All language subtitles for 7. DDOS Secrets

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,060 --> 00:00:04,020 In this video, we're taking a look at the website distributed denial of secrets. 2 00:00:04,530 --> 00:00:09,820 It can be found at Detour Secrets dot com forward slash wiki for slash distribute. 3 00:00:09,840 --> 00:00:13,740 It underscore denial underscore of underscore secrets. 4 00:00:14,810 --> 00:00:18,450 Now, distributed denial of secrets is actually pretty new to me. 5 00:00:18,470 --> 00:00:21,260 I just recently found out about this in the news. 6 00:00:22,130 --> 00:00:26,060 And essentially what it is is it's a lot like WikiLeaks, where? 7 00:00:27,490 --> 00:00:35,170 They take a lot of information and they provide the public, so according to website, that they don't 8 00:00:35,170 --> 00:00:42,970 have any particular agenda or ideology beyond ensuring that information is available for people. 9 00:00:43,120 --> 00:00:49,810 And apparently the data that they index, according to a site that we can see here is isn't in the public 10 00:00:49,810 --> 00:00:54,670 interest in kind of a prima facie case be made for the veracity of its contents. 11 00:00:56,020 --> 00:01:00,280 Now, if we take a look at the about section of this, we see that the. 12 00:01:01,480 --> 00:01:02,590 The founders were. 13 00:01:04,180 --> 00:01:09,310 Informally worked together for years, deep connection, data gathering, research journalism, activation 14 00:01:09,310 --> 00:01:18,160 technology and whatnot in 2018, and that in as of July 2020, they registered as a non-profit in California. 15 00:01:19,940 --> 00:01:24,140 So again, this is going to be a lot like WikiLeaks is going to have a lot of information that's being 16 00:01:24,140 --> 00:01:26,120 collected and shared to the public. 17 00:01:26,480 --> 00:01:28,760 So this may potentially be. 18 00:01:29,780 --> 00:01:33,320 A good resource for your open source intelligence. 19 00:01:34,720 --> 00:01:37,360 No, the other thing that they decide to do is. 20 00:01:38,650 --> 00:01:43,750 With data breaches, they say, to collect information, it sounds like some of the information was 21 00:01:43,750 --> 00:01:47,170 data breaches where people refuse to pay a ransom for it. 22 00:01:47,780 --> 00:01:55,660 Essentially, hackers gathered information from a company the company refused to pay and the malicious 23 00:01:55,660 --> 00:01:57,250 hackers sought to dump information. 24 00:01:58,000 --> 00:02:01,240 Well, it sounds like distributed denial of secrets collected some of the information. 25 00:02:01,240 --> 00:02:02,230 Now they're providing it. 26 00:02:03,140 --> 00:02:12,020 To the public now, morality wise, that's kind of a gray area again, we're dealing with data breach 27 00:02:12,020 --> 00:02:12,590 leaks. 28 00:02:13,190 --> 00:02:18,740 So some of us do use data breaches to verify information. 29 00:02:18,740 --> 00:02:19,250 So. 30 00:02:20,620 --> 00:02:25,780 And given how the information was collected in tribute it, you do want to make sure that this is going 31 00:02:25,780 --> 00:02:33,730 to be OK, both legally in your area and also for whoever's contracting you to actually do this. 32 00:02:33,730 --> 00:02:38,440 So if you're in a company, you do want to make sure that legally that you are able to use this information. 33 00:02:39,270 --> 00:02:41,790 So you do want to be careful about that. 34 00:02:43,230 --> 00:02:46,200 So to use the system, it's pretty easy. 35 00:02:46,920 --> 00:02:48,310 We're on the main page here. 36 00:02:48,330 --> 00:02:56,000 I'm just going to click on browse all categories here, and we can see it's broken up by different areas 37 00:02:56,010 --> 00:02:56,610 Africa. 38 00:02:56,610 --> 00:03:03,680 We see Asia Banker's Box Brazil, Britain, Iran and you can see the number of our members in here. 39 00:03:03,690 --> 00:03:10,960 So if I click on like, I'm just going to click on Hack here we see subcategories here. 40 00:03:11,130 --> 00:03:16,500 Australia, Queensland, PMK Bob Otto's emails. 41 00:03:18,040 --> 00:03:28,210 We could see in the bulls and and so forth, so if I just click on any of these would say doxing. 42 00:03:29,440 --> 00:03:30,130 Or. 43 00:03:31,120 --> 00:03:32,290 We take a look at. 44 00:03:35,140 --> 00:03:42,610 Click on here we could see over 130000 emails and other files from India Bulls, which operates a financial 45 00:03:42,610 --> 00:03:44,530 real estate, former school sectors. 46 00:03:45,900 --> 00:03:48,910 In approximately 90 percent of the day, it comes from email correspondence. 47 00:03:49,030 --> 00:03:52,330 So it gives us the information that's going to be contained in here. 48 00:03:53,350 --> 00:03:56,190 And if I we could see the country is India. 49 00:03:56,200 --> 00:04:00,940 Source Typekit from a hack, the source is c l zero p. 50 00:04:00,940 --> 00:04:04,840 We could see the files as certain nine point thirty two gigabytes. 51 00:04:05,740 --> 00:04:10,120 And then we have the torrent downloads here, the magnet in the torrent link. 52 00:04:10,120 --> 00:04:15,970 So if I click on that, I open up my C, my my torrent client. 53 00:04:16,150 --> 00:04:19,540 I can start downloading this and start sifting through the information. 54 00:04:19,810 --> 00:04:21,160 So pretty easy to use. 55 00:04:21,160 --> 00:04:27,490 But but again, we are dealing with data breaches, so be careful about that. 56 00:04:28,120 --> 00:04:33,670 Make sure that it's going to be again legal in your area, in your whoever you're doing this for. 57 00:04:34,240 --> 00:04:37,630 So again, this was dealing with secrets. 58 00:04:38,020 --> 00:04:38,920 Thank you for watching. 59 00:04:38,950 --> 00:04:39,910 I'll see you next VIDEO. 5979

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.