Logo

    Ep 17: Finn

    en-usJune 03, 2018
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    Podcast Summary

    • Identifying Hackers on Twitter: Tips and TricksFinn's story reminds us of the value of identifying and nurturing the talents of exceptional students with unique abilities. Providing appropriate educational opportunities can lead to extraordinary success.

      Hackers can be identified on Twitter through their unusual profile image, Unicode characters, and comments on privacy and anonymity. This is demonstrated by the story of Finn, a young hacker who gained access to his school's Twitter feed. While the story initially felt wrong and dirty to narrator Jack Rhysider, it eventually became a tale of a smart and different kid who public schools often fail to accommodate. Finn's fascination with computers began at an early age, and he developed skills beyond his mother's expectations. The story of Finn exemplifies the importance of providing appropriate educational opportunities to talented students with unique abilities.

    • Overcoming Adversity to Find Passion in TechEven in difficult circumstances, it's possible to find your passion. With perseverance and dedication, you can excel in any field and make a positive impact.

      Despite having Asperger's and ADHD, Finn discovered his passion for computers at a young age. He struggled to fit in at school and was bullied in various places, but found acceptance online thanks to the anonymity it provided. He quickly showed aptitude in IT, developing a love for solving problems and seeing code as a game. Though he bounced around different schools, it didn't matter where he was - he still struggled to fit in. Eventually, he found his place in the tech industry as a respected IT expert, showing that no matter how different you are, or how hard it may seem initially, it's possible to find your calling and thrive.

    • The Dangers of Technology Addiction and Cybersecurity VulnerabilitiesProper cybersecurity measures and digital literacy education are crucial to prevent potential data breaches caused by technology addiction.

      Finn's addiction to his tablet led him to explore his new school's network, discovering a shared folder on the principal's computer. His curiosity got the best of him, and he downloaded sensitive information, including passwords, unprotected and labeled as such. This highlights the importance of proper cybersecurity measures, both in personal devices and institutional systems. It also underscores the potential dangers of technology addiction and the need for digital literacy education. Although Finn's actions were not malicious, they could have led to severe consequences, and such incidents can serve as cautionary tales for individuals and organizations alike.

    • The Importance of Digital Security: A Cautionary Tale of Hacking and its Consequences.Always take digital security seriously. Implement robust security measures and report incidents of hacking instead of taking matters into your own hands. Hacking is illegal and can have severe consequences.

      The story highlights how easy it can be to hack into someone's personal and confidential information due to their carelessness and lack of security measures. The consequences of such hacking can be dire as Finn finds himself in a precarious situation with potential legal ramifications. It is important for individuals and organizations to take their digital security seriously and implement robust security measures to avoid such situations. Additionally, hacking and accessing someone's confidential information is illegal and can have severe consequences, so it is imperative for individuals to report such incidents instead of taking matters into their own hands.

    • The Importance of Cybersecurity Education and Responsible Online BehaviorWe must understand the seriousness of cybercrime and the impact of our actions online. Acting responsibly and ethically, respecting privacy, and promoting cybersecurity education can help prevent incidents and protect individuals and communities.

      Cybercrime can have serious consequences and can put many people's personal information and safety at risk. Even seemingly harmless pranks can quickly spiral out of control, causing panic and chaos. It's important to understand the impact of our actions and to think before we act, especially when it comes to technology and the internet. We should act responsibly and ethically, always respecting the privacy of others. Schools and other organizations must also take cybersecurity seriously and take steps to prevent breaches and protect sensitive information. Cybersecurity education and awareness is crucial to prevent incidents like this and to ensure the safety and security of individuals and communities.

    • The Importance of Weighing Consequences and Choosing HonestyThink before acting, weigh the pros and cons, choose honesty, learn from mistakes and grow.

      The consequences of making a mistake can be terrifying and anxiety-inducing. It can leave one feeling helpless and guilty. It is important to weigh the pros and cons of our actions before taking any step. Honesty is always the best policy, rather than lying to save ourselves from punishment. Even though it may seem like the easiest solution in the moment, lies will only make the situation worse. It is essential to learn from our mistakes and move forward, understanding that every mistake is an opportunity to grow and be better.

    • The Ripple Effect of Finn's Actions on His Life and FamilyHarsh school policies and the school-to-prison pipeline affect disadvantaged students. Panic and fear can grip parents when attempting to help their troubled child. Mistakes can damage relationships, even with close friends.

      The consequences of Finn's actions had a ripple effect on not just his life, but also on his family. The school's suspension and legal action led Finn to an alternative school for kids with behavior problems. This school-to-prison pipeline is a real problem faced by kids from disadvantaged backgrounds who are getting locked up because of increasingly harsh school policies. The incident also showed how panic and fear can grip parents when they're unsure of how to help their child who is in trouble. Finn's mistake of hacking into the school's website affected his relationship with his friends who saw him as a superhero before but now labeled him as a super villain.

    • Addressing the School-to-Prison Pipeline and the Role of Technology in EducationSupportive teachers, smaller classrooms, and adapting to technological advancements can combat the school-to-prison pipeline. Parents must also stay informed about their children's use of technology.

      The 'school-to-prison pipeline' is a real phenomenon where children at-risk of poor academic performance, suspension, and attending alternative schools face higher odds of being incarcerated. While Finn's alternative school was fraught with negative incidents, he also had supportive teachers and smaller classrooms, which helped him succeed. Finn's hacking experience shows there is a functional need for better understanding of emerging threats, such as computer hacking. As such, our world needs to adapt and incorporate the limitations and opportunities of technology into disciplining, monitoring, and educating youth, at home and in schools. Parents need to constantly learn and understand the changing landscape of technology, including the role of mobile devices and social media, in their children's life.

    • Navigating parenting and education in a digital ageParental monitoring and support for special needs children are crucial in a tech-savvy world. Continued education and adaptation are necessary to address gaps in the system.

      Parenting in the digital age comes with its own set of challenges. Monitoring children's online activity is crucial but can be difficult, especially with tech-savvy kids who can easily bypass parental controls. While schools have implemented policies to address these issues, cases like Finn's show that there are still gaps in the system. The story also highlights the need for better education and support for kids with special needs who may feel neglected or bored in a traditional classroom setting. Finn's story serves as a reminder that we are still in the early stages of the digital age and must continue to learn and adapt to keep up with the challenges it presents.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    72: Bangladesh Bank Heist

    72: Bangladesh Bank Heist
    A bank robbery with the objective to steal 1 billion dollars. This is the story of the largest bank robbery in history. And it was all done over a computer. Our guest this episode was Geoff White. Learn more about him at geoffwhite.tech. Check out Geoff’s new book Crime Dot Com. Affiliate link: https://www.amazon.com/gp/product/1789142857/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1789142857&linkCode=as2&tag=darknet04-20&linkId=bb5a6aa7ba980183e0ce7cee1939ea05 Sponsors This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Equifax, Google Chrome, KRACK, and Adobe - Hack Naked News #145

    Equifax, Google Chrome, KRACK, and Adobe - Hack Naked News #145

    Paul talks about Equifax, TPMs security flaw in Infineon smart cards, Google removes more malicious Chrome extensions from Web Store, a Linux Kernel Privilege Escalation bug discovered, and Equifax. Don Pezet from ITProTV joins us for the expert commentary. Stay tuned, on this episode of Hack Naked News!


    →Full Show Notes: https://wiki.securityweekly.com/HNNEpisode145
    →Visit our website: https://www.securityweekly.com
    →Follow us on Twitter: https://www.twitter.com/securityweekly
    →Like us on Facebook: https://www.facebook.com/secweekly

    Ep 42: Mini-Stories: Vol 2

    Ep 42: Mini-Stories: Vol 2
    Three stories in one episode. Listen in on one of Dave Kennedy's penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client. Guests A very special thanks to Dave Kennedy. Learn more about his company at trustedsec.com. Thank you Clay for sharing your story. Check out the WOPR Summit. Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io. I first heard Clay's story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention. Sponsors This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo. This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools. For more show notes and links check out darknetdiaries.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices