Fyre Fest goes up in flames, Madame Web is panned, the hot new crypto coin crashes. Who doesn’t love a good flop? From Silicon Valley scandals to Hollywood meltdowns - every epic fail has a story worth telling. Join TikTok superstar Misha Brown on Wondery’s The Big Flop as we unpack history’s most fascinating flops, frauds, and fiascos. Whether it’s Tom Cruise’s couch-jumping or Taylor Swift in Cats, we’re dissecting the moments when ambition, ego, and poor decisions collide. Each week, Mish ...
…
continue reading
John McAfee Podcasts
Danny’s quest to get smarter.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Unstructured: Dynamic Informal Conversations with amazing people.
…
continue reading
Conspiracy Theories and Cover-Ups investigates the dark forces, secret agendas, and hidden power structures that operate behind the scenes of world events. From government black projects and media manipulation to ancient bloodlines, mind control, and global deception — each episode uncovers the stories they don't want you to hear. Follow the evidence. Question the narrative. New episodes every week. 🔒 Want the full experience? Get complete video episodes, exclusive bonus content, and access ...
…
continue reading
Welcome to the Digital Desperados Podcast featuring Dark Tales from the Web with Patrick McMurphy. Patrick brings his Irish story telling origins into the limelight as he highlights the Dark Tales of Digital Desperados from around the globe. Cyber Criminal masterminds who are world renowned. Listen in and be prepared to be amazed and intrigued. This podcast is Brought to you by SaferNet VPN.
…
continue reading
Crypto Podcast by Pandora!
…
continue reading
A community-based discussion where we talk with key Bitcoin and Crypto personalities and projects
…
continue reading
The Crypto Corner is a micro podcast released every Saturday, featuring curated blockchain and cryptocurrency news.
…
continue reading
Foundering is an award-winning, serialized podcast from the journalists at Bloomberg Technology. Each season, Foundering brings you inside a different high-stakes drama from the technology industry, where its companies are wielding unprecedented capital and power.
…
continue reading
Podcast by Illegal Podcast
…
continue reading
CryptoBabble - Bitcoin Litecoin Ethereum EOS Cardano Monero ZCash Dash Ripple Neo BitcoinCash NEM IOTA Crypto
…
continue reading
4 friends talk about film, TV, comics and general pop culture with little to no insight on those subjects
…
continue reading
Jim and Kasper discuss internet culture, weird phenomenons, personal stories and sometimes this is funny.
…
continue reading
Conversations about entrepreneurship, economics, stoicism, existentialism, health, nutrition, philosophy, and self-improvement. Support this podcast: https://podcasters.spotify.com/pod/show/aaronolson/support
…
continue reading
The classiest most up to date podcast on current events and conservative culture you can get in America. Support this podcast: https://podcasters.spotify.com/pod/show/2-classy-gentlemen-podcast4/support
…
continue reading
Welcome to Netflix and Shill (Crypto Talks), where amazing things happen.
…
continue reading
The Long Road Home is a weekly podcast for listeners who want to learn about the more mysterious corners of the human experience. Aliens, men in black, missing people, ghosts, witchcraft, and various spiritual beliefs are only a few of the topics we'll cover. Join in and learn along with us! Life is short, take The Long Road Home.
…
continue reading
GOLF’s Subpar, hosted by former PGA Tour pro Colt Knost and his long time friend and on course rival Drew Stoltz, pairs colorful segments with in-depth sit-down interviews with the game’s biggest personalities. It will be available across GOLF.com’s platforms every Tuesday.
…
continue reading
Achieve peak performance in everyday life. Learn mindset, diet, supplement and fitness regimens from the brightest minds and strongest athletes in the world.
…
continue reading
The Ringer’s Bryan Curtis, David Shoemaker and Joel Anderson catch you up on the biggest media stories, from sports to politics and everything in between.
…
continue reading
Discussing all aspects of the Internet of Things from Ottawa, Canada and beyond. Featuring candid interviews with interesting people and companies who are building our connected world.
…
continue reading
1
What is Crypto w/ Michael Nye
Michael Nye: Bitcoin, Ethereum, Litecoin, Blockchain, Cryptocurrency, Crypto Advocate
What is Crypto is a podcast hosted by Michael Nye that teaches Bitcoin, cryptocurrency, blockchain technology, and how YOU will play a role in the future financial systems of the world.
…
continue reading
1
John McAfee's Final Interview: On the Run, Crypto, and Psychedelics.
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30The source provides excerpts from a transcript of a video interview with John McAfee, the British-American computer programmer and founder of the McAfee software company. McAfee, who notes he and his wife Janice are on the run from US authorities, discusses his rejection of traditional finance and investment, favoring cryptocurrencies like Monero a…
…
continue reading
1
#339 - John McAfee's Wife Finally Reveals What REALLY Happened to Him | Janice McAfee
3:13:44
3:13:44
Play later
Play later
Lists
Like
Liked
3:13:44Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjones Janice McAfee is the widow of John McAfee, the antivirus software pioneer and controversial tech entrepreneur. SPONSORS https://whiterabbitenergy.com/?ref=DJP - Use code DJP for 20% off EPISODE LINKS https://x.com/theemrsmcafee https://instagram.com/officialjanicemc…
…
continue reading
1
Crypto24 Ransomware: Stealth Attacks Blending Legitimate Tools
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10These sources provide a detailed comparative analysis of two significant ransomware threats: Crypto24 and LockBit. The first source offers a side-by-side comparison, establishing that LockBit operates as a massive Ransomware-as-a-Service (RaaS) model with highly variable tactics due to its use of affiliates, while the newer Crypto24 is characterize…
…
continue reading
1
#345 - Noriega's Secret Deal with Mossad & the DEA: New Docs Expose the Truth | Cillian Dunne
2:31:55
2:31:55
Play later
Play later
Lists
Like
Liked
2:31:55Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjonesAs the Cold War turns Central America into a battlefield of spies and sabotage, a Panamanian soldier trained by Mossad, the DEA, and Castro’s Cuba becomes the right-hand man to dictator Manuel Noriega and must survive the covert war launched by the very intelligence …
…
continue reading
1
CBS’s Halloween "Bloodbath" and Michael Jordan as the NBA's Ombudsman. Plus: Vox’s Astead Herndon on Leaving The New York Times and the Future of the Democrats.
1:35:32
1:35:32
Play later
Play later
Lists
Like
Liked
1:35:32Hello, media consumers! Bryan and Joel discuss the layoffs at CBS News (0:51) before diving into their thoughts on Michael Jordan’s two appearances on NBC thus far (14:05), the NBA's relationship to storytelling, and what they want from these MJ appearances. Next, Bryan and Joel educate the listeners on Jennifer Welch (28:41), including where she o…
…
continue reading
1
The Crypto24 Playbook: An Analysis of the Banco Hipotecario del Uruguay Ransomware Campaign
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and …
…
continue reading
1
Uruguay’s Digital Sovereignty Battle Combating Corporate Censorship with Labor Law and Algorithmic Transparency
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33A Regulatory Crossroads for Uruguay’s Digital Future Uruguay stands at a critical juncture in the formation of its digital policy, navigating a landscape defined by a stark “policy bifurcation.” This division is evident in the contrast between two distinct regulatory efforts: the swift, consensus-driven passage of a law governing the economic and l…
…
continue reading
1
Briefing de Políticas: La Intersección de Vulnerabilidades Cibernéticas, Corrupción Sistémica y Poder del Crimen Organizado en México
59:07
59:07
Play later
Play later
Lists
Like
Liked
59:07Un Nuevo Paradigma de Amenaza Híbrida Este briefing tiene como propósito analizar la convergencia de tres fuerzas que están redefiniendo el panorama de la seguridad en México: la creciente sofisticación tecnológica del crimen organizado, la existencia de vulnerabilidades digitales críticas en la infraestructura nacional y una corrupción institucion…
…
continue reading
1
El Secuestro Digital del Banco Hipotecario: Crónica de un Ciberataque Anunciado
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Cuando se Apagaron las Luces El 30 de septiembre de 2025, una sombra digital se cernió sobre Uruguay. El Banco Hipotecario (BHU), una entidad estatal clave para la vivienda y la economía del país, sufrió un apagón total en su red. Este evento no fue un “incidente informático” aislado, como insistieron las voces oficiales. Fue la materialización pre…
…
continue reading
1
ESPN’s Gamble, CBS and John Dickerson, and Graham Platner’s Reddit Posts
1:13:38
1:13:38
Play later
Play later
Lists
Like
Liked
1:13:38Hello, media consumers! Bryan is joined by Joel out of the bullpen to dig through everything that has come out of the NBA’s gambling scandal (0:40) before they share their thoughts on how ESPN handled the coverage of that news, who at the worldwide leader should be covering these stories, which former ESPN employees would have covered this in the p…
…
continue reading
1
The Sky is Leaking: A Case Study on Unencrypted Satellite Data
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07The source, a transcript from a YouTube video titled "HACKEAN A LA GUARDIA NACIONAL," discusses a critical cybersecurity vulnerability involving geo-stationary satellites where sensitive data is transmitted unencrypted. Researchers from the University of California San Diego and the University of Maryland demonstrated that with readily available eq…
…
continue reading
1
El Cielo Espía: Cómo una Antena Satelital Reveló Secretos a Plena Vista
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32En la azotea de una universidad, un grupo de “cerebritos”, como los llama su fuente, apuntó una antena hacia el cielo. No buscaban estrellas ni señales extraterrestres. Buscaban secretos. Y con un equipo de apenas 14,000 pesos mexicanos, encontraron más de los que jamás imaginaron, desvelando las comunicaciones internas de la Guardia Nacional de Mé…
…
continue reading
1
Huawei: La Historia del Gigante Tecnológico y la Operación Secreta que lo Acechó
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:321. Introducción: Un Router Comprometido en Irán En 2010, un router Huawei recién instalado en la oficina de un político iraní se convirtió en la herramienta de vigilancia perfecta. Sin que nadie lo supiera, una falla de diseño permitía a un atacante eludir la contraseña con un simple comando, una “llave maestra” digital que abría la puerta a todos …
…
continue reading
1
The Dragon's Network: Huawei, the NSA, and the Secret War for Global Tech Supremacy
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44The source provides an overview of Operation Shotgiant, a sophisticated cyber-espionage effort by the National Security Agency (NSA) of the United States targeting the Chinese telecommunications giant, Huawei. The operation began with an effort to determine if Huawei was spying on behalf of the Chinese government, as well as to map the company's in…
…
continue reading
1
La Historia de Shady Rat: El Ciberataque que Redefinió el Espionaje Digital
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Introducción: Un Cebo en la RedEn diciembre de 2012, el investigador de ciberseguridad Kyle Wilhoit lanzó un experimento fascinante. Creó una planta de tratamiento de agua completamente virtual, con sistemas de control industrial, documentación detallada y hasta un sitio web. Aunque supuestamente estaba ubicada en Missouri, en realidad funcionaba d…
…
continue reading
1
Operation Shady Rat: China's Cyber Espionage Engine
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44The source provides an overview of Operation Shady Rat, a long-running, extensive campaign of cyber-espionage attributed to a unit of the Chinese military (Unit 61398) starting around 2006. This operation involved Advanced Persistent Threats (APTs) utilizing simple but effective spear-phishing emails to install malware (often referred to as a "rat"…
…
continue reading
1
De lo Falsificado a lo Digital: La Sorprendente Evolución del Imperio Criminal de Corea del Norte
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Introducción: El Asalto de los $600 Millones En marzo de 2022, millones de jugadores del popular videojuego Axie Infinity comenzaron a experimentar algo extraño. Lo que al principio parecía una simple falla técnica —algunas funciones dejaron de responder— pronto se reveló como algo mucho más siniestro. El sistema no se podía arreglar porque no esta…
…
continue reading
1
From Super Dollars to Super Hackers: The Secret History of North Korea's Criminal Empire
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34The video transcript explores the phenomenon of highly effective North Korean state-sponsored hacking, contrasting this technological prowess with the nation's overall economic poverty and technological isolation enforced by its Juche ideology. It details how the government identifies and trains gifted math and science students to become hackers, o…
…
continue reading
1
La Guerra por la PS3: La Historia del Hackeo a PlayStation Network
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Introducción: El Apagón que Conmocionó al Mundo de los Videojuegos El 20 de abril de 2011, el universo de los videojuegos se detuvo. Sin previo aviso, una fuerza misteriosa desconectó la PlayStation Network (PSN) de Sony, sumiendo a millones de jugadores en un silencio digital. Lo que comenzó como una simple interrupción del servicio se convirtió r…
…
continue reading
The source, an excerpt from a YouTube video transcript, offers a detailed account of the events surrounding the 2011 PlayStation Network (PSN) hack. It begins by introducing George "GeoHot" Hotz, a renowned hacker who first gained fame by jailbreaking the iPhone and later successfully hacked the PS3 console, challenging Sony's proprietary control o…
…
continue reading
1
Pau Gasol talks winning his first ever tournament at Cal Club, his friendship with Kobe Bryant
1:16:27
1:16:27
Play later
Play later
Lists
Like
Liked
1:16:27On this week's episode of GOLF's Subpar, Colt Knost and Drew Stoltz are joined by Basketball Hall of Famer Pau Gasol for an exclusive interview. The 2-time NBA Champion reveals why his relationship with Kobe Bryant grew stronger once they were no longer teammates, what it was like picking up golf at the age of 39 and if he gets nervous playing majo…
…
continue reading
1
#344 - Top Chemist Just Discovered How to Hack the Brains Internal DMT Molecule | Chris McCurdy
2:41:36
2:41:36
Play later
Play later
Lists
Like
Liked
2:41:36Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjonesChris McCurdy is a pharmaceutical scientist and pharmacist whose research focuses on the design, synthesis and development of drugs to treat pain and drug abuse. His latest research investigates a naturally occurring molecule that may regulate an enzyme which helps p…
…
continue reading
1
#429 Exploring Consciousness: Brain Optimization and the Power of Microdosing with Adam Brain Supreme
1:38:16
1:38:16
Play later
Play later
Lists
Like
Liked
1:38:16In this podcast episode, Kyle welcomes Adam from Brain Supreme, discussing his intriguing story and various topics such as education, conspiracies, and health. Adam shares his background as a former college football player at Northwestern and his unexpected success during the cannabis boom in California. He delves into the ups and downs of his vent…
…
continue reading
1
#343 - They're Wrong about Cold Exposure: How to Really Supercharge Your Body | Dr. Thomas Seager
2:46:18
2:46:18
Play later
Play later
Lists
Like
Liked
2:46:18Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjones Thomas Seager, PhD is CEO of Morozko Forge ice bath company. He is also Associate Professor in the School of Sustainable Engineering & the Built Environment at Arizona State University. He's authored two books - "Uncommon Cold: The Science & Experience of Cold Plung…
…
continue reading
1
How Zohran Mamdani Won the Hearts and Minds of the Media (and New York City)
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Bryan and Joel are together in the studio to discuss Zohran Mamdani in the 17th edition of their 25 for 25 series (2:00). They discuss Mamdani as a political phenomenon (6:12), a media phenomenon (21:03), and someone who is signaling generation change (25:55). Later they welcome Eric Lach of The New Yorker, who profiled Mamdani for the magazine. La…
…
continue reading
The sources comprise a transcript of a YouTube video titled "Saving Samantha on Twitter Spaces" and a Spotify podcast listing for the same event, hosted by the "Cybermidnight Club – Hackers, Cyber Security and Cyber Crime." The primary source, the transcript, documents a live, often chaotic discussion among several individuals—Alberto, Sapit, Nana,…
…
continue reading
The provided texts offer two distinct perspectives on modern forms of influence and security, with the Darknet Diaries podcast excerpts exploring the history and function of PSYOP (Psychological Operations), or Military Information Support Operations (MISO). These audio transcripts explain how the US military uses non-lethal methods—including leafl…
…
continue reading
51
ESPN's Greg McElroy talks working with Mark Blackburn on his game and how playing for Nick Saban helped his competitive mindset
1:28:39
1:28:39
Play later
Play later
Lists
Like
Liked
1:28:39On this week's episode of GOLF's Subpar, Colt Knost and Drew Stoltz are joined by ESPN college football commentator Greg McElroy for an exclusive interview. The former Alabama quarterback talks what it was like playing under the legendary Coach Saban, his work with top instructor Mark Blackburn and a not so great BBQ experience at Jason Kokrak's ho…
…
continue reading
1
An NBA TV Mega-Preview, Good News About The Washington Post, and Your Favorite NFL Clichés
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47An NBA TV Mega-Preview, Good News About The Washington Post, and Your Favorite NFL Clichés Hello, media consumers! Bryan and David are back to discuss the worst response issued by the White House to a reporter's question, some good news about The Washington Post, and issues at Indiana University’s student newspaper (00:35). The two then dig into th…
…
continue reading
1
#342 - Physicist Quits NASA After Discovering Truth of The Universe | Thomas Campbell
3:07:19
3:07:19
Play later
Play later
Lists
Like
Liked
3:07:19Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjones Thomas Campbell is a physicist, author, and consciousness researcher best known for his trilogy My Big TOE (Theory of Everything). https://my-big-toe.com SPONSORS https://mnniceethno.com/dj - Use code DJ22 for 22% off your first order. https://stopboxusa.com/danny -…
…
continue reading
1
Listen now: Scamfluencers | The Pharmacist Femme Fatale
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53Natalie Cochran seemed like she had it all: a good job as a pharmacist, a loving husband, and two kids. But then she quit her job to become a government contractor and started raking in dough, or so she claimed. Behind the scenes, Natalie was running a classic Ponzi scheme, scamming friends and family with fake contracts, fake government emails, an…
…
continue reading
1
The Soul of the Machine: A Beginner’s Guide to “The Hacker’s Manifesto”
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:051. Introduction: The Voice from the Wires It’s 1986. The headlines are stark and sensational: “Teenager arrested in computer crime scandal”, “Hacker arrested after bank tampering”. To the public, these are simple stories of digital delinquency. But from behind the keyboard, a different voice emerges—a passionate, defiant defense of an entire cultur…
…
continue reading
1
The Unsafe Space: A Story of a Conversation Gone Wrong. Social media, social audio, twitter, x
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04Introduction: The Promise of a Safe Place Online On the internet, a “safe space” is a powerful idea. It’s meant to be a community where people can share difficult, painful experiences—especially when they feel wronged by powerful systems like governments, corporations, or universities—and be met with support and understanding. It’s a place built on…
…
continue reading
1
The Uruguayan Cyber-Dilemma: A Deep Dive into National Strategy, Legal Enforcement, and the Transparency Deficit (2024–2025)
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41The Uruguayan Cyber-Dilemma—A Critical AnalysisPresenter: Alberto Daniel Hill (Ethical Hacker, Forensic Expert, and Defender of Knowledge)Part 1 of 4: The Personal Cost of Transparency and the True Ethos of HackingI stand before you today not just as an expert in forensic science and ethical hacking, but as someone who has experienced firsthand the…
…
continue reading
1
Analysis of Twitter Space: “Ecos del Pasado en la Era Digital”
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40The source text is comprised of excerpts from a long-form, multi-topic audio discussion, which covers a wide array of subjects including personal relationships and intimacy, as indicated by early commentary on communication and sexual expression. A significant portion of the conversation focuses on geo-political and social issues, such as the perce…
…
continue reading
1
The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization Introduction: Two Hackers, Two Different Worlds In Argentina, law enforcement dismantles a sophisticated syndicate with direct ties to narco-traffickers, a group that built custom so…
…
continue reading
1
#428 Exploring Consciousness, Spiritual Wisdom & Cosmic Cycles w/ Edmund Knighton
1:36:56
1:36:56
Play later
Play later
Lists
Like
Liked
1:36:56In this podcast, the Kyle welcomes Edmund Knighton, a guest known for his deep understanding of the teachings of The Law of One and Rudolf Steiner. Knighton's journey with spirituality is shared, including his awakening, transformative experiences, and integration of Steiner's and Ra's teachings. The discussion also delves into the significance of …
…
continue reading
1
#341 - Mother of Telepathic Child Reveals How to Access Psychic Abilities | Dalia Burgoin
2:32:01
2:32:01
Play later
Play later
Lists
Like
Liked
2:32:01Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjones Dalia Burgoin is the mother of Lidu, a non-speaker such as the non-speakers featured in the Telepathy Tapes demonstrating Telepathy and other such abilities. Dalia is working with scientists such as Dr. Diane Hennacy Powell to study both Mind Sight and Telepathy wit…
…
continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
…
continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
…
continue reading
1
Uruguay's Dual Digital Platform Regulation: Labor and Democratic Governance
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
…
continue reading
1
Hactivism, Detention, and Digital Justice: Unpacking a Latin American Cybercrime Saga
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
continue reading