87: Guild of the Grumpy Old Hackers - Darknet Diaries - Audio Brevity | Audio Brevity
87: Guild of the Grumpy Old Hackers
Darknet Diaries

87: Guild of the Grumpy Old Hackers

Mar 16, 2021 47m
AI Summary Available

Get the full experience! Sign up to access transcripts, personalized summaries, and more features.

Episode Description

In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to VictorEdwin, and Mattijs tell their story.

Sponsors

Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

Support for this show comes from Privacy.com. Privacy allows you to create anonymous debit cards instantly to use for online shopping. Visit privacy.com/darknet to get a special offer.

View all active sponsors.

Listen to Episode

AI-Generated Summary

Trump's Twitter Legacy

The episode begins with a nostalgic look at Donald Trump's Twitter presence, emphasizing how his account served as a significant communication tool during his presidency. The discussion notes Trump's staggering follower count and the sometimes chaotic nature of his tweets, illustrative of his unfiltered approach to social media. The narrative highlights the bizarre moment when Rex Tillerson learned about his firing from a Trump tweet, underlining the unpredictable impact of Trump's online activity.

The Grumpy Old Hackers Comes into Play

This section introduces the Guild of the Grumpy Old Hackers, a trio of IT professionals who reminisce about their 2016 adventure of hacking into Trump's Twitter account. The tone is lighthearted despite the serious nature of their discoveries, as they recall how an exploration of leaked LinkedIn data led them to find Trump's lax online security practices—specifically, the discovery of his outrageous password: 'your fired.' The hackers explain their motivations and ethical dilemmas surrounding their actions.

Ethics and Vulnerabilities

Here, the podcast dives deeper into ethical hacking, pondering questions around personal identifiable information (PII) and the responsibilities of individuals who discover vulnerabilities. The hackers raise complex issues about testing passwords and the thin line between ethical and unethical behavior in digital security. This segment also highlights the importance of responsible disclosures, especially in cases of public interest such as securing a presidential candidate's online safety.

The Hacking Process

The Grumpy Old Hackers narrate the step-by-step process they undertook to gain access to Trump's Twitter account. They discuss the technical aspects of their hack, including user-agent manipulation and SMTP enumeration to discover valid email addresses. They playfully recount the thrill of confirming that they could log in, but alongside the tension of potentially facing legal repercussions for their actions. Their methodology, combined with their intentions to improve security, creates a compelling narrative about the intersection of ethics, technology, and accountability.

Responsible Disclosure

The conclusion of their hacking adventure leads to the crafting of a responsible disclosure email to Trump and relevant authorities including the Department of Homeland Security. The Grumpy OId Hackers express their worry about the lack of response, highlighting the anxiety that comes with flagging significant vulnerabilities in such a high-profile context. They reflect on their success in raising security awareness and urge listeners to take personal cybersecurity measures seriously.

Ready to get started?

Join other podcast enthusiasts who are getting podcast summaries.

Sign Up Free