Thought with the doom and gloom could use a funny story for the weekend. He also released the hacked footage from his Travelodge hotel.
This BBC article goes into detail and for once is reliable but he's 18 and VERY autistic to the point deemed unfit to stand trial. But that's embarrassing level of security that you get hacked by an amazon fire stick. Though considering how many modders are on GTA 5 that makes sense...
It's really pathetic how governments treat people like this as well.
Yeah, the left is focusing on trans'ing them all because they're extremely susceptible to peer pressure and indoctrination by authority and the right doesn't really help unless they are part of a religious community. 4chan USED to be their safe place but the left got to that too.
I'd prefer to hire ALL of these guys and create the ultimate cyber defence and assault team with autists then 2 guys that have both empathy and morals to stop them going too far or getting manipulated.
One autist with a fixation is worth a thousand normal minds. However only 1 in ten thousand fixations can be put to productive use for society. Most of us just dig giant robots more than is probably healthy.
Funny. I'm going to guess he used it to access a VM or something elsewhere, but even if not a Linux terminal is available on Android so I could imagine the potential for being powerful enough.
I just laugh at the companies too. You're telling me your data security is that weak? I've not read into it but if I had to guess it was someone dumb clicking a link in an e-mail and loading some backdoor. If he straight up just hacked through a firewall to a server, everyone responsible for that just needs to walked out for incompetence.
funny, though not surprising. Once an exploit is known it doesn't take any computing power at all to exploit it. about the same amount of computing pattern that it takes to access any old web page or fill out a form on a website. large computing power is needed when scanning for vulnerabilities, especially with complex systems, but most of the time that is done by gray hat hackers and blackhat hackers looking to sell the exploits online rather than exploit them themselves.
Thought with the doom and gloom could use a funny story for the weekend. He also released the hacked footage from his Travelodge hotel.
This BBC article goes into detail and for once is reliable but he's 18 and VERY autistic to the point deemed unfit to stand trial. But that's embarrassing level of security that you get hacked by an amazon fire stick. Though considering how many modders are on GTA 5 that makes sense...
Yeah, the left is focusing on trans'ing them all because they're extremely susceptible to peer pressure and indoctrination by authority and the right doesn't really help unless they are part of a religious community. 4chan USED to be their safe place but the left got to that too.
I'd prefer to hire ALL of these guys and create the ultimate cyber defence and assault team with autists then 2 guys that have both empathy and morals to stop them going too far or getting manipulated.
One autist with a fixation is worth a thousand normal minds. However only 1 in ten thousand fixations can be put to productive use for society. Most of us just dig giant robots more than is probably healthy.
Funny. I'm going to guess he used it to access a VM or something elsewhere, but even if not a Linux terminal is available on Android so I could imagine the potential for being powerful enough.
I just laugh at the companies too. You're telling me your data security is that weak? I've not read into it but if I had to guess it was someone dumb clicking a link in an e-mail and loading some backdoor. If he straight up just hacked through a firewall to a server, everyone responsible for that just needs to walked out for incompetence.
If he is as autistic as they make it seem, he probably accessed his own personal botnet and conducted his hacking through that.
Anyone know what was leaked? youtube is full of so many hoaxed “gta 6 leaks” it’s impossible to find the real leak.
I have the same opinion. I am tired of AI read fake videos.
funny, though not surprising. Once an exploit is known it doesn't take any computing power at all to exploit it. about the same amount of computing pattern that it takes to access any old web page or fill out a form on a website. large computing power is needed when scanning for vulnerabilities, especially with complex systems, but most of the time that is done by gray hat hackers and blackhat hackers looking to sell the exploits online rather than exploit them themselves.