This episode of Chronicle is brought to you by SpellRogue, out now on Steam Early Access!

Support us on Patreon:

Second Wind Merch Store:

The team at Kodi Fire IPTV strongly suggests that you use a VPN at all times.
Be it for browsing, watching Kodi, watching IPTV or anything else – the one that we recommend is Hidden Router. They provide you with very fast speeds, that can reach over 400Mbps, and their VPN service is as low as $6 per month (when paid for 2 years)!
Grab your own Hidden Router and regain your online privacy now!

32 COMMENTS

  1. Genuine question. GTA V came out in 2013, what's the harm of the source code being released 9 years later? I don't mean what are the ethical issues and I'm not saying anyone had the right to distribute code that doesn't belong to them. I just wonder why Rockstar wouldn't want it out there if it's been so long since it came out?

  2. I’m certain that he’s not wasting his hacking potential inside a mental hospital for the rest of his life, no he’s serving an unofficial indefinite life sentence working for the FBI’s cybercrime unit. He’s the modern day equivalent of a Tony Stark building a miniaturised Ark Reactor in a cave, with box of scraps. Why would Government allow such gifted potential to be wasted when they can exploit it & make him disappear when they’re done..

    Just like every other famous hacker that got past a very very advanced security system’s the FBI doesn’t like to waste potential talent so they make them disappear from the public eye so that they are ever failed to do their jobs, outlived their usefulness & or would have accumulated soo much sensitive data throughout their time serving the Government to the point where they become way too dangerous to be left alive & quietly silenced & buried in an unmarked grave..

  3. I had the same tactic happen to me multiple times, someone spamming the 2FA every minute. I didn't get relentlessly annoyed to the point where I let it happen; I changed my password. Only an idiot lets effectively a virtual burglar in just because he won't stop ringing the damn doorbell.

  4. most … corporate espionage? (not quite what i mean but its late and i cant remember the actual term)
    is caused by someone exploiting a physical fault in security
    a common one that security testers use is cold calling people at the company and seeing if they can get the info for where they eat lunch
    if its outside of the company then more than likely they have a card that can be read on them then all it takes is sitting in that lunch location and just cloning card signals
    this is a commonly known method and basically the first one anyone tries so most companies that use card locking systems know about it and have training for it in place

  5. I think the idea that age is a huge factor in understanding how these systems work is a bit of an illusion.

    It’s much easier to get access to a companies slack and steal some data than it is to actually pull off converting that stolen data into cash. The group of people reckless enough to try and bridge that gap is almost entirely comprised of teenagers and professional criminals. The pros don’t do high profile hacks so you only really hear about the teenagers in most media(with occasional cameos from Russian and NK state actors).

    If you look at security researchers and pen testers though the high level ones tend to skew towards the typical mid-career 20-40 age bracket just like most technical fields.

  6. Fun fact: Gen Z is apparently less tech literate than Baby Boomers ON AVERAGE since they grew up with all this "Just Working" at least/especially when it comes to scams. However, this has ALSO led to "hyper-tech-literate" people like this hacker. Where they just naturally get it all so well that even the best current security experts can only reconstruct what they did after the fact. This arms race will only continue, and like every evolutionary arms race, my money is on the attackers long term