Logo

    53: Shadow Brokers

    en-usDecember 10, 2019
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    Podcast Summary

    • The Astonishing Capabilities of NSA's Elite Hacking ForceTAO, formerly known as the NSA's elite hacking team, now operates under the name Computer Network Operations. The Equation Group, believed to be TAO, has access to the most sophisticated hacking tools ever created.

      The NSA ANT catalogue contains a list of hacks, cyber-surveillance devices and exploits that the NSA can use for specific missions. It includes some mind-bending devices such as a USB plug that captures and wirelessly transmits data, a piece of software that gives access to an iPhone’s text messages, contacts, voicemail, video camera, and geo-location. TAO is NSA’s elite hacking force, which has access to the most sophisticated hacking tools ever created. They spend years on research and development to make tools and use them whenever they need. TAO has changed its name to Computer Network Operations now. The name given to the NSA by security companies for their malware is the Equation Group, believed to be specifically TAO within the NSA.

    • Importance of Monitoring Social Media for Cybersecurity ThreatsIt's crucial to stay aware of potential threats on social media at all times and have a reliable SOC that can detect and respond to threats in real-time to protect against cyber-attacks.

      In 2016, a group called Shadow Brokers leaked cyber-weapons stolen from the NSA's Equation Group, which included malware for Cisco and Fortinet firewalls. President of Rendition Security, Jake Williams, was on-site helping a client with a security issue when the SOC alerted him about the Twitter post. Despite being occupied, he downloaded the files and analyzed the malware. This event highlights the importance of keeping track of threats and news on social media platforms, even outside the regular work hours. It also emphasizes the need to have a reliable SOC in place that can detect and respond to potential threats in real-time.

    • The Shadow Brokers Hack and Information Security ConcernsThe Shadow Brokers' hack of NSA tools highlights the need for improved information security measures to counter future breaches. Companies should routinely update their systems to ensure protection from such threats.

      The hack by Shadow Brokers of the NSA hacking tools has raised serious concerns about information security across the world. The vulnerability was unknown even to companies like Cisco and Fortinet, and the information is now in the hands of everyone, including the hackers. The Shadow Brokers have claimed to have other confidential data dumps and seem to be more interested in profit than anything else. At the same time, the world is still unclear about the identity of the hackers and how they got their hands on the information. Companies must work on improving their information security measures and routinely update their systems to counter these kinds of breaches.

    • The Shadow Brokers, NSA Hacking Tools, and Newly Released ExploitsInfoSec professionals cross-referenced IP addresses to check if they were hacked by the NSA. The Shadow Brokers released new, legit NSA-developed exploits posing a threat to security.

      The Shadow Brokers, who had captured the attention of the world by hacking NSA, made several posts about the hacking tools they stole from the NSA. Some InfoSec professionals used a list of IP addresses that the NSA is possibly hacking from, to cross-reference with the IP addresses coming into their network to check if they were hacked by the NSA. After Donald trump won the Presidential election, the Shadow Brokers made another post and signed off, saying goodbye, claiming they didn't get enough Bitcoins. They also released 61 new exploits developed by the Equation Group, TAO within the NSA. These exploits were not previously seen and they looked legit, thus posing a threat to people's security.

    • The Changing Landscape of Incident Response in the Age of Security Breaches and Political HackingEvent logs in Windows can now be edited by hackers, showcasing the impact of the Shadow Broker's data dump and the political nature of hacking stories. The expertise of InfoSec experts like @MalwareJake is crucial for raising awareness and sparking conversations on cybersecurity issues.

      Event logs in Windows can now be edited by hackers, which has changed the game for incident response. The Shadow Brokers dumping of stolen hacking tools further highlights the impact this has had on security. Additionally, their timing of dumps aligning with Russia being called out for hacking is suspicious and may be an attempt to distract attention from Russian activity. This highlights the politicization of hacking stories and the need for caution in interpreting them. Analysis and insights shared by experts like Jake Williams, also known as @MalwareJake on Twitter, help bring attention to important security issues and spark conversations in the InfoSec community.

    • Shadow Brokers Reveal True Identity of Former NSA MemberOur online and offline activities have consequences in the digital world, and it's essential to be mindful of what we share, even with close friends and family. We never know who may exploit that information and for what purpose.

      The secret group Shadow Brokers claimed publicly on Twitter that Jake is a former member of the NSA's TAO, which he had kept as a secret from his Twitter followers, family, and friends. This unprecedented act caused fear and unpredictability for Jake, as he didn't know how the US government and ordinary people would react to it. Through the distraction of teaching his SANS class, Jake coped with the situation, which was probably the main message of the Shadow Brokers. It's evident that they were not guessing about Jake's identity and had a specific purpose for the message. This incident highlights the need for individuals to consider their online and offline activities, as they may have consequences in the digital world.

    • Jake's Life After Being Outed as an Equation Group MemberThe Shadow Brokers incident emphasizes the need for businesses and governments to have strong cyber defense strategies in place to protect against constantly evolving cyber threats. Threat modeling should be regularly updated and personal exposure to potential threats should be limited.

      The Shadow Brokers tweet which outed Jake as an Equation Group member changed his life. He had to call his ex to explain the situation to her. Jake's threat modeling changed and he had to limit the exposure of himself and his family to any potential threats. The EternalBlue and EternalRomance exploits released by the Shadow Brokers made millions of Windows computers vulnerable to attack. Microsoft had patched EternalBlue just before it was released, which raised rumors that NSA had tipped them off. The incident proves that businesses and governments need to have strong cyber defense strategies in place to protect against constant and evolving cyber threats.

    • The Consequences of International Travel for HackersInternational travel poses a risk for hackers as they can be indicted, arrested, or subject to extradition policies. Hackers should be aware of the implications of their actions and the potential consequences when traveling overseas.

      The FBI can indict hackers who have committed crimes, even nation state hackers. Hackers on the Cyber's Most Wanted list who travel to countries with extradition treaties with the US are likely to be arrested. The Shadow Brokers dump operational data and hackers targeted by the DOJ have concerns about arrest risk. Hackers may be at the mercy of those who have access to their operational data. SANS instructors who have been accused of hacking on behalf of the NSA may be wanted in several countries and considered criminals. Hackers should consider the risks of traveling internationally, as they may be arrested or they may be subject to extradition policies.

    • The Shadow Brokers: A Top-Tier Hacking Group and Russia's Possible InvolvementThe NSA's prioritization of offensive capabilities over working with software vendors to fix vulnerabilities has caused concern about their focus on hacking and surveillance rather than keeping people secure.

      The Shadow Brokers group's capabilities in hacking the NSA and publishing their secret hacking tools place them in a top-tier category. It is highly likely that Russia is behind this group, but there has been no FBI indictment or public statements from the US government. The fact that the NSA hoards zero-days or exploits that nobody knows about, instead of being on the defensive and working with software vendors to get vulnerabilities fixed, suggests that the agency prioritizes being offensive. The Shadow Brokers may have been trying to expose this, and their actions have raised concerns about the NSA's interest in keeping people secure versus their focus on espionage, surveillance, and hacking into other networks.

    • Importance of Analyzing Shadow Broker Hacking Tools for Cybersecurity DefenseUnderstanding the capabilities and gaps in log files of sophisticated hacking tools like EternalBlue can reveal hackers' expertise. Strengthened cybersecurity measures are essential to protect against serious data breaches from weaponized tools developed with taxpayer money.

      The Shadow Brokers hacking tools contain sophisticated capabilities, which have been exploited by both nation states and hackers. It is essential for the InfoSec community to understand and analyze the tools to defend against future hacks, such as EternalBlue, that have caused major damage to organizations. Understanding the capabilities of the tools and looking for what's missing in logs after an attack can help identify the hacker's level of expertise. While the NSA may have developed these tools with taxpayer money, they have now fallen into the wrong hands, highlighting the need for strong defense systems and cybersecurity measures to protect organizations from serious data breaches and cyber attacks.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Ep 50: Operation Glowing Symphony

    Ep 50: Operation Glowing Symphony
    Operation Inherent Resolve was started in 2016 which aimed to combat ISIS. It was a combined joint task force lead by the US military. Operation Inherent Resolve sent troops, ships, and air strikes to Iraq and Syria to fire weapons upon ISIS military. It’s widely known that US military engaged with ISIS in this way. But what you may not have heard, is the story of how the US military also combated ISIS over the Internet. This is the story of how the US hacked ISIS. Sponsors This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2019 to get a $20 credit on your next project. Support for this episode comes from Honeybook. HoneyBook is an online business management tool that organizes your client communications, bookings, contracts, and invoices – all in one place. Visit [honeybook.com/darknet] to get 50% off your subscription. Support for this episode comes from Check Point. Check Point makes firewalls and security appliances you can use to combat the latest generation of cyber attacks. Upgrade your cybersecurity at CheckPoint.com Learn more about your ad choices. Visit podcastchoices.com/adchoices

    18: A Cornucopia of Crazy Making

    18: A Cornucopia of Crazy Making
    Celebrity weddings, hearty stouts, class clowns ruin it for everyone, private armies, another kickstarter rip-off, Japan rules at crazy, and Kanye West is still a total douchebag. They also discuss the future of making money on the internet. Subscribe to the Grumpy Old Geeks on iTunes and give us a five star rating. You know you want to! Shownotes: John Rzeznik Is Married Jimmy Beaumont & The Skyliners Jason's step-dad comes in at 2:46 Ten Fidy Stone Farking Wheaton w00tstout! University Suspends Online Classes After More Than Half the Students Fail Apple Developer site hack: Turkish security researcher claims responsibility Apple releases status board in reaction to hacked dev portal Monsanto Buys BLACKWATER the largest mercenary army in the world Selfie-Loathing: Instagram is even more depressing than Facebook. Here’s why. Awesome FREE Instagram Exporter The Wayback Machine The Archive Documentary This is not a conspiracy theory Kanye West sells $120 t-shirts: On the Emotional and Literal Value of Bravado. Seriously? Bizarre "Bagel Head" Injections Become Latest Beauty Trend in Japan Heard App IFTTT App NeverWet promo video NeverWet, the viral "magic" spray doesn't work. At all. Behind the scenes at a McDonald's photo shoot Arby's meat on Snopes Who Owns the Future? by Jaron Lanier Flattr See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Episode 3139: Dark Enigma - The Eerie Enigma of Cicada 3301

    Episode 3139: Dark Enigma - The Eerie Enigma of Cicada 3301
    Please be aware the stories, theories, re-enactments and language in this podcast are of an adult nature and can be considered disturbing, frightening and in some cases even offensive. Listener Discretion is therefore advised.

    Welcome heathens welcome to the world of the weird and unexplained. I’m your host, Nicole Delacroix and together, we will be investigating stories about the things that go bump in the night, monsters lurking under your bed or deep in the forest, that unknown creature lurking just out of sight and frighteningly imagined creatures, ghosts, supernatural beings or unsolved mysteries. So, sit back, grab your favorite drink, and prepare to be transported to today's dark Enigma....

    And on today’s Dark enigma we’re looking into a rather interesting conspiracy theory, well not so much conspiracy as weird, but I’ll let you be the judge. Okay, with that said, we will still be playing our drinking game and as you know, the drinking game is only for those of us that are at home and have nowhere else to go tonight. The choice of libation is yours, so choose your poison accordingly… Alright, now for the game part how about every time I say Internet that will be a single shot and every time I say Cicada, that will be a double shot. Now that the business end is out of the way we can jump headfirst into today’s dark enigma… so put on your best cyberpunk duds, grab your laptop and log into the darkest parts of the web as we jump down the rabbit hole with The Eerie Enigma of Cicada 3301

    We live in the age of the Internet. Virtually every aspect of our lives is tied in some shape or form to cyberspace, and the net has become a sprawling, lawless cyber jungle. And just like a jungle, there are things that move in the shadows and stalk about the wilderness here in the ether. In some cases it’s hard to know if what is prowling out there in the dark is harmless, a predator, a mere illusion caused by the play of light on the leaves, or something else. It is from this cyber wilderness that creeps one of the weirdest unsolved technological mysteries of the modern age; a puzzle put forth from some mysterious cabal whose agenda and identity remain unknown to this day, and which has spiraled into perhaps the most legendary and baffling conundrums of the Internet.

    On 4th January 2012, a cryptic message in simple white text on a black background mysteriously appeared on the infamous Imageboard 4chan set a small corner of the internet ablaze. It stated simply: “Hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in the image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few who will make it all the way through. Good luck.” The denizens of 4chan didn’t know what to make of it. Was it a marketing tactic? A recruitment scheme for some tech firm? An elaborate joke?

    16: Sum Ting Wong

    16: Sum Ting Wong
    Asiana Fox Faux Pas, the death & ressurection of Hulu, Atari Alums hit the slums, Jobs screwing Apple from beyond the grave, dorky algorithms, DEF CON biting the hand that spies, stalkers delight in new creepy, more crap you can't afford. Subscribe to the Grumpy Old Geeks on iTunes and give us a five star rating. You know you want to! Shownotes: On the Shortness of Life - Kindle Edition San Diego Zoo Safari Park Why you don't rely on interns. The Death of Hulu Owners call off Hulu sale, to inject cash instead Judge In Apple Price-Fixing Trial Used This Video Of Steve Jobs Chatting With Walt Mossberg To Prove Apple's Guilt Seriously?! Prismatic FEDS, WE NEED SOME TIME APART. Hackers convention ask government to stay away over Snowden Secure Ideas will not be presenting at DEF CON this year General Alexander Black Hat Keynote DEF CON 20 Videos Background Check app Intelius Date Check Patrick Smith's Ask the Pilot Touch of Modern The 50 Most Perfectly Timed Photos Ever Quit on 5 by 5 See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Don't underestimate how much trouble Facebook is in right now

    Don't underestimate how much trouble Facebook is in right now
    Facebook's management doesn't seem to understand why daily use on the site is continually falling. It may be because of all of the false promises Facebook has made about fixing problems like fake news and conspiracy videos. Facebook would do well to remember the fall of Myspace and what happened to Nokia and Blackberry.  

    Learn more about your ad choices. Visit megaphone.fm/adchoices