Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

Автор: DEFCONConference

Загружено: 2022-10-20

Просмотров: 456508

Описание:

The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly proficient with technology and wish to remain somewhat anonymous. They are both composed of a vast amount of introverts and abide by the same first rule: “Don’t get caught." Both tend to love Sun Tzu quotes as well. What happens when the hacker mentality discussed in the Hackers Manifesto is applied to things such as OpSec on the Darknet?

Over the past decade, there have been many DEF CON talks that have discussed Tor and the Darknet. None have ever come from a Darknet vendor. The approach was more academic, as opposed to economical. Having a background in IT, Infosec, and hacking, the goal is to present a unique perspective from a hacker’s point of view, as we look at how the hacker mentality applied functions in various hostile environments such as a Darknet Vendor, staff member of multiple Darknet Markets, and co-found of Dread, who then later would be a federal prisoner. Shortly after, he talks about how he was able to get himself out of federal prison 3 years early.

All of which was possible through the reconnaissance of various systems and methodologies. From the anticipated linguistical analysis that the feds were making of posts on Darknet forums to how to write a motion to a federal judge from a prison cell in order to make him understand what it was like there, we will take a journey through a variety of interesting places and times from a tour guide with unparalleled experience and access.

By focusing less on the basics of Tor and more on how insiders operate within it, we will uncover what it takes to navigate this ever-evolving landscape with clever OpSec. In addition to seeing what happens if you get caught. All through the perspective of the hacker spirit that refuses to submit.

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4677 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "zccAvgC4UxU" ["related_video_title"]=> string(87) "DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(16) "DEFCONConference" } [1]=> object(stdClass)#4650 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "JsVtHqICeKE" ["related_video_title"]=> string(83) "DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)" ["posted_time"]=> string(20) "13 лет назад" ["channelName"]=> string(13) "Christiaan008" } [2]=> object(stdClass)#4675 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "GR_U0G-QGA0" ["related_video_title"]=> string(36) "Bad Opsec - How Tor Users Got Caught" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(13) "Mental Outlaw" } [3]=> object(stdClass)#4682 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "BT38K6NqETE" ["related_video_title"]=> string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках" ["posted_time"]=> string(27) "6 месяцев назад" ["channelName"]=> string(22) "Раскадровка" } [4]=> object(stdClass)#4661 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "1VZkiQUzITU" ["related_video_title"]=> string(40) "Dream - The Infiltration Of The Dark Net" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(15) "Barely Sociable" } [5]=> object(stdClass)#4679 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "MmpkfM8I33Q" ["related_video_title"]=> string(89) "DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [6]=> object(stdClass)#4674 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "YcQEXZWSSFE" ["related_video_title"]=> string(100) "🏴‍☠️ DEFCON: Inside the World’s Most Infamous Hacking Conference | Full Documentary" ["posted_time"]=> string(25) "3 месяца назад" ["channelName"]=> string(21) "LufSec Cyber Security" } [7]=> object(stdClass)#4684 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "4EmstuO0Em8" ["related_video_title"]=> string(97) "DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [8]=> object(stdClass)#4660 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "blWdjRUPP6E" ["related_video_title"]=> string(72) "Разведчик о том, как использовать людей" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(18) "Коллектив" } [9]=> object(stdClass)#4678 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "5CzURm7OpAA" ["related_video_title"]=> string(84) "DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline" ["posted_time"]=> string(19) "9 лет назад" ["channelName"]=> string(16) "DEFCONConference" } }
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)

DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)

Bad Opsec - How Tor Users Got Caught

Bad Opsec - How Tor Users Got Caught

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Dream - The Infiltration Of The Dark Net

Dream - The Infiltration Of The Dark Net

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

🏴‍☠️ DEFCON: Inside the World’s Most Infamous Hacking Conference | Full Documentary

🏴‍☠️ DEFCON: Inside the World’s Most Infamous Hacking Conference | Full Documentary

DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow

DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]