Sargon's wife's son
kiwifarms.net
- Joined
- Feb 23, 2019
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
cool video but the TAA makes my blood boilthe virgin nepo baby game developing groomer versus the Chad autistic self-taught schizophrenic ramblings
I'm not saying he's wrong, I completely agree with his statement. I was just noting that he technically undermines his own knowledge.He's not wrong, but that's because humans are capable of making mistakes far more than a computer is. A computer is gonna want to know what elementary school you went to, and depending on how strict it is, it may not accept your miscapitalization based on how you originally answered that question, nor does it agree that [SCHOOL NAME] is the same as [SCHOOL NAME ELEMENTARY], where a human would be more accepting of the former and not say you're wrong by not adding the "Elementary" part on the end, and the same goes for what city you were born in. That's just talking to people, now you start sending emails out saying their bank account is compromised or they need to click this link to accept a UPS package or whatever. People are the weakest link, everything else is hard skills to navigate a network, usually via command line.
"I have all these scripts, these exploits, zero days, and RATs at my disposal, but really, all I have to do is say 'your mom's been compromised, I need 50k and her social security card'"I'm not saying he's wrong, I completely agree with his statement. I was just noting that he technically undermines his own knowledge.
The Def Con game started with TProphet dropping 50 Ellingson Mineral "employee badges" around the conference. On the back of each badge was a series of phone numbers that contestants would call and try to swindle the operators to share information about the company and, eventually, to take down the company's power distribution unit.
The Telephreak team went as far as setting up a call center in Minnesota with people who would adjust their replies to the callers based on the amount of Twitter chatter around the company. The more people tweeted about the contest, the tougher it would be to get info from the "employees."
The contest was scheduled to run until Sunday evening at 6PM PT, but the company was successfully hacked by a team called Psychoholics late Saturday night. In addition to getting kudos from the Telephreak organizers, the winning team got an "Uber" badge from Def Con -- which means it'll have free access to the conference for life. That part wasn't expected by TProphet. "It was a total surprise to us when Def Con named it a black-badge competition. We weren't even an official Def Con contest," he said.
De facto Psychoholics team-leader Jason Thor Hall said he handled most of the social-engineering work, but by the end of the challenge even some of the shy team members were getting into it and picking up on social cues. "Being able to read other people is huge in any walk of life, so I am glad they got to experience it and see how social engineering works in practice," he said.
During the challenge, the would-be phreakers had to do more than just make phone calls and remember dial tones; they also had to figure out voicemail passwords. One was an employee's birthdate. Another was the last four digits of an employee ID. Sadly, these are typical mistakes made by actual people in the real world. That alone should frighten the security team of any company.
Bradie "Shaye" Rehmel is the legal name of Mald's "boyfriend", who makes zero attempts to not look like the most generic tomboy on the planet despite being a genderspecial non-binary but actually binary "man".One other thing I thought was interesting, Bradie Rehmel is listed as a lead artist of Heartbound at Pirate Software and was in his 2017 group too. I think this Adam Baldwin was on it too, just to drive home my point about the epic hacker larping.
So, I went ahead and slapped out some CompuTIA Tech+, CompuTIANetwork+, and a half a dozen other courses with the CompuTia Preamble on various free resources. I'd say I'm pretty shit still when it comes to "Being Hax0r fagget" but after lurking here, on half a dozen ancient IRCs behind VPNs, operating through the gay faggotry of reddit, trolling Jita on Eve Online mentioning Maldavius, snooping the furry community with a dogshit "Entry Level Linden labs furry wolf avatar thing", and generally spending time I could be zoning out while my child plays minecraft on his own secure server that him and his friends have patched to high hell (Oh, wow, a preteen has his own Customized Minecraft Server with a ton of mods to it and even more bullshit than Jason has, makes you think) I realized that it's energy wasted.But he worked at Blizzard for 20 years! He's a veteran in the industry! He couldn't possibly be lying about how much of an epic 1337 haxor he is!
Very good research here. All this stuff kinda follows from his "Epic Industry Veteran" persona where he just talks a big game but for some reason barely shows off his actual "abilities" in lieu of just talking about how smart he is and showing off "his" awards. Not surprising to see even with his cybersecurity credentials it's mostly just lies him being incompetent.
Just to rinse my eyes and ears of Jason, I'll post a video from one of his 'detractors.'
Preserve Tube | Ghost Archive
It was an educated guess based on the information provided in the video. Jason never elaborates, so I extrapolated what I know. But since you're asking, I did a tiny bit of digging. Around the time Jason was employed, Blizzard implemented a Time-Based One-Time Password (TOTP) Two-Factor Authentication (2FA) to secure accounts. From what I remember, it was an optional program where you bought a $20-$30 keychain from the Blizzard store, and it promised an additional layer of security to stop hackers from getting into your account and stealing your gold.I'm completely lost as to how an "encryption algorithm" vulnerability could lead to breaking 2-factor (in a most likely type situation). Presumably at the time this 2-factor would have been their physical authenticator keychain or SMS-based, as far as I know. In this case the only encryption would be on the phone network, which you're certainly not touching, or on the HTTPS request to the website, which does not contain the 2-factor codes anyway initially.
How do you know this is the "most likely" exploit? It isn't even clear which exact exploit or time frame this would've been.
Retries Per Hour | 3 | 5 | 10 | 20 | 100 |
% of Success | 4.29% | 8.41% | 17.94% | 34.13% | 88.64% |
Ghost Archive, Preservetube, local:Our overlords at Google realized I was interested in this "Is Jason using a voice changer?" question and recommended a short with him being interviewed. Found the original video after a little digging- (starts at 19:34 if the timestamp fails)-
PirateSoftware and his craziest DefCon story!
https://preservetube.com/watch?v=A40LkDfTmCk
Our overlords at Google realized I was interested in this "Is Jason using a voice changer?" question and recommended a short with him being interviewed. Found the original video after a little digging- (starts at 19:34 if the timestamp fails)-
Erm, kind of cringe you don't think he's hacked his own internet and shielded his house in top of the line anti-government material (totally not tinfoil).Is he concerned his milquetoast takes and hypocrisy make him a target from government intelligence agencies?
And if he were such a target his home internet ISP would also be at risk.
I don't remember exactly when it was; but their devices were eventually figured out as hackers were routinely compromising accounts with the 2FA device linked to the account. Not sure how well the Blizz Authenticator App has been though.SNIP
There are imaging devices law enforcement has, that to keep it simple, use sonar or thermal imaging to see through walls. Believe it or not, tinfoiling your walls combats this tech.Erm, kind of cringe you don't think he's hacked his own internet and shielded his house in top of the line anti-government material (totally not tinfoil).
He even uses a high-tech security device on his front door that prevents spooks from hacking into your typical normie biolock to gain access to his hacker den, it's called a K.E.Y. (keep everything yours). Wouldn't expect you plebs to understand functioning at his level when everyone is trying to steal your shitty indie gamecode and youtube secrets.
VPN sponsorship incomingHe's a complete degenerate and freak schizo. In one of his Youtube Shorts called "PVP Enabled Network" he talks about how he refuses to use any of his accounts outside his home because he doesn't trust whoever owns the cell tower. This doesn't really need to be said, but 3G data and above are not considered vulnerable. Also obviously your actual communication with your bank is HTTPS which means even if they had access to the traffic it wouldn't be useful.
Bao and other hoe vtubers popular on twitch have been slowly transitioning to be pseudo IRL twitch streamers like its common on that platform to farm more simps using their body and to network better with groups like OTV (as some of them are Asian, Bao in particular), considering she showcases OTV member Micheal Reeves' shit at the start, she was probably invited there because of him.
>Asian american girl with circular glasses who still cling to japanese rituals she never naturally exercised in life, grifting a nerd audience, acting the part of "gremlin" as per vtuber standardsOur overlords at Google realized I was interested in this "Is Jason using a voice changer?" question and recommended a short with him being interviewed. Found the original video after a little digging- (starts at 19:34 if the timestamp fails)-
Bao's Vietnamese.>Asian american girl with circular glasses who still cling to japanese rituals she never naturally exercised in life, grifting a nerd audience, acting the part of "gremlin" as per vtuber standards
Fuck this dumb jewish plant; why is this stereotype such a thing suddenly?
Honestly? I think people have already forgotten, or never really knew that he's making a game.When do you think people will realize, that he perhaps will never finish his game?
Seriously, I went to his live, and all I see is 12 Hour Streams of wow and Space marine 2.
Can't he at least make a video where he talks about the what's still in development in his game, or perhaps his audiences doesn't care?