Get the full experience! Sign up to access transcripts, personalized summaries, and more features.
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.
Learn more about Grifter by visiting grifter.org.
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.
This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it’s often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.
The podcast begins with the host reminiscing about his unforgettable experiences at Defcon, the annual hacker conference in Las Vegas. He describes Defcon as chaotic yet exhilarating, with endless parties and activities that go all night long. Unlike typical conferences, Defcon is alive with events, parties, and a unique atmosphere where attendees engage with discussions and demonstrations across various tracks, making it an adventurous and social experience.
The host shares his creative idea of hosting a party at Defcon while maintaining his anonymity. To do this, he dressed in a disguise—the iconic big black hat, dark sunglasses, and bandana—and provided similar costumes to attendees at his party. The challenge was whether anyone could find the actual host in a sea of similar disguises. Hilariously, many could not, allowing him to enjoy the party without being overwhelmed by attention.
An interesting twist unfolds when the host decides to let attendees control his Twitter account during the party, testing the trustworthiness of his fans. The mechanism allowed guests to text tweets from his account without moderation or filtering, producing a lively atmosphere of hilarity but also some unease. The host wanted to see if the community would abuse this privilege, leading to unexpected laughter and a review of the fans' behavior.
The podcast illustrates the overwhelming turnout at the host's party, detailing the enormous crowd that gathered, stretching far beyond what had been expected. The innovative approach to including everyone in the party experience resulted in not just a packed house but also a monumental line, which became a memorable part of Defcon history, setting new records for attendance.
The host welcomes Grifter, a seasoned hacker and contributor to the hacker community. Grifter shares his journey from an early interest in computers to becoming an influential voice within the infosec community. He recounts his childhood experiences surrounded by hacking, criminal activities, and eventual redemption through his career path in cybersecurity.
Grifter's transformation is further accentuated as he discusses the contrasting experiences in his life—from childhood mischief to rigorous military discipline. He shares how his time in the military reshaped his perspective, imparting core values such as integrity and service. Ultimately, he applies these lessons in his cybersecurity career, focusing on ethical practices and a proactive approach to threats.
Shifting to his role at Black Hat, Grifter discusses the unique challenges and responsibilities associated with setting up networks in hacker conferences. He explains the interplay between the hacker and corporate worlds, highlighting the innovations sparked by community collaboration. This leads into his ongoing experience in the cybersecurity realm, where he actively hunts threats while promoting collaborative learning and knowledge sharing within the infosec community.
Join other podcast enthusiasts who are getting podcast summaries.
Sign Up Free