meta_pixel
Tapesearch Logo
Log in
Malicious Life

Human Side Channels

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 3 December 2019

⏱️ 34 minutes

🧾️ Download transcript

Summary

Human Side Channels



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi, I'm Ran Levy.

0:07.0

Welcome to Malicious Life in collaboration with cyber reason.

0:14.0

Quick content warning before we get started,

0:17.0

this episode contains discussion of a grisly murder. How do you catch a hacker who's covered their tracks?

0:40.0

Security experts have all kinds of ways of tracking cyber criminals.

0:47.0

Sometimes it doesn't take much.

0:49.3

If a hacker isn't careful, like Gary McKinnon, whose story we told in an earlier episode of malicious life,

0:56.6

they may leave behind personal data like an IP address or a girlfriend's email address.

1:03.8

Yon Johanson, the teenager behind D.C.S. openly bragged about his role in creating an illegal

1:11.1

software. All anybody had to do to get to him was, well, write an email.

1:17.0

Advanced actors such as nation states are tougher to pin down.

1:25.1

When GitHub was attacked, it was the insight of one independent security professional to use

1:31.3

trace route.

1:32.3

An ancient and somewhat obscure system command that tracks Internet

1:36.8

packets.

1:38.0

When Sonny, Google and the Democratic National Committee were hacked, circumstantial evidence, such as the nature of the attack

1:45.8

and the victims and systems that were targeted, played heavily into attributing those

1:51.6

responsible.

1:53.0

But let's suppose we've got a case where no such clues are available.

2:00.0

We're dealing with a really good hacker.

2:03.2

They've listened to every malicious life episode

2:06.5

and so they know all the pitfalls to avoid.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.