Rhys publik
[search 0]
Lebih
Unduh Aplikasinya!
show episodes
 
For many performers, their biggest fears is that people will find the creative writing they produced when they were younger. Early poetry, short stories, song lyrics, scripts and more shouldn't stay hidden in shoe boxes in our parents' house or in password protected folders on our laptops. It’s time we monetised that shame and gave those pieces the public outing our 15 year old selves would’ve wanted. Each week a guest brings something they wrote in their adolescence to be discussed and co-a ...
  continue reading
 
Podcast episodes about sports and teams I follow from football to ice hockey. Sometimes I may talk about stuff I feel that needs to be listened to. Would love to try and have a bit of a laugh and try and get a few friends on to talk about some things.
  continue reading
 
Ever wanted to be an Overnight Success? Well Rhys thought that sounded great too, turns out it may not be that simple! Listen along as Rhys interviews people from all walks of life who, from the outside appear to have gone from anonymous to the big time of their field, and find out the true story behind their journey! We raise a glass to not getting it right and finding your path in a unique way.
  continue reading
 
Loading …
show series
 
Are you a fan of The Simpsons and their uncanny ability to predict the future? Join us in this episode of The English with Rhys Podcast as we dive into The Simpsons' predictions and teach you how to talk about future predictions in everyday conversational English. Rhys is joined by his best friend, Ben, to discuss some of the most famous Simpsons p…
  continue reading
 
Jon and Brian are paid to break into buildings and hack networks to test their security. But on one mission, even the best preparation and tools did not equip them for what happened next. Visit https://darknetdiaries.com/episode/95/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=1isotvePA…
  continue reading
 
When Chris Davis sniffed out some strange Web traffic patterns, he peeled back the layers to discover one of the largest botnets ever created. But what was it for? And who is behind this malicious network? Visit https://darknetdiaries.com/episode/94 for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/…
  continue reading
 
#shorts Tensions got high when Pakistan did not give justice to the terrorist attacks that killed 40 Indian soldiers. Indian hackers took to the internet and hacked Pakistan as a form of protest. Listen to the full episode -🎙Darknet Diaries Ep. 51: The Indo-Pak Conflict ... https://www.youtube.com/watch?v=ym-9lozDDlw…
  continue reading
 
*Content Warning* This episode contains descriptions of child abuse, exploitation, and other NSFW language. Kik is a messaging app marketed to teens. 1 in 3 U.S. teenagers use Kik. Yet the company that owns the platform has abandoned it, and it has grown rampant with child predators and illicit content. So who is responsible for cleaning up this me…
  continue reading
 
When does selling spyware become a crime against humanity? "Mercenary Spyware" is a new grade of espionage tools that can track down terrorists *or* facilitate genocide, depending on who's using it. And the people who make it don't care who's buying, as long as they have the cash. In this episode we hear from Crofton Black at Lighthouse Reports who…
  continue reading
 
The Pirate Bay has been the go-to destination for pirated music, movies, and software since 2003, and despite MANY attempts by large companies and governments to destroy it, the site still lives on 20 years later. This is the story of its creators, their often radical views about copyright, and how this strange "Google for torrents" has bounced bac…
  continue reading
 
Amélie Koran, aka webjedi, has defended the networks of the largest governments, non-profits, and companies in the world. But when she spotted something lurking on the computers of the World Bank, a suspicious log quickly turned into a round-the-clock crisis. Visit https://darknetdiaries.com/episode/91/ for a list of sources, full transcripts, and …
  continue reading
 
Jenny Radcliffe is a People Hacker, and became a social engineer before it was cool. She gets paid to break into buildings and test their security. She shares three stories of how she blends in, breaks in, and one time when things went horribly wrong. Visit https://darknetdiaries.com/episode/90/ for a list of sources, full transcripts, and to liste…
  continue reading
 
When federal investigators uncovered a terrorist's phone, even Apple couldn't unlock it. That's when the FBI turned to a darknet marketplace for some shadier (and expensive) tools. Get the full story here: https://www.youtube.com/watch?v=cCojdhIBNeM ... https://www.youtube.com/watch?v=hZqX-WzCqLIOleh Jack Rhysider
  continue reading
 
The threat research team at Cybereason uncovered an interesting piece of malware. Many shrugged it off, but the more they studied and tracked it, the more it pointed to a serious threat actor, targeting Palestinian politicians. Visit https://darknetdiaries.com/episode/89/ for a list of sources, full transcripts, and to listen to all episodes. ... h…
  continue reading
 
*This episode was originally published on March 30, 2021. Some of the details about Twitter's policies and verified accounts is now out of date.* The Guild of the Grumpy Old Hackers hacked Donald Trump's Twitter account back in 2016 with surprising ease. SURELY when he became president, his security was locked down? Well ... Listen to episode 87 he…
  continue reading
 
Changing the parts on your PC and making copies of your software is a long-held tradition. So if game consoles are just tiny computers, shouldn't you be able to modify them? You used to, until lawsuits started favoring game companies instead of players. This is the story of Gary Bowser, a long-time hacker and modder who landed in VERY hot water wit…
  continue reading
 
A breach at LinkedIn and some truly terrible passwords allowed three Belgian guys to take control of Donald Trump's Twitter account in 2016. How they did it, and what they did next, might change how you think about social media. Visit https://darknetdiaries.com/episode/87/ for a list of sources, full transcripts, and to listen to all episodes. ... …
  continue reading
 
In 2012, LinkedIn was the target of a massive data breach. A hacker got in and stole millions of user details. But this wasn't because of weak user passwords or bad security practices. It all came down to one LinkedIn engineer's crucial mistake. Visit https://darknetdiaries.com/episode/86 for a list of sources, full transcripts, and to listen to al…
  continue reading
 
Making fake IDs is an art. But when partnered up with stolen credit cards, the sky's the limit on how much cash you can pull out of a local ATM. Visit https://darknetdiaries.com/episode/85/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=c9CCLfmH9wA…
  continue reading
 
The list of tricks hackers and phishers use to take control of your accounts is endless. There's even a 2nd hand market for compromised passwords, if you know where to look. Watch the full video here: https://www.youtube.com/watch?v=Qm7k1CPFkIc ... https://www.youtube.com/watch?v=Oq3BsVtEbHYOleh Jack Rhysider
  continue reading
 
PRO-TIP: Never post a picture of your boarding pass online. In fact, you probably shouldn't post anything online -- especially if you're the Prime Minister of a country. Visit https://darknetdiaries.com/episode/84/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=ko2duHwO280…
  continue reading
 
Government computer networks across the Caribbean - including critical infrastructure like power plants - were infested with dormant malware, ready to activate when the time was right. Who was behind this massive attack, and how did one threat hunter named Omar figure it out? Visit https://darknetdiaries.com/episode/135 for a list of sources, full …
  continue reading
 
Working on the tech side of the NSA doesn't happen overnight. It requires rigorous training, background checks, and a safe and secret place to let Chinese malware run wild. Visit https://darknetdiaries.com/episode/83 for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=JemCG7y_2kc…
  continue reading
 
CIA operatives in Iran can't just use text messages or email to phone home. So they set up a brilliant little website that looks like one thing, but it actually way more. Get the full story here: https://youtu.be/uh_q02eefFM ... https://www.youtube.com/watch?v=roGUqPs9xj4Oleh Jack Rhysider
  continue reading
 
The Pwn2Own contest challenges the world's greatest hackers to find vulnerabilities in common software, phones, and OSes -- and tech companies pay big bucks for it. Visit https://darknetdiaries.com/episode/82/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=cCojdhIBNeM…
  continue reading
 
The comms used by the CIA to contact assets in foreign countries were compromised in 2009, leading to some truly terrifying consequences. Get the full story here: https://www.youtube.com/watch?v=uh_q02eefFM ... https://www.youtube.com/watch?v=2nJRZIwpXlAOleh Jack Rhysider
  continue reading
 
Join us on The Rhys Show as we delve into the captivating realm of spatial cognition with renowned psychologist Barbara Tversky. In her groundbreaking book "Mind in Motion: How Action Shapes Thought," Barbara challenges conventional wisdom by revealing the profound influence of movement on human cognition. Discover the intricate relationship betwee…
  continue reading
 
"V" became an online drug dealer in high school. His early experiments on the Silk Road became a darknet empire until it all came crashing down. Visit https://darknetdiaries.com/episode/81/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=fsZoJWGDwxI…
  continue reading
 
In this episode, Jennifer Pahlka, a businesswoman and political advisor, joins us to delve into the failures of government in the digital age and how we can drive meaningful change. Her book "Recoding America" provides valuable insights into why government struggles with technology and offers solutions for improvement. Discover the complexities of …
  continue reading
 
What if the guy you just met at the bar has been slowly learning your favorite movies, vacation spots, and mom's phone number by tracking everything you do online. But in the end, his creepy actions are actually about getting you paid ... for turning on your employer. Visit https://darknetdiaries.com/episode/80/ for a list of sources, full transcri…
  continue reading
 
"Psychological Operations" are happening all around us, 24/7. Sometimes they're used in warfare against foreign enemies, and sometimes we know them by different names: Marketing, PR, spin, and propaganda. Get the full episode here: https://www.youtube.com/watch?v=zLWuuV0lBhU ... https://www.youtube.com/watch?v=JOkcz9TiN-c…
  continue reading
 
Join renowned economist Dr. Daron Acemoglu as he explores the intricate relationship between technology, power, and prosperity in this eye-opening episode. Discover why technological progress is not translating into widespread gains, delve into the history of technological advancements, and uncover the potential impact of AI on shared prosperity. G…
  continue reading
 
Deviant Ollam is a physical penetration specialist. That means he’s paid to break into buildings to see if the building is secure or not. He has done this for a long time and has a lot of tricks up his sleeve to get into buidings. In this episode we hear 3 stories of him breaking into buildings for a living. Visit https://darknetdiaries.com/episode…
  continue reading
 
What do you do when you find yourself the target of a massive hacking campaign, and you're getting thousands of phishing emails and someone keeps following you in your car? You might turn to Citizen Lab who has the ability to research who is behind this and help bring the hackers to justice. Visit https://darknetdiaries.com/episode/79/ for a list o…
  continue reading
 
The biggest weakness in the international banking system is human error. These hackers pulled off the largest bank robbery in history with perfect timing and a few keystrokes. Get the full episode here: https://www.youtube.com/watch?v=ttohYNSCkik ... https://www.youtube.com/watch?v=odliDuLX3tIOleh Jack Rhysider
  continue reading
 
Join renowned astrophysicist and bestselling author Avi Loeb as he takes us on a mind-bending journey through the cosmos in this captivating episode. Discover the fascinating possibilities of advanced technology created by distant alien civilizations and its potential impact on our growth as a species. Delve into the Galileo project, an ambitious e…
  continue reading
 
Discover vocabulary related to minimalism, learn new idioms to help make your speech more fluent, and boost your listening comprehension.Become a member: https://englishwithrhys.com/membership-levels/Take the Podcast Course: https://englishwithrhys.com/courses/the-podcast-course/Download the transcript: https://englishwithrhys.com/wp-content/upload…
  continue reading
 
Songs about TCP/IP, phishing attacks, and hacking the government? Finally, some music made for you and me. Welcome to Nerdcore, the unlikely genre that has launched hackers to fame and fortune. Visit https://darknetdiaries.com/episode/78/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=QI5…
  continue reading
 
Ever wonder how Google Maps knows exactly how much traffic is on any road before you're even on it? Their secret weapon is Android phones, and LOTS of them. Watch the full episode here: https://www.youtube.com/watch?v=8BzoEiK6evE ... https://www.youtube.com/watch?v=1w3QWlWtNv8Oleh Jack Rhysider
  continue reading
 
Loading …

Panduan Referensi Cepat