Hacked? | RALPH ECHEMENDIA | TEDxMiami

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
Transcriber: Alaa shebl Reviewer: Walaa Mohammed Ladies and gentlemen, Ralph Isham, India. You have already been hacked? Yes, Every single one of you. Before you woke up this morning. You already hacked. See, we live in a hybrid reality. No longer can you say that the opposite of virtual. Means physical. Our physical world is almost entirely driven by our virtuality, our information, our data. In fact, our individual identity is defined by data. My name is Ralph India and I grew up right here in Miami. Now I’m internationally known as the ethical hacker, for over thirty years I have been a technologist, cyber security expert , business executive, an entrepreneur and yes, a hacker When I specifically in the last 15 years, I decided to focus on individual privacy and what's called data protection. When I tell people what I've done and what I do, I almost always get some interesting questions. Typically they are, Can you hack my boyfriend or girlfriend? Can you hack an Instagram account? Can you hack my taxes? And, well, technically, that may be possible. The answer is no, because that would be unethical and illegal. But almost always I get asked, what is a hacker and how do I keep myself from getting hacked? We are all constantly being bombarded with news of hacking, but hacking is not a crime. It's actually a skill. But with the news, the type of coverage you get uses words like cyber warfare and viruses and ransomware, and the list of scary terms goes on and on. So much so that I would say that most of us have what I call hacking fatigue. Now, I am sure that you have seen a movie or two with guys who look like this. I hope that's not me. But this. This is not a hacker. Now we are constantly or usually anyway, presented this way. We are wearing masks and hoodies, which are not necessary if you're in front of a computer, by the way. And again, this is the way we're perceived. Right? But one definition, one dictionary definition defines the term hacker as a person who uses a computer to gain unauthorized access to data. And under that definition, you have already been hacked because the moment you started using technology, there is undoubtedly use of your data. That data that makes you you that defines who you are, that is your identity. It’s that data’s already in use in ways that you did not authorize, even if you happen to approve the terms and conditions on that app and website which no one really reads. You have no idea how that data is actually being used, nor do you really understand what you agreed to But why? Why? Why should you care? Well, our lives are so intertwined with technology that we can’t even operate in the physical world without it. And that's why we should all care, because it affects you. It affects you in ways that you may not even realize. That data, that data, that data defines behavior and behavior defines our individual and our collective identities. Identity defines reputation. Meaning that our use of technology may have a positive or negative impact on you personally Now, in business or any kind of personal matters. Our reputation drives our relationships. Privacy is an illusion. You cannot expect privacy when you’re in public and you are, in fact, in public. You are public. all technology that we use today, everything that you guys are using on your phones, is in fact a publicly available service, very much like a park or a library. So let’s get back to Hacker for a moment here. This term hacker. There are different types of hackers right? The important thing here, I want you to think about that term hacker, is how do you become the hacker and not the hacked? Right. There's a lot of different types of hackers. We have still probably seen an illusion. Here's some some of the hackers. We use terms in our industry like black hats and white hats and green hats and gray hats. But those terms have more to do with intent, with the motivation behind a person, the legal versus illegal activities taken by a group or individual. But really, the characteristics that make a person the hacker type. These are the sort of things we most of us have. Number one, the ability to learn. A thirst for knowledge. And if you note up here on one side, another meaning is an expert at problem programming in solving problems. Also, a person who engages in an activity without skill or talent. That's kind of a contradiction, right? Quite contradicting meanings. But it's that activity. It's it's the people who types who do. With or without knowing what they're doing. The ones who do doing leads to expertise. It leads ultimately to the knowledge and the skill sets for anyone to be effective at achieving a goal. The Hack. So you don’t need permission or authorization from anyone to know or to learn. And learning to learn is what hackers do. Oh, so well the truth is. That, you know, you think I’m telling you that you’re now supposed to become a hacker or be a cybersecurity expert just so you can protect yourself? No, because the truth is, is that we don’t really care about cybersecurity. That’s what I have learned in all these years. What we care about is safety. And security is a component of safety. But there are other components like availability, trust and privacy. What we really care about is safety. When you go out to a club out here or you go to an event, a venue for an event such as this, you have to go through security. And even though the guys here, we're not this way, usually it’s an intimidating person wearing a black shirt that says security on it. That’s the last person we want to have to deal with when we’re going to go party So but if that person was wearing a light blue shirt and it said safety on it, you'll be more likely to want to come up to them, communicate with them, ask them questions. Right. Hackers are innovators in safety, both the good and the bad actors. Because we love innovation, talked about innovation, and innovation has changed the way we live, and it’s created massively lucrative industries and everything from energy to finance and provided all kinds of considerable conveniences whose global impact are undeniable. In fact, in the 20th century alone, innovations such as radio, television, radar, air conditioning kind of important here in Miami, of course, computers and the Internet. We love innovation because innovation creates opportunity. Opportunity fuels economy. And along with these opportunities. Opportunity of any kind. Any kind. All opportunities produce risks. Right? So risks can be exploited. In cybersecurity, Exploiting risks creates innovation creating new opportunities. And this is the circle of innovation insecurity producing security. Now, these risks we hackers call vulnerabilities. And there technically there are hundreds of vulnerabilities in the technologies that we use today. They either all have or have had some sort of vulnerability. How many of us in this room show your hands if you has had your computer or your cell phone crash? Okay. Oh, that's almost everybody, right? Even. I recently had one of these issues. I had an external drive that I use. And this this drive is very important because it keeps a lot of important information, critical data that I use for different things, personal information, pictures, of course, and even I the ethical hacker, I don't I don't have access to the type of hardware necessary to be able to do data recovery. I had to take it to a data recovery company so that I can potentially get my information back. Vulnerability. Even I am vulnerable. I have to put my trust in someone else to be able to get that information back. Vulnerability creates trust. That sounds crazy, but it does. Vulnerability creates trust. So who do you trust in technology? Who do you trust when it comes to privacy? Good answer. Trust yourself. Privacy goes hand in hand with trust, right? And a lot of people I’ve had this conversation with, people say I don’t care about privacy because I have nothing to hide. And if you think you have nothing to hide, then that in itself is your biggest vulnerability because you will be exposed in ways that you couldn’t imagine today. And when you are, oh, you’re going to care. I assure you, our ability to create privacy or prevent that privacy from being used as a vulnerability really comes through learning. Through understanding and doing something with that knowledge. As I mentioned before, hackers are really good at learning how to learn very quickly and very deeply about a subject matter, about a company, about a technology, about a person or any sort of thing. They're really good at knowing how to do this. But with all the resources that we have online today, there is no reason. There is no reason why you can’t do this all the same things. I could say that everybody in this room is the smartest person in the room with one word. Google. Okay. There is no silver bullet for this issue of privacy. There is no single solution. This really isn't about just installing an antivirus or using a VPN. You have to actually learn how to reduce your risks, digital or otherwise. And that’s the only way that you can define your privacy. So. Privacy is something personal, only you can define it and only you can then create it. So with that said be the hacker and not that hacked. I’m going to leave you with a few lines of hacker code that are the best I think It’s what I consider to be the most powerful and best possible communicator, and that is the universal language of music. I'm going to introduce you to my daughter, Hennessy, and her song Privacy. Would you share your thoughts with me? Unfiltered and raw, baby. Most definitely ugly. Wouldn’t you, sweetie? Would you share your thoughts with me? Unfiltered and raw, baby. Most definitely ugly. Would you, sweetie? Should you be able to see all the dirty aspects of me, even the ones I have yet to see? Should you be able to see all the dirty aspects of me, even the ones I have yet to see? Privacy, where have you gone? Privacy, What do you mean ? privacy, were you thought of? Cause I don’t see any, any, any privacy. privacy. privacy. privacy. So you say that you've got nothing to hide. So then I guess you wouldn’t mind if I let myself inside. So you say that you’ve got nothing to hide So then I guess you wouldn’t mind if I let myself inside. Privacy, where have you gone? Privacy, what do you mean? privacy, were you thought of? Cause I don't see any. Any, any. Any privacy privacy privacy privacy Get some privacy.
Info
Channel: TEDx Talks
Views: 17,682
Rating: undefined out of 5
Keywords: Cyber, Data, English, Exposure, Hack, Privacy, Safety, TEDxTalks, Technology, [TEDxEID:53538]
Id: G5FTe8DeG6k
Channel Id: undefined
Length: 16min 39sec (999 seconds)
Published: Thu Jul 27 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.