or a service.
    Going back to the initial metaphor: IT technicians who have created the system made it start by opening the mine and, giving free access to whoever wanted to dig. The first person accepting a payment in Bit Coin, and the first one paying with it have created an economy, so a value.
    Today, some years after, Bit Coin have acquired a high value and are trendy.
    Some obsessed people believe one bitcoin will be worth even a million dollars, but it’s hard that the USA and Central Authorities will make the control skip from their hands, so who is addressing you don’t consider Bit Coin as an anarchic currency which will save banks from powerful people. This is foolishness, unfortunately.
    However, who is addressing you, know that Bit Coin nowadays is the only valuable trading system, allowing anonymity.
    And, yes, it’s true that in the Deep Web is possible to buy weapons and drugs with Bit Coins, and they are quality stuff, more than those being sold on real life.
    The most interesting thing, is that who collects Bit Coins doesn’t know it’s so easy to fool them, so going into the Deep Web, “laundry them” to convert them in money to pay on the real market who might offer services with quality: drugs, weapons and killers.

     

    FORCING A VIDEO SURVEILLANCE NETWORK

    There are things that can be done from behind a keyboard.
    Almost everything to be honest.
    But if you want to be really sure of the result, there’s nothing like the old method of working on site.
    This is the way you can tap both audio and video, safely.
    Video surveillance networks record in tapes, the oldest ones, and others on computers.
    Obviously the last ones are the easiest to tap, but a hacker should never take things for granted. If possible, always inspect.
    This way you may understand that, just to make an example, the inspector from the Local Health Unit doing a surprise inspection to verify the conditions of your facilities is not who he claims.
    Of course, it must be worth it.
    It’s like playing poker; you need hard face and iron hand.
    It’s like doing an open-heart surgery; you need to have a firm hand.
    Just an instance of hesitation and you blow it all.
    During the inspection you should choose the best method, the safest one.
    Oh, and don’t forget: prepare an online website page to print a fake inspection report at the end, that’s convenient.
    You have the opportunity to work directly on the network computer.
    And for people like us a few minutes are enough to grant remote control, even when it seems you are doing something else.
    Do you have a computer connected, can I access your CRM to fill in and print my report?
    We are always having our funds cut down, not even for pre-printed forms.
    Nevertheless everything is in order; your facilities meet the policy.
    Of course, you could maybe tell the cleaning company to clean better in the corners.
    You have a contract with a cleaning company, right?
    Of course you have.
    Here you are, I’m printing it.
    Please sign here.
    Have a nice day.
    Thank you very much Oscar.

© Dajko Comunicazione - 2013