reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
A major systems issue is affecting companies worldwide, including Sky News, due to a problem with CrowdStrike software. Many businesses, banks, telcos, and media companies are experiencing crashes and downtime. The issue is not a hack but a result of a faulty update from CrowdStrike. Offices globally are impacted, with users in the US, Europe, Asia, and New Zealand affected. The company is working on a fix, and updates will be provided as the situation develops.

Video Saved From X

reSee.it Video Transcript AI Summary
A storm is coming, just like we predicted. Stay tuned for more updates from Alex Jones on X.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet connected to the ICO was involved, along with several individuals. The speaker believes that blockchain analysis can provide evidence to support these claims. They mention one specific wallet that communicated with the hacker's wallet before the hack, and an individual at the Ethereum Foundation who set up the hack contract. The speaker concludes that there is more evidence to support their claims.

Video Saved From X

reSee.it Video Transcript AI Summary
Neo cons like Lindsey Graham are salivating about what's happening in Iran, hoping for a regime change, and the ongoing protests over the weekend gave plenty of fuel to their fire. Let's talk about what's actually happening in Iran right now, because your timeline is being flooded with rage bait and all sorts of fake news clips, old clips. If you've been online the past few days, you've seen the clips that Iran is exploding, cities on fire, the people have risen up, The regime is finished. That's what you're hearing. A lot of that content is either mislabeled, it's years old, it's from a different country entirely, or it's edited to look like it's new, it's actually not. A lot of fact checkers have already tracked down where a lot of people are using older protest video from Iran. Sometimes the video is from totally other countries, but don't let facts get in the way, so it's crazy. This is the same thing, by the way, that happened in Venezuela two weeks ago. All these conservative influencers just keep sharing this stuff. A friend of the show Glenn Greenwald called them out, he's like, hey, just keep sharing all this fake news, like, do you keep putting this out there? So what is real? Well, according to our sources, Iran is going dark digitally on purpose. Other news organizations have reported a nationwide blackout when the Internet goes down or is being blocked. The information war gets turned up to eleven. Gotta fill that void. A lot of fake news, rage bait, and even satellite workarounds right now are getting squeezed. Reports today that Iran is not only shutting down normal Internet traffic, but also attempting to disrupt Starlink connections. We can tell you that Starlink service is being interfered with beyond just the normal basic GPS jamming. Our own sources are telling us that foreign partners are helping Iran with this blackout, China and Russia specifically, helping to jam communications. Satellite phones, satellite internet, and other links that are going out. You're hearing names like Starlink, Iridium, Inmarsat, Theory Theorya. So if those names pop up being blocked. What we can say again according to our own sources is that Iran is in an unusually sophisticated communications clamp down right now, and on purpose. To basically close down prying eyes, looking into their country, and information going out of their country. It's a two way street right now, being closed down. China is the key player in this, in this jamming equipment that's being used right now. We're also hearing reports of concerning health risks within the radius of this equipment, where it has been deployed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims banks will announce a security action requiring weekend computer shutdowns, causing digital money to disappear. This will be followed by the detonation of strategic electromagnetic pulse bombs to knock out major grids. The speaker suggests this will appear as an attack on America by terrorists, Russia, or a simulated alien invasion using existing alien replica vehicles. The speaker asserts the Russians attempted a similar action in 1947. The other speaker expresses concern that these claims are irresponsible fear-mongering, but the first speaker insists it's irresponsible not to reveal this information, especially if it's true.

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI alerted our team about the possibility of a Russian propaganda dump similar to what happened in the 2016 election. They advised us to be on high alert.

Video Saved From X

reSee.it Video Transcript AI Summary
We've received some threats, primarily of Russian origin, including a bomb threat. While we don't consider these threats to be credible, we investigate all reports for public safety. The source of the bomb threat was confirmed to be from Russia. Additionally, we experienced a DDoS attack on October 14th, which involved 420,000 denial of service attempts from Russian actors. This prompted us to implement a verification system to distinguish human users from bots. The intent behind these actions seems to be to disrupt our election process and create division among us. It's clear that Russia is not a friend, and anyone who believes otherwise should stay informed. Thank you.

Video Saved From X

reSee.it Video Transcript AI Summary
Independent developers and consultants are monitoring network traffic, observing unusual activities related to a DDoS incident. There’s uncertainty about the status of the BC election site and whether it can be refreshed.

Video Saved From X

reSee.it Video Transcript AI Summary
A Bitcoin developer recently discovered a major security risk in the Lightning Network. Interestingly, five years ago, Craig Wright also discussed this issue. He explained that if a Lightning Harbor Central is targeted with a DDoS attack, it could potentially bring down 80% of the network and cause the graph to collapse. This attack could be executed with just five machines. Unfortunately, there is no fix for this problem as it is a complex issue related to the traveling salesman problem. Solving the Lightning Network also means solving the discrete log problem, which would eliminate the use of public-private key pairs. In conclusion, the speaker suggests that the XRP Ledger is a stable and reliable alternative.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled during the ICO is directly involved, along with several other individuals. The speaker believes that blockchain analysis can provide evidence to support this claim. They mention one specific wallet that communicated with the hacker's wallet and an individual at the Ethereum Foundation who set up the contract for the hack. The speaker concludes that there is more evidence to support their theory.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
We learn about DC leaks and the connection to APT 28, a Russian military intelligence hacking group. The morning the Hunter Biden story broke in the New York Post, it was confusing. We didn't know what to believe, but it seemed like a possible hacking campaign by APT 28. Despite that, I didn't feel comfortable removing the content from Twitter.

Video Saved From X

reSee.it Video Transcript AI Summary
The US Treasury has reportedly been hacked by a Chinese state-sponsored actor, described as a major incident. The cyber attack occurred earlier this month, with reports indicating that Treasury workstations and unclassified documents were accessed remotely.

Video Saved From X

reSee.it Video Transcript AI Summary
The US Treasury has reportedly been hacked by a Chinese state-sponsored actor, described as a major incident. The cyber attack occurred earlier this month, with reports indicating that Treasury workstations and unclassified documents were accessed remotely.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
Gindetti, a group of activist hackers, has been launching high-level cyber attacks, flooding websites like the police and senate pages, causing them to crash. These attacks disrupt access to important services, such as those provided by the police and senate. They also interfere with online voting. However, these sites are usually restored within a few hours. It is important to note that Italy has countered the Kine collective and even uncovered their identities and passwords. Unfortunately, some institutional websites and companies in Italy are not adequately prepared to defend against such attacks, underestimating the dangers of cyber warfare.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity challenges are increasing. Three concerns for the future: 1) Expect nation states to target critical infrastructure like the recent attack on the Ukrainian power grid. 2) Data manipulation could lead to confusion and distrust in society. 3) Non-state actors may shift from using cyber tools for recruitment to destructive purposes, disrupting the status quo.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
Someone is swatting my house, a hacker is swatting us. This happened last week too. Stop doing this to me. Let's go.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled by the ICO is directly involved, with multiple people implicated. The speaker emphasizes the ability to prove this through on-chain analysis, pointing out instances where wallets connected to certain individuals communicated with the hacker's wallet and set up the hack. They state that there is more evidence supporting their claim.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled by the ICO is directly involved and that multiple people must have been part of it. The speaker believes that blockchain analysis can prove this, mentioning a wallet connected to an individual that communicated with the hacker's wallet and another individual setting up the hack. They state that there is more evidence to support their claim.

Video Saved From X

reSee.it Video Transcript AI Summary
Here's what's coming: Banks will announce a security action on a Friday, forcing their computers offline all weekend, and digital money will vanish. Following that, strategic electromagnetic pulse bombs will detonate, knocking out major grids. This will appear as an attack on America by terrorists or Russia, or even a simulated alien invasion using existing alien replica vehicles. I know it sounds crazy, but the Russians tried this in '47. Some people think saying these things is fear mongering and irresponsible, techno paranoia, bogus, dangerous, and stupid. But I believe it's irresponsible not to say it, especially if it's the truth.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reports a direct online attack aimed at them that has escalated beyond typical harassment. They describe that the assault not only involved the deletion of their Instagram account but also that the attacker appears to wield power well beyond what the speaker can comprehend. The speaker notes that the attacker gained access to and removed the domain markplummer.com, which is described as a site that "only sells hoodies and training plans." In addition, the attacker managed to delete the processor, and as a result, their Shopify payment processor has been suspended, affecting their online coaching business. The speaker conveys a sense of being overwhelmed, stating that they believe they are in over their head because they do not know who is responsible for these actions. They emphasize the extent of the attacker’s capabilities by outlining a sequence of harm: the attacker can delete a presence from YouTube, delete a presence from Instagram, and then cause the payment processor to be shut down. This combination of actions leads the speaker to feel genuinely concerned for their life. Throughout, the speaker asserts a personal certainty about threats to their safety, insisting that they are genuinely concerned for their life. In a final, explicit assertion about their own stance in relation to self-harm, they state, “I will never kill myself,” conveying a clear commitment to their own safety despite the severity of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Modern Wisdom

Chasing The Most Hated Hacker In History - Joe Tidy
Guests: Joe Tidy
reSee.it Podcast Summary
Scattered Spider is a loosely coordinated group of hackers causing disruptions in the UK and US, notably attacking major retailers like M&S and the Co-op. These attacks have led to significant operational issues, including empty shelves and logistics problems. Unlike traditional cybercrime gangs, Scattered Spider operates more like a collective, using platforms like Discord and Telegram for coordination. CrowdStrike, a cybersecurity firm, has been monitoring their activities and coined the name Scattered Spider due to their disorganized nature. The motivations of teenage hackers have shifted from exploration to seeking fame and financial gain, influenced by social media platforms like Twitter. This shift has contributed to the rise of cybercrime gangs, with many young hackers starting their journey through gaming and gradually moving towards more serious cybercrime as they discover the potential for profit, particularly with the advent of Bitcoin. Ransomware attacks, which encrypt victims' data and demand payment for access, are a major concern, with social engineering often being the initial entry point for hackers. Scattered Spider's activities exemplify this trend, as they exploit vulnerabilities in corporate systems through deceptive tactics. The conversation also touches on the potential for future cyber threats, particularly regarding autonomous vehicles and the implications of quantum computing on encryption. The risks associated with insider threats in cybersecurity are highlighted, especially in public sector roles that may not offer competitive salaries. The discussion concludes with the mention of Joe Tidy's book, "Control Alt Chaos: How Teenage Hackers Hijack the Internet," which explores these themes in depth and is set to be released in June.
View Full Interactive Feed