Logo
    Search

    Hotline Hacked Vol. 2

    enMay 02, 2024

    Podcast Summary

    • Discovering Unauthorized Access to Medical RecordsRegular security checks and proper access control are crucial to prevent unauthorized access to sensitive information like medical records. Neglecting to secure APIs can lead to significant data breaches.

      Even seemingly secure websites and portals, including those handling sensitive information like medical records, can have vulnerabilities that allow unauthorized access. In this story, a user discovered that by incrementing an integer in an API request, they were able to view other people's medical records. This highlights the importance of proper access control and securing APIs to prevent such breaches. The user, in good faith, reported the issue to the medical records team and worked with their IT director to resolve it. This incident underscores the need for regular security checks and vigilance in protecting confidential information. It also serves as a reminder that even simple mistakes, like neglecting to secure APIs, can lead to significant data breaches.

    • Reporting vulnerabilities anonymously can be riskyAnonymous reporting of vulnerabilities can lead to positive outcomes, but it's crucial to follow proper channels and ensure the organization's transparency and trust in the security community.

      Reporting vulnerabilities to organizations can be a risky business, as you're essentially trusting the unknown person on the other end not to turn you in or exploit the information against you. This was the case for an anonymous security researcher who discovered a vulnerability in a medical imaging center's portal and chose to report it anonymously. The researcher's actions could have potentially landed them in legal trouble, as they were essentially committing a computer security crime. However, the response they received was far from what they expected. Instead of being met with suspicion and potential legal action, the organization was grateful for the discovery and took swift action to secure the portal while protecting the researcher's anonymity. The researcher was even praised by the CEO and doctors for their efforts. This story serves as a reminder that reporting vulnerabilities can have positive outcomes, but it's important to proceed with caution and ensure that proper channels are used to report the issue. It's also essential that organizations have clear and transparent bug bounty programs in place to encourage responsible reporting and build trust with the security community.

    • Discovering a healthcare app vulnerability and being rewarded with merchandiseCompanies that value security research and reward finders can strengthen their security posture and protect user data.

      Even companies that don't offer bug bounties value the efforts of security researchers who bring vulnerabilities to their attention. This was highlighted in a discussion about a security professional who discovered a flaw in a healthcare app's back end and was rewarded with a hoodie and a visor from the podcast. The healthcare sector, which is a major target for hackers due to the valuable data it holds, is one of the least "bug bounty-ified" industries. The professional's discovery led to the exposure of sensitive user information, including full names, phone numbers, social security numbers, and password hashes. This incident underscores the importance of input verification and secure coding practices to prevent such vulnerabilities. Companies that recognize the value of security research and reward those who find vulnerabilities can build stronger security postures and protect their users' data.

    • E-bike app security vulnerabilities: unsalted hash password storage and API data leakageThe e-bike app's security lapses included unsalted hash password storage and API data leakage, putting user data at risk of financial and privacy violations.

      The discussed e-bike app showed several security vulnerabilities. The most alarming finding was the absence of salt in unsalted hash password storage, making it easier for attackers to crack passwords. Additionally, the API returned extensive user data without proper authentication, exposing sensitive information like names, ride history, and previous invoices. This data leakage, combined with unsalted hashes, posed significant confidential information violations. The potential consequences went beyond financial problems, involving location data and habits, which could be used for stalking or other malicious purposes. The software engineer in the discussion emphasized the importance of following best practices, such as salting hashes and securing APIs, to protect user data. The ease of development should not compromise security, and the collection of unnecessary data, such as social security numbers, should be reconsidered. Overall, the e-bike app's security lapses demonstrated the importance of adhering to cryptography fundamentals and securing user data to maintain privacy and prevent potential misuse.

    • Challenges of Mobility Networks: Economics and SecurityMobility networks face economic unsustainability and security vulnerabilities, with potential legal implications for hacking devices.

      The world of mobility networks, whether it's scooters or bikes, comes with its own unique challenges and economic unsustainability. The discussion also touched upon the frustration of dealing with unresponsive parties when reporting security issues, and the potential consequences of hacking mobility devices, such as ebikes, which can have legal implications. The speaker shared an experience of encountering a security vulnerability in a mobility network, leading to identity fraud. They also mentioned the economic unsustainability of mobility networks, with companies relying on venture capital funding to cover losses. The speaker also touched upon the recreational aspect of using mobility devices but noted that they are often not the most cost-effective or practical transportation options. Additionally, the conversation delved into the topic of hacking ebikes and the ease of bypassing speed limiters. The speaker highlighted the legal implications of hacking mobility devices and the importance of adhering to regulations. In summary, the discussion covered the challenges of mobility networks, both in terms of economics and security, and the importance of following regulations when using or hacking these devices.

    • Encountering Hacked E-bikes and ScootersE-bikes and e-scooters can be hacked to go faster, posing safety risks and making them illegal. Oversupply is also a concern, leading to abandoned e-vehicles.

      E-bikes and e-scooters can be hacked to go faster, making them illegal and potentially dangerous. The speaker shares his experiences of encountering hacked e-bikes and scooters on bike trails and expresses his fear of using them due to their instability at high speeds. He also mentions the oversupply problem of these e-vehicles, as seen in the infamous "bike sharing graveyard" in China. The speaker's personal preference is to use traditional bikes instead of e-scooters due to safety concerns. Overall, the discussion highlights the potential risks and challenges associated with the widespread adoption of e-vehicles.

    • Montreal's bike-sharing system and Mount Royal's abandoned bikesMontreal's bike-sharing system became a success due to affordability and effective implementation, but the current state is uncertain. Meanwhile, Mount Royal is known for its pile of abandoned bikes. The Hackline Hacks podcast and Shopify are examples of innovation and problem-solving, applying hacking principles to productivity and success.

      Montreal's bike-sharing system became a widely used public service due to its affordability and effective implementation. However, the current state of the system is uncertain. Meanwhile, Montreal's Mount Royal is infamously known for its large pile of abandoned bikes. Moving on, during our commercial break, listeners can expect messages from us and our sponsors. The Hackline Hacks podcast prides itself on mastering the basics of podcasting. Preorder "The Hacker Mindset" to learn how hacking principles can be applied to productivity and success in various aspects of life. Shopify was mentioned as a beloved platform for selling goods online, making it easier for businesses to grow. In summary, Montreal's bike-sharing system, the Hackline Hacks podcast, and Shopify are notable examples of innovation and problem-solving, showcasing the positive aspects of hacking and productivity.

    • Exploring Shopify and Notion's Productivity BoostersShopify empowers businesses with a $1 trial, while Notion combines notes, docs, and projects with AI features, used by Fortune 500 companies to increase efficiency and reduce emails and meetings.

      Businesses can grow effectively with Shopify, and individuals can boost productivity using tools like Notion. Shopify offers a $1 trial period for businesses at any stage, while Notion combines notes, docs, and projects into one space, with AI features that save time and generate content. Notion is used by over half of Fortune 500 companies, helping teams work more efficiently by reducing emails and meetings. In the past, a computer hacking incident occurred in Edmonton, Canada, in 1977, involving altering billing for computer usage. This early computer hacking event made legal history before the days of Apple and RadioShack. While this story is interesting, the main focus is on the current benefits of Shopify and Notion for businesses and individuals.

    • Three UAlberta students charged for hacking in 1977The first hacking charges in Canada resulted from students attempting to bypass a university's computer system, causing significant damage and legal costs.

      In 1977, three University of Alberta students, Bruce, Michael, and Arnold, were among the first individuals in Canada to be charged with hacking-related offenses. They attempted to bypass the university's computer system's billing system, causing the $9,000,000 computer system to crash multiple times. Christiansen, one of the students, was caught and faced charges for using an unauthorized terminal and possessing user IDs and profiles. The legal response to this incident considered the computer as a telecommunications facility, and the students were charged with damaging the infrastructure, leading to significant legal costs. This event marked the beginning of cybersecurity concerns in Canada, as the concept of network security and hacking was just starting to emerge.

    • The lengths early hackers went to access powerful systemsEarly hackers used rudimentary tools to gain unauthorized access to powerful systems, highlighting their value and demonstrating the lengths people will go for advanced technology. The hub and spoke model for computing, where a central supercomputer is connected to terminals, has persisted throughout history.

      The early computer hackers went to great lengths to access powerful systems despite not being authorized, using rudimentary tools like paper notebooks and IBM Selectric typewriter terminals. This incident, which was a significant computer crime in Canada at the time, highlights the value and utility of these powerful systems, even in their primitive stages. The hackers' actions demonstrate the lengths people would go to maintain access to advanced technology, as the infrastructure of the Unix operating system still supports this hub and spoke model for computing, which persists to some extent even today. The discussion also sheds light on the historical context of early computing, where a company's $10,000,000 supercomputer was the center of its network, and terminals were the primary means for users to interact with it. The metaphor of a hub and spokes for computing has endured, with cloud gaming being a modern example of this concept. Despite the advancements in technology, the fundamental idea remains the same: the device is just a means for users to engage with the processing power that's happening remotely.

    • Exploring the Intersection of Technology and CreativityTechnology enhances traditional experiences, AI and voice manipulation make role-playing games more engaging, ethical considerations important when using others' voices or personal info, technology used in various ways, from ethical to unethical, awareness of trends crucial.

      Technology and creativity can come together to enhance traditional experiences, such as text-based role-playing games. The addition of AI and voice manipulation can make these experiences more engaging and unique. However, it's important to consider ethical implications, such as privacy and consent, when using others' voices or personal information. Another interesting point from the discussion was the caller's experience with GPU scalping during the global chip shortage. He discovered a friend's friend who had an extensive operation in this field, which went beyond individual reselling and involved bots for sniping. This story highlights the potential for technology to be used in various ways, some ethical and some not, and the importance of being aware of these trends. Furthermore, the use of different voices in the discussion added an extra layer of complexity and entertainment to the conversation. The caller's decision to use Jordan and Scott's voices for voice manipulation, despite not being theirs, sparked curiosity and led to some amusing moments. However, it also raised questions about clarity and potential confusion for the listeners. In summary, the discussion explored the intersection of technology and creativity, the ethical considerations of using others' voices and information, and the potential impact of technology on various industries, such as reselling and console scalping.

    • A look at the digital age's impact on economic processesThe digital age has given rise to new forms of economic activity, including bot-assisted product reselling and market manipulation, creating artificial scarcity and profit opportunities.

      The digital world has given rise to new forms of economic activity, such as bot-assisted product reselling and market manipulation. This community on Discord, for instance, was incredibly well-organized and profitable, with members paying $30 a month for access to bots that could predict and purchase new product releases before others. While some might view this as a waste of resources, others see it as an application of the same economic principles that have driven trade since ancient times. The pandemic-driven demand for certain goods, like GPUs and outdoor heaters, created artificial scarcity and allowed these scalpers to profit. Whether ethical or not, this behavior can be seen as the invisible hand of the market at work. Additionally, there are even markets for the software used in these operations, with developers selling licenses and after-market sales. It's a fascinating look at how the digital age has transformed traditional economic processes.

    • Exploring Micro Commodities and Everyday Items MarketsIndividuals use online communities and bots to buy and sell high-demand goods, creating a reseller market that can lead to price inflation and tedium, but also allows for savings through arbitrage.

      The world of commodity trading and forecasting has evolved to include micro commodities and even everyday items through the use of online communities and bots. These communities, filled with savvy individuals, find ways to buy and sell goods in high demand at a premium, creating a reseller market that can bring both benefits and challenges. For instance, individuals can save money by buying specific components of a product they need instead of purchasing the full set. The resellers provide a service by breaking down the sets and selling the desired components, making a profit in the process. This can be seen as arbitrage, where people exploit price differences in markets to make a profit. However, this practice can lead to price inflation and tedium, bringing the issues of scalping to everyday items. Companies may also realize they were undervaluing their products and raise their prices accordingly, as seen during the COVID-19 pandemic. The communities surrounding these practices can be fascinating to explore, as they reveal the lengths people go to obtain desired goods and the impact on pricing. If you're curious, consider checking out some of these Discord channels for a deeper understanding.

    • NVIDIA's Success During COVID-19: A Perfect Storm of EventsNVIDIA's success during COVID-19 was driven by increased demand for gaming and cryptocurrency mining, but the market eventually corrected itself. NVIDIA's business acumen and transformation into a major player in the supercomputer market have kept them afloat.

      NVIDIA's success during the COVID-19 pandemic can be attributed to a perfect storm of events that increased demand for their high-end graphics cards. This included people staying at home and turning to gaming, as well as the surge in cryptocurrency mining. However, the market eventually corrected itself as demand decreased and new technologies, such as AI, emerged, driving the prices even higher. NVIDIA's exceptional business acumen, led by Jensen Huang, allowed them to capitalize on these trends and transform from a consumer graphics card company to a major player in the supercomputer market. The question now is whether NVIDIA will continue to find new trampolines to bounce on or if they may eventually come crashing down. The commercial orders for massive AI computer systems powered by NVIDIA are huge, with tech giants like Facebook spending billions. However, the market is unpredictable, and only time will tell if NVIDIA can maintain their momentum.

    • Apple, AMD, Intel, and Qualcomm are pushing the boundaries of chip technologyApple's on-device AI models mark a new era in computing, Qualcomm's power-efficient chips challenge NVIDIA, Intel faces thermal throttling issues, and Microsoft's Surface Pro with Qualcomm chips is a notable contender.

      The chip industry is undergoing significant shifts as companies like Apple, AMD, Intel, and Qualcomm push the boundaries of technology. Apple's recent release of on-device AI models on Apple Silicon marks a new era in computing, and while NVIDIA has been a leader in this space, other manufacturers like Qualcomm are making strides with power-efficient, high-processing chips. Intel, once the undisputed leader, is facing challenges with thermal throttling issues. The next decade promises an intriguing competition among these companies. Microsoft's new Surface Pro, powered by Qualcomm Snapdragon X Elite Chips, is a notable contender. Intel's software compatibility issues with non-Windows operating systems have slowed progress, but as more manufacturers adopt these chips, software developers are expected to follow suit. NVIDIA's dominance in the GPU market is evident with Facebook's reported $1 billion investment in purchasing 650,000 GPUs from NVIDIA this year. This significant investment underscores the importance of having ample processing power to keep up with the demands of content delivery on platforms like Instagram Reels and TikTok. The chip industry's landscape is evolving rapidly, and it's an exciting time to witness the innovations and competition that lie ahead.

    • Personalized Recommendations Based on Individual BehaviorTechnology now offers an unprecedented number of personalized options based on individual behavior, leading to far-reaching implications such as potential misinterpretations and biases in recommendations. Listeners are encouraged to share their technology stories, theories, or confessions.

      Technology has advanced to a point where personalized recommendations are no longer limited by the amount of data available, but rather by the individual's behavior. This means that companies can now offer an unprecedented number of options based on an individual's actions. For instance, a streaming service might be able to suggest 50 million videos instead of just 1,000. This has far-reaching implications, and the speakers in the podcast discuss various possibilities, including the potential for misinterpretations and biases in the recommendations. They also encourage listeners to submit their own technology-related stories, theories, or confessions. The speakers also mention that they believe the caller is Dutch based on a clue in their speech, and they invite listeners to support the show by sharing it with others and rating it highly.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Ep 18 - CyberCrime and IoT Special - Smarttech, PwC, SwiftComply, Firmwave

    Ep 18 - CyberCrime and IoT Special - Smarttech, PwC, SwiftComply, Firmwave

    We talk to Ronan Murphy, CEO and founder of Smarttech, he tells us of some of the latest scams and raises our awareness of how to prevent being a victim. Pat Moran is PwC Head of Cybercrime & IT Forensics, he gives us some astonishing stats on cybercrime and gives us some practical, but excellent advice on how to prevent being a victim in work or even at home.

     

    Michael O’Dwyer has a fantastic story to tell of how he has built a company using personal drive and government funding. He tells us about his company SwiftComply and gives some great advice for startups.

     

    Finally, ex-Army officer and telecoms man Fintan McGovern tells us how he and the Firmwave team are rolling out a different network and conquering the business world. We talk cyborg chickens and connected bus shelters.

    37: Heaven Knows I'm Miserable Now

    37: Heaven Knows I'm Miserable Now
    In this episode we try and take some user feedback to heart and do a more lighthearted show filled with goodness, light, and the brighter side of the human condition. Yeah, didn't work. But at least we had a really good laugh doing it! Shownotes at: http://grumpyoldgeeks.com/37 Sponsor the show at http://tugboatyards.com/gog See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    ISC StormCast for Tuesday, April 2nd 2019

    ISC StormCast for Thursday, January 9th 2020