All language subtitles for 7. DDOS Secrets

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,060 --> 00:00:04,020 In this video, we're taking a look at the website distributed denial of secrets. 2 00:00:04,530 --> 00:00:09,820 It can be found at Detour Secrets dot com forward slash wiki for slash distribute. 3 00:00:09,840 --> 00:00:13,740 It underscore denial underscore of underscore secrets. 4 00:00:14,810 --> 00:00:18,450 Now, distributed denial of secrets is actually pretty new to me. 5 00:00:18,470 --> 00:00:21,260 I just recently found out about this in the news. 6 00:00:22,130 --> 00:00:26,060 And essentially what it is is it's a lot like WikiLeaks, where? 7 00:00:27,490 --> 00:00:35,170 They take a lot of information and they provide the public, so according to website, that they don't 8 00:00:35,170 --> 00:00:42,970 have any particular agenda or ideology beyond ensuring that information is available for people. 9 00:00:43,120 --> 00:00:49,810 And apparently the data that they index, according to a site that we can see here is isn't in the public 10 00:00:49,810 --> 00:00:54,670 interest in kind of a prima facie case be made for the veracity of its contents. 11 00:00:56,020 --> 00:01:00,280 Now, if we take a look at the about section of this, we see that the. 12 00:01:01,480 --> 00:01:02,590 The founders were. 13 00:01:04,180 --> 00:01:09,310 Informally worked together for years, deep connection, data gathering, research journalism, activation 14 00:01:09,310 --> 00:01:18,160 technology and whatnot in 2018, and that in as of July 2020, they registered as a non-profit in California. 15 00:01:19,940 --> 00:01:24,140 So again, this is going to be a lot like WikiLeaks is going to have a lot of information that's being 16 00:01:24,140 --> 00:01:26,120 collected and shared to the public. 17 00:01:26,480 --> 00:01:28,760 So this may potentially be. 18 00:01:29,780 --> 00:01:33,320 A good resource for your open source intelligence. 19 00:01:34,720 --> 00:01:37,360 No, the other thing that they decide to do is. 20 00:01:38,650 --> 00:01:43,750 With data breaches, they say, to collect information, it sounds like some of the information was 21 00:01:43,750 --> 00:01:47,170 data breaches where people refuse to pay a ransom for it. 22 00:01:47,780 --> 00:01:55,660 Essentially, hackers gathered information from a company the company refused to pay and the malicious 23 00:01:55,660 --> 00:01:57,250 hackers sought to dump information. 24 00:01:58,000 --> 00:02:01,240 Well, it sounds like distributed denial of secrets collected some of the information. 25 00:02:01,240 --> 00:02:02,230 Now they're providing it. 26 00:02:03,140 --> 00:02:12,020 To the public now, morality wise, that's kind of a gray area again, we're dealing with data breach 27 00:02:12,020 --> 00:02:12,590 leaks. 28 00:02:13,190 --> 00:02:18,740 So some of us do use data breaches to verify information. 29 00:02:18,740 --> 00:02:19,250 So. 30 00:02:20,620 --> 00:02:25,780 And given how the information was collected in tribute it, you do want to make sure that this is going 31 00:02:25,780 --> 00:02:33,730 to be OK, both legally in your area and also for whoever's contracting you to actually do this. 32 00:02:33,730 --> 00:02:38,440 So if you're in a company, you do want to make sure that legally that you are able to use this information. 33 00:02:39,270 --> 00:02:41,790 So you do want to be careful about that. 34 00:02:43,230 --> 00:02:46,200 So to use the system, it's pretty easy. 35 00:02:46,920 --> 00:02:48,310 We're on the main page here. 36 00:02:48,330 --> 00:02:56,000 I'm just going to click on browse all categories here, and we can see it's broken up by different areas 37 00:02:56,010 --> 00:02:56,610 Africa. 38 00:02:56,610 --> 00:03:03,680 We see Asia Banker's Box Brazil, Britain, Iran and you can see the number of our members in here. 39 00:03:03,690 --> 00:03:10,960 So if I click on like, I'm just going to click on Hack here we see subcategories here. 40 00:03:11,130 --> 00:03:16,500 Australia, Queensland, PMK Bob Otto's emails. 41 00:03:18,040 --> 00:03:28,210 We could see in the bulls and and so forth, so if I just click on any of these would say doxing. 42 00:03:29,440 --> 00:03:30,130 Or. 43 00:03:31,120 --> 00:03:32,290 We take a look at. 44 00:03:35,140 --> 00:03:42,610 Click on here we could see over 130000 emails and other files from India Bulls, which operates a financial 45 00:03:42,610 --> 00:03:44,530 real estate, former school sectors. 46 00:03:45,900 --> 00:03:48,910 In approximately 90 percent of the day, it comes from email correspondence. 47 00:03:49,030 --> 00:03:52,330 So it gives us the information that's going to be contained in here. 48 00:03:53,350 --> 00:03:56,190 And if I we could see the country is India. 49 00:03:56,200 --> 00:04:00,940 Source Typekit from a hack, the source is c l zero p. 50 00:04:00,940 --> 00:04:04,840 We could see the files as certain nine point thirty two gigabytes. 51 00:04:05,740 --> 00:04:10,120 And then we have the torrent downloads here, the magnet in the torrent link. 52 00:04:10,120 --> 00:04:15,970 So if I click on that, I open up my C, my my torrent client. 53 00:04:16,150 --> 00:04:19,540 I can start downloading this and start sifting through the information. 54 00:04:19,810 --> 00:04:21,160 So pretty easy to use. 55 00:04:21,160 --> 00:04:27,490 But but again, we are dealing with data breaches, so be careful about that. 56 00:04:28,120 --> 00:04:33,670 Make sure that it's going to be again legal in your area, in your whoever you're doing this for. 57 00:04:34,240 --> 00:04:37,630 So again, this was dealing with secrets. 58 00:04:38,020 --> 00:04:38,920 Thank you for watching. 59 00:04:38,950 --> 00:04:39,910 I'll see you next VIDEO. 5979

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.