How do hackers hide themselves? - staying anonymous online

SdĂ­let
VloĆŸit
  • čas pƙidĂĄn 14. 06. 2024
  • 🐕 Follow Me:
    Twitter: / collinsinfosec
    Instagram: / collinsinfosec
    Cybercademy Discord Server: / discord
    đŸ€” Have questions, concerns, comments?:
    Email me: grant@cybercademy.org
    🎧 Gear:
    Laptop (Lenovo X1 Carbon Ultrabook 6th Gen): amzn.to/2O0UfAM​​​​​
    Monitors (Dell D Series 31.5” D3218HN): amzn.to/2EXlgRF​​​​​
    Keyboard (Velocifire VM01): amzn.to/2TEswfd​​​​​
    Headphones (Audio Technica ATH-M40x): amzn.to/2F4Tvq6​​​​​
    Standing Desk (FlexiSpot Height Adjustable 47 inch): amzn.to/3p3uSAa

Komentáƙe • 785

  • @edrickreyes-melendez4215
    @edrickreyes-melendez4215 Pƙed 2 lety +3276

    Great video! But you failed to mention that hackers use hoodies and glasses to stay hidden too haha

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +354

      Now you are a true hacker Edrick 😎

    • @jackjaconelli5593
      @jackjaconelli5593 Pƙed 2 lety +1

      Wrong, they use it because the sunlight hurt their eyes

    • @ladvargleinad7566
      @ladvargleinad7566 Pƙed rokem +56

      What he ACTUALLY forgot was to mention covering up the camera.

    • @xansurnamehere
      @xansurnamehere Pƙed rokem +45

      @@ladvargleinad7566 you mean deleting the camera's drivers and/or completely removing it from the device (same for microphone)

    • @ladvargleinad7566
      @ladvargleinad7566 Pƙed rokem +28

      @@xansurnamehere And how is that supposed to fix anything? What if someone hacks your computer, reinstalls the drivers, and while they are still there, add a little spyware to said drivers? Or what if the camera has backup drivers on its own, separate, hidden partition?
      Covering it up or physically removing it is the safest way.

  • @fliporflop7119
    @fliporflop7119 Pƙed 2 lety +376

    they are in dark rooms with a hoodie on and type erratically green text on a black background, they have a world map with red connecting lines that make a sound when moving around, computer screen turns black and a bunch of pop-ups of random images with beep sounds appear and after drinking the sixth can of dr pepper they say :
    "I'm In"

    • @Razrman
      @Razrman Pƙed 2 lety +4

      đŸ€ŁđŸ‘đŸ»đŸ‘đŸ»

    • @pixelrunner2775
      @pixelrunner2775 Pƙed rokem +20

      don't forget the anonymous mask and audible mentions of "hacking into the mainframe"

    • @awii.neocities
      @awii.neocities Pƙed rokem +2

      "They have a world map with red connecting lines that make a sound when moving around"
      You just reminded me of Uplink.

    • @B-MoreCity
      @B-MoreCity Pƙed 11 měsĂ­ci

      Ok you need to stop! đŸ˜‚đŸ€ŁđŸ˜‚đŸ€Ł

  • @yourpersonaldatadealer2239
    @yourpersonaldatadealer2239 Pƙed 2 lety +2518

    Can’t tell if it’s the malfunctioning yt algorithm propagating it’s own inevitable demise or the feds wasting their time with honeypot videos again but either way, a gem of a channel and some novel content I look forward to learning.

  • @kaledrutus2554
    @kaledrutus2554 Pƙed 8 měsĂ­ci +202

    Actually, Ross Ulbricht was caught through an old email that he had advertised Silk Road on in Reddit, then, when they knew who he was they traced him to a library, and then a female and make FBI agents distracted him by pretending to have an argument while another rushed his laptop, so he couldn’t press the kill code button he’d set up previously, they also messaging him through Silkroad at that exact time and caught him with his laptop open and everything logged in 😅

  • @nx2913
    @nx2913 Pƙed 24 dny +9

    I'm amazed that he stops to make you learn what an IP is (most basic cyber security content) but then he speeds up when the things start to get complicated and tricky.

  • @mozesmegyesi6916
    @mozesmegyesi6916 Pƙed 2 lety +541

    You are not a script kiddie. Thank you for the lesson. This is fantastic.

    • @userou-ig1ze
      @userou-ig1ze Pƙed 2 lety +26

      if the compliment is 'you are not a script kiddie' then you label the person basically a script kiddie

    • @bikdigdaddy
      @bikdigdaddy Pƙed 2 lety +8

      Who said tho that he's a script kiddie

    • @ausmanx1161
      @ausmanx1161 Pƙed 2 lety +21

      @@bikdigdaddy he said it to himself in the video

    • @fernandoblazin
      @fernandoblazin Pƙed 2 lety +7

      ima script kiddie thanks now im near to matrix level

    • @userou-ig1ze
      @userou-ig1ze Pƙed 2 lety +5

      @@fernandoblazin Needless to say (and that's the point of it), calling somone 'not a script kiddie' is rather something else entirely than not('a script kiddie'). But even assuming this is as simple as !a == b is the same as a==!b (which, ignoring all context, may not be unreasonable!) it would simply make you 'not a script kiddie' not 'matrix level'. An alternative interpretation is for example, you are simply no programmer at all.

  • @mohsinattiq8810
    @mohsinattiq8810 Pƙed 2 lety +193

    Staying anonymous is one thing.. what about removing digital identity ? People who grew up in digital age and not knowing how bad things can get.. what steps can one take to wipe out this data ?

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +130

      Great point. Especially if you had parents, family, employers who posted photos and info about you online. There are digital privacy laws where you can request for your information to be taken down. But this is dependent on where live and even then there will still be an online footprint you left. Best possible option is to never make the online trail in the first place. That's not easy nowadays.

    • @ntseinfo3082
      @ntseinfo3082 Pƙed rokem +1

      @@collinsinfosec Po

    • @HopeisAnger
      @HopeisAnger Pƙed 11 měsĂ­ci +28

      If your like me, then your GenX parents keep posting your personal info on every social media site. So, the first step is to abandon parents.

    • @ElohiSilverEarthVentures
      @ElohiSilverEarthVentures Pƙed 10 měsĂ­ci +5

      ​@@HopeisAngerhey now that's not nice, they're just trying to show off they're kid that they're proud of. But I totally feel ya, I'm opposite and am extremely protective over my kids photos ever getting posted on internet. Especially, after a time I Googed his sisters name & shockingly on the first page that came up i saw a nude photo of hers that'd been reposted on a hella shaddy website, that had her little brothers photo on her wall right behind her, totally clear as day. I was pissed to say the least. Got that sh*t pulled down immediately.

    • @yx-su5qf
      @yx-su5qf Pƙed 9 měsĂ­ci +2

      ​​@@HopeisAngertrue, it sucks I have photos of myself out there on social media sites and Im not even sure what they post about me as I don't use those sites. Worst thing is that there's literally nothing i can do and they are gonna stay there forever

  • @Alex-to4iz
    @Alex-to4iz Pƙed 8 měsĂ­ci +32

    4:50 something worth mentioning is that installing your own vpn server on some random vps could be a security risk depending on your threat model. Federal agencies can detect your ip address is the only one connecting to that server and thus deduce the outgoing traffic from that server is effectively yours. Also, wireguard should be prefered over openvpn if you actually need to setup a vpn server for some reason.

  • @Lupinicus1664
    @Lupinicus1664 Pƙed 2 lety +550

    Good presentation and very clear, concise and useful information. As a 'security professional' (and someone interested in security since before the internet) this is exactly the kind of straightforward yet entertaining content we need more of.

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +26

      Thank you for the kind words. I am going to try to improve on my video presentation.

    • @rune.theocracy
      @rune.theocracy Pƙed rokem +1

      Try Mental Outlaw if you haven't yet!

    • @Lupinicus1664
      @Lupinicus1664 Pƙed rokem +2

      @@rune.theocracy thank you, I already subscribe to him, good advice though.

  • @sorrefly
    @sorrefly Pƙed 2 lety +316

    6:50 don't underestimate vulnerabilites with virtualization. TailOS discourages indeed the virtualization approach because the host machine can fully control and check what's going on in the VM

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +26

      Great point!

    • @0xdamian595
      @0xdamian595 Pƙed 2 lety +5

      Ssshhh

    • @PiMpMyCoMpUtEr
      @PiMpMyCoMpUtEr Pƙed rokem

      yes but being totally 100% anonymous is kindly impossible. Tails offer a way to get more % in anonymity. That's it. It's the same debate as with confinements and vaccines... Just gain more % here and here.

    • @ajigi7913
      @ajigi7913 Pƙed rokem +4

      Yeah but u can spoof any info that you connect with to a rdp so its a win win

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked Pƙed rokem +1

      True. Many, including myself at one point, thought VMs won't leak malware, but they can. Just as malware can hop partitions to jump to different OSs. (;

  • @khankhaaaan
    @khankhaaaan Pƙed rokem +5

    Your style is simple yet detailed, I haven't come across another related you tube channel that keeps it simple to the point and clearly examined. Subbed!

  • @AbdulAhad-oq6lz
    @AbdulAhad-oq6lz Pƙed 2 lety +29

    He’s not saying you should be a hacker but you could be a hacker 😂

  • @drowningfish6086
    @drowningfish6086 Pƙed rokem +23

    I feel weird about a lot of VPN's, although they claim to have a "no log policy," I've heard of many instances in which VPN companies helped the police in finding cyber criminals.

    • @flat-earther
      @flat-earther Pƙed rokem +3

      Drowning I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @Soaringkiwi1
      @Soaringkiwi1 Pƙed rokem +4

      From prior experience, government agencies do show up to the datacenter and usually either takes the drives or make a copy of them.

    • @theantianimeassociation7574
      @theantianimeassociation7574 Pƙed rokem

      that’s because VPNs are used to protect regular citizens, not criminals

    • @YaBoiKuma
      @YaBoiKuma Pƙed 11 měsĂ­ci +16

      Waay late to the party but here's an explanation:
      Any internet service provider, vpn company or other internet service owner based in the 14 eyes (basically NA, West EU, Australia) is legally required to comply with proper orders from law enforcement.
      In such cases they WILL demand all logs and any relevant information pertaining to their investigation.
      And the laws do allow businesses to lie about keeping no logs if it's for the sake of complying with said laws.
      Conversely, countries outside of the 14 eyes may have more lax laws around that stuff (think Sweden and the MulvadVPN cases).
      In short: if you're hoping that your vpn will allow you to escape those pesky glowies, ensure that the vpn is either a decentralized service (Tor/IP2P) or based outside the 14eyew

    • @CaptainBollocks....
      @CaptainBollocks.... Pƙed 6 měsĂ­ci +4

      And your flat earth nonsense has what to do with the discussion? @@flat-earther

  • @sleaf6
    @sleaf6 Pƙed rokem +16

    If I was selling bad things on the internet and I felt I was about to get caught; I’d make a CZcams channel and as such, talking about OPSEC, appear as a red herring.
    Hypothetically

  • @CA-FE-C0-FF-EE-00
    @CA-FE-C0-FF-EE-00 Pƙed rokem +4

    Tails for privacy: ye
    Tails for hacking: no

  • @bennewman4675
    @bennewman4675 Pƙed rokem +1

    Some people do silly things with out thinking. And then get found out

  • @women-mw1uh
    @women-mw1uh Pƙed 2 lety +20

    just found your videos. i'm a sys admin looking to get into cyber security and your videos are genuinely informative and enjoyable to watch. don't worry, you're definitely not a script kiddie. i'd know, i was one lool. keep it up man

  • @nizzinesworkshop2636
    @nizzinesworkshop2636 Pƙed 2 lety +9

    god damnit I fell off my chair laughing when you said "security professionals like you and I"!

  • @michellenoirstudios
    @michellenoirstudios Pƙed 5 měsĂ­ci +2

    4:09 I'm glad you mentioned that VPNs introduce intermediaries. I feel like a lot of people either forget or don't know about this and perhaps don't think about it before deciding when to use a VPN.

  • @AchwaqKhalid
    @AchwaqKhalid Pƙed 2 lety +43

    Nothing but straightforward pieces of information 👌
    If only other CZcams videos are made this way.

  • @sydniehi3054
    @sydniehi3054 Pƙed 2 lety +136

    Great content man, I just found your channel and its awesome! I’m going to school for computer science, I really wanna focus on encryption and cybersecurity, so your content is an attention grabber. Keep up the good work, posting a video more in depth like what you showed at the end would be pretty interesting!

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +5

      Thank you Sydnie!

    • @MrCipek1221
      @MrCipek1221 Pƙed 2 lety +5

      Keep up and don't make mistake I did! When you struggle with something, give yourself a time. Don't give up because you think something us "too hard". You just don't have enough knowledge to solve this problem. So educate urself and attempt one more time :)

    • @flat-earther
      @flat-earther Pƙed rokem +1

      Sydnie I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @sydniehi3054
      @sydniehi3054 Pƙed rokem

      @@MrCipek1221 I’m super late to this reply but thank you for the advice. It means a lot, especially with this degree you have a lot of people who aren’t willing to help or who have kind of like god complex.

  • @hammerfist8763
    @hammerfist8763 Pƙed rokem +19

    Staying anonymous offline is the bigger challenge.

    • @TruthResonates144
      @TruthResonates144 Pƙed rokem +2

      đŸ€”đŸ€”đŸ€” Interesting and thought provoking statement, I believe this might be the comment of the century... đŸ€”đŸ€”đŸ€”
      # Comment Of The Century, "Staying anonymous offline is the bigger challenge."
      - Hammer Fist

    • @proof_26xx
      @proof_26xx Pƙed rokem +7

      @@TruthResonates144 its not that deep

  • @KristinaKarina
    @KristinaKarina Pƙed 3 měsĂ­ci +1

    THIS ^ has been the most useful explanation! I have been researching each of these components individually, but you now put it all together in a series of steps. Maybe I am slow on the uptake
 or just was distracted with Life
 but this really helps with my own personal OPSEC! Thanks!

  • @Nimrod336
    @Nimrod336 Pƙed 2 lety +2

    Proxys...hops and exits...

  • @SirPiggyy
    @SirPiggyy Pƙed rokem +3

    Great Video, I’m somewhat knowledgeable but I loved how you broke down certain things for beginners

  • @stonetrench117
    @stonetrench117 Pƙed rokem +1

    Also that DNS thing is so terrifying!

  • @Chris-ki7rt
    @Chris-ki7rt Pƙed 2 lety +1

    this video was better than a 1 year course i did in cyber security

  • @droidevlib
    @droidevlib Pƙed 7 měsĂ­ci +1

    You revealed it; now they may be in danger.

  • @TimwiTerby
    @TimwiTerby Pƙed 2 lety +136

    Awesome demonstrations there, but personally I would have liked to see more about how criminals who use these stealth techniques actually get tracked and ultimately caught; I imagine there's a very interesting story there as well

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +40

      A video to follow-up on this topic is a great idea 👍

    • @0xdamian595
      @0xdamian595 Pƙed 2 lety

      Ddw had stories.. not that I know or anything as a useless script kiddie wannabe

    • @edwardmacnab354
      @edwardmacnab354 Pƙed rokem +2

      NSA has enormous resources ,money , techs , and proprietary software . Get in if you dare , but get out before they can target you , because they WILL get you if you don't !

    • @Hasblock
      @Hasblock Pƙed rokem

      This comment's a year old but look up seytonic or mental outlaw. Often times, it's the user unintentionally outting themselves by mixing their public and private identities I.e. using their anonymous email to sign up for Instagram, reusing their private email across multiple websites

    • @ajithAjith-rm5tp
      @ajithAjith-rm5tp Pƙed 10 měsĂ­ci

      ​@@collinsinfosecsir i need help
      Please help me anyone

  • @As-Somali
    @As-Somali Pƙed 7 měsĂ­ci +1

    when you're searches and watches on CZcams puts on the watch list.

  • @zeveroarerules
    @zeveroarerules Pƙed 2 lety +14

    You know what's real anonymous money?
    Cash.

    • @AnotherBadRep
      @AnotherBadRep Pƙed rokem

      Very True

    • @overlord5068
      @overlord5068 Pƙed 7 měsĂ­ci

      Cash will completely disappear in a few years
      Everything will be digital

    • @ronjones3977
      @ronjones3977 Pƙed 2 měsĂ­ci

      ​@@overlord5068few years no ......few decades maybe

  • @maxdemian6312
    @maxdemian6312 Pƙed rokem +2

    Now I know how to operate my own Silk Road without getting caught

  • @angelastandridge2729
    @angelastandridge2729 Pƙed 2 lety +1

    Yes please do go into more depth...I'm very interested. Thankyou đŸ™ŒđŸŒ

  • @eddielopez2373
    @eddielopez2373 Pƙed 2 lety +3

    I think where I’ve been going wrong is I’ve only managed stealthiness. I’m gonna give stealthinessness a try.

  • @annis750
    @annis750 Pƙed 2 lety +6

    Finally!!! Someone that can speak CLEARLY about this topic! Subscribed

  • @antc1611
    @antc1611 Pƙed rokem +3

    You Rock I'm getting a laptop soon .
    I'm just starting off .
    I'm learning how to code and read it .
    It's tricky but I'll figure it out !!!

  • @badza_3542
    @badza_3542 Pƙed 2 lety +2

    Very interesting i must say, i always had this question. Thanks for the video. you got a new follower :D

  • @lancemarchetti8673
    @lancemarchetti8673 Pƙed 10 měsĂ­ci +3

    Great points.
    At the end of the day if your DNS is still controlled by your ISP, vpns, anonymizing services won't help much. Unless you maybe have a PFsense unbound router setup using a service like Quad9 to cloak your DNS.

  • @Cybermondo
    @Cybermondo Pƙed 2 lety +35

    Hey Grant really nice video! How about to do a video with the techniques used to trace back this kind of be anonymous strategy? I mean some reverse engineering

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +9

      Hi Cybermondo, I like the idea!

    • @Cybermondo
      @Cybermondo Pƙed 2 lety +1

      @@collinsinfosec I will wait for it then ;)

    • @ironheadrondo5596
      @ironheadrondo5596 Pƙed 2 lety

      The Grugq is very good and has a few lectures going through the takedown of lulsec and another smaller one.

    • @Parker8752
      @Parker8752 Pƙed 2 lety

      @@ironheadrondo5596 I seem to recall the takedown of lulsec basically boiled down to one of the members being really, really bad at opsec, so once they arrested that guy, they were able to get him to get other members to reveal themselves over their now compromised private chat.

  • @Tapport
    @Tapport Pƙed 2 lety +32

    I was waiting for a VPN ad all video. Awesome job on this, nice to see some digestible content about hacking that isn't from a conference or experts react video. 👍

    • @flat-earther
      @flat-earther Pƙed rokem

      Tapport I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @Tapport
      @Tapport Pƙed rokem

      @@flat-earther I recommend you stop spamming CZcams comments with flat earth shit, lmao. Embarrassing.

    • @flat-earther
      @flat-earther Pƙed rokem

      @@Tapport So does denying the globe automatically mean flat earth to you?

    • @Tapport
      @Tapport Pƙed rokem +3

      @@flat-earther I honestly don’t care what shape you think the earth is, it’s still irrelevant to this video or my comment.

  • @trevor7355
    @trevor7355 Pƙed rokem +1

    This helped with my cybersecurity class, thanks!

  • @AVINASH__SHARMA
    @AVINASH__SHARMA Pƙed 11 měsĂ­ci +2

    Ready to hack neighbours wifi 😎.

  • @vasiovasio
    @vasiovasio Pƙed 10 měsĂ­ci +1

    Objective and Useful video! Thank you Grant!

  • @JonMurray
    @JonMurray Pƙed 19 dny +1

    Great video man. New subscriber âœŒđŸ»

  • @DhruvCanada
    @DhruvCanada Pƙed 2 lety +2

    wow i was *literally thinking of this rn!*

  • @Y2-_
    @Y2-_ Pƙed 2 lety +1

    So crazy what worlds are out there


  • @surfingbilly9654
    @surfingbilly9654 Pƙed rokem +1

    great video with some useful tips i have never thought about before. thanks grant!

  • @leothalion3983
    @leothalion3983 Pƙed 2 lety +1

    This was great! Thank you!

  • @dylanmorin8174
    @dylanmorin8174 Pƙed 5 měsĂ­ci +1

    What i still don’t understand is how you can remain anonymous if you must first connect to anything through your local ISP?

  • @cheesygerit2299
    @cheesygerit2299 Pƙed 2 lety +16

    Tbh writing style is covered so damn less in such videos so props for talking about it even if it was just a second and in a list of thing to identify you
    most people dont even know about that

    • @hazel-vf7on
      @hazel-vf7on Pƙed rokem

      I impersonated a long time ago (half a decade minimum) and one of the main things I used was writing style which made it quite difficult for people to figure out it was me even when they became suspicious. (I don't suggest you try impersonating, it gets messy.) It's one of those details that people don't really think about but makes a lot of difference.

  • @palakbhatia2555
    @palakbhatia2555 Pƙed rokem +1

    Garrett Evans Wow thank you Garrett, you've made my day!

  • @waldoungerer9851
    @waldoungerer9851 Pƙed 2 měsĂ­ci +1

    thanks brother. basic but good

  • @internetparrot9753
    @internetparrot9753 Pƙed rokem +1

    I knew most of this stuff but this was great review thank u

  • @xenostim
    @xenostim Pƙed rokem +2

    I thought the way to use proxychains was to give it a list of proxy servers to select from, and chain together several of them. Why did you just give it localhost?
    Also, in case people are interested, the way to protect a network against DNS tunneling is through DNS Inspection, which security appliances can do.

  • @wankstagg4220
    @wankstagg4220 Pƙed 2 lety +1

    This guy is onto something!

  • @Glow0110
    @Glow0110 Pƙed rokem +1

    More technical would be great. Appreciate your videos brother!

  • @dumbtex6107
    @dumbtex6107 Pƙed 11 měsĂ­ci +2

    Loved the vid I think you really summarized everything really well. I did want to say though I’m still new to the cybersecurity world as I’m really in robotics, but assuming I an attacker could use some sort of small pi like device to connect to virtually with it running a live os like you described I could have it connect directly to the victims network, or even just as a dummy ip in case of middle man failure. I was thinking about this with some of my own applications on a defensive standpoint luckily I’m able to hard wire everything so they’d have to literally tap in without me knowing.

  • @derykespina1116
    @derykespina1116 Pƙed 5 měsĂ­ci +1

    thank you for this video!

  • @zo7lef
    @zo7lef Pƙed rokem +3

    it would be lovely if you mention some tools/services that do the work - for spoofing and dns encryption to avoid the deep dive in coding world

  • @hasanali9983
    @hasanali9983 Pƙed 2 lety +2

    that was a really good informative video, thank u man

  • @sergetheijspartner2005
    @sergetheijspartner2005 Pƙed 11 měsĂ­ci +1

    If a hacker uses all of these methods, how would you go about finding them?

  • @n0kodoko143
    @n0kodoko143 Pƙed 2 lety +1

    Awesome video! Thank you

  • @Enlisttoday
    @Enlisttoday Pƙed 11 měsĂ­ci +1

    I’m just trying to protect myself I’m scared

  • @LotusTheWise
    @LotusTheWise Pƙed 4 měsĂ­ci +1

    I think my security is compromised lol
    I googled about a mission in watchdogs 2 and this showed up a few days later

  • @quackersna
    @quackersna Pƙed 2 lety +2

    Offensive security...love that term ✌

  • @sergiofiru817
    @sergiofiru817 Pƙed 2 lety

    Great stuff men. I just started watching you and you really make very good content. You got a new subscriber 😉
    And I would like to see a video that you get more technical in anonymity 🙂
    Cheers

  • @saifahmedsaid4909
    @saifahmedsaid4909 Pƙed 2 lety +1

    You are awesome man.... Keep going❀❀

  • @krypinz
    @krypinz Pƙed rokem +1

    Well, if your in cyber security. What is the best DNS to use? and how do you protect yourself better?

  • @diveallz1044
    @diveallz1044 Pƙed 7 měsĂ­ci +1

    Enjoyed the video man. I couldn't stop laughing Everytime I started typing something I thought you weren't going to mention...you started mentioning itđŸ€ŠđŸ˜…

  • @user-sl7br9tm7q
    @user-sl7br9tm7q Pƙed 8 dny

    Now I know how much effort that person put in to disrupt my normal life thanks...

  • @sumanbyte
    @sumanbyte Pƙed 2 lety +4

    Looking forward with more videos like this.

  • @king09426
    @king09426 Pƙed 2 lety +5

    Hii Grant, I love this video. Rich in info as always.

  • @kurosakiichigo241
    @kurosakiichigo241 Pƙed 2 lety +2

    Nice video bro learn a lot . Thanks for sharing

  • @jeffyramalhocardioworkouts
    @jeffyramalhocardioworkouts Pƙed 2 lety +1

    Subscribed, thanks for the info

  • @anshumanmishraw
    @anshumanmishraw Pƙed 2 lety +1

    Amazing tips and things which you provide.

  • @LZ2SM
    @LZ2SM Pƙed 2 lety

    By using a goodie inside a dimly lit room

  • @bammyd_6468
    @bammyd_6468 Pƙed rokem

    Great content....I am studying computer Science and need to know somethings so I found your channel and this content helpful💯💯..keep it upđŸ’ȘđŸ’Ș

  • @ghanshyamsinghshekhawat263
    @ghanshyamsinghshekhawat263 Pƙed 2 lety +2

    More details needed

  • @user-yd2ee6sf8k
    @user-yd2ee6sf8k Pƙed 2 lety

    love your voice overs

  • @scottbrady6240
    @scottbrady6240 Pƙed měsĂ­cem

    BY NOT HACKING PEOPLE THEY THINK THEY KNOW

  • @dunar1005
    @dunar1005 Pƙed 4 měsĂ­ci +1

    1:23 still, the reason he got caught was none of those. But the NSA cross referencing old posts of him that had a similar name to his later used username. then they claimed it was done by some unfixed exploit in his market. But of course we know they just checked their data collection.

  • @misscklic7469
    @misscklic7469 Pƙed rokem +1

    Thanks! Really useful in 


  • @fredrikzels2637
    @fredrikzels2637 Pƙed 2 lety +3

    I'd love to see a video that is more in depth and alot more details on how to do it and set it up. I'm new to this and would be great to see more high level programming.

  • @scott8964
    @scott8964 Pƙed rokem

    yes I would like you to do a more technical video on how to be anonymous online that is easy to follow step by step please 😊

  • @Child0ne
    @Child0ne Pƙed 2 lety +4

    I always thought you just did programming videos?!? I didn’t know you did cyber security

  • @anujtheattitudeboy3217
    @anujtheattitudeboy3217 Pƙed rokem +1

    you record with hardware outside of the program. Great tutorial btw it was very detailed but still just right for beginners.

    • @flat-earther
      @flat-earther Pƙed rokem

      Anuj I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

  • @terryscott524
    @terryscott524 Pƙed 6 měsĂ­ci

    don't forget to verify the checksum of any file that you download with a checksum of that file provided from a known good source

  • @DaggerSecurity
    @DaggerSecurity Pƙed 2 lety +1

    The advanced defenses you are referring to at 11:19 are IPS systems, correct?

  • @911Glokk
    @911Glokk Pƙed 10 měsĂ­ci

    Since a live session won’t save downloaded software a hacker wouldn’t use Tails.
    They would use something like Kali or ParrotOS.

  • @lukealadeen7836
    @lukealadeen7836 Pƙed 2 lety

    I work in IT and that's the only reason I'm here

  • @huckleberryfinn8795
    @huckleberryfinn8795 Pƙed 2 lety +17

    You're supposed to use your real picture on a fake ID, that way you can actually use it. That had absolutely nothing to do with Ross Ulbricht getting caught.

    • @collinsinfosec
      @collinsinfosec  Pƙed 2 lety +40

      Good point. However, it did. He used nine fake IDs, all with different names, etc. He used these IDs to sign up for server rentals across the world. He didn't have to use a real picture of himself to gain access to these servers, he could have provided any type of ID. If it really did come down to having to use a real photograph, it could have been more use to limit his exposure. Nine fake IDs with the same picture, different names implies someone is hiding their real identity. He could have limited his evidence. It ended up catching up to him in the end.

    • @maneee1748
      @maneee1748 Pƙed 2 lety +5

      @@collinsinfosec ehhh yes and no...it does look bad but when they found the 9 IDs package Ross said he had no knowledge of it and refused the package and didn't get arrested... Although at that point they were alrdy on his trail so it didn't matter much regardless

  • @platingplayer9753
    @platingplayer9753 Pƙed rokem

    Thanks for your information as a IT nerd đŸ€“ I'm happy to get this info 🙂
    But i think some how i know this before still gonna watch for more information 🙂

    • @flat-earther
      @flat-earther Pƙed rokem

      Plating I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

  • @xEndless11
    @xEndless11 Pƙed 2 lety

    Very useful, thank you :)

  • @Theineluctable_SOME_CANT
    @Theineluctable_SOME_CANT Pƙed 2 lety +4

    I admire your admission you're a script kiddie... Wise young man. Keep going!

  • @V393V
    @V393V Pƙed 2 lety

    11:50 😂
    You are a really Good Hearted Person👍

  • @usuiXt
    @usuiXt Pƙed rokem

    Super interesting, thanks for making this video. :)

  • @NightTerror0
    @NightTerror0 Pƙed 2 lety +6

    as a certified script kiddie I found this video very helpful

  • @oncecrowned
    @oncecrowned Pƙed rokem

    thanks i needed this so i can hack the entirety of google without being caught

  • @VivekSingh-pw1yl
    @VivekSingh-pw1yl Pƙed rokem

    SA. I opened. My eyes hurt. Too many buttons. Don't know what to do. Closed my soft.

  • @inteligence317
    @inteligence317 Pƙed rokem

    One could yield the same results utilizing a virtual machine and deleting the OS