Logo
    Search

    Pondering the Worldcoin Orb + the Gang Who Cracked Outlook + Hacking Together Superconductors for Fun and Profit

    enAugust 16, 2023

    Podcast Summary

    • New technologies and controversies in the tech landscapeStay informed about new technologies and cybercrimes, and take necessary precautions to protect data.

      The technology landscape is constantly evolving, with new projects and vulnerabilities emerging regularly. Sam Altman's Orb, a $5,000 silver spherical camera used for biometric data capture, has already sparked controversy and a black market for biometric IDs. Meanwhile, cybercrime continues to be a significant issue, with incidents like the infiltration of government organizations' email systems by Storm 558 and the hacking of OpenBullet, a web security tool. Amidst these developments, the passion and contributions of amateur scientists, as seen in the case of the superconductor LK 99, continue to shape the scientific world. It's crucial to stay informed and aware of these advancements and risks, and take the necessary precautions to protect ourselves and our data. Whether it's a crystal ball or a silver orb, the future is full of possibilities and challenges that require our attention.

    • Creating a biometric ID system for the Internet with WorldcoinWorldcoin, co-founded by Sam Altman, aims to create a biometric ID system for the Internet to verify human identities, potentially enabling a universal basic income. However, concerns over feasibility of providing user reversal basic income and securing online biometric verification persist.

      Tools for Humanity, a company co-founded by Sam Altman, is launching Worldcoin, a cryptocurrency project aimed at creating a biometric ID system for the Internet to verify human identities as AI becomes more common. The ultimate goal is to use this biometric ID to enable a potential universal basic income in the future. However, the skepticism lies in the feasibility of providing user reversal basic income and securing online biometric verification, which could be easily hacked and compromised. The concerns also extend to the security of storing and transmitting unique biometric keys across the Internet. Despite the ambitious goals, the skepticism remains high due to the technical challenges and potential security risks associated with the project.

    • Worldcoin project raises concerns around privacy, security, and legalityThe Worldcoin project, which uses biometric data for token minting, faces scrutiny due to potential privacy, security, and legal risks. Critics argue that the numeric representation of biometric data could be as vulnerable as the raw images, and regulators are evaluating the project's compliance with data protection laws.

      The Worldcoin project, which aims to create a global community using biometric data for token minting, raises significant concerns around privacy, security, and legality. The project involves scanning individuals' eyes and faces to generate a numeric string, which is then used to mint corresponding tokens on an Ethereum-based blockchain. While the company claims that raw images are deleted, critics argue that the numeric representation could be as vulnerable as the images themselves. With over 2 million people signed up and scanned worldwide, regulators in various countries are evaluating the project due to potential privacy and security risks. The tokens, which currently trade for around $2, have been popular in some of the poorest countries, leading to speculation and potential financial exploitation. The use of biometric data for cryptocurrency identification has been criticized by privacy advocates, including Edward Snowden. Overall, the Worldcoin project highlights the need for clear regulations and ethical considerations in the use of biometric data in the digital world.

    • Worldcoin project's privacy and security concernsWorldcoin's biometric ID and UBI token distribution face challenges due to privacy, security concerns and potential commoditization of biometric data.

      The Worldcoin project, which aims to create biometric IDs and distribute a universal basic income token, has faced numerous concerns regarding privacy, security, and potential commoditization of biometric data. Reports suggest that people in lineups to get their biometric data scanned have a limited understanding of the project's purpose, and there have been instances of malware attacks, stolen login credentials, and a black market for iris scans in China. Additionally, the project's long-term goals and token distribution raise concerns among experts in tokenomics. Despite the project's ambitious goals, the privacy and security issues, along with the potential for biometric data commoditization, cast doubts on its execution and long-term sustainability.

    • Worldcoin: Crypto Project with Ambitious Goals Raises ConcernsWorldcoin, a crypto project aiming to distribute tokens based on biometric data, faces concerns over trust, governance, and potential misalignment between founders and long-term goals. Ethical questions about data privacy and security also arise.

      Worldcoin, a crypto project aiming to create a database of biological identities under the guise of a crypto token, raises concerns about trust, governance, and the potential misalignment between short-term gains for founders and long-term goals for the project. The incomplete governance model, uncertain availability of tokens, and the founders' ability to sell their coins before the project's 15-year timeline have left many questioning the project's integrity. Additionally, the involvement of investors like Sam Bankman Fried, who is currently under house arrest and facing charges, adds to the skepticism. The project's reliance on biometric data for token distribution also introduces ethical questions about privacy and data security. Overall, the ambitious goals of increasing economic opportunity and UBI through AI funding are worth exploring, but the execution and trustworthiness of Worldcoin remain major concerns.

    • Hackers gained access to cloud-based email systems using stolen cryptographic keysRobust security measures are essential to protect cryptographic keys and prevent unauthorized access to sensitive information in cloud-based systems

      The security of cloud-based systems, including email systems, can be compromised if hackers manage to obtain the cryptographic keys used for authentication. This was demonstrated in a recent hack by Storm 558, a China-based hacker group, which gained access to the cloud-based Outlook email systems of 25 organizations, including the US State Department and the US Ambassador to China. The hackers were able to produce their own authentication tokens using a stolen cryptographic key, allowing them to access more secure enterprise-grade systems. This incident underscores the importance of robust security measures to protect cryptographic keys and prevent unauthorized access to sensitive information. It's not just about securing individual passports, but securing the entire passport printing machine.

    • Microsoft certificate theft: A significant security riskTheft of a Microsoft certificate can grant unauthorized access to sensitive data, highlighting the importance of robust key management systems and effective response strategies.

      The theft of a Microsoft certificate used for signing authentication tokens poses a significant security risk, potentially granting unauthorized access to a vast number of sensitive data. This breach, which reportedly affected 25 government organizations including the US State Department, underscores the importance of robust key management systems and the potential consequences of such breaches. Microsoft responded by blocking the stolen tokens and improving security measures, but theories surrounding the breach's origin remain unclear. The incident raises questions about the balance between relying on large companies like Microsoft for security updates and handling security independently. The SolarWinds attack, during which Microsoft Outlook tokens were also stolen, serves as a reminder of the potential reach and impact of such breaches. Ultimately, it's crucial for organizations to prioritize strong security practices and be prepared to respond effectively in the face of potential threats.

    • Governments becoming more open about cyberattacksJapan's silence on a hack and Interpol's takedown of a phishing operation highlight the evolving landscape of state-sponsored hacking, with increasing attacks and a growing trend of biometric crypto projects.

      The landscape of state-sponsored hacking is evolving, with governments becoming more open about admitting cyberattacks and increasing the public's awareness. A recent example is Japan's refusal to comment on a deep-level persistent hack, indicating a complex and potentially alarming situation. Simultaneously, the volume of attacks and compromises may be increasing, and there's a growing trend of biometric crypto projects. Furthermore, Interpol's takedown of a phishing-as-a-service operation, 16 shops, is a win for the good guys but likely won't put an end to the problem. The commodification of exploits as phishing kits continues to pose a significant threat, and the cybersecurity battlefield remains a constant give-and-take war.

    • Phishing Attacks: A Global ThreatPhishing remains a significant threat with over 70,000 users, relying on social engineering and easily set up, making complete elimination difficult, potentially shifting to other platforms

      Phishing remains a significant threat in the digital world, with over 70,000 customers across 43 countries using phishing kits to send fraudulent emails. These emails, often disguised as legitimate sources, aim to trick individuals into revealing sensitive information like credit card details or login credentials. The recent bust of a 21-year-old administrator of such a phishing operation highlights the ease with which these schemes can be set up and the vast reach they can have. However, the issue goes beyond technical solutions. Phishing attacks rely on social engineering, making it challenging to completely eliminate the threat through email filters or link blocking alone. The conversation also touched on the potential shift from email to other platforms like IRC chat for phishing activities, further emphasizing the need for continuous vigilance and education.

    • Hackers exploit new methods to bypass security measuresStay informed and take necessary precautions to protect against evolving cyber threats, including email and text message attacks, and be cautious of DIY projects that may have unintended consequences.

      As technology evolves, so do the methods used by hackers to exploit vulnerabilities. We discussed how email security measures are being bypassed and shifting to text messages, and how even security tools themselves can become targets. A recent example of this was the OpenBullet web security app, which was compromised and distributed with a remote access trojan. This serves as a reminder that no matter how secure a system may seem, human error and vulnerabilities can still pose significant risks. It's essential to stay informed and take necessary precautions to protect against these threats. Furthermore, during our conversation, we touched on an intriguing development in the world of science. With people working from home and resources limited, some researchers have turned to DIY projects, such as creating a superconductor using matches on Twitch. While this may seem like a fun and harmless experiment, it's important to remember that these actions can have unintended consequences and potentially put individuals and their communities at risk. Always prioritize safety and consider the potential impacts of your actions.

    • Potential discovery of room temperature superconductorA potential room temperature superconductor discovery could lead to a more efficient energy grid, less energy waste, and reduced greenhouse gas emissions.

      The discovery of a room temperature superconductor, if proven true, could revolutionize the energy industry by eliminating energy loss during transmission and reducing global warming. Superconductivity is a phenomenon where a material conducts electricity with almost zero resistance, but it has only been achieved under extremely low temperatures. The recent claim by South Korean researchers about a room temperature superconductor made of common elements, such as lead, phosphorus, and oxygen, has sparked global intrigue and replication attempts in labs around the world. The potential implications of this discovery are significant, as it could lead to a more efficient energy grid, less energy waste, and a reduction in greenhouse gas emissions. However, it's important to note that the discovery has not yet been peer-reviewed, and there have been instances of false claims made on preprint servers. The excitement surrounding this potential breakthrough highlights the importance of scientific research and the potential for groundbreaking discoveries to positively impact our world.

    • Amateur Scientists Race to Replicate Room Temperature Superconductor ClaimAmateur scientists, led by an engineer and Twitch streamer, are attempting to replicate a room temperature superconductor discovery, while the scientific community remains cautious and skeptical.

      The discovery of a room temperature superconductor, as claimed in a recent video, is a major scientific development that has sparked immense interest and skepticism. The material, lk 99, is said to expel magnetic fields, allowing it to levitate in a metal dish. However, the scientific community is cautious, with many teams attempting to replicate the results and debunking previous similar claims. The process of creating the superconductor is complex and requires specific atomic structures. Amidst this, amateur scientists and enthusiasts have taken to social media and DIY experiments to try and recreate the superconductor. One such person is Andrew McCallop, an engineer and Twitch streamer, who is trying to obtain red phosphorus, a crucial component, despite it being a controlled substance due to its use in making meth. The community's efforts have led to a surge of interest in this potential breakthrough, with people offering suggestions and resources to help McCallop in his quest. The implications of a room temperature superconductor are significant, as it could potentially revolutionize technology and energy production. However, the scientific community stresses the importance of proper research and replication before confirming the discovery. The ongoing efforts of both professional and amateur scientists add to the excitement and uncertainty surrounding this potential game-changer.

    • The Role of Amateur Scientists in DiscoveriesAmateur scientists have made significant contributions to scientific discoveries throughout history, from deciphering ancient cave paintings to linking carbon dioxide to climate effects.

      The process of creating LK 99, a potential new element, is complex and not yet fully understood. While the paper outlines the general idea, there's no clear recipe for replication. However, this hasn't stopped amateurs from attempting to make discoveries in various scientific fields. Throughout history, amateur scientists have made significant contributions, such as an archaeologist deciphering the meaning of 20,000-year-old cave paintings as part of a lunar calendar, or the discovery of the largest dinosaur footprint by fossil hunters. In climate science, an amateur climatologist published one of the first papers linking carbon dioxide to its effects on the climate in the 1930s. Despite criticism, the role of amateur scientists in scientific discoveries is rich and fascinating. While not every discovery is groundbreaking, the potential for making significant contributions exists. As an optimist, I believe that the confirmation of LK 99, if it is real, would be a cool discovery, and I wouldn't be opposed to an amateur scientist playing a role in its discovery. Overall, the history of amateur science shows that with dedication and passion, anyone can make a meaningful contribution to scientific knowledge.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    What You Need to Know about Cybersecurity

    What You Need to Know about Cybersecurity

    Today's special episode features audio from a webinar that we had earlier this year. In the audio you will hear from Jordan and our special guest, CEO of Mapletronics, Wes Hershberger. We and Jordan discuss current cybersecurity threats and how you can begin to protect yourself and your business. 

    Discussion includes: email safety, phishing protection, educating employees, strong password policies, data encryption, geofencing, online shopping safety, and more. 

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"
    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    Contenuto sponsorizzato

    Massimo Carlotti, pre sale team leader di CyberArk, è di nuovo al microfono per un podcast realizzato con il supporto di Radio IT. Insieme a Igor, parla della "piaga tecnologica" più diffusa durante il lockdown (il phishing), di sicurezza perimetrale e dei suoi limiti, dell'impatto sulle critical app (quelle senza le quali il business dell'azienda di blocca).

    E poi parla dei CISO, i Chief Information Security Officer (o direttori della sicurezza informatica), e di come troppo spesso in azienda il loro compito - fornire informazioni importanti per non avere problemi - sia spesso frainteso, e loro vengano visti come dei guastafeste.

    Un podcast ricco di spunti: buon ascolto!

    Altri contenuti su www.radioit.it

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Faced with growing ransomware threats, phishing attempts and more, the Department of Veterans Affairs is reevaluating what it means to be “secure” in a hybrid environment. VA CISO Lynette Sherrill outlines the agency’s cybersecurity strategy and emphasizes the importance of identity management through multi-factor authentication and least privileged access to secure critical IT systems and veteran data.

    Uncover the Secrets Behind the Screens: How to Maintain Your Privacy Online

    Uncover the Secrets Behind the Screens: How to Maintain Your Privacy Online
    In our interconnected digital world, safeguarding your online privacy is paramount. This episode delves into the alarming reality of identity theft and guides you on a transformative journey from mindless digital consumption to mindfulness. We unravel the startling frequency and impact of this cybercrime, shedding light on the urgency of protecting your digital identity.

    As we transition from mindless scrolling to cultivating mindfulness, you'll gain insights into how this shift can help you regain control over your digital existence, steering you away from the traps of distraction and over-stimulation.

    Unlock the transformative potential of the Be I AM practice – Be Intentional, Be Aware, Be Mindful. Discover how these principles can reshape your digital habits, leading to a safer and more mindful online experience. As we cultivate awareness, we equip ourselves with the best defense against online threats, recognizing subtle warning signs and taking proactive steps to shield your digital assets and personal information.

    Tune in now to uncover the secrets concealed behind the screens and embark on a transformative journey toward maintaining your online privacy and digital resilience.

    Sandra Estok is the founder of Way2Protect™, author of the international bestselling and award-winning Happily Ever Cyber!™ book, and the Cyber Literacy series for children. She is a Keynote Speaker and Corporate Trainer with over 20 years of experience in Cybersecurity, IT and Data Privacy. Her mission is to empower women to take charge of their cyber safety and have Peace of Mind Online.

    Website link: Sandra Estok
    Social media handle: @Way2Protect

    To watch Sandra Estok’s TEDx talk “What an identity theft victim can teach about cybercrime” click here. Or copy this link directly into your browser: https://www.ted.com/talks/sandra_estok_what_an_identity_theft_victim_can_teach_us_about_cybercrime