I Paid a Hacker to Hack Me
Vložit
- čas přidán 19. 06. 2024
- Coincidence? Or something much worse?
Please check out everyone who helped me create this video:
Cyber security experts, go tell them to upload more
@tenfoldsecurity9258
Funny educational content about topics you'll probably like if you're here
@SomeOrdinaryGamers
Calls scammers and makes them rage for hours, truly inspirational 😂
@KitbogaShow
Chapters:
00:00 I Gave Dark Web Hackers My Info (Pt. 1)
01:00 I didn't use a VPN...
02:09 Ft. The Hacker I Paid to Hack Me
02:45 Describing how a "script kiddie" attempts hacking
03:15 Is it possible to get hacked with just your IP address?
03:40 Ft. @KitbogaShow, was it the viruses?
05:10 Is someone after me?
05:30 Ft. @SomeOrdinaryGamers or is it coincidence?
06:34 What precautions did I take when I visited the dark web in part 1?
07:23 The slip up... maybe?
07:38 Tenfold security
09:02 GETTING HACKED
10:22 What about the dark web virus?
Edit: Adding this information here to satisfy anyone who may be curious about the comments claiming the information in this video is incorrect. I never want to misinform anybody. I know most of you come here for fart jokes or eating raw beans from a can, but still.... that's no free pass to misinform people.
Comment 1) "You cannot be hacked with only your IP address."
This statement is false. There are scenarios in which it is dangerous if a skilled "hacker" gets your IP address. For example, if you are running a Minecraft server on an outdated version of Windows, you could be vulnerable. In this scenario, all a skilled hacker would need is your IP address to potentially start accessing your system. Another scenario might be if you have an outdated/used router and just recently installed 10k~ malicious programs and intentionally disabled all of windows safety features... 😅 like I did the other day lol. Prob could have given more context as to what previously happened.
Comment 2) "What about CGNAT and dynamic IP addresses"
CGNAT is basically where your ISP will pool you with other houses/businesses and you'll have the same IP address. In this case, you cannot be hacked with only your IP address. It would be virtually impossible at that point. But if your internet is provided to your house via a wall jack in the US, you likely are given a specific IP address that is dynamic and will change occasionally. So once your IP address changes, you're safe. But, if you're being "hacked" using the method mentioned in comment 1, you'll never know you're being hacked. You will be vulnerable until your IP address changes, which sometimes takes months. & at that point, a good hacker will have likely created a new way to gain access to the system without needing your IP address.
Comment 3) "This 'Dark Web Hacker' is a script kiddie"
He's describing how easy it is for any uneducated kid to get on the dark web and start hacking. He's not describing his own process. That's my bad, I cut out too much of what he said. He spoke for hours, so I was trying to piece together the relevant parts. I'll be more carful with this type of editing.
Comment 4) "You don't need a VPN on the dark web"
It seems as though this is a debated topic. Some say a VPN creates another layer of security, some say it makes you less secure. In my case, a VPN might have added a much needed layer of security given I was clicking random links all across the dark web. In some cases, clicking a link in a web browser can run a malicious script. Now, could one of those scripts have grabbed my actual IP address? I'm not sure, that's why I paid a hacker to hack me.
Comment 5) "You can not hack someone by just sending an email to a person."
This statement is false. There are scenarios in which using a locally installed email program on an outdated system leaves you vulnerable by someone simply sending you the email and it loading within that program. It's extremely unlikely, but possible. You do not need to worry if you're using web based email.
Comment 6) "You cannot be geolocated with your IP address"
IP addresses do reveal your geolocation, but not your precise location like a home address does. That's pretty common knowledge. I think some viewers thought the video was implying that someone could know the exact coordinates of my left toe with my IP address.
I felt compelled to share these in depth answers in order to give some of my long time viewers and supporters the peace of mind that I'm not just going to give you a bunch of lies in a video. The scenario I'm in is incredibly unique. In 99.999999% of cases, you are not as vulnerable as this laptop is.
business: nick@zbtsol.com
• My Faith - Where I Got...
Thank you all for watching! Baby number 2 comes any day now, see you soon! - Věda a technologie
Mr. Homeless is literally every fear of Muta regarding dark-web personified
hahaha
i just checkd if its the best and even avast is better
Dude this made me fuckin laugh so fuckin hard
"OH NO THEY HAVE MY PUBLIC IP"
*unplugs router and plugs it back in*
"glad we dodged that bullet"
fr. This video is just crap.
😂
You implying that it will renew automatically with a different one?
@@thatdrh That was the joke, man. The OP obviously knows (hence the quotes and format) that internal IPs are different from public ISP IPs.
@@thatdrh That was the joke, man. The OP obviously knows (hence the quotes and format) that internal IPs are different from public ISP IPs.
As a certified penetration testing engineer (a legal hacker), this is one of the most hilarious videos I've seen. The process that the "hacker" is describing at 04:10 is referred to as "being a script kiddie." Essentially, anyone can take a bunch of scripts and commands that they do not understand, run them and hope for something to happen. Putting that aside, obtaining someone's IP address is largely insignificant in over 90% of cases. This is due to two reasons: CGNAT and closed ports. CGNAT is a situation where the ISP uses network address translation to map their clients' IP addresses, similar to what a home router does. As a result, multiple individuals share the same public IP address, and when someone tries to access it, they are actually accessing the ISP's router instead of the intended device. In most cases, people aren't even aware that they're behind a CGNAT. This is quite common due to the limited availability of IPv4 addresses, and the need to aggregate them using CGNAT. The second reason, closed ports, pertains to the majority of ISPs using firewalls that block HTTP/SSH/Telnet on the public interfaces of their clients' routers. This means that while the client and the ISP itself can access them, no one from the outside is permitted. This is also extremely common practice.
Even in the unlikely scenario that your ISP does not block these ports and you are not behind CGNAT, if someone accessed your router, they would only be able to... change its settings, and that's assuming they would break the admin password or have an exploit for this particular software version. Seriously, they would only be able to view and change your wifi settings, disconnect you from the internet, change the admin / user password and so on. To access your LAN remotely, the router would need to have the option of creating a local VPN server, which most consumer-grade routers do not have. While it is possible to upload a different pre-configured firmware to the router which does have this option, such as OpenWRT, assuming it is supported by this particular router model, it is extremely dangerous as it would disconnect you from the internet and cause your public IP address to change in most cases. The small minority of individuals who have their own public IP addresses, use dynamic addressing, which means the public IP address changes after every reboot of the router.
Finally, to end this rant, it is physically impossible to infect you with an email via Gmail's web interface without even opening it. This is Hollywood nonsense. It may be possible with an obscure email provider, or a local client like Thunderbird or Outlook, but not if you're using the web interface of a popular email service provider, i.e. like an overwhelming majority of people.
Gotta hate all these channels like this one and tekkitrealm who put in there videos complete bullshit like getting hacked by just receiving an email, or thinking that using a script that some one else made makes you a hacker 😂
@@somebody8986 Yeah, I honestly don't follow any of them and stumbled across this video accidentally - through YT's recommendations. At least they usually make it obvious at the very beginning, so we know which channels to avoid ;D
Yeah, I cringed pretty hard any time he was talking. Dude literally just did a scan with nmap lol. Sorry, Mr hummus, but this "hacker" is an absolute joke.
yeah, "if theres an exploit in the router" - big if there homie
How common is CGNAT really? It's unheard of where I live. I would hate not being able to port forward whatever I want. It's such a basic thing that I've come to take for granted, it would be a complete deal breaker.
This man is the definition of what schools say not to do and why those warnings exist
That 'hacker' at the start is 100% an Indian Microsoft support rep lmao. He knows jack shit about actual hacking, he's just rambling with well-known keywords
fr “get into ur network through an ip” the whole protocol is pointless if there isnt even that much security… 😢
i never comment but hearing "scanned over 60,000 ports" had me dying, makes it sound like some labor intensive work. takes two seconds. Also found it funny how the "security" expert said someoen could get exact location from a IP address......
@@l1tch_ general location but not exact lmao
@@somebody8986 and sometimes it’s just the location of where your ISP is
@@l1tch_ It is possible to get an exact address from an IP and im not talking about longitude and latitude
Every video I saw today had VPN sponsor and now when it's finally relevant it's sponsored by food.
you cant even use Tor browser if you aren't using vpn
you found what we call a "script kiddy"
He'a a dumb f*k. You cannot use a damn IP to do anything. Best he can is to DDOs and scan for ports but what good is that when every router uses DYANAMIC IP. Fr I am angered by this video.
Yeah, as far as he did so far, it was just scanning for open ports, which from a mobile hotspot wouldn't be allowed or work anyway.
@@WindowsDaily The way I remember you need to be on the network to scan for ports. Dumb shit anyways.
A what
lol I haven't heard that term in a long time 😂😂😂
man this whole video is a nightmare. can’t wait to see how this concludes
0 replies???? It’s been 2 days
Hi Crypto NWO! I used to watch your videos few years ago
omg crypto ! i hope ur videos get sponsers soon, u deserve it :)
i like to think that all of this stuff started because of him modding on r6 and then he fell down the rabbit hole lmao
The whole thing has been a ploy to find a hacker capable of giving him the ultimate R6 hacks.
@@GetOffMyPhoneGoogle lmaooo i hope one day like his last video will be a video linking everything hes done back to being banned on siege
@@GetOffMyPhoneGoogle He just woke up one day and decided there's gonna be acog on the 416 again no matter the cost
trollwaffen BUF
@@jz7383 yes
There’s a lot of misinformation in this. First, you do not need a vpn to access TOR (dark web), in fact it’s discouraged. Secondly, someone grabbing your IP does not mean anything! They cannot find vulnerabilities in your network or windows and the worst they can do is DDOS you and grab your approximate location (city and state). Plus, most IPs are dynamic, which means they switch automatically, so if someone grabs your IP, it’s likely to change the next day or two anyways! I like this guy’s content, but this is packed with misinformation.
Thanks for the info, I find it all interesting either way
You don't need to use a VPN but it really shouldn't be discouraged, while it does give another point that you could be theoretically penetrated from or have data leaked it is the least likely point, and accessing without could point all your traffic to one exit node, making it easier to identify you, whereas with multiple VPN servers it should make it harder for anyone to ever be sure they are even watching the same person if they are observing you from the exit node.
I agree it is a bit silly in places but certainly using a VPN shouldn't be considered worse than not using one on the Dark Web, even if the reality is you likely won't be hacked either way, though it does matter which VPN you use as some are more complacent with security and data breaches than others, and some are more cooperative with "Government Agencies" than others are.
Well you can be hacked with just an IP but the victim would have to be running a program like a webserver with vulnerable code on it or a old version of a smb server, but normal people likely arent doing that, it takes effort to open a port and link the program to that port
@@eyephpmyadmin6988 yes, I’m just simplifying it for this channel’s audience, which I’m assuming most have not tampered with any network if they believe an IP can get them hacked. But yeah ur right.
Why is it discouraged to use a vpn on dark web?
You really should've paid a reputable company to do a pentest on yourself. It takes more than "I did a Nmap scan and done" just for hacking.
The hacker in the video is basically what’s called as ScriptKiddie I.e he’s too much reliable on scripts that he finds and then the rest is Luck. When you gave him your IP address, What he essentially did is something called as NMap port scan which is basically a network tool to check all open ports of a system associated with an IP address. While it’s true for the reconnaissance stage of the hack and also, here the IP address points to the mobile phone and mobile phones tend to have low open ports and also, if there are open ports, in majority of scenarios there won’t be a pre existing script that a “Script Kidde” can use and get away with it. Better find good hackers next time.
Or maybe not some "hacker" from the darkweb, but someone who works in cyber security and knows his stuff xD
Or find some hacker that legitimately knows programming and can create actual python scripts for the purpose of hacking. T _ T
It’s a script kitty not kidde 😐
@@uncanny4038 no it ain't
@@uncanny4038purr
“I Paid A Hacker To Hack Me” Congrats, you've played yourself.
good job copying another comment dude
@Static The guy Based posted it 40 min ago, this guy 37 min ago, i will not reply anymore.
@@davidooow6678 sihehu
@@davidooow6678 Who asked tho?
uh, tha-that's the idea??
Loved the Kitboga feature! Homie is a force of nature when it comes to pissing scammers off
This hacker just reminds me of the con when they say your computer is infected, no threat unless you are dumb. Not a hacker.
We all know real hackermen are legally obligated to say "I'm in" after pressing ENTER.
Therefore, this must be a double-agent hecker.
"I find scripts on the dark-web and replace the ip-address with your ip-address" Dude you were talking to a professional script-kiddie.
Not to mention this dude only ran one script and was like "ah no open ports, your un-hackable bro"
Agreed
I'm not knowledgable bout this stuff but am trying to learn. Even I had a hol up moment when the hacker said they just copy stuff.
@@GunakillyaOG to be fair "well stoles is better than poorly made" very much applies here, especially for you or anyone who wants to learn, looking at good sources and trying them out is a great way to learn.
But don't call yourself a professional if all you do is copy and past some stuff without knowledge/ kust replacing the IP.
I'm pretty sure his point was that anyone could hack someone using readily available code, not that that was the method he used.
@@GunakillyaOG This is what most hackers do and is why you never want to be the lowest hanging fruit.
He lied to you about a lot of things lmaooo. They need more than just your ip address to get into your network.
Yes, this exactly! The amount of misinformation in this is crazy. First, you DO NOT need a vpn for the dark web, in fact it’s discouraged. Everything is routed through TOR servers, so a vpn is a vulnerability. PLUS, IPs can’t be used to directly hack you! Most IPs are dynamic anyways which means they are switching by themselves, so if someone’s pulls your IP, your IP will not be the same IP tomorrow
Yeahhh, this video is very misleading lol. I can literally post my IP here, and the worst thing that would happen, is that I can get DDOS'ed. Also, there is a lot of wrong information in this video. You can not hack someone by just sending an email to a person. 🤣
@@relklarsen yep!
@@relklarsen I guess that the mail thing is like a zero days that actually happened on iphone SMS's so basically similar type of vuln and about the IP i mean you can run port scanning on someone's network via their IP and find vuln that you can exploit
@AAAA yeah, he doesn’t lmao
I always love Muta appearances on other channels, a small crossover event is still a crossover event
I watched this man go from perfectly sane to being the literal definition of insanity
I’m a Junior in college right now majoring in Cybersecurity. I’ve wanted to drop out so many times. your videos have inspired me to learn all I can!
thank you
Heard the salary is good later on
I've heard some things about how "IP cannot be used to hack you" it CAN but you have to do some fanangling by doing things like port forwarding and other things, which you would have to intentionally enable (which is what im assuming this hacker was looking for)
A lot of this content is cashing in on the "dark web super scary" sentiment. One thing to bear in mind is that some devices can compromise networks without you even realizing. People don't understand what "port forwarding" is and assume it's an involved process. Sometimes it's as simple as ticking a box on a firmware install for your new NAS box.
In general though, if you're a normal user with normal user things. There's very little risk involved with getting your IP leaked. The worst that might happen is DDoS, which can be solved relatively easily for most users.
For larger companies or even people who work from home with more "advanced" network needs, there's for sure a risk of finding an exposed port to pivot into your network.
with an IP you can do a LOT.. remote hosting, download keyloggger steal victims info.. Geolocate adress with IP.. find info on who lives there, where they grew up , who they are related to..commonly used security questions for banking apps or most security questions are easily found on most peoples social media pages ( their dogs name , best friends name , what street they grew up on , mothers maiden name ) Linked in profiles.
not to mention the malice one could cause with swatting attacks/ DDOS attacks if they wanted...
)
@@jasoncalahaisen7224 Woah Woah Woah
You absolutely cannot do most of these things with JUST an IP address.
You cannot just remote host/sftp files onto someone's PC without a TON of setup on both ends, including pre-shared keys usually. This is not a situation where you just grab someone's IP and throw files at them.
Geolocation is very broad, at most you'll get a state and maybe a city. Not enough information for anything. Maybe useful when tied to other DOX information, but only if your social media is poorly managed. And that's a different issue.
You absolutely cannot SWAT someone based on an IP.
I like that you're passionate about security, that's great and we need more people like that in the world. But leaking IPs is not a large data breach.
if anything, the scariest thing Mr. Homeless did was leak a phone number. With SIM swapping you can pivot that into a massive breach (assuming it wasn't a burner for that explicit reason).
@@jasoncalahaisen7224 yes that however requires a lot of OSINT and only the most dedicated of hackers who will do dedicated attacks will go that for (I mean this in the realm of geolocating, using social media to find answers to security questions, and discovering large amounts of PII) also iirc keyloggers won't work purely off of IP, neither will stealing someones info unless you mean that this attacker is already on the network. remote hosting im pretty sure you also can't do to someone unless once again, they have things like port forwarding and other unsafe things enabled (which are usually by default disabled)
@@RoeyAA it can be ticking a box yes, but usually its behind a bunch of things that the average user will never access or even see in their lifetime use of a standard os like mac or windows which was my primary point
that virus program that you said you were worried about at the end. don't be because its just a really old program that i used almost 15 years ago to mess with the computers at my middle school. brought back alot of memories seeing that lol. . funny to see that the virus program survived that long and someone put it on the dark web.
well... it could be a modified version.
Thank you for risking possibly everything for the sake of entertaining us. You’re amazing 😂
This guys channel is perfect
Smart enough to know how to fuck around
Dumb enough to find out
Funny enough to share with everybody in an entertaining way
there's a point you just have to throw that laptop out for national security sake
Ive been here since the beginning of siege and seeing your content expand and grow into some Michael Reeves shit is so insane, love it :) keep this up its very creative :D
I absolutely love how all my favorite CZcamsrs are coming together on projects.
🤡🤡🤡
yo nick glad to see you're doing good man, haven't seen ya since north but always catching up on the videos, glad to see the success, much love brother
I love how he puts his life at the deepest risks and seems fine and still jokes around lol!
keep being awesome man! but just remember be careful! Things will get messy
weeee, your hacker knows how to do a portscan, big fckn deal.
Where the bloody hell is part 3 man
Ironically this very same thing happened to someone I work with this week, unfortunately, fell into a bank scam and gave pretty much all of their information to the scam callers
i don't remember anything like that in the video
this is the only drama series id ever watch, i love it so far
I may be getting hacked but this seems like a great time to sponsor Hello Fresh
The "hacker" is talking a load of bullshit with buzzwords, I bet he just created a Netflix account and logs into it "to prove he can hack people" and then claims he has no idea who it is...
Do you even know what brute forcing is aka cracking. I’ll give you a run down of how you do it you need a leacher then a word list and you need to know the email address provide you are looking to crack the accounts of you also need residential rotating proxy’s you also need a config to use with the leacher. The leacher uses the proxies and the config in combination with the word list to scan for accounts. don’t comment on stuff you know nothing about.
Your videos are amazing.
Can’t wait for part 3!
Is it just me or the video delayed
Me too
Average day for basically homeless: ah yes let's pay someone to hack me
Jesus I started watching this guy YEAAARS ago like 2017 and now bro is married with a child and I still live with my mom
_Really_ enjoying this series!
This man will go to any extreme for content and I'm here for it. Mad lad.
Man this is why I wait for a show to have all of the episodes out bc the wait is too much for me 😂
Man you really teasing us with this part split
for someone not exactly security wise you did really good for the most part
So much teasing ! We need the next uploaf !
best crossover episode, some ordinary gamers and basically homeless
This is a great channel. Glad I stumbled upon it
Coincidence? Or something much worse? Part 3 coming soon 😱
Great video man glad to see your evolution from community controllers
yo what was the anti virus software i need to buy that shits
Free meals... i can just eat dirt
@@gospodinzvijer Frfr
this was an amazing video i've been waiting so long for it can't wait for ep 3
I like this series. Stay safe, always use protection.
the production on his videos are just getting better and better
I feel like I’ve been waiting so long for this and it’s finally happening 😭😭💕 I’m so pumped
Give my man a Netflix series already
Is the "to be continued" hinting that the hacker might have done some backdoor stuff by getting him to download that program?
Sick vid. The chimes at the outro gave me chills ngl
Every good story begins by the way you can identify yourself to the subject and his story
Homeless I just want to say good luck on this. This reminds me I need my CompSci buddy to check my setup and stuff out because I’ve done some sketchy stuff. Nice vid!
This guy is more of a script kiddie, NOT a hacker.
Bro these little teases at the end really get me
Whenever I see this, I remember the story of a mad man in a psychiatric hospital who kept tapping and tapping and tapping to ...see more
BRUH man knows how to make cliffhangers better than TV series writers in 12 minutes
Homeless and Muta should make a series together because his entire job is cyber security
Very curious about the re-occurring recommendation of using VPN with Tor throughout this video. I believe if anonimity is the goal, you certainly don't want to be turning on a VPN alongside Tor.
There's nearly no way that IP address (non-VPN use) matters unless you were running a server that had a vulnerability (ex. SMB exploit EternalBlue used in the famous WannaCry ransomware), or unless you cared about getting Denial-of-Serviced for a while (and couldn't readily get a new IP). There's generally no security risk at all, only a privacy risk; namely when it comes to governments knowing what you're doing (although they have other methods too, so it's not like a proxy/VPN makes a person private), or potentially certain commercial organizations like for pirated content, assuming that certain US ISPs are still forwarding client information to these companies.
You definitely gave him everything by downloading his antivirus lol. He now has all your files
This video ain’t sponsored by a vpn it’s sponsored by hello fresh because that’s what you need to stay safe on the dark web😂😂
the ''custom neon sign'' in the background just gets me LOL. Like have a real sign which actually tells something, like your yt channel name. But no instead, you go for something that says what it is, ''custom neon sign''. LOL.
"Im currently inside of a FBI safe house hiding from hackers - Dark Web Pt.10"
This guy is giving his info to hackers let just appreciate this
always puts in so much work, amazing
Love this series!
love the ending, he was so nice to let you use his antivirus software :p
Hacker - runs nmap scan
Basicly Homeless- Woahhh
Isn’t this what hackers do anyways? Expect without your consent.
Takes me back to corpse husbands narration of the 'i hired a hitman on myself ' creepypasta story
“If I gave you my IP address, what could you do?” Depends. How bad did you piss me off lol
you cannot geolocate ips precisely. itll only give you the approximate location of the address(like a city/region)
It's possible, but you would have to have cooperation from their ISP (or have hacked them), since ISPs keep logs of which account is using what IP at what time.
To put this straight, This Man Installs 100+ Viruses on his Computer, Makes a fridge a gadget, and went to the dark web and INSTANTLY regrets it I've got to say... You are one interesting person.
If anyone is wondering using a VPN with Tor is often worse since the VPN provider can see your traffic. However it will hide that you're using Tor from your Internet Provider. So self hosting a VPN can help you
the fact that this isnt sponsored by a vpn is incredible
this feels like a netflix documentary
Pssst you don't really need a VPN on Tor. Unless you're paying for your VPN with something like XMR and you use completely fake info. You're not as secure as you think.
This is amazing, you’re insane man, great content.
A VPN should have no effect on TOR, since it pretty much is a VPN itself
this is exactly what i was thinking
tor already reroutes traffic through multiple places, so why would you use another vpn???
@@drcgaming4195 There is an attack that can be done on tor networks where if somebody owns a large amount of machines in the tor network, theres a chance that somebody could connect and get routed all through machines that they own. That would de anonymize you and show your actual IP to the person or group owning those machines. I usually use a VPN as well, just in the extremely rare possibility that happens. Then, they would have to try to get my actual IP from the VPN provider, which hopefully wouldn't give it up.
but maybe im just paranoid for that lol
Either kitboga is the luckiest man in the world or his social security number is just a coincidence
Bro that “hacker”. I think I had him from Microsoft Tech Support last week.
This has gone off the rails...
Am I the only one who noticed the audio is COMPLETELY desynced from the video??? Like minutes off lol
yh
Yeah it's the same for me too. Like someone tried to edit out the hellofresh ad but cut the audio and not the video
yess I thought my computer was damaged or bugged but thank God its not.
Funny how Muta is actually the only one that knows what he's talking about. Not even that "Cloud Security Engineer" guy.
cant believe he did all this just to scam hellofresh out of some free meals for his family
cant wait to wait another 5 months for the next part
Bottom line is if a real hacker wants to get your info and destroy you then it's very easy. But you have to give them a reason. There has to be files they want, money, secrets or something worth spending hours of time. I went down the rabbit hole and came to realization that anyone with a brain & free time can do things most of the public can't imagine. Movies/Games don't even begin to shine a light on the amount of vulnerabilities people leave open.
Whats the name of some vulnerabilities ?
I am just laughing watching a skid and a person using intense music to pretend like "wow guys i am going to get hacked what a cool hacker"
This has all the elements for the premise of a new Unfriended movie
That link is not a part2
only OG's knows how he's come down to this type of content
I Absolutely love that you teamed up with kitboga for this video!!!!
you guys need to do another collaboration for real! yours energies match
@@SpicySpleen lol he hates kitboga if you’re an og
im honestly surprised that this guys youtube channel is still being operated by him and not taken over
I just watched a mf movie.. LOVE the content, really love the dedication to keeping us entertained
“Was it maybe 10,000 viruses” took me out this dude is really the most wreckless man on the internet 🤣