Translator: Bob Prottas
Reviewer: Ariana Bleau Lugo So this is a hotel room,
kind of like the one I’m staying in. I get bored sometimes. A room like this has not a lot
to offer for entertainment. But for a hacker, it gets a little
interesting because that television is not like the television in your home, it’s a node on a network. Right? That means I can mess with it. If I plug a little device
like this into my computer, it’s an infrared transceiver,
I can send the codes that the TV remote might send
and some other codes. So what?
Well, I can watch movies for free. (Laughter) That doesn’t matter to me so much,
but I can play video games too. Hey, but what’s this? I can not only do this
for my TV in my hotel room, I can control your TV in your hotel room. (Laughter) So I can watch you
if you’re checking out with one of these, you know, TV based registration things, if you’re surfing
the web on your hotel TV, I can watch you do it. Sometimes it’s interesting stuff. Funds transfer. Really big funds transfers. You never know what people
might want to do while they’re surfing the web
from their hotel room. (Laughter) The point is I get to decide
if you’re watching Disney or porn tonight. Anybody else staying
at the Affinia hotel? (Laughter) This is a project I worked on
when we were trying to figure out the security properties of wireless
networks; it’s called the “Hackerbot”. This is a robot we’ve built that can
drive around and find Wi-Fi users, drive up to them and show them
their passwords on the screen. (Laughter) We just wanted to build a robot, but we didn’t know
what to make it do, so – We made the pistol
version of the same thing. This is called the “Sniper Yagi”. It’s for your long-range
password sniffing action, about a mile away I can watch
your wireless network. This is a project I worked on with
Ben Laurie to show passive surveillance. So what it is, is a map
of the conference called “Computers, Freedom and Privacy”. And this conference was
in a hotel, and what we did is we, you know, put a computer
in each room of the conference that logged all the Bluetooth traffic. So as everybody came and went
with their phones and laptops we were able to just log that,
correlate it, and then I can print out a map like this
for everybody at the conference. This is Kim Cameron,
the Chief Privacy Architect at Microsoft. (Laughter) Unbeknownst to him, I got to see everywhere he went. And I can correlate this
and show who he hangs out with (phone dialing)
when he got bored, (phone dialing)
hangs out in the lobby with somebody. Anybody here use cellphones? (Laughter) (Phone ringing) So my phone is calling – (Ringing) calling – Voice mail: You have 100 messages. Palbos Holman: Uh oh! VM: First unheard message – PH: Where do I press – VM: Message skipped.
First skipped message. PH: Uh oh! VM: Main menu. To listen to your –
You have pressed an incorrect key – You have two skipped messages.
Three saved messages. Goodbye. PH: Uh oh!
So we’re in Brad’s voice mail. (Laughter) And I was going to record him
a new message, but I seem to have pressed an invalid key, so we’re going to move on. And I’ll explain how that works some
other day because we’re short on time. Anybody here used MySpace? MySpace users? Oh! Used to be popular.
It’s kind of like Facebook. This guy, a buddy of ours Samy,
was trying to meet chicks on MySpace which I think is what
it used to be good for. And what he did is he had
a page on MySpace about him. It lists all your friends,
and that’s how you know somebody’s cool is that they have
a lot of friends on MySpace. Well, Samy didn’t have any friends. He wrote a little bit of Javascript code
that he put in his page, so that whenever you look at his page it would just automagically
add you as his friend. And it would skip the whole
acknowledgement response protocol saying “Is Samy really your friend?” But then it would copy
that code onto your page, so that whenever anybody
looked at your page it would automatically add them
as Samy’s friend too. (Laughter) And it would change your page
to say that “Samy is your hero.” (Laughter) So in under 24 hours, Samy had
over a million friends on MySpace. (Laughter) Hey, he just finished serving
3-years probation for that. (Laughter) Even better, Christopher Abad,
this guy, another hacker, also trying to meet chicks
on MySpace but having spotty results. Some of these dates
didn’t work out so well, so what Abad did
is he wrote a little bit of code to connect MySpace to Spam Assassin,
which is an open source spam filter. It works just like
the spam filter in your email. You train it by giving it some spam train it by giving it a little
bit of legitimate email, and it tries to use
artificial intelligence to work out the difference. Right? Well, he just trained it on profiles
from girls he dated and liked as legitimate email. Profiles from girls he dated
and not liked, as spam, and then ran it against
every profile on MySpace. (Laughter) Out spits girls you might like to date. What I say about Abad is, I think,
there’s like three startups here. I don’t know why we need Match.com,
when we can have Spam dating? You know this is innovation. He’s got a problem, he found a solution. Does anybody use these – bleep –
keys for opening your car remotely? They’re popular in, well,
maybe not Chicago, OK. So kids these days will drive
through a Wal-Mart parking lot clicking open, open, open, bloop. Eventually you find another
Jetta or whatever just like yours, maybe a different color,
that uses the same key code. Kids will just loot it, lock it up and go. Your insurance company
will roll over on you because there’s not
evidence of a break-in. For one manufacturer we figured
out how to manipulate that key so that it will open every car
from that manufacturer. (Laughter) There is a point to be made about this
which I barely have time for, but it’s that your car is now a PC,
your phone is also a PC, your toaster, if it is not a PC,
soon will be. Right? And I’m not joking about that. And the point of that is
that when that happens you inherit all the security
properties and problems of PC’s. And we have a lot of them. So keep that in mind,
we can talk more about that later. Anybody use a lock like this
on your front door? OK, good. I do too. This is a Schlage lock. It’s on half of the front doors
in America. I brought one to show you. So this is my Schlage lock. This is a key that fits the lock,
but isn’t cut right, so it won’t turn it. Anybody here ever tried
to pick locks with tools like this? All right, got a few,
few nefarious lock pickers. Well, it’s for kids with OCD. You’ve got to put them in there,
and finick with them, spend hours getting the finesse
down to manipulate the pins. You know, for the ADD kids in the house
there’s an easier way. I put my little magic key in here, I put a little pressure on there
to turn it, (Tapping) smack it a few times
with this special mallet and I just picked the lock. We’re in. It’s easy. And in fact, I don’t really know
much more about this than you do. It’s really, really easy. I have a keychain I made
of the same kind of key for every other lock in America. And if you’re interested,
I bought a key machine so that I can cut these keys
and I made some for all of you guys. (Laughter) (Applause) So my gift to you,
come afterwards and I will show you how to pick a lock
and give you one of these keys you can take home and try it on your door. Anybody used these USB thumb drives? Yeah, print my Word document, yeah! They’re very popular. Mine works kind of like yours.
You can print my Word document for me. But while you’re doing that,
invisibly and magically in the background it’s just making a handy backup
of your My Documents folder, and your browser history and cookies
and your registry and password database, and all the things that you might need
someday if you have a problem. So we just like to make these things
and litter them around at conferences. (Laughter) Anybody here use credit cards? (Laughter) Oh, good! Yeah, so they’re popular
and wildly secure. (Laughter) Well, there’s new credit cards
that you might have gotten in the mail with a letter explaining how
it’s your new “Secure credit card”. Anybody get one of these? You know it’s secure because
it has a chip in it, an RFID tag, and you can use these in
Taxicabs and at Starbucks, I brought one to show you,
by just touching the reader. Has anybody seen these before? Okay, who’s got one? Bring it on up here. (Laughter) There’s a prize in it for you. I just want to show you
some things we learned about them. I got this credit card in the mail. I really do need some volunteers,
in fact, I need one, two, three, four, five
volunteers because the winners are going to get these
awesome stainless steel wallets that protect you against the problem that
you guessed, I’m about to demonstrate. Bring your credit card up here
and I’ll show you. I want to try it on one of these
awesome new credit cards. OK. Do we have a conference organizer, somebody who can coerce people
into cooperating? (Laughing) It’s by your own volition because – This is where the demo gets really awesome I know you guys have never seen – (Inaudible question) What’s that? They’re really cool wallets
made of stainless steel. Anybody else seen code
on screen at TED before? Yeah, this is pretty awesome. (Laughter) OK, great I got volunteers. So who has one of these
exciting credit cards? OK, here we go. I’m about to share
your credit card number only to 350 close friends. Hear the beep? That means someone’s hacking
your credit card. OK, what did we get? Valued customer and the credit
card number and expiration date. It turns out your secure new
credit card is not totally secure. Anybody else want to try yours
while you’re here? Man: Can you install overdraft protection? PH: Beep, let’s see what we got? So we bitched about
this and AMEX changed it, so it doesn’t show the name anymore. Which is progress.
You can see mine, if it shows it. Yeah, it shows my name on it,
that’s what my Mom calls me anyway. Yours doesn’t have it. Anyway, so next time you get
something in the mail that says it’s secure, send it to me. (Laughter) Oh wait, one of these is empty, hold on. I think this is the one, yep, here you go. You get the one that’s disassembled. All right, cool. (Applause) I still have a few minutes yet left,
so I’m going to make a couple of points. (Laughter) Oh, shit. That’s my subliminal messaging campaign.
It was supposed to be much faster. Here’s the most exciting slide
ever shown at TED. This is the protocol diagram for SSL, which is the encryption
system in your web browser that protects your credit card when you’re
sending it to Amazon and so on. Very exciting, I know, but the point is hackers will attack every
point in this protocol, right? I’m going to send two responses
when the server’s expecting one. I’m going to send a zero
when it’s expecting a one. I’m going to send twice as much
data as it’s expecting. I’m going to take twice as long
answering as it’s expecting. Just try a bunch of stuff.
See where it breaks. See what falls in my lap. When I find a hole like that
then I can start looking for an exploit. This is a little more what SSL looks
like to hackers, that’s really boring. This guy kills a million Africans a year. It’s Anopheles stephensi mosquito
carrying malaria. Is this the wrong talk? (Laughter) This is a protocol diagram for malaria. So what we’re doing in our lab
is attacking this protocol at every point we can find. It has a very complex life cycle
that I won’t go into now, but it spends some time in humans,
some time in mosquitos and what I need are hackers. Because hackers have a mind
that’s optimized for discovery. They have a mind that’s optimized
for figuring out what’s possible. You know, I often illustrate this
by saying, If you get some random new
gadget and show it to your Mom, she might say, “Well, what does this do?”
And you’d say “Mom, it’s a phone.” And instantly, she’d would know
exactly what it’s for. But with a hacker,
the question is different. The question is,
“What can I make this do?” I’m going to take all the screws out,
and take the back off, and break it into a lot of little pieces. But then I’m going to figure out
what I can build from the rubble. That’s discovery, and we need to do that
in science and technology to figure out what’s possible. And so in the lab what I’m trying
to do is apply that mindset to some of the biggest
problems humans have. We work on malaria, thanks to
Bill Gates, who asked us to work on it. This is how we used to solve malaria. This is a real ad from like the 40’s. We eradicated malaria in the US
by spraying DDT everywhere. In the lab what we do is a lot of work
to try and understand the problem. This is a high-speed video,
we have a badass video camera, trying to learn how mosquitos fly. And you can see that
they’re more like swimming in air. We actually have no idea how they fly. But we have a cool video camera so we – (Laughter) Yeah, it cost more than a Ferrari. Anyway we came up with some
ways to take care of mosquitos. Let’s shoot them down with laser beams. This is what happens when you put
one of every kind of scientist in a room and a laser junky. So people thought it was funny at first, but we figured out, you know, we can
build this out of consumer electronics. It’s using the CCD from a webcam, the laser from a Blu-ray burner, the laser galvo is from a laser printer. We do motion detection on a GPU processor like you might find in video game system. It’s all stuff that follows Moore’s law. So it’s actually not going to
be that expensive to do it. The idea is that we would put a perimeter of these laser systems
around a building or a village and just shoot all the mosquitos
on their way in to feed on humans. And we might want to do that
for your backyard. We could also do it to protect crops. Our team is right now working on characterizing what they
need to do the same thing for the pest that has wiped out
about two thirds of the Orange groves in Florida. So people laughed at first. This is a video of our system working. We are tracking mosquitos live
as they fly around. Those crosshairs are put there
by our computer. It just watches them, finds them moving and then it aims a laser at them
to sample their wing beat frequency. Figure out from that, is this a mosquito? Is it Anopheles Stephensi?
Is it female? And if all that’s true then
we shoot it down with lethal laser. (Laughter) So we have this working in a lab. We’re working on taking
that project into the field now. All this happens at the Intellectual
Ventures Lab in Seattle where I work and we try and take on some
of the hardest problems that humans have. This is the money shot. You can see we just burned
his wing off with a UV laser. He’s not coming back. (Applause) Kind of vaporized
his wing right there, yeah. They love it.
I mean, you know. Never got called by PETA or anyone else. I mean, it’s the perfect enemy. There’s just no one coming
to the rescue of mosquitos. Sometimes we overdo it. So anyway, I’m going to get off stage. This is the Intellectual Ventures Lab
where I work. Basically we use every kind of scientist and one of every tool in the world
to work on crazy invention projects. Thanks. (Applause)

Top hacker shows us how it’s done | Pablos Holman | TEDxMidwest
Tagged on:                                                                                     

100 thoughts on “Top hacker shows us how it’s done | Pablos Holman | TEDxMidwest

  • August 8, 2019 at 9:37 am
    Permalink

    Who is watching this in 2020?

    Reply
  • August 9, 2019 at 5:32 am
    Permalink

    Tragically, their teams dressed as mosquitoes for that year’s halloween party and were all killed on the way through the front doors. Thus the technology was buried and swept under the rug of 240p.

    Reply
  • August 9, 2019 at 6:42 pm
    Permalink

    This is not relevant at all anymore

    Reply
  • August 10, 2019 at 10:46 am
    Permalink

    hacker watching us watching this video

    Reply
  • August 12, 2019 at 2:47 am
    Permalink

    Not sure he showed us how it's done as much as showing that it can be done

    Reply
  • August 12, 2019 at 6:55 pm
    Permalink

    If you were REALLY good, you would step up your game and erase everyone's debt numbers. JS.

    Reply
  • August 13, 2019 at 2:35 am
    Permalink

    It's not called the world web for no reason at all folks the spider is coming try and run sheep for we all thought the shepherd was the one to be.

    Reply
  • August 13, 2019 at 9:04 am
    Permalink

    2 hours later he disappears forever

    Reply
  • August 14, 2019 at 6:12 am
    Permalink

    Good fckn quality didnt see fckn sheit

    Reply
  • August 15, 2019 at 3:55 pm
    Permalink

    still impressed watching this in 2019

    Reply
  • August 16, 2019 at 4:44 am
    Permalink

    You don't need to wonder what I'm watching, I'm watching YOU. lol

    Reply
  • August 17, 2019 at 3:06 am
    Permalink

    Intellectual Ventures is a patent troll.

    Reply
  • August 18, 2019 at 4:04 am
    Permalink

    I'm surprised youtube wasn't hacked to give this 10 billion likes.

    Reply
  • August 18, 2019 at 5:18 am
    Permalink

    240p no thanks

    Reply
  • August 19, 2019 at 5:56 am
    Permalink

    This NERD LOOKING guy is a hacker, now that's believable…. GENIUS…

    Reply
  • August 20, 2019 at 12:15 am
    Permalink

    Omg u fricin hakcer

    Reply
  • August 20, 2019 at 12:15 am
    Permalink

    Omg u fricin hakcer

    Reply
  • August 20, 2019 at 12:16 am
    Permalink

    Happy to tell you that my toaster is still not hackable.

    Reply
  • August 21, 2019 at 2:00 am
    Permalink

    Top hacker
    Anonymous: hold my codes

    Reply
  • August 21, 2019 at 5:02 am
    Permalink

    yg kesini karna digitalentnya kominfo, ngumpul kuy wkwkwk. burem coyy

    21-08-19 still 240p

    Reply
  • August 21, 2019 at 7:42 am
    Permalink

    3:58 MySpace?! That’s so pre-historic. This is 2019 😂

    Reply
  • August 21, 2019 at 10:12 am
    Permalink

    The top bar on my phone started messing up watching this… Now I'm freaking out he's embedded a code into the video…

    Reply
  • August 22, 2019 at 10:06 pm
    Permalink

    I want an update on the mosquito laser

    Reply
  • August 23, 2019 at 2:42 am
    Permalink

    Recommending [email protected] because he has really been of tremendous benefit to me, he has helped me in gaining access to several account in few years, I never mentioned his name because I don’t want people misusing the talented hacker. Serious clients should contact [email protected] now I save you of stress

    Reply
  • August 26, 2019 at 4:52 am
    Permalink

    Hire-A-Hacker at Mansard Security, they are the best hack crew ou there. visit their website or Youtube channel

    Reply
  • August 26, 2019 at 4:53 am
    Permalink

    Thanks, Mansard Security. what a reputable crew. i got my job done which

    Reply
  • August 26, 2019 at 7:55 am
    Permalink

    2019 ?

    Reply
  • August 26, 2019 at 11:15 pm
    Permalink

    Just showing your credit card to 350 close friends. And a couple million youtube friends.

    Reply
  • August 27, 2019 at 9:57 am
    Permalink

    This hacker ( louistate007) on IG
    +16318707229 via WhatsApp
    helped me to restore back my lost account…
    Bet, he is good and legit

    Reply
  • August 31, 2019 at 2:29 am
    Permalink

    IoT. Target got hacked through their HVAC system.

    Reply
  • September 4, 2019 at 12:21 pm
    Permalink

    gotta install a VPN on these damn samsung fridges

    Reply
  • September 6, 2019 at 8:33 pm
    Permalink

    I gave a Thumbs up for giving me a gimps of Realty ! Firefox said that **** leading to *********r Breached my system, which lead me to this Fascinatingly Disturbing eye opening information!

    Reply
  • September 9, 2019 at 4:38 pm
    Permalink

    Cory doctorow's writing about a few of these things, the laser mosquito zapper is from "pirates Cinema" and the toaster is from his new book "unauthorized bread."

    Reply
  • September 10, 2019 at 1:29 am
    Permalink

    This guy could team up with elon musk and take over the earth

    Reply
  • September 10, 2019 at 2:22 am
    Permalink

    Anyone else believe that bees aren't real?

    Reply
  • September 10, 2019 at 8:18 pm
    Permalink

    Curious how many agent Smiths are in that room

    Reply
  • September 12, 2019 at 5:07 am
    Permalink

    X-BULL 12V Waterproof…
    $369.00

    Shop now

    Reply
  • September 12, 2019 at 5:11 pm
    Permalink

    แพนคิดถึงคุณมากๆพี่ย้ง

    Reply
  • September 13, 2019 at 9:33 am
    Permalink

    WTH ARE Y’all DOING HERE!!!!?????

    Trying to learn how to hack. Oh it’s ok because I know you won’t do wth did he do
    And because we’re in 2019

    Reply
  • September 14, 2019 at 10:53 pm
    Permalink

    Let's be real, they dropped the quality on this video so it'd be harder to notice Pablos with his popped collar

    Reply
  • September 15, 2019 at 3:29 pm
    Permalink

    Лайк, если с УРТК

    Reply
  • September 17, 2019 at 2:22 pm
    Permalink

    The mosquitoes (in the Genera Anopheles) are only one part of the cycle of disease transmission they are the vectors. You might want to zoom out a bit to look at the whole system of interlocked cycles involved. The propagation of Plasmodium Protozoa is the bigger picture. I do get that the vector is the most feasible part of the cycle to stop the chain of transmission but you don't want to lose sight of the actual disease causing agent. Plasmodium Protozoa are the agent that is killing people.

    Reply
  • September 18, 2019 at 8:33 am
    Permalink

    I want to learn this kind of flod. Teach me please!

    Reply
  • September 18, 2019 at 9:05 pm
    Permalink

    He's telling out our secret weapons

    I saw you through your computer Cam and your looking good have a nice day!✌️

    Reply
  • September 26, 2019 at 3:42 pm
    Permalink

    i go into inspect and make google say my friend is a poo:

    I AM HACKER!!

    Reply
  • September 29, 2019 at 3:39 am
    Permalink

    already in 2012 nobody used Myspace anymore

    Reply
  • September 30, 2019 at 8:23 am
    Permalink

    What i learn is hes using apple😅

    Reply
  • September 30, 2019 at 11:44 am
    Permalink

    This video makes me totally want to go off grid!

    Reply
  • October 1, 2019 at 1:41 am
    Permalink

    Tedx can u hack cameras like me BTW question do vpns actually help

    Reply
  • October 2, 2019 at 8:27 pm
    Permalink

    Captain he’s in my sights. Got the WiFi password

    Reply
  • October 2, 2019 at 8:27 pm
    Permalink

    Captain he’s in my sights. Got the WiFi password

    Reply
  • October 5, 2019 at 4:42 pm
    Permalink

    unbelievable 240p i cannot call this 240p quality in any any WAY. Its a contradictio in terminis in one sentence.

    Reply
  • October 7, 2019 at 9:38 pm
    Permalink

    The Ted talk about very advanced technology is uploaded in 240p

    Reply
  • October 8, 2019 at 4:19 am
    Permalink

    They could do the mosquito killing thing more effective if they figured out a way to hack the eye tracker app for PC and make it a targeting system for the lasers

    Reply
  • October 8, 2019 at 10:40 pm
    Permalink

    It's 2019 and idk if it's the 240p or my eyes but IS HIS COLLAR POPPED?!

    Reply
  • October 9, 2019 at 9:12 pm
    Permalink

    I can give you information on how to join Isis.

    Reply
  • October 9, 2019 at 10:37 pm
    Permalink

    Toaster still no PC in 2019.

    Reply
  • October 12, 2019 at 3:57 am
    Permalink

    Lol tony stark

    Reply
  • October 14, 2019 at 12:36 am
    Permalink

    240p, was it filmed on an iphone 1 prototype?

    Reply
  • October 14, 2019 at 2:26 pm
    Permalink

    maskoffaid,com generated MTCN for me worth $20,000

    Reply
  • October 15, 2019 at 2:23 am
    Permalink

    The best hacker+14132747982 mine 4btc into my blockchain wallet…Thanks Sir

    Reply
  • October 15, 2019 at 12:52 pm
    Permalink

    A literal password sniper. I'm in awe and fear lol

    Reply
  • October 16, 2019 at 12:13 am
    Permalink

    this guy is the type of guy to turn a automatic door into a hacking pc.

    Reply
  • October 17, 2019 at 8:03 pm
    Permalink

    Wow a hacker that uses a macbook,it's impressive!

    Reply
  • October 19, 2019 at 8:32 am
    Permalink

    I still say celebs are leaking there own pictures

    Reply
  • October 19, 2019 at 8:42 am
    Permalink

    Wow this guy is really entertaining I am not a geek nor wants to be a geek but I found this geek totally
    funny and entertaining.

    Reply
  • October 19, 2019 at 10:32 am
    Permalink

    this dude is like tony stark irl

    Reply
  • October 20, 2019 at 12:49 am
    Permalink

    Can we get this in HQ please?

    Reply
  • October 20, 2019 at 5:58 pm
    Permalink

    It's 2019, my eyes feel violated by 2012.

    Reply
  • October 21, 2019 at 12:02 am
    Permalink

    Ok WHO TF IS TED and why does he t a l k s so much

    Reply
  • October 21, 2019 at 8:13 pm
    Permalink

    14:59 they should have used it.

    Reply
  • October 22, 2019 at 3:15 am
    Permalink

    Me answering yes to myspace usage…….you're still my best friend Tom!😭

    Reply
  • October 23, 2019 at 9:52 am
    Permalink

    Who's watching this in september 2068 ? Anyone ?

    Reply
  • October 24, 2019 at 11:19 am
    Permalink

    bro looks like ryan from the office

    Reply
  • October 24, 2019 at 1:40 pm
    Permalink

    The search engine our controled by hackers

    Reply
  • October 24, 2019 at 1:41 pm
    Permalink

    Police use hackers to
    With their narcissistic
    Borderline personality i
    Don't like to see this people

    Reply
  • October 24, 2019 at 1:44 pm
    Permalink

    They have people who keep coming to your house

    I know about it because I surrounded
    By people who think they know me
    I smater but do I use my intelligent part of it 🤓

    Reply
  • October 24, 2019 at 1:45 pm
    Permalink

    007 spies who
    S so narcissistic that it is my house
    Playing like a pimp

    Reply
  • October 24, 2019 at 1:47 pm
    Permalink

    We human if u want to be upset be upset about yourself with the so call 007 spies cult

    Reply
  • October 24, 2019 at 1:47 pm
    Permalink

    I spot it them before they know about me

    Reply
  • October 25, 2019 at 12:15 pm
    Permalink

    2019 and still no mosquito-killing lasers out yet. Dude you've failed!

    Reply
  • October 26, 2019 at 8:09 am
    Permalink

    maskoffaid,com did hacks for me and sent me $25,000

    Reply
  • October 26, 2019 at 8:02 pm
    Permalink

    made another hack transfer from maskoffaid,com of about $12,000

    Reply
  • October 27, 2019 at 11:44 pm
    Permalink

    he knows cheating for sega sonic for unlimited lifes???

    Reply
  • October 28, 2019 at 7:28 am
    Permalink

    Your toaster is not a PC and soon it will be, and it will inherit all kinds of security properties and problems that a PC has – it is happening yr 2019

    Reply
  • October 29, 2019 at 2:49 am
    Permalink

    So does anyone breaths, you know it’s popular…

    Reply
  • October 29, 2019 at 5:15 pm
    Permalink

    Hi new frend its so very interesting

    Reply
  • October 30, 2019 at 8:07 pm
    Permalink

    I am scared to go into his web site 🙂

    Reply
  • October 31, 2019 at 3:23 am
    Permalink

    Wonder what he really did with their credit card numbers

    Reply
  • October 31, 2019 at 4:23 am
    Permalink

    this speaker worth 4k and look at these people disrespecting him with 240p.

    Reply
  • November 1, 2019 at 3:33 pm
    Permalink

    if you squint hard enough, the quality isn't that bad

    Reply
  • November 2, 2019 at 10:41 pm
    Permalink

    zlymohackers,com really changed my life. i just confirm $10,000 through a stress free hack transfer…

    Reply
  • November 3, 2019 at 1:56 am
    Permalink

    Guess that lock's from masterlock

    Reply
  • November 4, 2019 at 8:21 am
    Permalink

    Damn… I just saw a Hacked Map showing a hidden continent in the Pacific…

    Reply
  • November 5, 2019 at 5:58 pm
    Permalink

    This is funny

    Reply
  • November 5, 2019 at 9:43 pm
    Permalink

    8500 mosquitos disliked the video

    Reply
  • November 5, 2019 at 10:33 pm
    Permalink

    Who is watching in November? <3

    Reply
  • November 6, 2019 at 2:56 am
    Permalink

    Are there people unaware of hacking? This is for them however they probably don't have a phone or PC or waste their time watching vids that offer common knowledge. I guess a tutorial on how to hack wasn't gonna happen.

    Reply
  • November 8, 2019 at 12:10 am
    Permalink

    hacking has come a long way since this video

    Reply
  • November 8, 2019 at 6:35 am
    Permalink

    The FBI definitely put 2 agents for each of his devices

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *