What are some lesser know facts about the cybersecurity/hacking field?
Only 0.05% of cybercriminals are ever detected and prosecuted in the U.S., making it one of the safest crimes for a criminal to commit.
>>524045072that jeet code has caused way more damage and inconvenience
>>524045072>What are some lesser know facts about the cybersecurity/hacking field?There exists a self replicating worm that changes itself autonomously to better disguise itself and to search for vulnerabilities on its own to inject rootkits.Worm rootkits are nothing new but this one changes itself constantly to better avoid detection. Its wild stuff. Pretty cool. No one knows about this because its underdevelopment.
>>524045072You can use big data analytics and a.i. to collapse criminal organisations from infighting. Text spoofing and voice phishing with number spoofing are used to harass, provoke, cause suspicion and rumours of snitching etc. The distrust leads to open hostility which can lead to open violence. This is especially effective if the criminal organisation has some kind of political or law enforcement protection via corruption. It simply bypasses the authorities. Descriptions of this tactic are met with disbelief and open hostility so the targeted group is highly vulnerable to it. If you identify it being used in your group or associates you should quietly distance yourself. It never ends well.
>>524045072The actual work is fucking mind-numbing, and a lot of it is being willing to help the c-suite by lying about details in reports to lawyers after breaches. They lied to me. It is not a topless 19yo Angelina Jolie on roller blades. Oh, and it's not much hacking, it's more configuration. so much yaml you start writing your grocery list as a tree of conceptually distinct groups.>>524045226I've actually seen that in the wild, but it lives on an eeprom and subverts the os through a fake mbr, storing itself in acpi tables and using dma to manifest undetected, then loads a hypervisor under the os, and uses a parallel set of (xen in my case) syscalls to mask itself while spreading to everything it connects to, and connecting to everything it can. It not only changes the output of all commands to hide itself, it masks memory as system reserved and runs the command under it, that's the only way you can tell, cpu timing comparison to a clean room box. You have to break your system in a way that no one would ever break it to actually interact with side-effects. It's real shit. Don't get paranoid. lol.>>524045136I believe that. It makes me sad because these tools were supposed to be for knowledge, which would lead to wisdom, but it was perverted for money, which leads men to war.( ;__;) $
>>524045310This is only if you can identify the group, and interact with it. Most cyber crime, as I understand it, is international, and single strike, not uh,, whats the fucking term persistent, long-term, and passive. I can see that AI harassment is working to keep /pol from discussing the epstein files right now without any coherence, but once you get used to it, it just serves as a temporary DOS vector.>Text spoofing and voice phishing with number spoofing are used to harass, provoke, cause suspicion and rumours of snitching etc. The distrust leads to open hostility which can lead to open violence. This is especially effective if the criminal organisation has some kind of political or law enforcement protection via corruption.To do what you're describing you would need nation-state resources, Or enough money to do business without restriction in a geography. The AI saturation and conflicting narratives, derailment, only really discourages temporarily, and then people regroup. It also forces a group to find other venues to connect than the one you're clank spamming them on, which is not great, because the second they switch, they can distinguish each other from the bots, and if you forced them to establish protocols for identifying each other in the clank storm, you lose, because you won't know how, and you may or may not be able to identify it again. it will create another cat mouse dynamic, and increase cohesion. War people read war history, still don't understand blowback, and fail to predict it everytime. Every action we perpetrate echoes through eternity.>Descriptions of this tactic are met with disbelief and open hostility so the targeted group is highly vulnerable to it. If you identify it being used in your group or associates you should quietly distance yourself. It never ends well.This sounds like a threat. Good luck with that. I'm sure fighting will sate you and bring you real happiness. It happens all the time.