Thank you. I was in a club.
She know I'm coming steady.
If you want, you can have it.
So, she don't know the classes.
I see a body 101. I see a body one-on-one.
Get to the crib, make you come.
This is sweet car, you my honey bun.
I know your nigga was a bum.
Fuckin' in Cardi, had some fun.
Girl, I'm the king of my city, I'm the one.
So you can have me, you really wanna win.
How you so nasty, you really wanna win.
How you so fresh, you really wanna win. I was in a club, but I was in a club, Had liquor in my cup. Yeah, passion in my cup.
See her off, I'ma hit him up.
Yeah, he gonna be a victim.
I was trying to dance with the bitch.
Couldn't keep my hands off of you.
Now she spent some bands on the fence.
Now I tell you that she really wanna work.
Oh yeah, she advanced with the shit.
And I got a chance with the bitch.
Love a boy romance with the bitch.
Couldn't even put my mans on the bitch.
Like damn. Romance with a bitch put me for my man's on a bitch like damn Yo, what is up everybody?
We got a good space for you today.
We're going to be talking OpSec with my friend Mike.
Bro, appreciate you pulling up, by the way.
We're going to get started pretty soon.
We're going to play like one, two more songs and, you know, talk crypto.
He was not full. He said it coming. I said go, hey, you coming. Let's get it Because she got green because he didn't come to Michael's space to learn about opsec
21 minutes until I got guns on the light, until I got a Saturday.
Yo, for real, just imagine not being here as I'm about to drop 100 fucking Bitcoin in value.
That's fucking crazy work.
Insane. If you give a fuck about your bags hit that box at the bottom right like and repost the room partners right under my nose these niggas mad cause I got all the doubt these niggas mad cause I got all the doubt
charging my stock cause I got every stock
got every girl ain't no top of my hole
I understand that it's your girlfriend bro
but you know I got a kid for phone
so don't be alone when I can't be great
living life on a head don't a type of
my eyes so clean I might start moving
got a bucatti like ketchup bubble
pay at your curling you already know
don't really like who we're friends with the most
I'm in the truck, got an eye on my camera
Don't even come, got the bread in your throat
If you stop touching my gun, got no hoes
I put a coat on the top of my coat
Only 20 minutes before the show
I met that girl and I found my show
Never met in the crowd on the floor
I don't tell them I'm a son of a fool
I told her, baby, we don't get that wrong
Listen, this is my my city, though But I'm treated like. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl.
I'm a girl. I'm a girl. I'm a girl. I'm a girl. I'm a girl. Oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, oh, I All right, everybody we're gonna get started in just a second I'm gonna play like one more quick song and
We're gonna have a pretty good conversation today, man. I'm pretty excited for this
And everybody that misses it bro rest in rest in peace, because Mike is cracked.
And all of you need to learn about OPSEC.
Bro, everybody's getting drained.
Bro, I've only been on Solana for like a year and a half,
and I've been drained like twice already, bro.
So hopefully this helps me not get drained again.
Yo, chill, Vo, chill, chill, chill, chill, chill, chill.
I can retweet the room, though. I can retweet the room.
I can retweet the room though Like every truth the room
I was gonna clown me for getting drained, bro. It's not my fault. I was new. It's not my fault. It's not my fault It's not my fault. One more song. It was cuz you never attended a fucking Michael case space
That's why you're getting drained. I've been so nice because like you guys heard what comes out of my mouth
I'm not all there sometimes. You know what I mean?
But I've never been dreamed because the first thing i did was i listened to michael k real real and this was at wallet guard like this you know this is og times
you know what i mean and wall guard evolved so real bro hey like and retweet the room we're gonna
we're gonna get started in just a second bro i got some yachty for you i got some yachty for bro if
you've been drained before i need you throw up a hundred or something
I've seen a lot of it on the timeline some stuff up top
Bro, one of my one of my friends Princess Hype Hill got drained propose never gotten drained. That's crazy
Still you can get drained by so many different things. All right. All right. All right. All right. All right. All right.
Why can we do it the room? It's for fucking bitches and toes. If it's not fucking the fumes. I need to get a blaze. Bring to my stage.
How about it pop out to fade?
How about I break out the cage?
I squirt from behind the shades.
It's our first friend to see late.
How about it pop out the cage?
How about it's not too late?
How about it pop out to fade?
That's got me. I'm from Francisco to Biscuit, nasty. How about it? I'm from Rappargo, grass. Thank you. How about it's not too fade, how about Christmas days? How about the color, you straight to the blaze? How about it all rise in graves?
How about it looks like days?
I can say all you get me.
How about the bitch in a blender? How about? can buy the city. How about, how about, how about, how about,
how about, blend, blend, blend, blend, blend, blend,
blend, blend, blend, blend,
blend, blend, blend, blend, blend, blend,
blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend, blend all right all right all right we're gonna get started here we're gonna get started we got a
pretty good show for you today i'm gonna start by welcoming everybody up here. Yo, curl, my guy, how you feeling?
How we feeling, man? Bro, we're feeling great. You know, just more of the same as usual,
just trolling people on the timeline, doing stuff IRL to try and get that shit sorted out
so I can quit my job job even though it is my own
business i want to quit real and and do something else that's like more tech heavy fucking tired of
plants man bro curl curl is one of the hardest working people that i've met on ct like he just
like curl doesn't need to work he really could just chill forever but he bro
curl you're low-key inspiring bro no glitch no glitch no glitch no glitch no bro i'm i'm about
to go back to as head of product at uh sassy labs bro because like really i need shit to yeah bro i
need i need to cook bro i need stuff to do i i've i've had a couple other interviews. They went well or whatever.
It's just, like, philosophically, I just don't align with the businesses.
Like, yo, I love a good Ponzi.
I just can't sell people a Ponzi.
Do you want to give, like, a little bit of blurb about what Sassy Labs is for people who don't know?
I'm people that don't know.
Oh, Sassy Labs is just people who don't know i'm people that don't know oh sassy
labs is just a software company that uh makes software that's that's all we do that was like
extremely vague and scary we're a software company that makes software you know i could tell you on
the back channels like what we're working on bro but like it's not public information and it's like, you know.
Oh, but I can tell you what we've worked on in the past, like Pudgy IP marketplace, Ugo's made by apes.
There's also DocuSign if you need a document.
Yeah, there's a Web3 DocuSign and then there's a Web3 on-chain NDA agreement.
You still have to get it notarized or whatever, right?
I'm definitely DMing you about this after the space.
I want to go to Airby, then I want to go to Vo,
because Vo had her hand up.
How are the coins that you don't own doing?
I know nothing about any coins you're talking about, mate.
I have zero dollars in crypto, mate.
But yeah, I think everything's going well, right, Mary?
Oh, man, everything's going great. Me personally,
I'm chilling. I'm chilling.
Seoul is, last I checked, was like
186 now, down pretty significantly from
You know, there probably is
Everything goes up when it goes up
It goes down when it goes down
Conviction, bro, conviction
That's how I'm feeling right now
Everybody's panicking on the timeline
I think just take a deep breath
Go outside, touch some grass
I'm ready for Among Us after this space.
I'll let you run for tune-off course today.
Yo, this is actually a growing issue
all right we were actually about to have like a banger space we're about to talk to michael
uh from metamask about operational security and how not to get drained because everybody's
getting drained everyone is getting drained bro everyone everyone's getting drained except both hey mary mary i was i was
writing threads on how to not get drained before you even knew what crypto was okay oh holy flex
holy ora holy shit not not even a flex i'm just i'm just saying i've i've been putting tweets out
like that for a while i'm glad michael's here to talk about it you can you can talk about it too
oh you can join us in the conversation and then you know what
i will play among us today mary fun fact i was uh i was sim swapped last year what yep you were
sim swapped how does that how does that happen how does that happen to people twitter so twitter
leaked the data of which accounts had a phone number tied to them um and this was like and now it's like publicly like that this happens um so i went in and i like changed my phone number
there were a few people that were getting hacked i know franklin and like a couple other big people
were getting hacked i was actually dealing back and forth with zach xpt about it um and there
were a few other people of like you know 100k ish to like 500k follower size um and it was all like
twitter related stuff which i guess is better than your wallet but um i had changed my password and
taken off my 2fa to be my phone number it was like a it's either a yubi key or a app now which is
what everyone should be using not your phone number um or even like a google phone number
but yeah if i hadn't done that my twitter would have been toast they hacked my twitch though
uh which i hadn't used in years and it was all like gamers that don't know what the fuck crypto
is so they like broadcasted a fake magic eden website that was just a drainer um yeah absolutely
terrifying and i knew it was happening i was at It was like, they always do it on a weekend or holidays. So like the phones, the phone carriers are like not open. It started like ahead of the conversation. But yeah, it was like super scary. I knew it was happening. I was getting spam texts. I still get spam texts every single day from like random numbers of like absolute gibberish, like a year and a half later.
absolute gibberish like a year and a half later um but yeah it's really scary my phone went to sos
i was like okay great like i'm getting sim swapped because everyone is getting sim swapped but
yeah it's it's really scary it's like a crazy invasion of privacy because they they were like
trying to get everything right they were trying to get my robin out they were trying to get my
coinbase they were yeah it's it's really scary i'm glad i've never been swim sim swapped uh knock on wood there holy shit bro we got
we got dk i want to say hi to dk and then i want to kind of get into the conversation
how are you doing bro i'm good man dk have you ever been sim swapped i'm about bro i'm about
to break the tetris world record bro i've been playing for like four hours what tetris you're
about to break the tetris world records yeah i'm
at like two million score right now i've been playing for like two hours or something what's
the world record i don't know like 16 millions oh you might have a few days left to play yeah
definitely holy shit all right i'm to leave you to that, man.
I want to know if you break that record.
I'm going to keep you updated.
Anyway, Michael, thanks for coming up here, man.
I'm looking forward to having an interesting conversation
surrounding everything that's going on with how people are getting drained,
how to avoid it, what good OPSEC should look like,
you know, all those things. I want to get into it. I also want to talk about your background. So
if you want to give a quick introduction, man. Yeah, definitely. First off, appreciate you for
having me on the stage. You know, shout out to Vo, Kuro, everybody that's up here. Really
appreciate you guys. My name is Michael Kay. I'm the senior manager at
Consensus on the BD team, and I'm on the product safety team at Metamask. And I come from the
wallet guard acquisition from about a year ago. So about two and a half years ago, I moved into
a hacker house with five other DGENs, and we built an app that stopped wallet drainers.
And within a year, Metamask acquired us, and now we all work for the largest wallet company.
So it's just been a crazy ride.
And I think that staying secure is just an afterthought.
We're expecting the masses to come in
and to be their own banks
when the masses don't even understand
how to manage their own passwords
and how to not get socially engineered or scammed.
The one thing that I wanna say is that all the people
that are getting completely wrecked and drained on the timeline, 99% of the time, it's not even a wallet drainer.
It's something that existed before crypto. It's malware. It's a Trojan. It's social engineering.
It's a phishing scam. These are all things that existed before crypto existed, but they affect
your crypto assets. So one of the things that I always stress and recommend is to web two before you web
three, you want to lock down your web two, so that you don't have to deal with web three threats.
Because again, a lot of people coming in, they have this web two mentality. And it's unfortunate
because in web two, you're not going to back up the files on your laptop until you lose all your
files. And just like in web three, you're not going to care about getting drained until you
get completely fucking wrecked. So human nature is to not care until it's too late. But hopefully, one tip that I drop in this space could actually save somebody. And if you haven't done so already, you better hit that box at the bottom right, like and repost the room because we're going to be dropping unlimited alpha, unlimited value and knowledge. And I think that's one of the most important things.
and knowledge. And I think that's one of the most important things.
Amazing. Amazing. Amazing. Amazing. Man. Oh,
I'm just let you take it away here. I definitely have a bunch of questions.
I definitely want to hear about, I think first,
I think one of the biggest things that social engineering has been happening a
lot. One of my friends literally just got drained doing this.
Like there's this guy that's dming people
i'll just let you run this guy dming people he's offering them like a soul or two soul to help
teach them how to get into crypto he'll get you on telegram or get you on discord
help you share your screen and share like you on axiom and through that he'll like instantly drain you so could you break down kind of how that works and
what that is yeah for sure and i actually pinned up a post just now about something that's directly
related to this it's giving the ability for people to remotely control your device and it's so easily
avoidable it's insane so if you take a look at that pin post new zoom scam tactic a lot
of people get invitations into fake interviews fake video game invitations um you know fake
training sessions or they want to learn about your project or they want to you know put you in their
publication whatever the case is this applies for both web 2 and web 3 everything that i'm going to
talk about is not just for crypto it's for your
regular life this is that you should be talking about or sharing with your friends and family
members so that they don't get completely scammed or wrecked so this is the new zoom scam tactic
it's actually been around for a while at this point but it's also the same tactic that's used
on discord calls and i'm pretty much tell pretty much anything that you could share your screen on
so essentially what they do in the zoom call situation is they get somebody on the call that sets their display name to be called zoom.
And then they ask you to share your screen, to share your project or whatever, or to help you with, you know, trading or whatever the case is.
And the second that you hit share your screen, they send a request that asks you if you want to allow them to remotely control
your device. Now, this is the most important part, reading. Nobody reads anything that's in front of
their screen, bro. It's really sad. It's something that we learned in elementary school, how to read,
and nobody reads anything. People are hitting accept, allow, agree, continue, next on anything that pops up on any device that they're using.
That mentality in Web3 gets you completely fucking wrecked.
So if you take a look at that screen, you'll see that it says Zoom is requesting.
So most people would read the first three words and they would say, oh, Zoom's just, you know, trying to, I'm trying to share my screen.
So I'm going to let it share my screen.
But what you're really approving is a request for that person to remotely connect to your device.
And once they remotely connect to your device, they dump a payload, a script that automatically executes and steals all of your browser cookies.
Is that a remote access Trojan?
Yeah, it's a remote access Trojan.
Essentially what they're doing is they're stealing all of your browser cookies so they could sign into all your accounts without knowing your
usernames and passwords. They're stealing all of your wallet extension data, which you could just
copy over to a fresh browsing session and open up immediately. They're doing a data dump on anything
else that's a credential store or your Apple keychain. Pretty much anything that has sensitive
information within a few seconds, they're able to steal from you. So think about this, just because you hit approve on a
request for someone trying to connect remotely to your device, you get completely wrecked because
you didn't take two seconds to read what's in front of you. Now it's completely avoidable.
This is the crazy part. It's avoidable and people just don't do it. Can you guys still hear me?
easy part it's avoidable and and people just don't do it can you guys still hear me or am i getting
right okay so so the second part of that post tells you exactly what to do to turn off the
ability for people to be able to remotely connect to your computer think about this why would you
ever want even someone have the option to remotely connect to your device so it's a simple setting
change and it and i outlined it outlined it in the second part of
that post. You go into your Zoom global settings, and you can completely disable the ability for
people to remotely request controlling your computer. So unfortunately, even the people
that are listening on this stage, and this is a recorded space, and people are going to listen to
this later on, you're not going to go take the two seconds to turn off that setting. You're going to be sitting there as an open door waiting for
someone to completely wreck you. This is just human nature. And I'm being as straightforward
as I can. I've said the same things for the past five years in this space. And every single time
people like throw up the emojis, they like the post, they repost it. And then they end up DMing
me after they get completely fucking wrecked, asking for help and saying, yo, I should have listened to you.
This is your chance to listen to me.
This is your chance to take the two seconds to actually employ what I'm talking about.
And in this case, it's just a simple setting change.
So yes, people are getting on Discord calls.
They're getting on Zoom calls.
They're getting on Google Me calls, Telegram calls.
And they're literally letting people just remotely control their device because they're not reading what they're clicking
And it's completely avoidable.
Hey, Mike, I have a question for Mike.
Yo, Mike, how many different types of ways can you get hacked?
Cause I've seen, obviously there's that there's bookmark drainers, there's, uh, extensions.
Oh, there's everything, bro.
There's malware, there's extensions. What else? Oh, there's everything, bro. There's malware, there's malicious extensions. You know, obviously remote calls where people request your device
control. There's Trojans where people have remote access to your device at all times. They could be
squatting on your device and you don't even know that they're watching everything you're doing on
a daily basis and they're waiting for the right time to actually attack you so there's there's so many different scans but the ultimate win and this is something that i've preached non-stop is to simply
employ device segregation a lot of people use the same computer to do their work and their personal
shit and their gaming and managing their crypto assets you are your own bank at this point banks
have multiple layers of security and you're out here raw dog in the blockchain using a single
device for everything that you do every day so think about this if you have a separate device
for your crypto and it's in a completely segregated environment that you don't have any other accounts
on there that device is is literally for one purpose.
Then even if you do get on a call with a scammer,
even if you do give somebody remote control
even if you do install malware
or fake video game invitation,
you're not getting your entire crypto portfolio wrecked
because it has nothing to do with the device
that you're actively using.
It is the easiest win in the space
device segregation or even wallet segregation stop keeping all of your stuff in one wallet
don't keep all of your assets in one basket when you leak your seed phrase your private key or you
get these you know malicious threats on your computer and they actually extract that data
you're making it easy for them to take everything in one shot so it's free to spin up another wallet and make sure that you keep your assets
and your devices segregated because if people did that i mean we wouldn't be seeing what we're
seeing today and i'm actually happy that mass adoption didn't happen quickly because obviously
nobody listens but imagine there were 10 times the amount of people here getting wrecked, like they're getting wrecked right now. That would be
detrimental to the bottom line. That would be detrimental to people's wallets because people
don't talk about security until after people get wrecked. It's an afterthought. Security is an
afterthought. I'm sure the last thing that anyone on this stage or anybody in this space wants to
deal with is onboarding your friend or family member into crypto and then getting a phone call or a text message where
they're telling you, yo, I lost everything. What happened? So this is your opportunity
to at least mention security at some level so that you don't have pure negligence so that you're not
just telling them about a hundred X and thousand X. How do you keep your gains? How do you make
sure that scammers that don't give a fuck that they're taking your last hardened dollar don't actually ever get access to it
it's an easy win and it's simple though i'm sorry i see you have your hand up
no it's all good i yeah i appreciate it um yeah after i got i mean i've always tried to practice
really good opsec and i still got sim swapped by an external force as well so like at the end of
the day you can do everything to protect yourself and if someone really wants to fuck with you like they will which is really
awful but you can you know it's like you can lock your doors at night but if someone really wants
to break in they're gonna break in um there's also a few other ones i don't i don't think you
mentioned like downloading pdfs like a lot of the time like at magic eden we'd be sent pdfs or docs
or slideshows or whatever kind of documents.
And, you know, to open them, we have to download them.
We, yeah, there's like a lot of processes around this to check if they're okay first,
because that's super easy to get drained that way.
Same thing when we were playtesting games, when we had like a pretty big gaming team at Magic Eden.
We'd have to download these like test lights and you know these like random websites
and stuff like that and a lot of those were just all of them are fine but you know people do get
drained from that. Some of my friends have gotten drained from that like downloading a bad extension
or a bad game and it's really scary because a lot of these accounts look legitimate or there's even
one where I think it was like the New York Post like the actual New York Post account was like hacked or something.
Just the DMs were hacked or delegated or whatever it was.
And they were DMing basically every KOL and crypto and anyone adjacent to them to like get an interview, get a podcast.
And it was the actual account, like the actual account was DMing people.
It was just a bad actor on the account, which is like, you know, how can you prevent that?
Right. It's like you read the email or the message and it looks pretty legitimate, like nothing looks off of it
either. Yeah, 1000%. A lot of great points, Vo, but all completely still avoidable. And I'm going
to explain to you how. So every in every single one of those scenarios, you were doing something
on the same device that you manage your crypto on. Not you specifically, but in all these scenarios that we see people getting wrecked,
they're opening that PDF on the same computer that they manage their crypto.
They're downloading that fake video game or getting a DM from the New York Times account
and installing whatever they're sending over on the same device that they're doing everything else.
So device segregation goes such a long way.
You could go and buy $150 Chromebook
and that's your segregated device. And it's not tied to your daily activities. It's a completely
different environment for you to be able to do what you need to do without having to worry about
clicking on the wrong link or installing the wrong thing. Now, Vo, I think something that's
super important that you mentioned was SIM swapping. Yes, at the end of the day, you don't
own your own phone number.
The phone company owns your phone number. And it doesn't take a lot of effort for someone that
wants to get into your shit to call up your phone provider and socially engineer some idiot that's
working there into thinking that they are you. And once they have access to your phone number,
you probably have your phone number tied to your Twitter account, to your Apple ID, your iCloud, your Gmail.
Guess what they're able to do?
They're able to use the phone number as a recovery method
without needing your two factor information or your password,
and they can get into your shit.
So the easiest win when it comes to SIM swapping, yes, at the end of the day,
you can get SIM swap no matter what, because again, you don't own your phone number.
But once they actually have access to your phone number, is your phone number actually tied to any of your accounts?
So the easiest win is to remove it from your Twitter, remove it from your Google account,
remove it from your Apple ID. I'm not saying remove your iMessage capabilities. I'm saying
just remove the ability for people to recover your account using your phone number, because you
should use something else like your email. You own your own email. You don't own your own phone number. So there are
always ways around everything. But to be clear, you could do all this stuff. You could have all
the security in the planet. If someone really wants to get into your stuff and you're not
vigilant or cognizant of what's happening, nothing's 100% secure at the end of the day.
If anybody that's talking to you about security says like, this is the 100%, it's just not true.
So you still got to stay cognizant.
You still got to stay aware.
But if you employ all these different tips,
you are as close to 100% secure as you could possibly get.
And that's 99% ahead of everybody else in the space,
especially the people that are getting wrecked on the timeline.
Deca, you got your hand up yeah so i was gonna talk about the there's this scan that's going on
where you access try access to website that interdicts you like to a different website than
that does like cloud fair and it has you like open um what's that thing when you click on the
script yeah where you copy paste the code yeah exactly yeah yeah so that's that thing when you click on the script? Yeah, where you copy paste the code? Yeah, yeah, yeah, so
That's that's also another one
Basically what they try to do is they tell you hey in order to access this website
Open your terminal or open your run window and just paste this code in so we could give you access that that
Code that they're pasting is the same code that the people that are remotely controlling your computer are using
It just grabs all the information that's sensitive on your computer and sends it directly to them.
Now, again, if you were on a computer that doesn't have your crypto assets because you keep a segregated device,
even if you did do that, your crypto wouldn't be affected because it's just affecting what's on the computer that you're actually using.
The other part to this is that 99% of the time,
it's like malware that's easily detectable by an antivirus, except nobody uses an antivirus.
People just assume the computer that they have is already secure. The smartphone they have is
already secure. Apple devices are already secure. We have seen time and time again that that's not
true. We saw it over this past weekend with the zero day that was able to basically give scammers
access to your device by a picture being sent to you.
You don't even have to open anything.
So if it's connected to the Internet, there's most likely a way for it to be compromised.
But there's ways to also prevent being compromised using tools like what I just posted to the to the top ultimate web security tools.
These are tools that I myself as a cybersecurity specialist use. And guess what? A lot of these tools actually answer a few of the things that
were already mentioned on this space. I'm just going to quickly mention some. So none of these
tools require you to connect, create an account. None of the tools require you to connect your
wallet. They're all completely free and you don't have to install anything. Starting from the top
virus total. If somebody sends you a file or gives you
an attachment or gives you a link to go download something, instead of opening it up on your
computer and just hoping for the best, you can actually drop it into virus total and it checks
it against over 60 antiviruses to make sure that it's 100% clean before you decide to open it on
your computer. Think about how many scenarios and scams I could have prevented for people that are installing these fake video games or these fake Zoom calls.
Like, just drop the file in VirusTotal, and it'll tell you if it's legit.
The next one, unshorten it.
A lot of scammers, they send you a link that ends up redirecting you to somewhere else.
It looks like it's going to Facebook or X or whatever,
but then it ends up taking you to a fake Facebook a fake X
So on short and it lets you drop any link into it and it reveals the final destination of the link
So, you know actually where it's going if it's claiming to go somewhere else
I mean that's alpha that's huge and the third one I'll mention and you guys again could check out all the tools
They're all free is browser link browser link is like a virtual machine that's running
inside of a browser window. So you can go to websites, you can go and download stuff and
check stuff out without doing it locally on your device. It does it in a browser window. So it's in
its own segregated environment. So if it is malicious, you could tell it's not real just
by using browser link to spin it up. So, I mean, these are simple tools and if just people
knew about them or they bookmarked that thread and anytime some weird situation or weird DM or
weird download got sent to them, you would be completely fucking fine because you would know
exactly what the true story behind the link or the download or whatever it is that they're sending
you. And I know there's a couple of hands up. So, um, DK and then root yeah so everybody says iphones are safe bro but
i don't think they really are so is there any ways like to be actually safe on apple devices
yeah for sure so uh another thread that i threw up at the top it's somewhere in the middle it's
called um let me just grab it real quick here i'll post it again because there's like a lot
of threads now um but on your iphone there are multiple things you could do to lock it down
when it comes to security.
The first thing is stop avoiding doing updates.
They release updates for a reason.
A lot of times people hit later
or do like skip the update or whatever the case is.
The reason why they release those updates
is to patch security holes,
just like the one that we saw over the past weekend.
So you want to make sure that you never skip updates
from your Android phone, from your Windows computer,
from your Apple computer, from your iPhone.
Updates are super important.
The next thing is you wanna make sure
you're using a real privacy preserving VPN.
A VPN randomizes your public IP address
because on a daily basis in your home wifi
or your work wifi, for example, your IP, your public IP never changes.
But every single website that you visit, everything that you do online logs your IP address.
And if there's someone that's malicious that's trying to get into your shit, they could send you a link, grab your public IP.
And now they're able to basically ping your router over and over to look for an exploit on your network because you probably didn't update your router firmware.
You know, this is going a little deeper and more technical, but the concept is, is that do
your updates, use a VPN so that you preserve your IP address and also use a real antivirus like
Malwarebytes. So I mentioned the VPN, it's called Molvad, and I mentioned the antivirus, it's called
Malwarebytes, and it's made for Android, it's made for iPhone, it's made for Mac, it's made for Windows.
And basically what it does is that's active detection.
It's constantly running and just making sure that everything's 100%,
that you're not going to hit a phishing link,
that you're not going to hit some scammer site that's been reported.
And the unfortunate thing is people say, well, Apple don't get viruses,
Then why is it that half the people that are getting drained and wrecked and scammed are using Apple computers?
This is not rocket science.
This is straightforward alpha on what to do, how to set your shit up so you don't deal with these types of situations.
Just because you have a Mac doesn't mean you're impenetrable.
Just because you got a Windows that came with a free trial of whatever doesn't mean you can't get viruses.
You still have to employ some level of security and I'm telling you exactly what to do in a single thread with direct links
On what to use all in one place in layman terms. I can't make it any easier
Michael another question. So why does like for example Firefox I know that there is like a fake as
Like Meta mask copies in the fucking
App Store itself so a lot of people that I also know got drained because of it
and they clicked it because it looks very legit it has like a 10k reviews and
it's it's legit people install it they get drained because it's not the real
one it's not the fake one because they overlooked it at that situation.
How does companies like Firefox treat that in that way, if I may ask?
Yeah, so that's a good question.
So we've been in contact with the Mozilla Foundation
regarding their malicious extensions that they keep letting people put up.
We also work directly with Chain Patrol that specializes in branding protection.
Big shout out to Chain Patrol because they help with all these fake takedowns and scam websites that get spun
up. The ultimate win is going to the source.
And I'm going to explain how exactly this works right now.
If you do a Google search for install Meta mask,
install Phantom or whatever you're looking for,
most likely the results that you're going to get at the top are fake sponsored ads that don't actually take you to where you're looking to go. And that ends
up scamming people a lot, especially when you search for things that are crypto related. Most
of the time, those ads that are coming up are going to lead you to malware or wallet drainer.
So it's important to not only have your security set up the right way, but also understand what
you're interacting with. This goes back to the first point
about reading what's in front of you.
So a lot of people that were landing
on those fake MetaMask installs,
we actually tracked all those pages
as we were submitting them to Mozilla Foundation.
And some of them had like 34 downloads.
Some of them had broken English in the description.
And you could clearly tell that it wasn't real but most
people again don't read what's in front of them they rush and if they had something as far as a
simple layer of security on that device maybe it could have caught it if it was malware maybe it
could have caught it if it was a password stealer so these are all things that you have to go to the
source you have to understand what you're interacting with and what you're clicking on
and by the way I do mention what browser to use
and what ad blocker to use in that security thread.
I'm going to pin it up again.
It's called Ultimate Security Thread, but...
Hey, what are your thoughts on Brave?
Yeah, that's exactly what I was going to mention.
In this Ultimate Security Thread,
I'm pinning it up there right now.
The first thing I talk about is using Brave.
So Google is is literally
spying on you number one number two they disabled ad blockers because they get money from these fake
scam ads so it is in your best interest to not use google chrome just for the simple sake of security
and privacy that's why i recommend using brave brave is a privacy preserving chromium based
browser what that means is it removed all the garbage that google is doing in the background That's why I recommend using Brave. Brave is a privacy-preserving, Chromium-based browser.
What that means is it removed all the garbage that Google is doing in the background,
reporting everything you do and search for and go to Google.
It removed all those layers of telemetry out of the equation.
And it's based on Chromium, which is the same engine that Google Chrome is based off of.
So you could still use all the same extensions.
You could still sign into a Google account and sync your favorites,
except it doesn't have all the garbage
running in the background from Google.
The other great thing about Brave
is that it has ad blocking built in,
and they go very hard on this concept
because Google just recently announced
that they've blocked ad blockers, which is just insane.
So Brave is privacy preserving,
fully compatible with everything you're already doing
in your Google google chrome and it
has ad blocking built in so i highly recommend it like your parents or grandparents are probably
doing google searches every day think about how many times they're probably accidentally clicking
on a sponsored ad if you care about your family just throw brave on there trust me it's gonna be
a lot better for everybody so i love brave big shout out to brave and their whole team
Big shout out to Brave and their whole team.
My grandparents are Googling Google.
What do you think about TailOS?
So if you use TailOS and also using Brave or Chromium as the base of it,
is that like the perfect OPSEC that you can use before clicking anything?
For 99% of people, to get them to switch operating systems or to change what they're
doing on like you know on a on a os level is is is a task right like it's like trying to explain
to somebody that just wants to dip their toes into crypto what self-custody is obviously you
want to start them off simple and then introduce them into self-custody for most people everything
that i'm recommending and and again i just did pin it up to the top, the ultimate security threat.
Everything that I'm recommending is things that there's no, like, there's nothing to
It's just like changing a setting, right?
It's just like locking down your stuff the way it is, because you're probably going to
have more headaches trying to convince people to switch operating systems or change their
flow, as opposed to just saying, yo, just turn the setting off.
So people could never remotely jump into your device, if you accidentally let them you know those are easy
wins i appreciate it thank you and do you know about cyber attacks michael yeah yeah i've been
in cyber security now i actually dealt with like three months ago i had been dealing with like
these authentication abuse like mfa fatigue attacks and some injection attacks.
So I've been working with another cybersecurity guy that's been helping me with this.
But how do we like actually avoid them?
Yeah, but all those things you just mentioned, were you told that's what you're dealing with or you figured it out yourself?
Okay, so this is the problem.
And this comes down to at a psychological level. Um, a lot of people get
contacted randomly or they're told that there's issues with something. My brother told me so.
Okay. So if your brother's, if your brother's telling you this, like, obviously he knew about
like someone attacking you directly on the internet, right? Yeah. Okay. So was it, and then,
and then now you're saying you're talking to another guy to helps lock stuff down
but is this just like you as a person or just your accounts there after like your accounts because you got a lot of followers
Natural application live and they actually like attack the authentication
I'm not sure what you mean. You had an application live and they attack the authentication what I'm sorry
What do you you see like how cloudflare works and shit?
I actually so basically I had an app like a simple game live
And they actually like it turned off like the cloudflare was skipping and it's just like the same thing
I told you like they have you copy shit and all oh, so you just installed something malicious
Into the app like how do they get
into the app i can't look i'm not i this space i wish i could sit here and like break down house
like trojans work and stuff like that but at the end of the day like you had something installed
that was like let this happen right not sure but it might be yeah hey dk there's a really good
podcast you want to listen to called Darknet Diaries.
And it goes through pretty much every way a hacker can come into.
And I've listened to everyone three times over.
And it's probably like it comes, it's like the most understandable way to understand hacking.
And what I got from all the episodes is that the weakest link to all OPSEC is usually the human.
Human element is what destroys it.
So I've listened to that podcast as well.
That's a great shout out there.
You know, it goes more technical.
Like there would be no way I could within the next 30 minutes explain all that stuff.
But the podcast does break down if you want to get into the inner workings of how exactly it executes itself how people actually target others you
know the dark web it's it's a really good uh cast can you send that to me live twitch
yeah just look just google it it's called dark net diaries and also do one of my favorite things
i fucked around with is called a rubber ducky never pick up a usb i have a rubber ducky
yeah they're they're kind of fun you can fuck with them and like and like stick them into your
friend's computer and make like shit dance on the screen and whatever but like to to to breach an
air gap what people do they leave um usb sticks around and then it pretty much acts as a keyboard
um like a like because you can control an entire computer through like the terminal right so it
actually circumnavigates all mail all like antivirus
protection and all that stuff because it actually thinks a human is typing into the terminal so
never put a random ass usb stick into your computer and there was this other thing that's
like a cable it works like the same as a rubber ducky like they use it to transfer their phones
or laptops or whatever yeah that's actually kind of new i've seen that so if you guys want to see some crazy like things
go to hack five hack five is like a crazy cool website where they you can see what kind of
devices they use and they say it's like a white hat hacking but i'm sure a lot of black hat use it
solid solid uh appreciate that guys we lost michael for a second uh just gonna reset the room
make sure like retweet definitely follow michael he's dropped a lot of fucking alpha already um we got we got a
few people with their hands up that I want to go to and then I want to toss back to Michael these
are probably questions for you Mike uh Alec what's up man yo yo what's up guys how are you thanks for
talking thanks for having me I hope everyone's well Michael, I wanted to ask you, you know, obviously people are, you know, letting hackers into their computer indirectly.
But more importantly, outside of these curl commands, outside of these USB sticks, like I'm afraid that, you know, we're starting to rely too much on Telegram. And I feel like you connect these contacts and you DM these people and it's easy to clone
How easy is it to break into someone's Telegram or clone their Telegram?
Yeah, that's a really great question.
So I just pinned it up to the top.
Most of these things I've already written threads on, I just keep pinning them up to
This is a thread about Telegram and changing some settings so that it doesn't automatically download files that people send
to you the reason why that's important is because it might be something malicious it might be
something extractable and you might not notice and actually let it execute so turning off the ability
for these files to auto download to your device because it's an open door is like an easy win
the other side to it is when you have
a telegram, by default, your phone number is publicly viewable. And you're probably in a lot
of like DGEN trading groups and like groups with thousands of people that you don't even know.
They can tap on your profile and see your phone number. And if they want to get into your shit,
what's going back to the concept of SIM swapping that we were talking about before.
It's super easy for them to get into your account because you're giving them the information directly. If they see you have a crypto-based
PFP or you're talking about these crazy trades in the Telegram group that you're not sure who
everybody is, that's a target. You're setting yourself up for failure. So you have the ability
in your Telegram settings to hide your phone number publicly, which I recommend doing immediately at
the same time that you turn off the ability
for people to automatically send you files
that auto-download to your computer.
Guys, these are like, at the end of the day,
like some of the things that I'm mentioning,
like, hey, change this setting
so people can't remotely connect to your computer.
so people can't automatically send files
that download to your device.
This is like no-brainer type of situations.
literally takes one setting change to pull this off. But again, unfortunately, 99% of people just
aren't going to do it because it's not going to happen to you until it fucking happens to you.
So take this with a grain of salt and also like understand it's, you shouldn't be afraid to be
secure. You feel a lot better navigating web two and web three when you employ all these
different tips, these easy wins, and you're not sitting there sweating and shaking every time
that you're confirming a transaction or clicking on a link or interacting with something. You feel
completely different and you also onboard others safely as opposed to just like not talking about
security until they get wrecked as well. So yes, Telegram settings, your Twitter settings, your
Gmail settings, your iCloud settings, go through every fucking settings menu of everything
that you use and configure it the right way. Lock it down. Use real two-factor. Remove your phone
number. Don't get SIM swapped. These are all things that you eventually have a default of
security in your head. So when you make a new account in the future, you know what information
is okay to give and what two factor is okay to use.
It completely changes your dynamic.
You're holding a phone in your hand every single day.
Did you ever think about like, hey, you got pages and pages of apps installed on your
phone, all made by third parties, all running in the background.
When's the last time you used all those apps?
Remove shit you're not using.
Remove Chrome extensions that are sitting there running in the background that you
probably forgot about that are eventually turning into malware.
We've seen this situation with cursor, cursor extensions, an AI tool.
People were downloading cursor extensions, again, made by God knows who, and the extensions were turning into malware and draining people's wallets.
They weren't wallet drainers in nature, but they affected your crypto.
they affected your crypto. You have to audit yourself. You have to realize what software
You have to audit yourself.
do you use on a daily basis and what can you eliminate from the equation so that you minimize
your attack variables or have pages and pages of apps, have a million notifications, have 10,000
unread emails and you don't know what's real and what's not. Pick one. This is not rocket science.
Michael, one quick follow-up on that is you were talking a lot about browsers.
I wanted to ask your opinion on perplexity comment.
I personally have never used it.
I prefer to use Brave on everything, but I will definitely check that out.
I do want to spin around the room.
Pingu's had his hand up for a while.
Then I want to go to Gmain.
And then we have African TG Scammer up here as well.
I think that'll make for an interesting conversation i
don't know what's what his deal is but yo yo michael loves these guys like yo bro i watched
michael just fucking just like nuke these guys brains bro like i just love that i love
the the username though that is that is uh african tg scammer all right let's
go to pingu pingu um hi guys uh opsac 101 um i just wanted to say why you sound so sad bro hold
hold the fuck up why you sound sad what's going on i'm trying to i'm trying to be serious and keep myself composed um so serious um opsec 101 guys um i uh
the second pin tweet the michael security thread uh the amount of times i've shilled that um i
should be getting fucking bonus payments in the background or something um but i did have uh one
question uh for michael since he's up here and there's an AMA based around him.
I've actually had a question I've been meaning to ask him for a few weeks now.
I might as well just get it done out the way here because the time zone fucks us up.
Anyway, Michael, what was that chocolate milk place called in Singapore?
My brother's going there next week and I want to tell him to go there.
I know which mall it was in. It was so good. in singapore my brother's going the next week and i want to tell him to go there um i know i know
which mall it was in it was so good we went there three times in two days um i really need to know
the name of it so my brother can have the same experience i'm not gonna lie to you bro i was
thinking about that place like a couple of weeks ago and i was like yo we have to go back one day
because the chocolate milk there was unbelievable like how many times did we go back we probably went back every single day i was an aria like when we first tried it we
went three times in two days but um all jokes aside you are here to answer questions and i did
just pose on to you um i would like my brother to have the same experience that we did um i hear you
go into all this technicality and detail
about opsak and you can't name a fucking chocolate milk place to me right so just
happen to get my answer and get on with my day to be honest this yo I promise
you I will look through my bank statement and figure out where what what
the chocolate milk place was called bro I will take care of your brother I
promise the guy who was given your security advice can't even remember the name of a chocolate milk place we wanted bro because he's too focused
on our opsec bro because my entire i don't even remember what i ate two hours ago bro because all
i care about is security all right so let's uh let's move on he'sung that around nicely what's this magical chocolate milk bro i want some
oh yeah i can't i don't even bro i swear to god one day obviously michael doesn't drink he's a
very good boy shout out to him but um one day i was absolutely battered and i was leaving the club
at uh marquis in uh marina bay sands mall in singapore and then mich like, hey, like I'm over here by the food place.
Yeah, like as if I'm in a dark alleyway,
like signaling like, hey bro.
That's literally how it was.
I was like, I was like, all right,
I'll swindle my way to the corner of the fucking mall.
Michael's there with this mysterious drink in his hand.
had a cuddle from his mother and he's like yo like literally have a sip of this i have a sip of this
and i literally melted into his arms and then i was like please get me one of those
every single day they definitely put some shit in that drink bro i don't even know what it is
i can't even explain it to you guys other than it's a chocolate milk ask drink i'm so fucking thirsty right now
i might have to order something on uber eats right now bro
he's like searching for any chocolate drink but yeah pingu bro appreciate you i didn't know you
were up this early or this late on that side of the world back there in cardiff i normally am but i'm just dying off but obviously
we never get to speak to each other vocally it's just dm so i was like i'll pop in and give it a
little give a little shout out to michael like you know are you going are you going uh back again
this year um i'll be in asia so i think so i i think most likely if not you can come see me in thailand
or something like that mate i'll be around the corner okay let's go are you going to davcon
contemplating so i went i went i went to every single country last year and met every person
in crypto like i'm pretty exhausted like i don't know who else there is to network without these
oh yeah your life sounds so difficult mate. Yeah
All right, all right next every country and so I have one last year like yeah
All right, all right, uh, holy shit, bro, uh
Who's next? That was a good intermission. Thank you. Thatingu. That was a great intermission. Thank you, Pingu.
Pingu, bro, is graced our stage rarely because it's like...
I don't know what time it is for you guys to cross the pond,
Holy shit. Thanks for pulling up, Pingu.
Always good to see you, man.
Then the Telegram Scammer.
It's a crazy name, I can't lie. Then Queen Wartooth just came up. G-Man, what's up the Telegram Scammer. It's a crazy name.
Then Queen Wartooth just came up.
Actually, he answered my question.
Was it about the chocolate milk?
Security questions about chocolate milk, apparently.
African TG Scammer. security questions about chocolate milk apparently that's that's nice um african tg scammer you had your hand up bro what you got to say yo what's up
nah you don't sound african i've heard this phrase before send the phrase bro
he's tripping australian mate I'll make the payment immediately This has to be someone's old account
I've just made a token today
To raise awareness for it
I knew this was a mad thing
Have you ever noticed how when I'm quiet
For the whole space because of something serious,
like just like the most unserious, most retarded people come up?
Like, you know, you guys just need me to be crashing out all the time for you guys to act right?
Like, yo, this is a very serious topic.
This sounds like the beginning of a crash out. Continue. Yeah, yeah, bro. It is a very serious topic hold on hold on this sounds like the beginning of a crash out
continue yeah yeah bro it is a crash out because like yo bro i watched people lose fucking uh
760 000 this fucking past week and then this fucking retard is coming up about a fucking coin
how about you fucking do something with your life other than fucking scam people like why do people
have to be hoes on the internet?
Like you could go be a hoe in real life and no one would know but you came here to do it so that we have a record of it
Like I fucking hate it here sometimes bro. Like who are these people and who raised them?
Who raised them it's crazy
Yo, bro, they didn't pick the right parents.
That's why they're scamming, bro.
They couldn't pick the right parents like the rest of us.
There's a lot to unpack there.
There's a lot to unpack there.
I think the crash out's over.
I was going to say something else, but then I realized, like, you know, like, probably my badge will disappear after I see it, so.
That's a good tweet, though, bro.
You didn't choose the right parents.
You didn't choose the right parents.
Wartooth, what's up? up hey i miss you guys how are
you good how are you good happy i like curl that it wasn't an option to not scam or be a hoe it's
like just do it in a place where nobody would know and and that's all good but i'm sorry he offended
you with your token uh i i do have a a question for Michael about security and two questions actually.
And the first one is what do you do if you do think that you have a rat on your computer or remote access Trojan?
So the best thing that people could do if they're in a situation where like they're not sure of what the status of stuff is with their devices or because sometimes people have like two laptops, a desktop,
a smartphone. It's just like everything's all over the place. The best thing that I would
recommend to do is save everything in an offline encrypted backup drive, like two copies of it,
wipe all your devices and install the fresh latest version of each operating system and then cleanly put back on what you care about.
That's like the best thing to do if, again,
you're unsure of what might be wrong with your computer or whatever the case is
or your device or if you've been compromised.
I mean, there are other ways around it, like actually getting a real antivirus,
like the one that pins up to the top, you know, doing an audit
of your like startup items and the software that's installed, the Chrome extensions you have running,
but generally like the easiest thing to do, because most likely you have a million variables
all over the place for most people, because when they get a brand new device, it also comes with
a bunch of crap installed on it. That's just sitting there running in the background that
they never gave a fuck about just like taking up space and battery life and all these different things
is to just save what's important to you reset everything to the latest and fresh version and
put your important stuff back on and once you do that go through the ultimate security thread at
the top and get brave get a real vpn get an antivirus and you're going to have a night and day difference from what you had
before. Cause now you set it up the right way and it's a fresh start.
Cool. Thank you. Sorry for thumbs down. And just then I meant to thumbs up.
I was like, yeah, what did I say? Like I'm just trying to help it.
No. Okay. So that's perfect. And thank you so much for the thread.
I bookmarked that to read in a minute, but how, what if you want to save evidence of it? Like, what if you want to show that it happened?
Oh, yeah, definitely. So there are ways to like export logs and export different history or like
see if you actually clicked on a legitimate link and all these different things. So I would never
like advise anyone to once they're compromised to just delete everything. Like obviously you want to have a backup or an archive of what happened or try to
export or get as much information as you can, like screenshotting the conversations or exporting the
data logs from the browser or the history on your computer. So yeah, exporting the data logs. Sorry.
So I can say that a little bit slower. Yeah. So, yeah. So like, yeah, yeah. So like in most applications, like, you know, pretty much anything you're using, there's
logs somewhere in a hidden folder on the computer.
And the logs show like different things that might have happened in the program.
Maybe it was like an open connection.
Like, for example, sometimes people have like a remote software on their computer, like
And that's how a lot of people like deal with these like remote scams
without even realizing it. This is generally for the older generation. What happens is like they
let someone into their computer and they believe that like Microsoft has an issue or there's an
Apple issue or like something wrong with their internet. And what ends up happening is once,
you know, you reset the computer, you don't even have a log of who connected to you, what IP address
they use, what user ID they were using, which you can report to the authorities. You can create police
reports with this information. So most applications allow you to export your logs. And anytime that
you want to find out the process of getting information out of an application as far as
what happened in the background, just, you know, you could search like how to export WhatsApp logs,
how to export team viewer logs, and it'll tell you step by step on how to get information out of the application you're using
before you actually wipe it. So you have the evidence segregated.
Cool. Thank you so much. And then my last question for this is, do you have anybody
you recommend for like someone that would do that kind of an investigation on your computer?
I personally don't, but that's what I write about.
And it's all free information.
I would never let anyone into my computer.
A lot of people have, you know,
taken their computers to like local computer stores
You don't know who's looking at your stuff.
Like I, it's, it's, it's trustless for me, right?
It's the same thing as like connecting to people's wifi.
I never connect to anyone's wifi. If I need wifi, I'm using my own hotspot. I'm not connecting to the hotel I'm
at. I'm just for convenience. Like if I need to charge my phone, I'm using my own charger. I'm
not using some random one at the airport plugged in. Like if you keep everything internal to
yourself and like, you just do the research, it's, it's not hard to do the research. It's
really easy to digest. You can actually figure out like the answers or, um, what software to use or pretty much anything I've written in all the threads all
in one place. Um, so I personally don't recommend anybody like going and being led into your device
to help audit shit, but there are definitely great people in the space that you should follow
that always drop great tips like me, like NFT drew. And, um, you know, I mean,
big shout out to NFT drew and the whole boring security team, uh, boring security. You could
take courses there. They're free. And they talk about everything I'm talking about in this space.
And they show you live examples of shit. And you don't have to have a board ape. It's like,
you could just, if you're in crypto, you can sign up for the boring security classes and they talk
through and walk through everything I'm talking about without having to remotely connect to you.
You know, it's like, you want to get as much information as you can without letting people into your devices. I understand. Thank you so much. I really appreciate your
feedback. My pleasure. Thank you. Thanks everybody for asking these questions, by the way, like
it's worth millions of dollars to me, bro. Miri that you, you got me up on stage and you're letting
me speak. So I appreciate you and every, all the just all the speakers coming up just don't let it make you
think you're special yeah yeah well i really appreciate you coming up yo bro like yo just
imagine bro like yo if that first space that you did with uh michael pingu i didn't attend it and like i just kept on doing all the
same retarded shit i was doing bro think about it like
bro it's it's little thing like little tips go such a long way i have people dm me all the time
bro and they're like i shared that space or that podcast you were on
before my friend started using crypto and he actually caught a scam and it saved him. Like
that, that to me is like unlimited value, bro. Like fuck all the noise on the timeline and the
fake 100Xs, Photoshopped garbage. Like what's good information is invaluable. When I onboard
someone into crypto, I'm not talking about a hundred x's or thousand
x's i'm telling them about what the point of crypto is what it means to own your own assets
what decentralization and getting the rid of the middleman is about not just thousand xing because
99 of people don't thousand x they don't hundred x they lose everything they get scammed they get
drained then guess who they're pointing the finger at you, but they
can't point a finger at you. If you were clear to them about what they're jumping into, how to set
it up the right way to understand what they're buying, right? You're not telling them specific
about like you're on. They understand what the point of what they're buying is. Otherwise,
at the end of the day, you're left with a bag of NFTs, a bag of tokens that you yourself don't
understand you yourself don't like, and you can't fucking sell.
And then you come and you point the finger at crypto and say everything is a scam.
When the only thing that was a scam was the way you were introduced into it.
Is using password managers like in browser safe?
No, do not use autofill or browser password managers that store that information in a single file in the app data.
Like you need to use an encrypted password manager,
something like Bitwarden, which again,
I link up in the ultimate security thread at the top
because remembering thousands of unique passwords
is not practical and using the same password
for everything is not secure.
So using a real self-hosted open source password manager
like Bitwarden is the ultimate win.
There's a lot of password managers out there that have been hacked and they've leaked people's data like LastPass.
People unfortunately save their seed freezes and private keys and what they thought was their secure LastPass vault.
And all that information has been sitting on the dark web and every now and then gets tapped into and people get wrecked because they don't rotate their keys and they save those keys digitally at some point and something they thought were secure.
So when you're using a self-hosted password manager like Bitwarden, the only attack variable is you yourself.
Just like when you have backup codes, hopefully you're not syncing your two-factor codes and your Google Authenticator or Authy to like their servers.
You're holding them offline like you would your seed phrases or private keys.
The only attack variable is yourself. There's no one else to blame at the end of the day. If you
remove all these third parties from the equation, if you remove all the concept of storing your
information somewhere else, no, you want to own your information. I guarantee you, most of the
people in this space have iPhones and they have iCloud turned on for everything. You're syncing
your entire life to one point of failure, all your photos, all your videos, your notes, your emails, your iMessages, everything is in your iCloud
account. And you probably have your phone number tied to your iCloud account. So if someone wants
to get into your entire life, your key chain, everything on your Apple device, all they need
to do is SIM swap you because you didn't take the two seconds to do what we talked about during this
space, which is remove your phone number as a recovery method from those accounts.
So it's just a matter of time before you get hacked, unless you actually incorporate some way to make it harder for people to hack you.
And that's exactly what we're talking about.
So, Michael, I need to know if this is janky or not.
So what I have set up is like it's just like a like an old IBM laptop laptop and i'm running like kali linux off a usb stick
right and that's like where i do most of my banking and like uh crypto stuff right and then like
every time like i turn off the laptop completely i gotta pull up my fucking like my notebook where i have all my cut it so yo i print out this is the
janky part i think is janky i don't know if it's okay or not but i have a printer that only hooks
up to that like specific laptop and then like i'll print out the seed phrase and i'll like cut
and paste it into a notebook is that janky did you just say you print out a seed phrase yeah yeah i just have
like a printer that all i do is i print out seed phrases on it and then i like cut them out and i
like have like a scrapbook with all my seed phrases in it is that janky yeah there's like
multiple jank to what you're telling me like there's like multiple levels of jank to this
entire process bro do you put yeah that's why you're here and I'm asking this question, bro
So yeah, but that's why I'm answering you. Hold on a second. So someone found the scrapbook
They would just have access to all your shit, right?
I don't let people over at my house though quick question
So I want to add a password to my flash drive so I can put all my passwords and shit in it.
Then put a password so only I can access it.
If it's encrypted at rest.
So a lot of times, so a lot of these companies like Western Digital and Seagate, they advertise that like the drive itself is encrypted or people don't realize that like when they put a password using some third party software on their flash drive or their external drive, it's really hard for people to get across that.
So what you want to make sure, and this is also for your actual device, if you have like a MacBook or a Windows computer, this is what stops people from pulling out your drive and being able to read all the info on it externally through a file viewer because you're not booting up into the operating system you're
not booting up into the drive you want to make sure what you have is encrypted at rest and what
i mean by that is like think about it if you buy a if you buy an external drive or a flash drive
and you connect it and copy files to it what's stopping somebody from taking it and just popping
it into their computer and copying your files so So the main thing that you wanna do is employ
hard drive encryption, drive encryption.
And all operating systems, there's like BitLocker in Windows
and there's like something else in Apple,
but basically it's encrypting the drive.
So you're the only one that has the decryption key
so that you can view what's on it.
So if it gets stolen or someone tries to like bypass
that comes on it, like they will never be able to see your files.
They will never be able to get into your laptop or your,
or your device externally because your drive is encrypted at rest.
I could send you some info on this.
If you DM me as well, depending on like what you're trying to encrypt,
Like this is not something that you pay for.
Like drive encryption is a free thing.
You can do it directly through your operating system.
Is that what I should switch to, too?
Like, just do encrypted drives?
Because, like, sometimes, like, this notebook thing is super janky.
I'll lose the notebook in the house.
I'll give you some alpha.
I'll give you some alpha.
So, a lot of people don't realize that with a
hardware wallet like a ledger or trezor you could have a 25th word to your seed phrase
and it's a word that you choose yourself so even if someone finds your entire seed phrase they
would never be able to get into your ship like these are the different like these are the easy
wins the tips that i'm talking about that i drop all the time So if you follow me, this is a big you know for anybody that's listening. If you follow me
I'm not all my listeners set up michael
What do you mean? I have the 25th word like I and I have multiple different 25th words and you wrote them down
No, I didn't write the 25th words bro. They're just words that I know that are like
Things I wouldn't talk about in public
ever okay good i don't talk about religion and stuff like that right so yeah that's less jank
that's less jank than what you were talking about before bro that's good okay yo but like
to get it from being janky like should i digitize this on my secure notebook no i i don't i like i i never like
digitize or like if something is connected to the internet like it's not it's my seed phrase is never
being typed in anywhere like it's being generated on a hardware wallet and i'm writing it down
right like offline like not not sending it to a computer and printing it through the printer like you, you don't want to, you don't want to do that. You want to keep everything as offline as possible.
That's the point of a hardware wallet, which unfortunately a lot of people don't fucking
realize they buy a ledger or trezor. And then instead of like connecting it to your software
wallet, like your phantom or your metamask and then clicking, you know, connect hardware wallet,
they're typing in the seed phrase that the ledger put generated into the software wallet,
rendering the whole thing useless. It's really sad, guys. Like people don't even know the
differences between a seed phrase and a private key. A lot of people get their seed phrases
completely, you know, compromised. And then they're told on the timeline, like, yo, go create
another wallet, create a fresh wallet. And then they go and they create a new wallet underneath
the same compromised seed phrase. And they auto scam themselves again. Like education goes such a long way in the space and unfortunately like people just don't care and
again i want to give a big shout out to miri and kuro for hosting the space and talking about this
stuff like before like people in their communities get wrecked because that's what a lot of communities
do they don't talk about this stuff until someone does get scammed or the floor price gets destroyed
because someone floored all the assets because they got their assets stolen like these are things that actually matter in the space not the degenerate
gambling casino like that's that's fun and sometimes and like it's cool but like
you gotta take a step back and like get some real value out of like why you're here and what the
point of what you're doing is yo again thank you for coming on, man. This has been a wealth of information.
And I want to encourage you guys to look up top again.
Check out all these threads that he's posted.
There's a lot of information here.
I'm literally reading through them as we speak.
We got some new people on stage.
We got some new people on stage that definitely have some questions for you, mate.
Yeah, thanks for having me up good space murray uh michael so i hear you and i understand everything you're saying i
fucking love it and uh i have i have this um problem with some of my clients because they
know that they know that i do crypto stuff right and a lot of them are like old heads, like boomers and shit, right?
oh, I told you I should have bought Bitcoin,
It's like, yeah, but you didn't.
Anyways, what they're worried about
is they hear about dumb shit,
Hak tua and the Trump token,
And like, I want to be honest,
if they were to listen to this
space, they'd still be just as confused as they
You know what I mean? Which is fine.
We're not necessarily talking
about what to buy here, right?
We're just talking about how to keep
No, I'm not talking about what to buy. I'm talking about
that's their number one concern.
I can show them my returns i can show them like yeah but at the end of the day yo kaz at the end of the day bro like i don't think i don't think you need to do
any of that i think it's a matter of like how we introduce people into crypto that's what michael
let me finish the question yeah yeah for sure probably no it's probably too long-winded the
way i was yeah no worries no question so it's probably my bad. But the point is, is there a way like if you could start somebody just if I was going to go to the store today and buy a new laptop and transfer all my shit to a brand new secure system?
brand new secure system is there like a simple way that you would uh that you could explain how
you would do it like like a step-by-step process that's concise yeah so are you saying like if
someone just wants to set up a secure new device like what's the process i have crypto i've got
like six wallets and they're like oh you want you want to like, you want to be able to manage it securely. How could I, how could I consolidate everything?
how could I go buy a brand new laptop and a ledger or whatever you,
whatever you think is the best.
I'm also interested in whatever hardware and,
and what would you do if you were some disorganized DJ with a million
Yeah, that's a good question.
Listen, I'm a disorganized degen that does that
But I don't use a Ledger or a Trezor.
I just have a separate laptop
that's never been connected to anything ever
or had any software downloaded on it ever.
And I just use that as like a cold wallet.
So whenever I need to do anything with like a DAP or anything,
I just send it straight from that wallet to another one.
Thanks Bobby. I think Michael was wanting to add to that as well. send it straight from that wallet to another one.
I think Michael was wanting to add to that as well. I appreciate you, man.
Yeah, so if I was like, had my stuff everywhere
and I was like, what's the most secure way to set this up?
Two variables, actually a brand new device
and a hardware wallet, super crucial
if you're managing more than a few thousand
dollars of stuff. And the reason why is because you could have all the security in the world.
You could do everything on a segregated device, whatever the case may be, but nothing is 100%
secure. But if you have a hardware wallet in the equation, you have to have a physical input
externally from the device in order for anything to move. There's some segregation you want to
employ in what the assets are that you use every day
as opposed to the assets that you don't plan on selling.
Most people just keep it all in one place
and it ends up completely getting them wrecked.
So if you have cold storage or a completely separate device,
that's obviously what we were talking about earlier
in the space, which is device segregation,
but employing a hardware wallet into the mix
is that additional layer of security. So when you buy a hardware wallet or when you buy a computer, don't buy it on Amazon
or eBay or buy it off of Facebook marketplace. These are devices that you want to make sure come
directly from the manufacturer because when you're buying a hardware wallet, you never know the
person that you're buying it from or where you're getting it from might have the firmware changed
or something malicious on it. You want to get everything direct from manufacturer. You might save 10 bucks on Amazon.
Doesn't matter. Get it directly from ledger, not ledger on amazon ledger.com, the actual website.
And same thing with the computer, get it directly from the manufacturer. The first thing you want
to do when you get the computer is you want to wipe it because it comes with a bunch of like
pre-installed garbage, especially if it's a Windows computer and you want to set it up so that the only things you need on there are related to like what you're using it for
and making sure that it's set up the right way, which is all in the ultimate security threat at
the top. Like what antivirus to throw on there, what ad blocker to use, just like lock it down
as much as you can and use it only for crypto assets. Don't use it for anything else, not for
meetings, not for for gaming not your personal
not your work keep it as a completely segregated device like what bobby was mentioning
have you heard of uh thank you michael that's very useful have you heard of cloaks before
cloaks um okay all right never. It's like a password management
I was just curious if you had an input on it
How would you love about transferring all these fucking bits and Bob these fucking assets, right?
You just simply send it over
You're not you're not sending you're not sending it over you already have the seed phrases and keys for them
So you're not like doing any on-chain activity there
You just wouldn't you what you could do is is just copy and paste all your seed phrases
and then just email it to
an email that you have on that.
If you were to just use it for crypto only is it safe is what
safe the salonophone again it's just a matter of like that you're using it only for crypto
you could install other apps or you can install other apks it's an android device you could go
online and get tricked to install a malicious apk onto the device like it's a matter of how you use it so
you have to be cognizant of when you're using the salon phone keeping it segregated as a device for
that i know that there's a software feature they have on there um which is like a a vault it's like
an additional encrypted storage which is super cool um but yeah that's like another layer of
segregation but again if it's if it's a crypto if you're using it for crypto use it only for crypto don't use it for your zoom meetings to
You know, the number one way
Getting hit right now like the biggest like licks are getting hit is people hit you up
People are getting hit up in their deals. Like trust me. Nobody wants to hire your ass. Okay
Like you're not going to get hired
Like if somebody tries to put you on some fucking live stream or like wants to fucking FaceTime you
if somebody tries to put you on some fucking live stream or like wants to fucking facetime you
no bro you're special bro like they they found you bro i swear to god bro so many people get
oh my god the biggest licks are getting had somebody got fucking hit for 100 racks today
i'm like bro you seriously thought you're they were gonna hire you god damn you gotta apply for
the job to get hired what it's kind of crazy that somebody with a hundred bands is like willing to get a job and like risk it.
But anyway, Michael, is there a way, like, I'm going to be honest, dude, like my op-sick's pretty good.
Like I have, I have several phones.
I've got several devices.
Like I've got several cold wallets.
It's all, you know, it's all good and dandy, but like, you know, I, I'm not like super tidy with everything.
a little bit too much money on my hot wallets like is there a way to know if i'm compromised
so if you're concerned about that like compromise to what level the device and like the security of
the device you're using or if your seed phrase or
private key has been leaked and someone's wallet watching you until the right moment
you kind of i mean both but like mainly the wall watching until the right moment kind of thing yeah
the wallet watching until the right moment and this is something i employ myself is you got to
make sure to like rotate your keys every once in a while for the that you actually care about
so rotating your keys is like obviously you you wanna do more so on a hot wallet
considering it's something that you're actively using
and you don't know if there's something malicious
on your device at some point.
Obviously you wanna employ the security
that I'm talking about up there to make sure you're clean.
But the concept of rotating your keys
gets rid of that feeling considering you're actually
like creating a fresh seed phrase. And when I say rotate your keys,
I don't mean create a new wallet under the same seed phrase. I mean,
install a fresh instance of the wallet with a brand new seed phrase and then
move your assets over to it.
Yeah. Sorry. Just want to mention this before it escapes me. Um,
you were talking about people getting DM and, uh told about interviews and different things that they should basically think is a
good opportunity. And I always get messages all the time where someone messages me and is like,
yo, is this real? Does this person really work for decrypt? Does this person really work for
coin market cap and this and that? And every time it's the same answer, guys. No, the answer is no. And the way that you can verify if that person works for that company
is so fucking simple. It's going to blow your mind. You guys ready for this?
All you have to do is anytime anyone from any giant company contacts you telling you about
an opportunity. I know this is like going to be like brain surgery for some of you guys,
but it's so simple. All you got to do is say to them, yeah, no problem. Just message me from the main account. And guess what? You'll
never get a message from the main account because it's not real period. Every single time it's that
easy to not get scammed in that scenario. I mean, and sorry, sorry you were gonna mention something else. Yeah
Beaver has a two million dollar house, but he can't buy internet
Beaver just run the whole space that was crazy
Yeah, OPSEC 101 idiots get fucking drained.
Don't connect to Twitter spaces if you value your fucking money.
Yeah, I wanted to say that everybody who DMs you,
if they offer you a spot for like an interview,
they actually do want to know your story
because they think you're important and your story matters.
So don't discount yourself.
I actually do have a serious question.
I have a serious question.
You're going to get everybody.
what's your take on trading bots?
I mean, nothing crazy, but like, crazy, but money and fucking Axiom.
And it's fine if I lose it all tomorrow.
Do you think that there's any extra steps worth taking
other than just basically expect to maybe wake up and get drained one day?
Can I be honest with you?
Yeah. You're coming across
as really self-conscious, man.
I'm just gonna be straight up. You just sound a bit shaky,
Dude, I like my fucking money!
I feel like Michael's like your therapist
okay tell me it's all okay yo pingo's making a really good point man beaver only makes jokes
when he's nervous all right so two two is two is a question so using a telegram or a trading bot
that you're not directly holding the keys for,
that you're giving another application to manage for you,
it's going back to the concept of nothing's 100% secure.
That platform could get compromised at some point.
If you're comfortable knowing that what you're placing into that environment,
you're okay with losing, that's a different story.
Most people are not okay with losing that stuff.
And they don't realize that the risk factor even exists.
So they put all their eggs in one basket.
They blow their whole crypto load in a single trading bot
and then something might go wrong, right?
Like there's ways to, again, employee segregation,
use different services so that you're not keeping
all your eggs in one basket.
But back to the point of you're giving your keys
for some application to manage i mean
we all know not your keys not your crypto so okay cool awesome uh be so's had her hand up for a
while i want to go to be so welcome up and then i'll go to bobby and uh um these holes up thank
you yeah you can explain my house explain what's going on bro
what the fuck is going on
we made it a public server
and now all the kids are joining and they're like they you do? We made it a public server and now all the kids are joining
and they're like, they fucking hate us.
Who made it a public server?
Yo, alright, alright, alright.
You guys should just cheat on voice chat
and just absolutely ruin the kids' night.
You know, you guys are dickens.
Peach has been asking about Among Us since 5pm
I mean, I'm worried about like
She needs to get a job bro
Bro, we just need you guys to fucking join
We've been asking you for hours
Bro, you gotta play Among Us for 7 hours a day
Yeah, it's like a therapy
Lock in, don't clock in be so Mary Mary
He joined at 5 p.m. She's gonna play until 5 a.m. That's just by the way
I want to go and just vote her off every time now
Yeah, yeah, anyway, what are you guys coming like?
When are you guys coming?
Bro, after the space is over.
I'm going to go ahead and secure my spot now
because then demand is going to be...
And then once everybody joins after two rounds,
Beaver, you know what I can do?
Because I own the server,
I can just kick people that I don't like out of the VC
and make room for you. What if I did that? Bro, can can just kick people that i don't like out of the vc and make room for
you what if i did that bro can we just kick tunday i have him i have him meet it every single time
it would be it would be i'd be like incredibly honored and all and humbled as well if if you
would bless me with the position of discord moderator and it's honestly it's been one of my biggest dreams
oh my god all right you know what happened yesterday i killed tunday in front of beaver
thinking he wouldn't tell anyone because no one likes tunday
well clearly my friend my good friend i didn't know those were the rules.
Okay, to be fair, I'm kind of new at this shit.
Like, I've never played Among Us before.
I didn't know those were the fucking rules.
And then, and then BB reports.
He's like, yeah, I saw Be So Kilt Tunde.
I'm like, what the fuck, dude?
I saw you disappear before I saw you, like, Tunde's dead body.
I didn't register those Tunde's dead body until after I saw it was you and then at that point it was too late because whenever i reported i immediately was like
be so be so be so be so kill all right all right i have to interrupt you guys you may be addicted
to among us like you just might have a serious addiction to Among Us.
Can we freeze their Discord accounts, Miri?
See, that's not going to help, though.
They need to choose by themselves to do it.
They need to get IP bans on Among Us.
Listen, Michael's going to drop in like 10 minutes.
I'm going to let people ask final questions to him, and then I'm going to rug.
Michael, are you coming and playing Among Us with us?
I've never played Among Us.
I'm admitting that on the space live.
I mean, it sounds like it's a big thing.
He's going to DM you every day.
If you think this beaver's bad, need to see him on among us yeah he's he's like freaking out dude he's like no no no no it wasn't me oh
no it wasn't me i didn't do it and it fucking was okay all right people still have their hands
raised people still want to ask michael questions he's got to go soon. I know you guys are
You want to play Among Us, you won't let me end the freaking space.
I don't get it. Holy shit.
We got Em, who's had his hand
up for a while, and then Pingu
also put his hand up, so let's
rapid fire. Let's go. Em, what you got?
How are you doing? Can you hear me?
Well, I just wanted to say that today it was fun to me that I almost got scammed by a profile of the Indian version of...
What was the entity for drug regulation on.
I'm not going to lie, it sounds like a new problem.
Let me ask this question.
Em, please continue with your question.
Well, I just got followed by the Indian DEA and I asked them like why did they follow me
and they wanted to try to
Bro, are you whispering? I'm sorry bro
I'm trying to hear what this
Can you speak a little closer?
I'm trying to be more culturally sensitive, Michael.
He's just far away from the mic.
Well, yeah, he's also far away from us in the first world.
So maybe have some sympathy.
I didn't fucking know that.
Wait, are you judging him by his accent, Bevox?
No, no, I'm not saying that.
No, Michael is. Michael is. How do you know where he's at? I'm judging him by his accent, Bevo? No, Michael is.
How do you know where he's at?
I'm judging him by his mic quality.
Michael is judging him by his accent.
I'm going to make a synopsis.
that he got followed by some random
phishing account and they wanted him
That's not what he's saying?
No, I'm saying the answer is no.
We talked about it before.
Nobody wants to interview you via freaking text.
Nobody's trying to give you a job.
I'm super sorry to break the ball.
And if you consider the upside.
Even if the very small chance it is true,
there's literally the upside is so small compared to the risk.
The risk being you lose everything
Like that's the crazy thing all you have to do is just say no
How do you still own the taxes you still owe the taxes brother like I don't know what to tell you
You could lose the money, but if you don't file a police report, you still
gotta fucking pay the taxes on it, bro.
money? Dude, are you talking about if your phantom
all gets fucking drained, you're gonna
fucking report that to the IRS?
You have to still. You have to still,
bro. I agree. Actually, yeah, no.
Yeah, that's true. Yeah, look out for the IRS.
Cool. Awesome. Wait, is that actually a real thing? Yes, Airbnb. Look out for the IRS. All right. Cool. Awesome.
Wait, is that actually a real thing?
Pay ahead of time, actually.
Well, just consult a tax professional.
Because at this point, we're just wasting Michael's time.
Everybody has all these jokes.
Pingu has his hand up, and then I'm going to rug the space.
If you don't give a 20% tip to your tax man, you're a bad person.
Michael, we've talked a lot about cold wallets, hot wallets, VPN, this,
I find your security thread super useful.
I was wondering when you were going to release one on IRL security. um, browse that, um, I find your security thread super useful. Um,
I was wondering when you were going to release one on IRL security.
Um, I was thinking you could break it up by country.
we can talk about guns and stuff like that in your house.
we'd probably have to talk about maybe like a taser or like,
a legal knife that you can carry around with you.
I was wondering if you were like,
yeah, yeah. Like home security home security like cameras like safes do you have any recommendations
do i need to do i need to hire like man security like yeah i don't know how far to take this yeah
so here's a piece of alpha that i'm going to tell you guys. So in that web tools thread, there's a website I
linked to called pentester, pentester.com, P-E-N-T-E-S-T-E-R.com. That allows you to do a
dark web search on yourself and see everything that's leaked about you on the dark web. And you
might see that your phone number, a password you're still using, your home address, all this
stuff is out there. Mitigate it. There's's ways to mitigate it there's ways to remove that data from a
lot of different sources a lot of different data harvesting websites and
that's your first step is to actually be not afraid enough to check what's
leaked about you out there because if it's if you could see it then everybody
else on the internet could see it too. Um, so check out pen test
Yeah, but but say if we had gotten past that point and my stuff was already leaked and they show up to my house
Then what security measures do we have in place?
Bro, what a wrench? I'm I'm a
I'm a cyber security guy, bro. What do you want me to to tell you Get machine gun mounted auto detecting heat turrets
On your fucking front lawn
That now is a really great time
I think now is a really great time to boom the space
I really want to thank Michael
Shout out to Michael K From Metamask I think now is a really great time to boom the space. Thank you all for coming. I really want to thank Michael.
Shout out to Michael K from MetaMask.
You cannot miss his profile.
They're all pinned up top.
You can review it at any time.
But this has actually been a goldmine.
Yo, I'm gonna let Michael have the last word.
Then I'm gonna boom the space.
Greatly appreciate you again for having me up here. I love that the energy was pretty free-flowing you know there was some comedy there was some some beaver there was some pingu you know people coming up asking bro
why why am i in a fucking noun what is it comedy bro you're not serious but for real um i think i
think it was it was a lot of good information that was dropped if you haven't done so repost the room or bookmark the link share it with your friends and family members even web to everything we talked about was relative to your web to as well if you want your grandma to get fucking wrecked using Google Chrome and clicking on scam ads, that's on you. But at the end of the day, it's not hard to stay secure. You just got to fucking do it. Love guys. Until the next one. Peace.
If you like a manga, say hi.