Game Theory: Hackers Are EVERYWHERE! (Watch Dogs 2)

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
Seems like it's pretty much every [day] that I see or hear about some new life hack You're just obsessed with shortcuts and macgyvering the world around them But a lot of these things just seem to be trivial [to] me use a bobby pin to get that last bit of toothpaste out of the tube, [ooh] Super exciting use a cheese grater to spread butter that hasn't softened mind Officially blown turn the wi-Fi capabilities on your phone off or someone can steal and erase your whole life in a matter of seconds Ah wait what? hello internet welcome to game theory the show that uses [science] and math to turn Gaming's nublar into the latest of Theorists today is an important day. Not only are we returning to one if not the most infamous? Multi-part series in game Theory history, we're also covering information that will simultaneously Terrify and Empower you making this episode one of the most important ones of the entire series just no exaggeration because today we're not talking about hypothetical parallel multiverses or Pokemon evolutionary patterns we're talking about the real world and the vulnerabilities that increasingly exist in it it's been two years since our first watch underscore dogs video and a lot has happened in the world of [technology] since then we now exist in a smart world or at least that's what we like to think Smartphone Smart [Cars] [Smart] [TVs] Smart Watches act everything from your book to your Cigarette needs to be plugged in these days and as [tech] has evolved around us. We've created for ourselves What's known as an internet of things [you] know the internet is a bunch of connected Data web Pages full of information constantly collecting more all linking to each other that we have to navigate around well that now exists in a physical form all around us everything from your light bulb to your Thermostat can be connected to your phone and that phone is linked to your computer which also may be linked to your car and iPod the printer the Washer this internet of things is a web of connected devices Constantly collecting and sharing information with each other to improve their own efficiency and that's just one smart home that home connects to a smart grid which collectively becomes a smart City and Onward and upward to a smarter world you probably see where this is going on one hand everything is faster and more convenience like Hard house I'll know my favorite [90s] jock Jam Playlist because they both talked to my phone when I walk into the house I don't have to miss a beat a pump up the Jam [but] this internet of things also makes us vulnerable as the rush to shove technology into everything [from] the refrigerator to the kitchen sink literally means that security holes have your car's brakes can be activated remotely power grids could be shut down for literally tens of Thousands of people your houses heat can be cranked up by five extra degrees making it really uncomfortable for you to sleep at night And that's our topic for today Exploring the holes that exist in the world around us And how to exploit them why well because one it's essential for you to be aware of things like that for your own safety But also to because it's the world of watchdogs to where ctos from the first game has been upgraded to version 2.0 and is embedded everywhere in this internet of things collecting behavioral data and then selling it to the [highest] bidder [I] guess there's three reasons because reason number three is that this video is sponsored by ubisoft and anticipation of Watchdogs - hey? Ronnie's got to eat so let's talk about your data, but my data is safe [I] hear you saying and sure you might take special care of your phone tablet computer and [laptop] But what you probably don't worry about is your microwave or your washing machine The most important technique for anyone doing major hacking jobs is called pivoting pivoting is when a hacker gains access to your internet Networker server through one machine and then hops to other computers in the same network if you [are] a nefarious hacker And you wanted secret company documents you probably want stuff that's locked down on special secure servers So why try to fight your way into those when you can hack into something that's totally unprotected instead like the office Thermostat if the thermostat is connected to the same network as the computers containing the secret information a hacker can hack the thermostat then pivot Their way to accessing everything else that's on that same internet connection from the inside and hacking a thermostat Refrigerator or even a light [bulb]. Yes A light bulb is all becoming Possible because [people] in offices are switching to smart homes where everything is connected and controlled from where oh yeah Your cell phone so now every security camera Washer/dryer thermostat, and light bulb is a Gateway into our phones which this point basically have our whole lives on them and to think you didn't even bother to reset the default password on your Alexa [in] the creepiest instance of this ever have gotten into baby monitors earlier this year a family in Washington Noticed odd noises coming from their three-year-old son's room only to discover that the monitor had been hacked and that the hackers were able to Watch and talk to their child while they slept this is all clearly stuff That's beyond you right sure pivoting your way from one smart home device to the next is easy and watchdogs, too But that's because it's a game. Well as it turns out the reality is that it's shockingly easy to become a hacker [there's] even a word for the likes of us hackers who don't really Innovate but are basically just reusing other people's codes and getting really good mileage out of the copy function We're called Script kiddies basically because anyone can do these kinds of hacks me You cat pat although he would be called a script kitty and he would need to grow some opposable thumbs Here's a great example of a script kitty a Few years ago a 15 year old boy in Austria was arrested for hacking into the website of 259 companies in the Span of get this three months 90 days 259 companies a 15 year old and he did it all by using scripts he found on the internet It's not that far off from the origin story of [Markus] Watchdogs Twos main character who got abused by a crooked system and became a Self-taught hacker to ensure that no one ever got screwed over like him again Sure, the most famous hackers out [there] are real pros Who are basically knowing their way through life? But sometimes the vulnerabilities are just there sitting one google search away for you to just copy pasta now Did the kid get caught yeah of course they did I mean I'm talking about him after all and is a lot of this stuff At best unethical and at worst totally illegal. Yeah, definitely just because you can do It doesn't mean you should do it consider this the theorist seal of do not try this at home Speaking of easy to do hacks. Here's a thought experiment if you saw this thing right here sitting on your desk at work What would you do would you a ask around to see if it belongs to anyone or b? Just plug it into your computer and see what it is or maybe it was given to you at say Iii coming loaded with all the latest gameplay footage from Cod 14 [Wii] ran out [of] ideas [well] if you answered anything other than C Bash it into a thousand pieces with a hammer than you answered wrong my friends because that [innocent-looking] [Thumbdrive] is what's known [as] a rubber duckie sure it looks and sounds innocent enough But this thing is no sesame street toy unless Ernie was trying to steal Bert's identity and drain his bank Accounts rubber duckies look and work exactly like a typical thumb drive, but also come equipped with teeny-tiny Processors and Sd cards so that computers recognize them as input devices aka Keyboards if you can do it with a keyboard then you can program the rubber ducky to do it automatically when it's plugged in including open web browsers to download programs search the computer for sensitive files and passwords or track your Keystrokes to follow your every move we actually tested these things out on the episode of game lamp I did on hacking and I can tell you from personal experience They really work Hackers who came in for that episode actually had to Program the thing down to slow it to an extent that we could see it working even the most complicated maneuvers with a ducky can take Seconds usually it can execute a program without you seeing it and definitely not in time for [you] to stop it and in those seconds Of us using it in game lab it found everything on the computer and pulled it [right] off Uploading the files wherever I wanted them to go an email account a server Basically the [information] the ducky is stealing isn't on the usb. It's already in an email. Sent back to the hacker Uploaded to some Google drive account, [but] obviously something this powerful must be really hard to get your hands on rights No, actually you can buy them online for 40 bucks. [oh] wait. No Amazon prime shipping Ha screw that never mind think of things that look harmless But can utterly wreck your life check out the pineapple the pineapple looks like harmless router and your computer Or phone can use it as a source of Wi-Fi Azaab but the pineapple is like a Wi-Fi Mimic where it can pretend to be any open wireless network think about what that means if someone has a Pineapple in a Starbucks you think that you're connecting the computer to Starbucks as [network] But you're actually connecting to the pineapple and playing right into the hackers hands once your device is connected to the pineapple It's game over dude any data You send over the network like passwords and credit card numbers all go straight to the person operating the pineapple It's literally as easy as it looks when you're playing the game And you know why because it's inspired by the game off camera of that game lab episode the creator told us that she designed the Pineapple to create a system where hacking would be as easy as we see in watchdogs, and she definitely succeeded This is called the wi-Fi pineapple. I just had this little guy running and who is Jacob's apple watch that is me a Few clicks, and you are caught art imitated life And then life imitated right back [so] sure the tools you need to become [a] hacker are simple and readily available What if you want to do some real damage a great example of this next-level hacking comes straight from the game from the preview Gameplay? footage we've seen at E3 of Watchdogs 2 when our dedsec team wants to manipulate the politics of San Francisco using hacking turns out. You can totally manipulate political elections and ballot boxes It was just recently all over the web how vulnerable electronic polling systems are in the us States have lost Thousands of votes due to supposed glitches in the system's most of which are a decade or more old and haven't updated their security Protocols in years this again is one of those times when yeah it feels unbelievable That just a few button presses can do something like this, but it's not that many more irl if you have the right stuff so if you're not happy with Either Hillary Clinton or Donald Trump as our next president well go ahead hack the voting stations and make deez nuts your next president So that's no joke [deez] is a totally legit candidate, and I would totally be his Vp. If he asked nuts Patrick 2016 at least we know we have the hacker Vote if you want to see something really cool and also really mind-blowing [there] are these online [maps] tracking in real-time Attempted hack attacks between countries this one's called the norse attack map And it looks like a video game except it's not it's expert hackers trying to break it to all of our private data Every second of every day just sit there and watch China blast out volleys of attacks towards the us And it seems like everyone is always attacking Dubai for some secret reason None of us regular people are allowed to know it's almost hypnotic But each rainbow-colored last is just another threat headed our way In short what you're witnessing are the most high Stakes of battles we flight in the Modern age Nations at war but not with soldiers on a battlefield. [it's] a virtual battle of Information happening remotely hacker versus hacker, but that's hacking at a global scale and as we've seen today It doesn't need to be nearly that complicated Watchdogs [2] is a great example Where one of the game's Key features will be these hacker V hacker battles just at the local level Rival programmers face-To-face on the streets of San Francisco trying to Outsmart each other programmer Duels It's like West side story for computer Junkies Maria I just breached the firewalls of Maria [at] this point, you're probably thinking. We should all be really terrified, and yeah hacking is serious stuff That's surprisingly close to home and getting easier by the day So are we doomed to live in a world where computer hackers are the new alpha dogs or should I say Elf oh? Watchdogs, no I shouldn't say that scary as this episode might make it [seem] the answer is actually no my friends loyal theorists Hope is on the Horizon and hacking isn't just some tool for the bad guys There's a growing army of people out there who are working to protect us with just as intense Counter hacking the Guardian project is a nonprofit organization devoted to protecting the privacy of people vulnerable to hackers which if we're being honest is basically everyone recently the guardian project partnered with tor the anonymous network that hosts the deep web servers to add similar layers of stealth and Encryption to Smart Home Devices Basically taking something that's scary to most of us like the dark web and turning it into something that makes us all Safer or just infects everything that we buy and were just completely oblivious to it who knows But honestly there's more where that came from if you want to be a hacker, but ain't got time for [that] prison sentence well You can become a white hat hacker meaning that you basically get paid to have the biggest companies in the world and tell them where Their [weaknesses] are basically you're being paid by google to tell them why they suck they can make their system safer and you can make some serious bank Facebook and Google will pay rewards as large as $20,000 to hackers who expose vulnerabilities in their products there are whole companies who do nothing but Penetration testing and know they're not just porn companies they're basically hacking for the good guys making the world a safer place like a Superhero gets rewarded for never having to go to the gym funny enough Marcus and his hacker group dedsec worked the same way trying to expose the corrupt ways businesses are exploiting the private data being collected by [ctos] 2.0 in watch underscore dogs, [too] Hackers are out there to help but to sum up the lessons of this episode be safe out there use a vPN and theorist family hacking may be all around you but knowing about it and knowing the Vulnerabilities that exist are the first steps to empowering yourself in this case knowledge truly is power, but hey That's just a theory a game Theory, thanks for watching One more special thanks to ubisoft for sponsoring this video and giving me another excuse to dive into the ever more Fascinating ever more terrifying world of hackers if you want to learn more about Watchdogs - there's a link in the description right down and there that will lead you directly to their trailer so click on that Or if you're interested in seeing how a hacker can break into your car [atm] or even your heart [that's] right your heart click Right here, or right here to check out my first two watchdogs videos Did you know that hackers could even hack? Planes from the Entertainment center in the back of the seat I didn't include that in the video because it's just it's just too scary [I'm] already afraid enough of flying suffice it to say though If it's got a computer it can be hacked and unless you're a hacker at the level of Mr.. Robot there's not a whole lot that we can do [about] it fun times [a] Real-life scary episode to kick off in [October] of Spooky Theories now if you'll excuse [me] I've got to go analyze the ethics of killing some animals. See you next week
Info
Channel: The Game Theorists
Views: 4,183,101
Rating: undefined out of 5
Keywords: watch dogs, watch dogs 2, hacker, hacking, hack, hackers, how to hack, how to, infamous, watchdogs, ubisoft, scary, scare, horror, fear, dark, secret, truth, uncovered, game theory, matpat, mattpat, matthewpatrick13, matthew patrick, game theorists
Id: RCnwfaN6dOQ
Channel Id: undefined
Length: 14min 54sec (894 seconds)
Published: Sat Oct 08 2016
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.