|
Did you see the usage of Deepsound? I don't think anyone could tell the difference between someone burning some lossy, lovely MP3 they found on the internet to a disc and someone putting some hidden content in the disc on top of said lovely MP3 via Deepsound.
|
# ? Sep 6, 2015 00:26 |
|
|
# ? May 26, 2024 01:30 |
|
seaborgium posted:He burned the parts on his computer, but he still has a folder full of data CD's hidden cleverly under his dresser. I'm betting a case could be made fairly well once someone dug through those. Except they're all encrypted with DeepSound and so look like normal audio cds for all intents and purposes.
|
# ? Sep 6, 2015 00:27 |
crazysim posted:Did you see the usage of Deepsound? I don't think anyone could tell the difference between someone burning some lossy, lovely MP3 they found on the internet to a disc and someone putting some hidden content in the disc on top of said lovely MP3 via Deepsound. Learn something new every day, I'd never heard of that. So it probably is hidden then.
|
|
# ? Sep 6, 2015 00:53 |
|
Wasn't there a plot point where someone couldn't rip or play one of Elliot's "music" CDs, though? Or is that part of DeepSound too?
|
# ? Sep 6, 2015 01:58 |
|
That was the CD from the "random" musician who accosted Angela and her boyfriend, I think. DeepSound wouldn't prevent ripping.
|
# ? Sep 6, 2015 02:00 |
|
I can totally understand, like, old people not knowing how to use computers and being unable to identify malware on the internet; but just inserting random discs or USB drives off the street seems so dumb that I can't believe people my age, even with the most basic of computer literacy, would actually do that.
|
# ? Sep 6, 2015 02:16 |
|
CharlieFoxtrot posted:I can totally understand, like, old people not knowing how to use computers and being unable to identify malware on the internet; but just inserting random discs or USB drives off the street seems so dumb that I can't believe people my age, even with the most basic of computer literacy, would actually do that. Try it yourself, go to Walmart and buy $50 worth of USB sticks, fill them with an autorun.inf pointing to goatse and leave them around your work parking lot. All you really need is one hit. People are curious. Super-nice people want to look through it for a clue to see if they can get it back to the original owner. Seat Safety Switch fucked around with this message at 02:23 on Sep 6, 2015 |
# ? Sep 6, 2015 02:20 |
|
You'd be surprised. The Department of Defense got hit with exactly that attack. People are far too curious for their own good.
|
# ? Sep 6, 2015 02:23 |
|
CharlieFoxtrot posted:I can totally understand, like, old people not knowing how to use computers and being unable to identify malware on the internet; but just inserting random discs or USB drives off the street seems so dumb that I can't believe people my age, even with the most basic of computer literacy, would actually do that. People also work hard to click through their browser telling them "THIS SITE IS DANGEROUS THIS ONE RIGHT HERE WE CHECKED DON'T DO IT gently caress STOP WHAT ARE YOU DOING OH FOR CHRIST'S SAKE".
|
# ? Sep 6, 2015 02:41 |
|
Use adblock and whitelist cookies and javascript if you want IT to look kindly upon you
|
# ? Sep 6, 2015 02:44 |
|
BlindSite posted:Even if he did find something there wouldn't be any evidence because elliott drilled, microwaved and turfed all his poo poo at least twice (probably thrice with the fcsociety hack going through) since he hacked dog man though right? It spooks me that people can do truly heinous poo poo via hacking and then stand very little to no chance of facing consequences for it as long as they destroy and hide the computer, or computers, they used before the heat comes down. I mean, human nature along with the impracticality of destroying all your poo poo every month means it rarely works out that way, but still. Off the top of my head, I think encryption can work as a more reasonable method. Put your stuff on a password encrypted harddrive with a real password that's gibberish like z5pr9xl for 10-15 characters.
|
# ? Sep 6, 2015 08:35 |
|
CharlieFoxtrot posted:I can totally understand, like, old people not knowing how to use computers and being unable to identify malware on the internet; but just inserting random discs or USB drives off the street seems so dumb that I can't believe people my age, even with the most basic of computer literacy, would actually do that. It really boggles your mind that someone would find a USB stick on the ground and not try to use it for their own purpose? Most people would be like " hey, free thumb drive hell yeah!". That's the most plausible of any hack in this show.
|
# ? Sep 6, 2015 09:18 |
|
Cactus posted:I hope that this is one of the themes the show is angling towards. It depends whether the writers are going for a V for Vendetta-type "what if OWS was successful?" revolution fantasy, or whether it's going more in a Wolf of Wall Street or The Wire direction, in that these institutions are so big they're self-perpetuating and the elites that control them have so much wealth they never suffer any real consequences no matter what happens. Or even a totally bonkers other direction I haven't even thought of. Either way I can't wait to find out where this is going. Sam Esmail has stated that the show was inspired by his time with the Arab Spring in Egypt, so I heavily suspect that the show will play out similarly: the "revolution" looks like it's going to change everything, but the elites are far cleverer than suspected, and the masses utterly fail to "wake up". So what they end up with is just the same world as before but the ruling class has shuffled around a bit.
|
# ? Sep 6, 2015 11:58 |
|
seaborgium posted:He burned the parts on his computer, but he still has a folder full of data CD's hidden cleverly under his dresser. I'm betting a case could be made fairly well once someone dug through those. As mentioned they are quite smartly hidden, and even if they weren't modern encryption means unless Elliot gave them the key they would be useless to any investigation.
|
# ? Sep 6, 2015 12:12 |
|
empty baggie posted:It really boggles your mind that someone would find a USB stick on the ground and not try to use it for their own purpose? Most people would be like " hey, free thumb drive hell yeah!". That's the most plausible of any hack in this show. Yeah when I learnt about it being a real world practise a few years ago it blew my mind. It's so simple but incredibly effective. Id probably have done the same before learning about it, and probably would still. My housemate has found USB sticks belonging to students before and used the files to trace them back, but i presume the environment he's in is protected to stop any known malicious entities from an attack. But if it's something custom written specifically to infiltrate the network he's on? Owned. Can't think of much in the way of social engineering that's happened in s1, that's always my favourite real world method. Tell people to do something in an official voice and they'll probably do it. High vis jacket and a clipboard, how many people will honestly question if you are who you say you are?
|
# ? Sep 6, 2015 12:27 |
|
NowonSA posted:It spooks me that people can do truly heinous poo poo via hacking and then stand very little to no chance of facing consequences for it as long as they destroy and hide the computer, or computers, they used before the heat comes down. I mean, human nature along with the impracticality of destroying all your poo poo every month means it rarely works out that way, but still. there's a bunch of overkill in the show that i imagine is purely for effect. like they toasted that whole computer, case and all. probably unnecessary; unless the nsa has gotten craazy the computer fan doesn't sto're any data in the real world cybercrime is insanely traceable, i don't recommend it. the internet routes your connection through a ton of different servers, the owners of precisely none of which appreciate being used for crimes, especially bandwidth-expensive crimes and all of which will totally cooperate with basically anyone to avoid the slightest chance of being charged as an accomplice. like, its sweet that you're using a proxy server in a non-extradition country but you still have to go through your isp and their isp and so on to even get out there. and tor is a non-starter since basically every entry and exit node is run by the feds to catch nonces.
|
# ? Sep 6, 2015 13:36 |
|
It's probably just easier to nuke the whole machine, as things like the network interface will have a MAC ID etc. why strip it down when you can just throw the whole thing in the fire. And yeah, when it comes to security online regardless of what precautions you take you have to presume that everything you do can be traced back to you. Because that encryption protocol you use is probably busted wide open and offers zero protection.
|
# ? Sep 6, 2015 13:44 |
|
In the pilot MR Robot said : "You don't take down a conglomerate by shooting them in the heart. That's the thing about conglomerates, they don't have hearts. You take them down limb by limb, as they unravel, their illusion of control unravels." Really interested in seeing the next part he takes down. E: Also, whoever did the music for this needs an emmy. Spacman fucked around with this message at 16:07 on Sep 6, 2015 |
# ? Sep 6, 2015 16:02 |
|
Spacman posted:E: Also, whoever did the music for this needs an emmy. It's fantastic, and I've meant to mention it a bunch of times. Again, it feels like it's heavily influenced from elsewhere (in my mind it's Trent Reznor's soundtrack for The Social Network, which I loved) but it doesn't matter. It's used perfectly.
|
# ? Sep 6, 2015 16:40 |
|
EL BROMANCE posted:It's fantastic, and I've meant to mention it a bunch of times. Again, it feels like it's heavily influenced from elsewhere (in my mind it's Trent Reznor's soundtrack for The Social Network, which I loved) but it doesn't matter. It's used perfectly. It is influenced about five places per song minimum, it's brilliant. Time and time again. gently caress me the last scene after the credits... Just amazing.
|
# ? Sep 6, 2015 17:38 |
|
CharlieFoxtrot posted:I can totally understand, like, old people not knowing how to use computers and being unable to identify malware on the internet; but just inserting random discs or USB drives off the street seems so dumb that I can't believe people my age, even with the most basic of computer literacy, would actually do that. I lost a friend's usb drive on campus that I was using to print an assignment. A professor found it, opened multiple files, saw my name, and looked me up through the campus directory to return it. He wasn't even that old, maybe like 40.
|
# ? Sep 6, 2015 19:47 |
|
EL BROMANCE posted:It's fantastic, and I've meant to mention it a bunch of times. Again, it feels like it's heavily influenced from elsewhere (in my mind it's Trent Reznor's soundtrack for The Social Network, which I loved) but it doesn't matter. It's used perfectly. All the screeners used The Social Network as a temp score. I read a lot of the show's music is Tangerine Dream.
|
# ? Sep 6, 2015 20:54 |
|
nooneofconsequence posted:I lost a friend's usb drive on campus that I was using to print an assignment. A professor found it, opened multiple files, saw my name, and looked me up through the campus directory to return it. He wasn't even that old, maybe like 40. I mean, I guess that seems reasonable. I'm probably just paranoid because one time I fell for one of those dumb Facebook posts that can hijack your account, and I felt so bad about being tricked in such a way that now I am incredibly distrustful of everything. I won't even plug my laptop into public USB chargers.
|
# ? Sep 6, 2015 21:23 |
|
I think that Rule of TV demands that someone will probably find out about Elliot being the hacker and it will probably end up being Krista's douchey ex, just because it will cause the most tension and conflict and Rule of TV demands that whatever will cause the most tension and conflict will probably happen. And there's, well, no story if they just get away with everything. I hope it happens in some way that makes sense though. I love this show, but a lot has already happened on it that strains the limits of chance and credulity. I'm not talking about tech stuff or even necessarily characterization, I'm talking about stuff like "Wow, how very convenient that the exact specific event that would cause the biggest problems for everyone just so happened to fall into place right now by some sort of immoderate coincidence!"
|
# ? Sep 6, 2015 23:19 |
|
I'm an academic librarian, and students constantly forget their USB drives in our shared library computers. I'll always pop them into mine to identify the owner and send them an e-mail, but now I'm having second thoughts.
|
# ? Sep 6, 2015 23:22 |
|
EL BROMANCE posted:It's probably just easier to nuke the whole machine, as things like the network interface will have a MAC ID etc. why strip it down when you can just throw the whole thing in the fire. Especially when IPv6 finally reaches full use. No more NAT on a single IP...
|
# ? Sep 6, 2015 23:23 |
|
Big Bad Voodoo Lou posted:I'm an academic librarian, and students constantly forget their USB drives in our shared library computers. I'll always pop them into mine to identify the owner and send them an e-mail, but now I'm having second thoughts. There's a pretty good chance at least one of them you found was left behind on purpose. It's pretty common. I think there was an article in 2600 magazine about doing just that not too long ago.
|
# ? Sep 7, 2015 00:11 |
|
Big Bad Voodoo Lou posted:I'm an academic librarian, and students constantly forget their USB drives in our shared library computers. I'll always pop them into mine to identify the owner and send them an e-mail, but now I'm having second thoughts. If your computers run Windows, yeah maybe don't do that. Not just for the reasons you see in Mr Robot but also that many viruses auto copy to usbs plugged into the infected computer, so the owner may not even be aware they are spreading something malicious. BrianWilly posted:I think that Rule of TV demands that someone will probably find out about Elliot being the hacker and it will probably end up being Krista's douchey ex, just because it will cause the most tension and conflict and Rule of TV demands that whatever will cause the most tension and conflict will probably happen. And there's, well, no story if they just get away with everything. If I was writing the show I'd go for something like dog man hiring another hacker to hack Elliot. There's very few plausible ways he can catch Elliot within the law. Mega Comrade fucked around with this message at 11:20 on Sep 7, 2015 |
# ? Sep 7, 2015 10:57 |
|
This show is really a lesson in why you should just epoxy all your non-essential ports shut.
|
# ? Sep 7, 2015 12:32 |
|
ultramiraculous posted:This show is really a lesson in why you should just epoxy all your non-essential ports shut. On your computer, too.
|
# ? Sep 7, 2015 12:56 |
|
ultramiraculous posted:This show is really a lesson in why you should just epoxy all your non-essential ports shut. Are vents non-essential? Why is my computer on fire?
|
# ? Sep 7, 2015 13:07 |
|
Mega Comrade posted:If your computers run Windows, yeah maybe don't do that. Not just for the reasons you see in Mr Robot but also that many viruses auto copy to usbs plugged into the infected computer, so the owner may not even be aware they are spreading something malicious. Definitely true. I had a flash drive infected by a non-networked laptop of all things, and I get home, plug it in and see some hidden executables that would've owned a Windows installation outright.
|
# ? Sep 7, 2015 13:59 |
|
I still have the memories of sitting at an Atari ST and having to go through about 300 discs to find the infected ones.
|
# ? Sep 7, 2015 14:24 |
|
BrianWilly posted:I think that Rule of TV demands that someone will probably find out about Elliot being the hacker and it will probably end up being Krista's douchey ex, just because it will cause the most tension and conflict and Rule of TV demands that whatever will cause the most tension and conflict will probably happen. And there's, well, no story if they just get away with everything. The dog still has a micro SD card in him depending how long ago that was. Douche Dog Man could potentially have it if he steals the dog back. There's your danger.
|
# ? Sep 7, 2015 15:15 |
|
Elliot pulled off the arm of the sunglasses to reveal a USB drive. Has Elliot considered pulling the legs off the dog yet?
|
# ? Sep 7, 2015 15:26 |
|
blunt posted:Except they're all encrypted with DeepSound and so look like normal audio cds for all intents and purposes. Well, they'll get him on pirating music then!
|
# ? Sep 7, 2015 16:39 |
|
I can't believe how many people would put an unidentified usb stick in their computer without thinking twice. I guess I've just gotten used to living in the IT bubble where not doing that is common sense. But seriously, some of the world's most dangerous viruses start out that way. Check out Stuxnet.
|
# ? Sep 7, 2015 16:53 |
|
The Stuxnet white paper is some read. It's also my go to thing when people say "nobody uses Macs so nobody ever bothered writing exploits for them", when you have people writing exploits for one very precise system. Users are always the weakest point of exploitation, and people just don't think. Before I read about it being a technique a few years ago, I'd have never considered it despite it being obvious now. I know my laptop is locked down to only work with our encrypted keys, but given it's a Windows box and I trust our IT team about as much as as I trust my dog not to eat a pizza within easy reach, I bet whatever security protocols they've undertaken are barely effective at best.
|
# ? Sep 7, 2015 17:07 |
|
My theory is that the gun in the popcorn machine went off because of the heat and shot Tyrell. (Though I don't know enough about guns to judge if this is even possible)
|
# ? Sep 7, 2015 18:48 |
|
|
# ? May 26, 2024 01:30 |
|
chaosbreather posted:there's a bunch of overkill in the show that i imagine is purely for effect. like they toasted that whole computer, case and all. probably unnecessary; unless the nsa has gotten craazy the computer fan doesn't sto're any data the worst of it comes from places like china/russia though where the government don't give a poo poo about co-operating with tracking people down did anyone else think the guy who blew his brains out looked like tyrell a bit? mostly in the mannerisms/smile. not that i think it means anything of course
|
# ? Sep 7, 2015 18:58 |