Seems like it's pretty much every [day] that I see or hear about some new life hack
You're just obsessed with shortcuts and macgyvering the world around them
But a lot of these things just seem to be trivial [to] me use a bobby pin to get that last bit of toothpaste out
of the tube, [ooh]
Super exciting use a cheese grater to spread butter that hasn't softened mind
Officially blown turn the wi-Fi capabilities on your phone off or someone can steal and erase your whole life in a matter of seconds
Ah wait what?
hello internet welcome to game theory the show that uses [science] and math to turn Gaming's nublar into the latest of
Theorists today is an important day. Not only are we returning to one if not the most infamous?
Multi-part series in game Theory history, we're also covering information that will simultaneously
Terrify and Empower you making this episode one of the most important ones of the entire series just no
exaggeration because today we're not talking about hypothetical parallel multiverses or Pokemon evolutionary patterns we're talking about the real world and the
vulnerabilities that
increasingly exist in it it's been two years since our first watch underscore dogs video and a lot has happened in the world of
[technology] since then we now exist in a smart world or at least that's what we like to think
Smartphone Smart [Cars] [Smart] [TVs]
Smart Watches act everything from your book to your
Cigarette needs to be plugged in these days and as [tech] has evolved around us. We've created for ourselves
What's known as an internet of things [you] know the internet is a bunch of connected Data web Pages full of information
constantly collecting more all linking to each other that we have to navigate around well that now exists in a
physical form all around us everything from your light bulb to your
Thermostat can be connected to your phone
and that phone is linked to your computer which also may be linked to your car and iPod the printer the
Washer this internet of things is a web of connected devices
Constantly collecting and sharing information with each other to improve their own efficiency
and that's just one smart home that home connects to a smart grid which collectively becomes a smart City and
Onward and upward to a smarter world you probably see where this is going on one hand everything is faster and more
convenience like Hard house
I'll know my favorite [90s] jock Jam Playlist because they both talked to my phone when I walk into the house
I don't have to miss a beat a pump up the Jam
[but] this internet of things also makes us vulnerable as the rush to shove technology into everything [from] the refrigerator to the kitchen sink
literally means that security holes have your car's brakes can be activated remotely power grids could be shut down for literally tens of
Thousands of people your houses heat can be cranked up by five extra degrees making it really uncomfortable for you to sleep at night
And that's our topic for today
Exploring the holes that exist in the world around us
And how to exploit them why well because one it's essential for you to be aware of things like that for your own safety
But also to because it's the world of watchdogs to where ctos from the first game has been upgraded to version
2.0 and is embedded everywhere in this internet of things collecting behavioral data and then selling it to the [highest] bidder
[I] guess there's three reasons because reason number three is that this video is sponsored by ubisoft and anticipation of Watchdogs - hey?
Ronnie's got to eat so let's talk about your data, but my data is safe
[I] hear you saying and sure you might take special care of your phone tablet computer and [laptop]
But what you probably don't worry about is your microwave or your washing machine
The most important technique for anyone doing major hacking jobs is called pivoting pivoting is when a hacker gains access to your internet
Networker server through one machine and then hops to other computers in the same network if you [are] a nefarious hacker
And you wanted secret company documents you probably want stuff that's locked down on special secure servers
So why try to fight your way into those when you can hack into something that's totally unprotected instead like the office
Thermostat if the thermostat is connected to the same network as the computers containing the secret information a hacker can hack the thermostat then pivot
Their way to accessing everything else that's on that same internet connection from the inside and hacking a thermostat
Refrigerator or even a light [bulb]. Yes
A light bulb is all becoming
Possible because [people] in offices are switching to smart homes where everything is connected and controlled from where oh yeah
Your cell phone so now every security camera
Washer/dryer thermostat, and light bulb is a Gateway into our phones which this point
basically have our whole lives on them and to think you didn't even bother to reset the default password on your
Alexa [in] the creepiest instance of this ever have gotten into baby monitors earlier this year a family in Washington
Noticed odd noises coming from their three-year-old son's room only to discover that the monitor had been hacked and that the hackers were able to
Watch and talk to their child while they slept this is all clearly stuff
That's beyond you right sure pivoting your way from one smart home device to the next is easy and watchdogs, too
But that's because it's a game. Well as it turns out the reality is that it's shockingly easy to become a hacker
[there's] even a word for the likes of us hackers who don't really
Innovate but are basically just reusing other people's codes and getting really good mileage out of the copy function
We're called Script kiddies basically because anyone can do these kinds of hacks me
You cat pat although he would be called a script kitty and he would need to grow some opposable thumbs
Here's a great example of a script kitty a Few years ago a 15 year old boy in
Austria was arrested for hacking into the website of
259 companies in the Span of get this three months 90 days
259 companies a 15 year old and he did it all by using scripts he found on the internet
It's not that far off from the origin story of [Markus] Watchdogs Twos
main character who got abused by a crooked system and became a
Self-taught hacker to ensure that no one ever got screwed over like him again
Sure, the most famous hackers out [there] are real pros
Who are basically knowing their way through life?
But sometimes the vulnerabilities are just there sitting one google search away for you to just copy pasta now
Did the kid get caught yeah of course they did I mean I'm talking about him after all and is a lot of this stuff
At best unethical and at worst totally illegal. Yeah, definitely just because you can do
It doesn't mean you should do it consider this the theorist seal of do not try this at home
Speaking of easy to do hacks. Here's a thought experiment if you saw this thing right here sitting on your desk at work
What would you do would you a ask around to see if it belongs to anyone or b?
Just plug it into your computer and see what it is or maybe it was given to you at say
Iii coming loaded with all the latest gameplay footage from Cod
14 [Wii] ran out [of] ideas [well] if you answered anything other than C
Bash it into a thousand pieces with a hammer than you answered wrong my friends because that [innocent-looking]
[Thumbdrive] is what's known [as] a rubber duckie sure it looks and sounds innocent enough
But this thing is no sesame street toy unless Ernie was trying to steal Bert's identity and drain his bank
Accounts rubber duckies look and work exactly like a typical thumb drive, but also come equipped with teeny-tiny
Processors and Sd cards so that computers recognize them as input devices aka
Keyboards if you can do it with a keyboard then you can program the rubber ducky to do it automatically when it's plugged in
including open web browsers to download programs search the computer for sensitive files and passwords or track your
Keystrokes to follow your every move we actually tested these things out on the episode of game lamp
I did on hacking and I can tell you from personal experience
They really work
Hackers who came in for that episode actually had to
Program the thing down to slow it to an extent that we could see it working even the most complicated
maneuvers with a ducky can take
Seconds usually it can execute a program without you seeing it and definitely not in time for [you] to stop it and in those seconds
Of us using it in game lab it found everything on the computer and pulled it [right] off
Uploading the files wherever I wanted them to go an email account a server
Basically the [information] the ducky is stealing isn't on the usb. It's already in an email. Sent back to the hacker
Uploaded to some Google drive account, [but] obviously something this powerful must be really hard to get your hands on rights
No, actually you can buy them online for 40 bucks. [oh] wait. No Amazon prime shipping
Ha screw that never mind think of things that look harmless
But can utterly wreck your life check out the pineapple the pineapple looks like harmless router and your computer
Or phone can use it as a source of Wi-Fi Azaab
but the pineapple is like a
Wi-Fi Mimic where it can pretend to be any open wireless network think about what that means if someone has a
Pineapple in a Starbucks you think that you're connecting the computer to Starbucks as [network]
But you're actually connecting to the pineapple and playing right into the hackers hands once your device is connected to the pineapple
It's game over dude any data
You send over the network like passwords and credit card numbers all go straight to the person operating the pineapple
It's literally as easy as it looks when you're playing the game
And you know why because it's inspired by the game off
camera of that game lab episode the creator told us that she designed the
Pineapple to create a system where hacking would be as easy as we see in watchdogs, and she definitely succeeded
This is called the wi-Fi pineapple. I just had this little guy running and who is Jacob's apple watch that is me a
Few clicks, and you are caught art imitated life
And then life imitated right back [so] sure the tools you need to become [a] hacker are simple and readily available
What if you want to do some real damage a great example of this next-level hacking comes straight from the game from the preview Gameplay?
footage we've seen at E3 of Watchdogs 2 when our dedsec team wants to manipulate the politics of San
Francisco using hacking turns out. You can totally manipulate political elections and ballot boxes
It was just recently all over the web how vulnerable electronic polling systems are in the us States have lost
Thousands of votes due to supposed glitches in the system's most of which are a decade or more old and haven't updated their security
Protocols in years this again is one of those times when yeah it feels unbelievable
That just a few button presses can do something like this, but it's not that many more irl if you have the right stuff
so if you're not happy with Either Hillary Clinton or Donald
Trump as our next president well go ahead hack the voting stations and make deez nuts your next president
So that's no joke [deez] is a totally legit candidate, and I would totally be his Vp. If he asked nuts
Patrick 2016 at least we know we have the hacker
Vote if you want to see something really cool and also really mind-blowing [there] are these online [maps] tracking in real-time
Attempted hack attacks between countries this one's called the norse attack map
And it looks like a video game except it's not it's expert hackers trying to break it to all of our private data
Every second of every day just sit there and watch China blast out volleys of attacks towards the us
And it seems like everyone is always attacking Dubai for some secret reason
None of us regular people are allowed to know it's almost hypnotic
But each rainbow-colored last is just another threat headed our way
In short what you're witnessing are the most high Stakes of battles we flight in the Modern age
Nations at war but not with soldiers on a battlefield. [it's] a virtual battle of
Information happening remotely hacker versus hacker, but that's hacking at a global scale and as we've seen today
It doesn't need to be nearly that complicated Watchdogs [2] is a great example
Where one of the game's Key features will be these hacker V hacker battles just at the local level Rival programmers
face-To-face on the streets of San Francisco trying to Outsmart each other programmer Duels
It's like West side story for computer Junkies Maria
I just breached the firewalls of Maria
[at] this point, you're probably thinking. We should all be really terrified, and yeah hacking is serious stuff
That's surprisingly close to home and getting easier by the day
So are we doomed to live in a world where computer hackers are the new alpha dogs or should I say Elf oh?
Watchdogs, no I shouldn't say that scary as this episode might make it [seem] the answer is actually no my friends loyal theorists
Hope is on the Horizon and hacking isn't just some tool for the bad guys
There's a growing army of people out there who are working to protect us with just as intense
Counter hacking the Guardian project is a nonprofit organization devoted to protecting the privacy of people vulnerable to hackers
which if we're being honest is
basically everyone recently the guardian project partnered with tor the anonymous network that hosts the deep web servers to add similar layers of stealth and
Encryption to Smart Home Devices
Basically taking something that's scary to most of us like the dark web and turning it into something that makes us all
Safer or just infects everything that we buy and were just completely oblivious to it who knows
But honestly there's more where that came from if you want to be a hacker, but ain't got time for [that] prison sentence
well
You can become a white hat hacker meaning that you basically get paid to have the biggest companies in the world and tell them where
Their [weaknesses] are basically you're being paid by google to tell them why they suck they can make their system safer
and you can make some serious bank Facebook and Google will pay rewards as large as
$20,000 to hackers who expose vulnerabilities in their products there are whole companies who do nothing but
Penetration testing and know they're not just porn companies
they're basically hacking for the good guys making the world a safer place like a
Superhero gets rewarded for never having to go to the gym funny enough Marcus and his hacker
group dedsec worked the same way trying to expose the corrupt ways businesses are exploiting the private data being collected by
[ctos] 2.0 in watch underscore dogs, [too]
Hackers are out there to help but to sum up the lessons of this episode be safe out there use a vPN and theorist family
hacking may be all around you but knowing about it and knowing the
Vulnerabilities that exist are the first steps to empowering yourself in this case knowledge truly is power, but hey
That's just a theory a game
Theory, thanks for watching
One more special thanks to ubisoft for sponsoring this video and giving me another excuse to dive into the ever more
Fascinating ever more terrifying world of hackers if you want to learn more about
Watchdogs - there's a link in the description right down and there that will lead you directly to their trailer so click on that
Or if you're interested in seeing how a hacker can break into your car [atm] or even your heart [that's] right your heart click
Right here, or right here to check out my first two watchdogs videos
Did you know that hackers could even hack?
Planes from the Entertainment center in the back of the seat I didn't include that in the video because it's just it's just too scary
[I'm] already afraid enough of flying suffice it to say though
If it's got a computer it can be hacked and unless you're a hacker at the level of Mr.. Robot
there's not a whole lot that we can do [about] it fun times [a]
Real-life scary episode to kick off in [October] of Spooky Theories now if you'll excuse [me]
I've got to go analyze the ethics of killing some animals. See you next week
