Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,060 --> 00:00:04,020
In this video, we're taking a look at the website distributed denial of secrets.
2
00:00:04,530 --> 00:00:09,820
It can be found at Detour Secrets dot com forward slash wiki for slash distribute.
3
00:00:09,840 --> 00:00:13,740
It underscore denial underscore of underscore secrets.
4
00:00:14,810 --> 00:00:18,450
Now, distributed denial of secrets is actually pretty new to me.
5
00:00:18,470 --> 00:00:21,260
I just recently found out about this in the news.
6
00:00:22,130 --> 00:00:26,060
And essentially what it is is it's a lot like WikiLeaks, where?
7
00:00:27,490 --> 00:00:35,170
They take a lot of information and they provide the public, so according to website, that they don't
8
00:00:35,170 --> 00:00:42,970
have any particular agenda or ideology beyond ensuring that information is available for people.
9
00:00:43,120 --> 00:00:49,810
And apparently the data that they index, according to a site that we can see here is isn't in the public
10
00:00:49,810 --> 00:00:54,670
interest in kind of a prima facie case be made for the veracity of its contents.
11
00:00:56,020 --> 00:01:00,280
Now, if we take a look at the about section of this, we see that the.
12
00:01:01,480 --> 00:01:02,590
The founders were.
13
00:01:04,180 --> 00:01:09,310
Informally worked together for years, deep connection, data gathering, research journalism, activation
14
00:01:09,310 --> 00:01:18,160
technology and whatnot in 2018, and that in as of July 2020, they registered as a non-profit in California.
15
00:01:19,940 --> 00:01:24,140
So again, this is going to be a lot like WikiLeaks is going to have a lot of information that's being
16
00:01:24,140 --> 00:01:26,120
collected and shared to the public.
17
00:01:26,480 --> 00:01:28,760
So this may potentially be.
18
00:01:29,780 --> 00:01:33,320
A good resource for your open source intelligence.
19
00:01:34,720 --> 00:01:37,360
No, the other thing that they decide to do is.
20
00:01:38,650 --> 00:01:43,750
With data breaches, they say, to collect information, it sounds like some of the information was
21
00:01:43,750 --> 00:01:47,170
data breaches where people refuse to pay a ransom for it.
22
00:01:47,780 --> 00:01:55,660
Essentially, hackers gathered information from a company the company refused to pay and the malicious
23
00:01:55,660 --> 00:01:57,250
hackers sought to dump information.
24
00:01:58,000 --> 00:02:01,240
Well, it sounds like distributed denial of secrets collected some of the information.
25
00:02:01,240 --> 00:02:02,230
Now they're providing it.
26
00:02:03,140 --> 00:02:12,020
To the public now, morality wise, that's kind of a gray area again, we're dealing with data breach
27
00:02:12,020 --> 00:02:12,590
leaks.
28
00:02:13,190 --> 00:02:18,740
So some of us do use data breaches to verify information.
29
00:02:18,740 --> 00:02:19,250
So.
30
00:02:20,620 --> 00:02:25,780
And given how the information was collected in tribute it, you do want to make sure that this is going
31
00:02:25,780 --> 00:02:33,730
to be OK, both legally in your area and also for whoever's contracting you to actually do this.
32
00:02:33,730 --> 00:02:38,440
So if you're in a company, you do want to make sure that legally that you are able to use this information.
33
00:02:39,270 --> 00:02:41,790
So you do want to be careful about that.
34
00:02:43,230 --> 00:02:46,200
So to use the system, it's pretty easy.
35
00:02:46,920 --> 00:02:48,310
We're on the main page here.
36
00:02:48,330 --> 00:02:56,000
I'm just going to click on browse all categories here, and we can see it's broken up by different areas
37
00:02:56,010 --> 00:02:56,610
Africa.
38
00:02:56,610 --> 00:03:03,680
We see Asia Banker's Box Brazil, Britain, Iran and you can see the number of our members in here.
39
00:03:03,690 --> 00:03:10,960
So if I click on like, I'm just going to click on Hack here we see subcategories here.
40
00:03:11,130 --> 00:03:16,500
Australia, Queensland, PMK Bob Otto's emails.
41
00:03:18,040 --> 00:03:28,210
We could see in the bulls and and so forth, so if I just click on any of these would say doxing.
42
00:03:29,440 --> 00:03:30,130
Or.
43
00:03:31,120 --> 00:03:32,290
We take a look at.
44
00:03:35,140 --> 00:03:42,610
Click on here we could see over 130000 emails and other files from India Bulls, which operates a financial
45
00:03:42,610 --> 00:03:44,530
real estate, former school sectors.
46
00:03:45,900 --> 00:03:48,910
In approximately 90 percent of the day, it comes from email correspondence.
47
00:03:49,030 --> 00:03:52,330
So it gives us the information that's going to be contained in here.
48
00:03:53,350 --> 00:03:56,190
And if I we could see the country is India.
49
00:03:56,200 --> 00:04:00,940
Source Typekit from a hack, the source is c l zero p.
50
00:04:00,940 --> 00:04:04,840
We could see the files as certain nine point thirty two gigabytes.
51
00:04:05,740 --> 00:04:10,120
And then we have the torrent downloads here, the magnet in the torrent link.
52
00:04:10,120 --> 00:04:15,970
So if I click on that, I open up my C, my my torrent client.
53
00:04:16,150 --> 00:04:19,540
I can start downloading this and start sifting through the information.
54
00:04:19,810 --> 00:04:21,160
So pretty easy to use.
55
00:04:21,160 --> 00:04:27,490
But but again, we are dealing with data breaches, so be careful about that.
56
00:04:28,120 --> 00:04:33,670
Make sure that it's going to be again legal in your area, in your whoever you're doing this for.
57
00:04:34,240 --> 00:04:37,630
So again, this was dealing with secrets.
58
00:04:38,020 --> 00:04:38,920
Thank you for watching.
59
00:04:38,950 --> 00:04:39,910
I'll see you next VIDEO.
5979
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.