Jason Thor Hall / PirateSoftware / Maldavius Figtree / DarkSphere Creations / Maldavius / Thorwich / Witness X / @PotatoSec - Incompetent Furry Programmer, Blizzard Nepo Baby, Lies about almost every thing in his life, Industry Shill, Carried by his father, Hate boner against Ross Scott of Accursed Farms, False Flagger

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

Which will happen first?

  • Jason Hall finishes developing his game

    Votes: 33 0.8%
  • YandereDev finishes developing his game

    Votes: 413 9.7%
  • Grummz finishes developing his game

    Votes: 117 2.7%
  • Chris Roberts finishes developing his game

    Votes: 143 3.3%
  • Cold fusion

    Votes: 1,640 38.3%
  • The inevitable heat death of the universe

    Votes: 1,932 45.2%

  • Total voters
    4,278
I feel like going around and looking for Devs that deserve more attention and praise than Jason. You know, ones that actually are doing shit.
In fact I saw one at the gamescon presentation a few weeks back that caught my eye so I went and found their youtube.
Game's name is, 'Swordai'

Started a year ago with this:

View attachment 6436049View attachment 6436046
Now we have this:
View attachment 6436065

1 Year Jason. He's got a multiplayer system in 3D with people fighting and playing.
One year and nowhere near the amount of resources as you.
Now that’s a dedicated programmer/developer, love to see it.

Currently watching a streamer/ programmer who built his own fps-engine written in OpenGL and C++
For some reason i cant post any image or YouTube link here so just the name then: Tokyospliff.
To clarify: I don’t like weed and never will but don’t mind him doing it occasionally. He’s a cool guy.
 
Last edited:
Apparently he is good friends with 1o57, the guy responsible for making the challenges. 1o57 needed a break of some kind, and PirateSoftware would then be the keymaster of the room for the duration of the break. This is how he gained his access, by being buddy buddy with an organizer. Great social engineer.

The Black Badge challenges are extremely simple but tedious (there's many, they're just annoying), and fundamentally not at all related to any post-beginner cryptography. The literal first chapter of any extreme beginner level cryptography course would basically cover everything that the challenges are about, with the disclaimer that not a single solution is at all cryptographically secure.
@Eminent Not that I want to defend this exceptional individual, but at these cons there's a certain ceiling that can't be breached since these conferences only last a few days or weeks. Most of the challenges aren't that impressive it's more of a time trial against other people than it is an amazing accomplishment. In the wild real researchers take weeks, months, or years to make progress on security problems. Cryptography problems you're talking years or decades assuming there's not a critical error in an implementation that's discovered. A lot of the DefCon workers volunteer time for no pay, and there are only about a half dozen or dozen people who get paid to work on the con. A lot of these cons are kind of a joke even if they have very interesting talks by legit researchers. This isn't something that's just an issue in cybersec, most cons as far as I can tell are just a way for people to job hop or sell their product.

The security researcher specializing in crypto tend to not be publicizing their findings in the open at conferences because they're already employed, and their employer doesn't want their findings available outside their product. There are longer term challenges, but generally: "Ain't nobody got time for that." Why should researchers spend their time working on very difficult artificial challenges when they've got actual research to do that will make them or their company money? If they made these challenges actually rigorously difficult none of them would get solved over the days or weeks the con was running.

His constant parroting of his 20 years experience, as well as his story about how he single-handedly invented, designed, and built some electronics for QA at blizzard have had me questioning Jason "Thor" Hall since I first learned of him. There are many bullshitters in cybersec who lie about their skills, and achievements. If he was skilled enough to single-handedly design, implement, and manufacture some specialized electronic device for QA at blizzard why was he working there in the first place? The story was in a short, and it was one of the first one that I saw. The story made me believe he's one of these cybersec bullshitters who claims to have been hacking the FBI since he was 13, but somehow you can't find any evidence of anything he's ever done.
 
Could definitely see him being the "very special guest" some backwater middle school would bring on to ramble at the students about how he managed to go from being homeless to gestating wildly at a captive audience of pre-teens.
Gestating wildly at an audience would be extremely impressive because he's a man and physically incapable of carrying an embryo and growing it into a fetus.

Now acting like a self-help preacher guru and gesticulating wildly at some pre-teens while talking about hacking a nuclear power plant or stealing the keys to the answer room is very believable. He might even be put in front of some high schoolers.
Not only is it a really messed up, manipulative, and and incredibly bad display of sportsmanship, he just fucking cheated then bragged about it online for years and years.

It’s like admitting you cheated at playing checkers with your grandma then bragged for a decade about how fucking smart you are for tricking her.
That's so incredibly petty and malicious that you have to wonder if he's a Scooby Doo villain.
 
  • Agree
Reactions: BigPeanut
Come to think of it, I've met at least three different guys who carried themselves as domain experts in game dev, engine dev (which is a special breed of autism if you never met one), and penetration testing respectively, yet the first two were barely able to pass undergrad programming courses and the third worked at Best Buy. All three had that similar phenotype of slightly tall, somewhat overweight, no facial hair, and having long hair but not doing even the bare minimum grooming. All three also had that thing where they're socially awkward but also incredibly talkative. All 3 annoyed me in the exact same ways 'Thor' does. Is this just a common type of person?
 
Thor seemingly has enough time out of his busy day possibly making heart bound(no he's not he's actually at Twitch Con from what I can recall). To tell us in detail how is ferret died.







1727234019237.png
 
This is the outcome that happens a lot anecdotally but has not been researched outside of that.
What does he mean by that? In his experience it happens a lot, but when researching this issue, he didn't find others with similar problems, or it happens a lot, but didn't do any additional research about it? Either way this is a strange wording.

Shaye is an Exotic Vet Assistant
So his pooner wife isn't a vet...
 
@Eminent Not that I want to defend this exceptional individual, but at these cons there's a certain ceiling that can't be breached since these conferences only last a few days or weeks. Most of the challenges aren't that impressive it's more of a time trial against other people than it is an amazing accomplishment. In the wild real researchers take weeks, months, or years to make progress on security problems. Cryptography problems you're talking years or decades assuming there's not a critical error in an implementation that's discovered. A lot of the DefCon workers volunteer time for no pay, and there are only about a half dozen or dozen people who get paid to work on the con. A lot of these cons are kind of a joke even if they have very interesting talks by legit researchers. This isn't something that's just an issue in cybersec, most cons as far as I can tell are just a way for people to job hop or sell their product.

The security researcher specializing in crypto tend to not be publicizing their findings in the open at conferences because they're already employed, and their employer doesn't want their findings available outside their product. There are longer term challenges, but generally: "Ain't nobody got time for that." Why should researchers spend their time working on very difficult artificial challenges when they've got actual research to do that will make them or their company money? If they made these challenges actually rigorously difficult none of them would get solved over the days or weeks the con was running.
Sure, it's the same reason interviews for jobs requiring math or coding ask weird puzzles to test how someone thinks and solves problems as opposed to presenting them with a real problem the company is working on. Usually the questions to test this are intentionally abstract to test how they behave on the spot.

The difference is no one brags about doing well on those or getting them right. The LARP at Defcon is fine for a game and a general test that gives you a badge to show off you're the best at solving a little game at a con, to use it as a reference for ability is where it becomes cringe. It's like going to one of those Tough Mudder events, running the course, and then claiming you're a professional athlete because you won a badge there, it's a fun little thing to point to as a fun memory and something that took effort, but it's no foundation for expertise.
 
What does he mean by that? In his experience it happens a lot, but when researching this issue, he didn't find others with similar problems, or it happens a lot, but didn't do any additional research about it? Either way this is a strange wording.


So his pooner wife isn't a vet...
I love how even when talking about how his beloved ferret died he HAS to clarify that his pooner wife is a Vet and that she absolutely knows what she is doing.
 
@StoatLover

In my experience the reason there are so many bullshiters in cybersec, IT, and just tech overall is due to the general public not having much deep knowledge of the technicals that go into their devices and daily use programs and it's a really easy "in" for people who want to manipulatively boost their image and come off as an "expert" in such things.

Sure any normie can figure out how to use a smartphone due to its purposely straightforward designed interface but an enormous majority of them wouldn't be able to tell you how anything that makes that device work works on a technical level. In and of itself thats fine, BUT at that point anyone who can parrot technobullshit with enough conviction and certainty will sound like an authority on the subject. What's the normie gonna do? Know they're being bullshat? No, they're going to just nod and ooh and ah and the ferret piss scented hackerman with 20 years of doing almost nothing to his name.

That's what fucks me off about people like Jason Troon here. He knows enough to get his foot in the door and due to a certain amount of (understandable) ignorance on behalf of the public, he rode this shit to the bank.
 
Aren't these con "capture the flag" or other exercises essentially run for larpers by other larpers. Basically anyone with any real skills is there for other content and if you do these competitions you really don't have enough time. Basic way to win these is get big enough team to split work and then only do this for duration of the con. It helps if your group of lapers have a few experiences or smart people and you can easily ride the coattails. Especially when you cheat.
 
I think something a lot of you guys are missing is the fact that actual hackers who steal money and breach major systems would not go around constantly bragging about it in a place where their identities are easily documented and possibly matched. Opsec is one of the most important things for a hacker and I'm supposed to believe there's an entire convention of the most badass haxors on the planet jerking each other off and bragging about their l33t skillz?
 
Aren't these con "capture the flag" or other exercises essentially run for larpers by other larpers. Basically anyone with any real skills is there for other content and if you do these competitions you really don't have enough time. Basic way to win these is get big enough team to split work and then only do this for duration of the con. It helps if your group of lapers have a few experiences or smart people and you can easily ride the coattails. Especially when you cheat.
Yes, and no. One of the other big thing that happens is companies developing tools or exploits will join CTFs to win and market their tools. All of these little contests can be LARPy jokes, but they can be useful for training, and simulating real world threat environments. A lot of CTFs are about as impressive as the crypto puzzles that he found. That being said all kinds of events at these cons are opportunities for people to learn about stuff outside of their expertise. How basic and LARPy they are varies greatly. Now whether it's worth spending 3-5k to do something your company could run for basically nothing on some weekend is debatable. Biggest opportunity at most cons is for sales.

Sure, it's the same reason interviews for jobs requiring math or coding ask weird puzzles to test how someone thinks and solves problems as opposed to presenting them with a real problem the company is working on. Usually the questions to test this are intentionally abstract to test how they behave on the spot.
@Retink Retunk, not to start a tangent argument, but in my experience talking to grey beards about interviewing the shift happened dramatically after Google took off. It wasn't a common practice to give everyone a bunch of puzzles in an interview. Google started to take off and everyone said, "Google has the best smartest people we have to copy Google!" Destroying hiring practices across the entire industry.

In my experience the reason there are so many bullshiters in cybersec, IT, and just tech overall is due to the general public not having much deep knowledge of the technicals that go into their devices and daily use programs and it's a really easy "in" for people who want to manipulatively boost their image and come off as an "expert" in such things.
@Johnny Silverhand, as above not to start a tangent, but this is not the case with companies working with cybersec services. You're talking "cheap" bills in the quarter millions for companies with CTOs, and CSOs, of their own who are literate. There's so many bullshitters because cybersecurity is heavily connected to legal requirements, and government jobs. It's seen as a cost that adds nothing to revenue generation of the company. There's a lot of what you could call regulatory capture. I don't think anything will change until they start throwing C-suite in prison for their negligence. I'm not holding my breath. They want their rubber stamp so they can make regulators, investors, whoever is requiring the assessment happy. Many customers just want to get past whatever legal requirement they have so they can keep doing business. Hiring someone like Jason is actually an excellent strategy for this end, especially since he'll be so much cheaper than most experienced hires! Save costs, and give the customer what they want.

Thor also recommends submitting to bug bounties. You'll get screwed pretty often by every bug bounty system even if you find something. They'll offer you half of what they claimed they were offering, or compare your research to something similar, and claim they solved it already then offer you nothing. Even using HackeOne this happens all the time. The company will refuse to pay out on a bounty program. Unless you're some savant that's able to find many many vulnerabilities very quickly you'll not survive on bug bounties. You will submit a real exploit, the company will fix it, and then they'll offer you a starbucks giftcard and a tee-shirt or worst case scenario a cease and decist even when they have a bug bounty program.
 
I'll say that Jason isn't wrong about telling people "no," but he's wrong about doing it at an interview. They want to see how you act, react, think, etc to get an idea of what kind of person they're interviewing; if the job is very technical, they also probably want to be sure they're getting someone who actually knows their stuff and not just another H1-B nepo-hire. However, the power of "no" is something that should be used, the problem being, it requires a steel will and the knowledge of consequences. I had a HR meeting after butting heads enough with a manager at a previous job and they tried to do the whole "What can we do help you?" I told them, "Let me say no. I know you won't do that, but that's what I need. They keep screwing up and then saying it's my problem, they need to feel the pain of their own mistakes. Let me say no." Had a long discussion about how their tickets are incomplete, so what I setup is incomplete, and they inspect it 10 minutes or less till showtime and always have a problem with me not doing my job and demand I make things right; and gun to the fucking head I have to or I may as well not show up the next day. Let me say "no," nope, can't do that. The one place I did tell someone "no," told them several laws I'd be breaking, they give me the "I don't care," told them I do care, and when you try to get me fired, I'll take you with me. The power of no is good to have, but fucking know when to use it. Someone asks you to show your process and you tell them no, I'm pretty fucking self-destructive in the workplace Jason, but even I'm not that fucking stupid.

Is this just a common type of person?
Phenotypes are real, don't dismiss them as pseudo-science.

There's so many bullshitters because cybersecurity is heavily connected to legal requirements, and government jobs. It's seen as a cost that adds nothing to revenue generation of the company.
Majority of cyber-security specialists in the government are mainly people familiar with security tools and laws/processes/etc. The actual hacker/programmer types who work for the government, are really under Raytheon, GDIT, and others who are contracted to the government. Your day to day guys who man the SOC, let's just say I know two of them who have LTT hoodies. Never had a problem with them and they're personable enough, but they're not turbo-autists, they're a typical nerdy/weirdo/Internet autist computer person; but that's me throwing stones in glass houses.
 
Is this just a common type of person?
Had a friend similar to Thor.
He would always quickly assent in new social circles, but it would be short lived. As his constant need to exaggerate his accomplishments and skills would be realized once few people had actual skills in what he would brag about.
He also lacked self-awarness.

Funnily enough he was also a programmer/game dev sperg. Once we were talking about some pathfinding in his game, and I suggested that he should not overthink and just do simple DFS/BFS, as that was 2D grid game. Bro did not know what stack is.
For those that don't know stack is one of the most basic data structures in computer science.
And he worked as full-stack back then, and had directional education(not college, but something akin to trade school, as we have those where I live for IT).
I still cannot comprehend how things like that could happen.

But yeah, there is a lot of people who live by bullshiting, yet are somehow insanely socially awkward.
Maybe that's a boon in today's society where people assume autist=skilled.
 
What does he mean by that?
it reads to me like a very poor attempt at trying to hide his negligence. you're right that the wording is very strange, it immediately caught my attention too, it almost sounds like a subtle admission. but really it seems like it's just his usual routine of, "i'm smarter than you, i already did the research and cleared myself of blame, you need to take the master hacker's word for it you idiot." now, i'm no vet, but how does one ferret get overheated by another if they're in an air conditioned room and supposedly not cramped or overcrowded? and why would you start a rescue being so under-prepared for something so simple?
 
@Retink Retunk, not to start a tangent argument, but in my experience talking to grey beards about interviewing the shift happened dramatically after Google took off. It wasn't a common practice to give everyone a bunch of puzzles in an interview. Google started to take off and everyone said, "Google has the best smartest people we have to copy Google!" Destroying hiring practices across the entire industry.
I don't think puzzles and quizzes are necessarily bad, but most are administered by HR these days as opposed to skilled engineers, which is kind of like hiring a plumber to give you a colonoscopy, but the plumber is also mentally retarded.
 
  • Like
Reactions: batterybee
Thor also recommends submitting to bug bounties. You'll get screwed pretty often by every bug bounty system even if you find something.
Completely agree with this point. It is mostly parroted around by posers or people with little experience. I have seen a ton of people say they consider going into bug bounty without having any understanding of the subject matter.

People who are intelligent enough to reliably stumble upon exploits in popular software will probably be seeking employment from firms like MIC/NSO Group/submitting to Zerodium, rather than waste their time reporting directly only to be falsely marked as duplicate and never see any money.


@Eminent Not that I want to defend this exceptional individual, but at these cons there's a certain ceiling that can't be breached since these conferences only last a few days or weeks. Most of the challenges aren't that impressive it's more of a time trial against other people than it is an amazing accomplishment. In the wild real researchers take weeks, months, or years to make progress on security problems.
Of course. You would absolutely struggle with a time restriction to solve a more complex puzzle, my primary gripe with the situation, as others have mentioned, is that solving these challenges are discussed as if they *are* some great, month-long complex achievement. There are certainly difficult and longer term CTFs out there. Personally I would love to see Jason Hall do something like Flare-on or similar, as he has experience with "digging in code caves" and "removing the polymorphic".

Code cave clip:


Not archiving because I'm almost certain they've been posted before. I just love them.
 
Last edited:
Back