Transcribe all your audio with Cockatoo

Blazing fast. Incredibly accurate. Try it free.

Start Transcribing Free

No credit card required

LO PEOR QUE HE VISTO COMO AGENTE DE CIBERSEGURIDAD - El Hilo Negro Podcast

LO PEOR QUE HE VISTO COMO AGENTE DE CIBERSEGURIDAD - El Hilo Negro Podcast

El Hilo Negro Podcast

21 views
Watch
0:00

It all started with Minecraft, because I play a lot of Minecraft. When the case of E-S-T came out, this guy uploaded the declassified documents, the emails that were sent, the photos... I was totally open about this. And there's these people with plates. I regretted it to a point of being curious, right?

0:17

When someone is going to publish a file of this magnitude, a month or a week ago, the agency in charge of that file will say that they are conspiracy theories. And once they publish it, no media will do the same.

0:28

They just hacked Kellsat and Tercel.

0:31

When a hack like this is achieved, it is because there are people inside who allow it. We go to the OCS, we put the rubber ducky and from there we have access for us to transfer the money. Your data is browsing the internet all the time. I want 100 Ines. No, 100 Ines will cost you $1,500. Give me those. You click and I have remote access to your computer.

0:49

I can see your screen, your microphone. How are you, friends?

1:12

Welcome to a new episode of your favorite podcast, El Hilo Negro. Today I bring a super, super complex topic that I think should be dealt with much more and it is the issue of cybersecurity. I think that today we should deal with cyber security more. In general, we always think about the possibility of being spied on by the internet, or everything that can happen in what is known as the deep web. So many networks that use...

1:38

networks of trafficking, networks of pedophilia, of very complicated topics, that can use the web as a main instrument to carry out criminal acts. What can happen there is very strong. Even the fingerprint that one leaves in a very innocent way when using devices and everything, are things that can be traced, that can be known.

2:02

And precisely today we are with an expert in cybersecurity who brings some very tense and worrying topics. Nice to meet you. Thank you very much for being here.

2:13

Thank you.

2:14

Jack, I thank you very much because I know that this implies encouraging you to tell very complicated things that are always in the dark.

2:21

Yes, that's right.

2:22

How long have you been working in cybersecurity?

2:24

Three years.

2:25

It all started with Minecraft, because I play a lot of Minecraft, on very famous servers. So, you get in touch with people from other countries. It's controversial because there are very specific servers, where they are like a game, but there are people who sell or lend services of this type.

2:44

So, playing, I met one of my friends, who I only met once in person. He also liked that topic a lot. We were very close, that's why. As time went by, we started talking and connecting more, and we realized that we were very much in sync

3:03

with the topic in cybersecurity. At that time we didn't have a big notion and for us everything was hacking and accessing and things like that, the basics. There are many types to start in cybersecurity. There are the script kiddies, which are people who grab GitHub repositories, copy them, paste them, and they are already pre-mademade tools so you can do things. We looked on GitHub to do phishing,

3:28

which is how you steal YouTube accounts, PayPal, you enter a link, you send an email, and in that link, your IP appears, and the data of that person, what device it is on, where it is, many of those things. So, in what qué país se encuentra?

3:46

O sea, con un... Justo para tomar eso nada más tantito, que creo que es una estafa muy común ahorita. O sea, no nada más para creadores de contenido. A mí a cada rato me llega para hackearme mi canal y digo, no, maldito, no voy a crear.

"99% accuracy and it switches languages, even though you choose one before you transcribe. Upload → Transcribe → Download and repeat!"

Ruben, Netherlands

Want to transcribe your own content?

Get started free
3:57

Sí, exacto. and they can know all about you. Yes, from the moment you click on the terminal, all of that appears. So, for example, if I wanted to steal a PayPal account, I would use a very famous tool called P-Phishing, which is a pre-made repository where you just put which device you want to access,

4:25

it generates a URL, a link, or you can create one based on the program. If you have the person's email or a message, when it enters, the PayPal page will appear as if it were normal. You can even get an email, an authentication notification of the real application.

4:46

When you put your data in the terminal, when you click, your password, your email, and you can access it. And there's also the option that if it asks you for a... You see that many times it asks for an authentication that I'm going to send you three numbers,

5:01

it also gets them to you, you receive them.

5:03

So you can basically see everything.

5:05

Yes.

5:06

Is it complicated?

5:07

No, in fact anyone with a lot of free time and curiosity can do it. Because I tell you, it's the script kiddies. Just watching a tutorial, you can do it. It's that simple. Currently... Oh no, I'm already sad. we've been 3 minutes of playing. Right now, anyone with a simple computer and time,

5:29

and a YouTube tutorial, and a desire to learn, can do it. There are tutorials, in fact. You can look for them on YouTube, they'll appear.

5:37

No, don't look for them. There are no tutorials, don't look for anything. So it's very simple.

5:42

Yes, it's too much. This is like the tip of the iceberg, what everyone knows. Then comes more complex things like attacks of service denial, the Trojans, the RATs, that you can send a file as if it were a photo, you click and you have a remote access to your computer. I can see your screen, your microphone, all that through a RAD. That's like...

6:08

The little thing. That's very basic, so to speak. So I shared a lot with this friend, and we both complimented each other to be able to learn more in a better way.

6:20

Did you guys make the scams?

6:22

That's how we started. I fell into the tutelage of minors. We developed something called a rubber ducky. A rubber ducky, when you put it in a computer, it creates a terminal, and you start writing, writing, writing, and it sends the script to you, and you have access.

6:36

In fact, if you have your email, it's easier to hack you, because it's more personal. So, me and this friend, and another friend from high school, we did...

6:46

All those scams?

6:47

Yes. First, we started by cloning cards.

6:51

No, it's not easy at all. Not anymore. That's why we stopped doing it. Because we didn't get it all the time. We didn't have the knowledge to be able to do it...

6:59

The clonings.

7:00

The clonings in a correct way. Cloning is the right way, because credit cards are very secure. It's not as easy as before, where you'd pass a skimmer and all the information was cloned. In gas stations, that was where the most business was. You'd pay with a card and the gas station would come, you'd scan it quickly, and it would charge you in a second. And they'd take their commission.

7:22

Currently, chips are not very secure, so you can be sure of that, it's already very complicated. If they do it, I think it's... Well, it's people who know what they're doing, and people who are...

7:34

Very professional.

7:35

Very professional.

7:36

Specialized.

7:37

Very, very specialized, because the branch of cybersecurity, I think it's one of the broadest branches that exist in the branches of engineering systems in general.

7:45

And now the most important ones, because every time...

7:48

You need it more.

7:49

Everything is digital, even government procedures are becoming digital. Exactly. So, a meeting here, a fine here, everything is like that. So, really, digitally, cybersecurity is the most important thing.

8:03

And unfortunately, it is what is most expensive in Mexico. In it's what's most in need in Mexico. There's no fundamental base in cybersecurity.

8:09

They just hacked Kelsat and...

8:11

I'm still going to comment on that.

8:13

You're just saying, those should be the most careful.

8:16

The most careful.

8:17

I don't know if it's true, but they mentioned that it was because someone put a password of 22222.

8:24

Something like that. Here comes another topic of social engineering. Social engineering is that, for example, I can, for x or y, I do it to the email of a worker of the SAT, let's suppose. So, day by day, I send him emails, Hey, I'm the engineer, I have access, Hey, I'm the engineer, I have access. Maybe he doesn't see them, maybe pase un mes, pasen dos, pasen tres.

"Cockatoo has made my life as a documentary video producer much easier because I no longer have to transcribe interviews by hand."

Peter, Los Angeles, United States

Want to transcribe your own content?

Get started free
8:45

Pero al cuarto, no sé, lo agarras en sus 10 minutos, lo agarras, no sé, ya queriendo seguir o revisando algo. Y en una de esas, cae, y yo, este, si, es tal, tal, tal, acceso. Y también las llamadas de que, ah, soy ingeniero. is a little more complicated to carry because they are asking for a lot of authentication. OK, I manage to get the number of the engineers in Telcel

9:09

and I mark that I am the engineer and I have access to your registration number. Where do you locate yourself?

9:14

Yes, it is more secure.

9:16

When a hacking of this type is achieved, it is because there are people inside that allow it. Because, for example, what I'm going to tell you, I personally find it stupid that they ask you to register your phone number with your corp because it doesn't have much to do with hacking the 3L. And all those data that seem harmless can be used to get loans in your name, to put a property on such and such thing.

9:37

I'll tell you what we used to do. We used to get credits in Didi, right? Or in Nu. Of course, it's easier. You had your phone number, your name, your date of birth. You might not be paying attention and you get a text from NU saying,

9:51

you owe so much, right? And you say, no, I don't owe NU, maybe it's a scam. And maybe it's not, and you do owe it. And you don't even realize it.

10:00

So... I don't know. I got a message from Banamex that I had my debt and I don't even have Banamex. I mean, do I have Banamex? Is it possible? Well, I'm going to check.

10:15

I'm anxious.

10:16

It can be both. It can't be a scam.

10:18

It can be either a scam or it really is. In any case, they can call you directly. If they call you directly, it's most likely that someone has taken out a loan. But in the same way, you keep the call because it can also be the same thing as getting more information to get a real loan. Of course. So you have to be very careful with that.

10:40

I tell you that unfortunately Mexico lacks a lot of cybersecurity. What worries me a lot is that'm worried because we are millions of people who navigate freely on the internet, trusting the security that the websites or our devices provide us. So that in the end, someone can easily put millions of people in danger for a few pesos.

11:01

Yes, and just like you mentioned about the cloning of cards in gas stations, you say, well, the gas station does it because they give you money, right? And sometimes you imagine, oh, they took a note. But no, they are literally pesos.

11:15

Yes, 500 pesos, 100 pesos for a card.

11:19

Yes, so it's nothing compared to what you get and what they make you lose, right?

11:24

Yes.

11:25

Speaking of cybersecurity, in Mexico in general there is not much progress. I feel that if someone wants a career, they should study that because, as you say, it is very broad and I think it is what they will need the most.

11:39

Yes, I am currently studying engineering systems. Ok. Yes, I'm currently studying engineering systems. Okay. Obviously, I learned this through other means. I feel that the best way is to be self-taught because the schools will teach you, but I'll tell you, the field is so wide that there's no way you can finish, even if you do the degree in three years, you'll have a lot of things left over.

12:05

You have to specialize in a specific branch, whether it's cloud protection, servers, etc. Millions of branches more.

12:15

Hey, I would like to ask you, because, as you mentioned, we are talking about the most, or like the tip of the iceberg, of all the things you've seen in cybersecurity issues. For example, we were talking about card cloning, phishing and all these ways of scamming, which are the most common and the simplest, that we are... Well, somehow I think people know more now,

12:42

but I think it's getting even stronger.

12:44

Yes, too much.

12:45

And from there, from what we were saying before, before you came to the interview, you've had contact with very complicated situations, that go up to government trafficking networks, even, I mean, tell me a little bit about how you go from one thing to another.

13:00

Look, I feel that the greatest virtue of someone from the Red Team, in this case, is curiosity. It's the greatest virtue, curiosity. Because the more curious you are, the more you investigate and the more paranoid you become. Of course, maybe this is connected to this. Yes, because I... now I got obsessed. I didn't sleep. There were times when I studied and studied and reviewed and did and did. I mean, there were times when I didn't sleep and I was with my friend and we checked and inquired.

13:30

In one of these Minecraft servers we found another person, an American. He put you in chats that were already encrypted, they were encrypted, they had a specific key, a specific link. They were isolated servers. It's not as easy to access. It's not like you go to the dark web and you can see that. They are very private, very closed.

14:01

It's like being able to enter a safe.

14:04

Yes, exactly. And it's very complicated to have this kind of access because they are very suspicious people. They say, I don't know if you are a police officer. In this case, the guy was already paranoid and right.

14:16

And he said, I don't know if you are a CIA agent, I don't know if you are from the FBI. Or I don't know if you're from the FBI, or if we're decontaminating. No, I'm from Mexico. And I have nothing to do with those types of institutions.

14:33

And what was the promise? You asked for access to what? To the chats. To the chats, but did you know what they were about?

14:41

We knew there were about bad things. But at that time, out of curiosity, we didn't know.

14:49

What were they talking about?

14:51

Because they were talking about things like enclaves and we asked them and they told us. It made us curious. What's going to happen there? I told my friend, we have to win it. It took three months months to get it. And in between, because he said, I'm going to commit, but you commit to me.

15:08

That is, give me your information, which I know I can use in case you really go to...

15:13

To try to...

15:14

To try to deceive me or do something. And all this in Minecraft, I mean, there are specific services, right? They won't tell me which ones, so I don't try to...

15:29

And for adults.

15:30

Yes. But let's say it's not perceived as a dangerous place where criminal activity happens. Yes, exactly.

15:36

If you stay on the surface, if you get into famous servers and so on, absolutely nothing will happen. They are normal people. Obviously, you have to know where to look, you have to know who to look for, so they put you in other kinds of contexts. When we had access, we realized that this chat was about filtered things and theories, in this case, the US government.

16:01

But they sent declassified documents, that is, without censorship. So there was someone in the US government, but they sent declassified documents, that is, uncensored.

16:05

So there was someone involved in the US government who was releasing information there?

16:10

Yes, because he thought he was super revolutionary, that he was going to expose this and he wanted everyone to see it and upload it. And he said, do something, spread it, publish it. And at first I thought, oh yes, we're going to do this, but my perspective

16:30

changed completely from the revolutionary desire. When someone in the chat said, remember that those who finance your revolution are the ones you are attacking. That is, they will not allow anything to come out

16:42

without their consent. Because it doesn't matter what happens. There will always be someone who benefits from it. That's what struck me. The same people who are attacked by the millionaires... ...by the Europeans, foreigners, Mexicans...

16:59

...are the ones who finance the revolution you're celebrating. They won't let anything to happen without them seeing it first. In this case, when the FBI case came out, this guy uploaded the declassified documents. By declassified I mean that they were not with the giant black lines.

17:19

Yes, they are public.

17:21

Because the FBI tells you, ok, we are going to publish them, but censored.

17:26

Of course, and they type in 20,000 things.

17:28

They type in millions of things. Not many were uploaded. The few that were uploaded were enough to make me regret having gotten into that type of chat, because they were things... I don't know how to describe it. The emails that were emails, the photos...

17:47

You could see all of that? Yes.

17:50

A little bit? A little bit, yes. Not everything. But what I could see was... I regretted it to a point. I was curious. What do I do here? What do I need?

18:04

Leaving aside what they were sharing, of being curious, like, what am I doing here? What do I need? Because, I mean, leaving aside that, that they were spreading, there were also people who offered what services, and also people who always look for how to attack the other, right? So, you had to be very careful,

18:15

in a very hostile mind, I mean, no... Ah, that means you're paranoid, right? You don't know if you clicked wrong on something and they already have access. Yes, knowing how easy it is to get access. Yes, exactly. So you have to be very careful. And even if you had all the precautions, even if you opened the chat

18:30

in a virtual machine so as not to compromise your main operating system, it's no use.

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
18:38

But what did you see? Because right now, for example,

18:42

very, very, very, very, very ugly things are coming out.

18:44

Yes, very ugly things coming out. Like, if they f*** children, if... I mean, things that you say... I mean, that's always been talked about, being realistic. All my life. All my life, it's been talked about,

18:53

that if the adenochrome, and that if this, and that if the rituals... That's been talked about all my life. All my life, there are people saying, Are they crazy? Is it true? Are they conspiracy theories? With that little access you had, could you say it's true or are they conspiracy theories?

19:09

I'm going to tell you something very curious. When someone is going to publish a file of this magnitude, a month or a week before, the agency in charge of that file is going to say that they are conspiracy theories. And the day they publish it, no media is going to pay attention to it.

19:24

That's howin everything is.

19:27

It's that simple. If you ever heard of a conspiracy theory and you saw it published, then the worst thing is that it was real. But unconsciously, it got to you months or weeks before you pay attention to it. It's the simplest way in which this kind of government gets rid of all these things. Deserves.

19:44

Deserves. How do you get rid of these things? By deserting. Deserting?

19:46

It's very easy. We see it every day. Even with cases of disappearances. A 19-year-old working boy, living an impeccable life, is forced into recruitment. How easy is that? Because they don't ask for proof anymore.

20:06

How easy is it to say, I was in the mine, he sold it, that's why it happened to him.

20:09

Exactly.

20:10

And how do they all take it without questioning? Why do you say that? Ah, well, yes, I was in the mine. That easy? And you say, ah, well, yes. Once there is proof, everything is very... As we say, everything is easily demerited. Yes, it's just that...

20:26

No matter what means you use, everyone is screwed. Everyone is absolutely screwed.

20:33

Yes, I feel like whenever there's money, it can be perverted. Because maybe you say, well, this one, maybe this one, without saying anything, it's not exactly that they tell you what to do, but maybe the brand that pays them has connections with this,

20:47

has to do with it, so they won't push it. Sometimes I feel that sometimes it's not even, or it can be that they are verbal agreements or not spoken, threats, and also many times those who finance this, well, that doesn't even come out. It's not even questioned.

21:04

It's like maybe sometimes the journalist says that there are many cases where they do buy them, but sometimes it's not even the journalist who says, I'm going to do this. I've talked to people who say,

21:16

I've tried to get this note and they block it.

21:18

Yes, exactly. I feel that the media, like you, are independent because you show reality, a very raw reality that bothers and sometimes when you tell the truth, someone doesn't know what to do with it and totally deserves it.

"The accuracy (including various accents, including strong accents) and unlimited transcripts is what makes my heart sing."

Donni, Queensland, Australia

Want to transcribe your own content?

Get started free
21:33

Or even the same people, right? Like you say, no, that's too dense, I don't want to live in such a cruel world.

21:38

It's blocked.

21:39

No, thanks, that can't be true.

21:41

Many people are already so used to ev avoiding or normalizing things, and they prefer to look elsewhere. So these types of media, like yours, are the ones that make these people uncomfortable, because they don't have censorship. So they can't say, I don't want this to be uploaded or I don't want this to be disclosed.

22:00

But they can't do anything either, because if they do something, people will know why or who it was. They will end up deducing the problem. So, it's unlikely that something will happen to you.

22:13

No, stop it.

22:15

It's unlikely, because you are a very public person, very famous in in journalism. I've seen many examples at universities. If something happens to you because of something you say, and someone doesn't like it, it will be extremely obvious why that happened to you.

22:37

Governments complain a lot, but change also begins in us. If you don't start to be aware of the things that are happening around our country and I don't know if I, for example, watch this episode and say, well, I'm going to be more careful and in a week I'll forget it, the situation will continue exactly the same. Although I was on both sides, both helping and attacking,

23:02

it's not cool. Because in the end, everything ends up coming back to me.

23:08

And how dangerous, because, for example, going back to the topic you mentioned about Mindframed, these files, which at the end of the day are already very complicated issues, that you even say, well, I need an external server, that they can't link my IP,

23:21

and if I ever open it from my TAL, and it's like it's already starting, or as you say... A paranoia. A paranoia, but there are still more things that you have known, that you have realized. I don't know if it's the same through Minecraft, or has it been through other places?

23:34

So, let's get into the famous web read, right? Anyone can enter. It's not that complicated. You just have to be in a virtual machine, preferably so as not to compromise the main operating system. And a Tor browser comes in, you look for links on YouTube, Google, Reddit forums, and one will come out. Many imagine that the Deep Web is like a web page, where all the things are.

24:04

I imagine it as a giant black hole.

24:07

Not so much, yes. Many people think, oh, it's for sale, and the photo, and it goes here and there. But most of the time it's a page with many links, like Instagram. And totally blank, with all the links. You go down, you log in one, it connects you to another server, and there it tells you, sale of weapons, and so on, and so on, which is like the basics.

24:32

From there it continues like the dark web, which is this...

24:35

Deep web and dark web are different.

24:37

They are very different. A curious fact is that they were created by the CIA, to be able to control the traffic that existed in this type of sales. Illegal. Curioso fueron creadas por la CIA para poder controlar el tráfico que había en este tipo de ventas.

24:48

Ajá. Ellos saben todo. Pero pues, todo es dinero, todo es economía.

24:53

Como dice, siempre hay alguien beneficiándose, ¿no?

24:55

Siempre va a haber alguien beneficiándose de todo. Entonces, ahora sí que aquí viene el saber buscar, ¿no? Que realmente pues es muy superficial, o sea, no encuentras más allá que no anything beyond what you've seen on YouTube.

25:07

Really, drugs, this... Pedophilia. Oh, yes.

25:10

Notice that...

25:11

Oh, excuse me.

25:12

That can be found a lot in a music player called Ares. If you type in the word children, you get videos.

25:21

That easy? Yes, it's easy. It's just that sometimes it bothers me because you think about what is deep web, dark web, and I don't want to say the place, but we were talking to certain people who were talking to us about rat networks. That's a video we were going to talk about, but the truth is that they are such strong and complicated topics

25:43

that we didn't even want to touch it. Because it's so obvious for people to know. And they gave us access through Google. It wasn't even a deep web, a dark web, that you imagine these places are very hidden. It was literally a catalog of girls of different ages. Foreigners, most of them. Yes, or migrants.

26:06

You could get in so easily. I mean, they tell you to pay your ticket, go to cdmx.com, like that. But there were so many girls, and you say, how is that possible? It's not possible that they haven't seen it. Simply, when you start to see it, you say, these are spheres of very high power

26:31

in which I consider that there is no complaint. I mean, no. I feel that, unfortunately, there are times that there are issues that are like, we say, putting a bullet in your chest.

26:40

Exactly. Sometimes, it's playing roulette with those issues. Because there are so many sick people who consume it for their own benefit, but behind those people is the people who manage it. If you mess with them, they have a lot of money. I'm not talking about the millionaire from Polanco. I'm not talking about people who already have accounts abroad to be able to launder their money.

27:04

Yes, amounts of money that we can't even put in numbers or that we don't have in our minds to think about.

27:09

Exactly. I think the most famous case in Mexico was the one in Acapulco. We have to understand that this was made known by a journalist who unfortunately was very damaged by these businessmen who managed her. She published a book, I think it's called The Demons in Eden or something like that. It was the most superficial thing she could teach. And what she really should have taught, she didn't publish, but it can be found.

27:37

This started first in Cancun. In Cancun, many businessmen and hotels gave her foreign them services to foreigners. They gave you money and foreigners. They showed you a catalog. I mean, very shamelessly, as in Catalan.

27:51

Very specific too.

27:52

Yes, very specific. So, mostly they were foreigners, because they were expensive services, obviously. It was how it could be done.

27:59

I even came to know that suddenly one thinks that girls, if there are cases of rape, of tata and all that, but many times the parents go and offer.

"I'd definitely pay more for this as your audio transcription is miles ahead of the rest."

Dave, Leeds, United Kingdom

Want to transcribe your own content?

Get started free
28:08

Exactly.

28:09

That's what's more awesome, that sometimes the parents are those who say, I have a four-year-old girl, how much do you give me?

28:15

Here's where I'm going, in Acapulco, I think it was in 2013, when a Canadian was found kissing a girl in front of his parents, who were like an indigenous girl. His father was in front of him, and there were two girls in the middle of the street. Until they recorded it.

28:29

But imagine what happened, that even people said, well, here on X Street.

28:34

I mean, it was already very normalized. Then, possibly, Acapulco, which was where it became more famous, for the same thing as the journalist Lidia Cacho. She suffered a lot because of these businessmen. This man had many contacts with very important people in the legal and political sphere. He's like our Mexican Jeffery.

28:53

When he saw that the complaints were already being implemented in Cancun, they decided to move their business to Acapulco, which was where he made this kind of thing because it was such a shameless way that it was even colluded with the one that was as a rector or director, I don't know how to say, of the DIF, where she gave the children. She said, give me so much and I'll give you so much.

29:20

That's how it is a recurring theme, not only in Mexico, but also in the United States. And I don't know, but do you remember that not long ago there was news that there were children who used it for this kind of horrendous practices in the tunnels of New York?

29:44

The hate.

29:45

They released some children and even it was even talked about children who were raised just for that.

29:51

For raising women. Here comes another topic.

29:55

You say, how can it be possible? But it's so atrocious that you don't believe it.

29:58

There is an Israeli intelligence group called 2-800. It is a military agency that arrests children The Israeli intelligence agency is called 2800. It's a military agency that arrests children. Because they take them out of high school to recruit them. And if they pass the corresponding tests, they get into this intelligence system because they use cyber warfare. Most of their ex-members are people who know about cyber security in a brutal way.

30:23

They use their software to spy in an incredible way. They can create a software with 5,000 lines of code in less than two days.

30:33

Okay, for people who are not programmers, how long would it normally take?

30:39

I think like a month.

30:43

Okay, so like a very fine job in two days.

30:47

Yes, obviously, you have to understand that this is a group of people who are military. So, this whole group is very extremist because of their religion, which in this case is Judaism. They are very much guided by their beliefs. Their biggest accreditation of this group was dismantling a nuclear system in Iran with malware. They infected a computer

31:11

and made an exoplanet the bases in which they refined this element to create a nuclear bomb. What they did was to infect from the inside with social engineering, obviously someone from there put a USB into a computer

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
31:26

and the malware spread for a week until they found their target, which in this case were the turbines that could extract all this material. What they did in those turbines was centrifuge them and stop them, centrifuge them and stop them.

31:44

They centrifuged themuged that they exploded. They dismantled a whole system in a country simply with a USB.

31:52

I feel like most people don't understand what can be done, right? How far can a cyber attack go?

32:00

Exactly. It can affect too much. I think the most famous case was with the Pegasus software. It's clear that it wasn't directly attributed to them, but it was a coincidence that those who created and founded that cybersecurity company, which doesn't exist anymore, by the way, were ex-agents of this Israeli group.

32:19

Pegasus is a software that was predominant in the time of Peña Nieto. This software was a malware spy software that with a simple call had access to your entire phone. It was an impressive spy software.

32:34

So you answered a call and it went in?

32:37

No, no, without answering. It just went in.

32:39

So that exists?

32:40

Yes. Because that's like from TV.

32:42

Yes, sometimes reality outweighs fiction. So, yes, it existed and it was the most famous case because Peña Nieto bought it. He bought it, it was one of the countries that started to make it public, buying this type of espionage tool from Israel. He used it a lot in the cases of the 43rd Ayotzinapa, not to find them, but to watch out for those who wanted to find us.

33:07

And this was also known in this type of forum that I was in. So, in those forums, it was purely for sensitive information. Yes, because most people, some sell it to very specific people who make use of an unknown, for them to make use of it. I honestly don't know why anyone would want to buy something like that. Someone very curious, maybe. And there are people, as I told you, of this type,

33:31

who felt like the most revolutionary people in the world. And they wanted to be known. And if it was a world revolution, what thing would they do? So, this appears here. They watched these types of people so that the case wouldn't become so media-heavy. No. That's really cool because then... You know, there's always this belief that...

34:06

That's why there's Telegram, right?

34:08

Exactly.

34:09

Because they tell you that... In your WhatsApp everything is visible. It has reached the point where this rumor, this belief that it's probably true... Because then, even simple things, right? You notice it in simple things.

34:21

Let's not go to something that has to be necessarily violent. You send a message to your mom, I would like to buy a bicycle. And there you have it, this chat is encrypted so that no one, even God, can see it. Cut to bicycle commercials.

34:36

And you say, ah!

34:47

request to track the app.

34:49

This is so that, supposedly, if you look for something, you don't see more of this type of content. Which is something that's really not going to happen.

34:57

It's like giving us a little pat on the back, so you can say, oh, don't cry.

35:01

So you can say, oh, don't cry. So you feel safe. Basically, that's it. So you feel safe, so you can surf. But it's not true. Obviously not, because your data is surfing the internet all the time.

35:16

Do you think it's very worrying the way we are exposed and we don't realize it? Or, you, knowing all this, do you think the average person if they knew what you know Exposed, I'll say come with you. You can almost went out. I told several to a stock on the lap And I put a video Chris Casey super and okay to service. Yeah, I think I think a romper. Yes, I

35:31

You're gonna get a little is no see Tomar as much precaution is per case in the canada de nada temeno Just precaution is in quantum staff us. No, I can add a cause. I'm a sincere Cedar na persona promenade More than anything, very simple things. Yes, from an average person, day to day. But, for example, I got to a point where I got into a paranoia for this kind of topics, where I covered the camera of my computer, blocked the microphones. I got to a point where I got to encrypt it,

35:57

I got to completely uninstall the operating systems, because I have a dual-bot that used Windows and Linux. I completely disconnected from Linux, I disconnected from the other operating systems. There came a point where I even felt like throwing a drill into the computer

36:18

and saying, no, I don't want to do this with your hardware,

36:21

it has nothing to do with me. What has traumatized you the most?

36:25

Jeffrey's case.

36:27

Really?

36:28

Yes. It's a picture that even makes you nauseous. It's a group of famous people. Not famous celebrities, but businessmen. To describe it, let's say it's a table like this one, a little longer. This one looks like it's a tropical environment, or at least that's what you can see, because there are palm trees in the background and a pool in the background. There are two people with animal masks, but not masks, but those that overlap with a thread.

37:14

Like antiphases. Like antiphases. There are these people and in the middle there is a woman, I mean, like an open woman with her legs tied back. I don't know if you can understand me. Like a pig, but she's like facing forward. She's held by a bar. So she's like diagonally, but with all her legs back. She's totally open about this.

37:39

So she's lifeless. Yes, she's lifeless. And there's these people with plates, you could say. That's the picture that left me the most disgusted.

37:50

Like a buffet?

37:51

Something like that.

37:52

Oh my God.

38:00

The context is shocking, isn't it? Like a normal family meal.

38:05

And everyone laughing. Like a chicken family meal. And everyone's laughing.

38:06

Like a chicken.

38:07

Yes, and everyone's laughing. One is passing the plate to the other, laughing. And there are two others, there are many more people, but you can see the background. And the four main people you see, one is holding something to of wood to cut.

38:25

The other two are passing the plate to one another. And the other is just standing there, looking. The other one was like altars to deities, full of blood. I think rituals are the basics of someone who does that.

38:43

It's interesting how these delicate things are mixed with deities. I feel that it's something that people, or many people, tell us that has nothing to do with it, that they're not rituals, and that it's not a... And also, all the time, certain symbolisms are made present, certain things that one sees in the great spheres of power, that you say, oh, that's it, how can everyone be doing the same thing if it doesn't mean anything?

39:11

But what happens? What you say, Meritano, you are stupid because you believe nonsense, but there is an adoration to certain deities, which also They also explain the horror of the sacrifice and everything that has to do with it.

39:28

Yes. In the context that he sent us with the document that this boy exposed, they made it clear that in the mail he said, I'm sending you the latest news about the great booty sent by Jeffrey. He doesn't say who sent it, it was like an email. Obviously, we don't know his emails. In the next photo, it's just a sent photo, there's no prayer.

39:55

It's just a photo to send, which is the one of this altar. Apparently, they worshipped very specific deities. One of them is like an owl.

40:09

I've seen it, they say it's in the dollar.

40:13

This is a deity that is attributed to knowledge. I investigated it on my own and it seems to be a demon. This demon grants you knowledge if you invoke it. It seems to be one of the least dangerous,

40:37

as far as you don't make a pact with it or ask for anything. There is no pact.

40:38

Exactly. But there is a consciousness. The demon says, ok, use me, but you know what terms you're going to use. And the next one is Baal. In fact, Jeffrey has a bank account with this name, which is the main one, so to speak. I don't know why this kind of people with so much money lend themselves to doing this kind of thing.

41:02

Or do they has these beliefs.

41:05

I think that in the majority they say they are Catholic or Christian, and on the other hand they are giving to deities many things. I think that a human life, money, sex, many things. In fact, something very funny is that they used to exclude Elon Musk a lot. They said he was a freaky kid. They said, that freaky kid was talking about rockets. He was talking about those rockets.

41:33

And they excluded him. They never invited him.

41:36

There's an email saying, invite me to the craziest party you have. And you're like, no, dude.

41:44

They said he was a very casteist community. But this type of person is in this type of situation. If you see them without context, you can think they do it because they do. But...

"Cockatoo has made my life as a documentary video producer much easier because I no longer have to transcribe interviews by hand."

Peter, Los Angeles, United States

Want to transcribe your own content?

Get started free
42:01

It's more sinister to think that they do it for some exchange of power or just for an offering to a deity in exchange for something, because it's not just a simple worship, there always has to be something they ask for.

42:15

Exactly, there is always something in between for you to be able to make a pact with a deity. I'm not a diagnostic person. I don't think this exists. You can do it for the Netherlands. But if you don't give them the power, then no. So I think that's what it is. And the easiness with which the US is in Mexico.

42:35

That's a very relevant issue right now. When they say American invasion... ...you can imagine the army literally crossing the border, and military against military.

42:50

Exactly.

42:51

But how long, without surprising us, until this series of n****s. How many of the CIA's DEA were here in Mexico looking for narcos. They've always been in there.

43:06

This is something that intrigued me. You don't know the famous guy named Barbie.

43:14

Yes, he's very famous. He's about 18 or 15 years old. Yes, he's very old.

43:22

This surprised me a lot. This was something that really surprised me. He was an American citizen born in Texas. Before becoming a narco, he started as a narco agent under the DEA.

43:36

He got more involved and gained power.

43:40

So he was an agent under the DEA?

43:42

Yes. Well, at that time he was already an agent. But when he became an agent under the DEA agent? Yes. He was a... Well, at that time he was already a former agent. But when he became a DEA agent, he sent information about the Sinaloa Cartel, about the Zetas, about many other...

43:55

...institutions.

43:56

...institutions. This person deviated a little from his duties and became a fundamental part of this cartel. So when he was captured, many people saw him as very cynical. Why is he smiling? Why did he let himself be captured? He said, I have already fulfilled my duty, I gave them information.

44:21

When I was extradited, because he was not impred here, they extradited him to the United States. He told them when they extradited me, give me immunity arriving there. What many do, right? They say let's go. Yes. Exactly. So when he returns to his country, right now he is living normally with his wife and daughters in a place in Houston. There he is, happy with life.

44:47

He's in a great mood.

44:48

Yes, and also... It's impressive how the CIA and FBI are in Mexico. They control the f*****. You can see certain celebrities of the CIA and be able to say, oh, he's the good guy, he's the boss. Well, behind him are institutions that allow it.

45:11

Because a country with this security, with this technology, do you think it's going to allow tons of people to pass through your country every day?

45:18

No, I feel sometimes, sometimes I feel like, I don't know, Sometimes I watch the news and I feel like it's like the soap opera of the 90s. Well, yes. Now what do they want us to think? Or where do they want our mind to go? What is this fiction that you are going to tell us about, for example, now that they are fighting? And then I say, they must be friends and they make their... Tomorrow we say, no, he's going to be friends, but tomorrow they'll be like, ''He's going to be crazy.''

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
45:48

I don't know, but it's like that.

45:51

There's a saying that says that chess players are good friends. After moving the board, they shake hands and leave. Many people think that this has been going on for years. For a lifetime. For a lifetime. The US is not involved in politics like your friend, the fanatic. Sure.

46:13

No, I mean, or more like that. So, they are aware of absolutely everything that happens in our country.

46:20

Hey, and how do you live your life being aware of this? Because, well, I mean, you've been life being aware of this? Because you've been in the game for three years. Minecraft. You were in Minecraft and then you moved here and started to become a professional. Now you are officially working in cybersecurity. It's been three years, which is not much.

46:43

Yes, not much. So you have a long life ahead of you.

46:47

A lot to learn.

46:48

Well, to learn, but to find out.

46:51

Yes.

46:52

How does that make you feel? What do you think about it?

46:56

As I was saying before, this guy's comment, who said, remember that we are financing your revolution, the ones above. It was something that really hit me. Because you live with the intention of letting it pass. Because you know that absolutely nothing will happen. The cases of the elite, after what people know,

47:27

is the reaction of the elite, which was none other than uploading videos and TikToks. But not really giving light, giving focus, giving follow-up to the people.

47:33

What's happening? We're not going to... I mean, nothing.

47:35

And with the ICE, with Trump and all this, and more so now that he's the current president, less. Because he was very friendly. He was... Presidente menos porque el era me easy more We're gonna get an hermanos Jeffrey Trump. I senses I videos they use a single it always

47:53

You know it's my book. No Justo como que también a yes, can I wanna piece a la famosa cortina de humo no se excepto que también desde I come over a serious. I like a silly like a C. C. Just a muy muy You also say, how is it going to be? And it happens. And it's just very... You call it social engineering, right?

48:10

Yes, exactly.

48:11

I guess it also works the other way around. Right now we're going to upload this, they crash, two or three of them come here, they throw us out and we say, oh no, no.

48:19

And that's it.

48:20

Exactly. So, now, day to day, it's living with that weight, knowing that there's nothing in the world that hasn't been approved by those who control everything. And it's a bit disappointing to see so many fights every day, to be able to give a lot of visibility to something,

"Your service and product truly is the best and best value I have found after hours of searching."

Adrian, Johannesburg, South Africa

Want to transcribe your own content?

Get started free
48:39

when in reality, it's people who allow it. Because your revolution isn't revolutionizing, it's just advancing allow it. Because your revolution is not revolutionizing. It's just advancing the process of something that was going to happen and that someone would benefit from it.

48:51

It can even be part of a script, right?

48:53

Exactly.

48:54

And now that they fight and two or three people come out and say, no, how can it be? And we capitalize this like this and we put this in. That also, until when are, until you buy a car. I wanted to buy a car a little while ago and they put 10 problems in me to solve them and sell me 10 solutions.

49:12

And I said, this is something simple, simple, that we can identify. It also works the same with politics, with everyday life.

49:22

Yes, with everything. In fact, you also realize the influence of the state of Israel in Mexico is too much. And all over the world. I don't know if you've noticed that most of the US presidents have been Jewish.

49:36

I hardly pay attention to that.

49:38

Realize the only one who wasn't and who didn't recognize Israel as a legitimate state was Kennedy. No one can take that away from them. They are too good. But the way they get into countries to control the media, the people... I'll give you an example of a company called Palantir. This company was used precisely as cybersecurity, to protect data. Later, I evolved to create different software.

50:27

There is one called Botam. This software takes specifications of a person. For example, tall, must a mustache, middle-aged, with this, this, this, and this, and this software will scan all the people in your country who agree with this type of statistical routines.

50:58

There are cameras everywhere, that's really cool.

51:00

Yes, so if this is executed well, it can be used to find criminals.

51:06

Yes, it's always like they sell it to you, right? Facial recognition, but how are there countries that just like that, with facial recognition, can detect you in the street?

51:14

This software analyzes you even by routines, by a specific routine. If you need a very specific profile, a very specific routine, this software will tell you everything about these people, where they live, how they measure, how they are, all the possible characteristics. And this is used a lot by Trump, one of the two who acquired this type of tool.

51:38

Gotham? It's called Gotham, the software of the company Palantir, which in fact has has a strange ideology. Because engineers are called engineers sent to the front. That's how they are described.

51:53

Like some...

51:54

Yes, and also the CEO is very strange. He puts a lot of ideologies in his company, manipulates a lot of his employees too. In conferences, he manages all his employees through a site that he created. So he can make a video call out of nowhere, he can send a video, he can write, all his employees see it.

52:16

So they influence a lot, right? This type of tool is used precisely for not so good things.

52:21

No, and also that you put a lot of things in our minds, like that rumor that sounds super weird, it can be true. Yes, exactly. For example, I say something that is very X, but it's silly because you realize that once...

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
52:34

well, X. I bought... I realized I had a game and it just came out like if you click here, we give you gems. I looked for a page. I clicked on the page,

52:47

and obviously they didn't give me my gems. I said, no, my gems. But from there, in fact, I had to throw away this cell phone because it didn't allow me to take pictures or anything because it said, camera in use. All the time it said, camera in use.

52:59

But in my mind I was like, ok, so, I said, I was like, no, like this, oh no, but how do you cover it? And you start getting freaky and you say, no, no, who's watching me? But I was like, who's watching a Chinese? Who?

53:13

You don't know, right?

53:14

Or what for?

53:14

Most hackers who do this kind of thing are from India.

53:19

Oh, a Hindu.

53:20

Yes, it's what a lot of people don't realize, that most of these types of people... It's funny because it happened to me once, they tried to attack me with a rat, and obviously this guy looked very obvious, and I told my friend, let's turn this guy around. And he said, yes.

53:43

And then X or Y things happened. We had remote access to his computer. When we saw the camera, it was literally a Hindu. He was lying down, he had his laptop here. He had a giant focus pointing at his face, with music from India in the background while he ate.

54:04

Ding-a-ling-a-ling. Yes, something like that. And he was like this me with music from India in the background while he was eating. He was like, tingling, tingling, tingling. And we were just watching. And when we sent him a message, a screenshot of us having access to his computer, he made a face like he was taking out his eyes, and he was choked with his food, and he started insulting us in his language,

54:22

and he turned off the computer. It was very funny because you realize that most of these people come from India. They are also very good at computer science. They have a very good computer skills and most of the scams they do are through call centers.

54:36

The people who stole my Facebook page and who are trying to hack me are always from India.

54:43

Yes, always. Yes, they are Indians. Facebook Is It

54:49

No, you see the case that didn't call centers montazos, yeah, no, no We put him to the camera

55:00

Oh To manipulate you? If you get caught doing something wrong?

55:08

No, I did take my phone off. I said, once, but I didn't leave my camera on. I said, no, no more.

55:12

Yes, because you can be very confident and they catch you in a compromising profile. It's like... I have this video of you. I have this photo of you. Although they can also use it

55:31

That's more like a more targeted attack, right?

55:34

Yes. If they catch you on a good profile or take a selfie, that's all they need to be able to.

55:42

No, because you always have a good profile. Because now that it's remove it with Face ID, you're always putting your face there.

55:48

Yes, exactly. It was the last thing they needed. And then, unconsciously, you're the one who gives permission to these accesses. Then the screen appears, the quick window, and you give the access to it yourself,

56:00

just to remove it.

56:02

Or to what you access when...

56:04

You're normal to another screen. Yes, yes, accept, accept, accept, accept.

56:06

So, you don't even realize it. And I mentioned to you... Well, I, with these friends, and this kind of things, at first it worked well with the scams, of...

56:18

of this... Diddy, right? Later, we started with this that I mentioned we started to mention the rubber ducky, but we did it in the countryside. This friend told us if there were police nearby or what routes were being taken, there were no cameras.

56:36

I was with another friend from high school, we went to the OXXOs, or the car service shops, we put the rubber ducky in, and from there we had access to transfer the money through their transfer system. We didn't go through the cash register, we didn't go through the cigarettes, we went through their system because their system is very old. And the worst thing is that it's very funny because we don't use violence.

57:01

We really tell the ladies, just have a new stamp and let them put their UCB. We even start talking to the guys.

57:10

Let them put their UCB there.

57:12

Obviously they knew it wasn't a good thing.

57:15

A little money.

57:16

Yes, the majority did. The last time they caught us was for a lady. Because most of the time we were like, I'll transfer you to another bank and you'll pay. And they didn't tell them anything because in the end they were going to take it as a robbery. So they didn't... They didn't investigate further.

57:34

And also, it's also important to clarify that it's wrong, but we didn't rob the kid who went to school. Or the man, I mean, people... We used to take the kid to school. Or the old man.

57:46

People who were obsessed.

57:48

You were lucky. Yes, because we didn't take 100 pesos. We did it a few times. About 8 times. And we would get about 80,000 pesos. Obviously, we were several, so it was divided.

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
58:02

That's why it's a big amount. Yes, but the money would go through different accounts before it reached the main one. Although, obviously, we couldn't trace it because the cyber police didn't have the budget to follow up on a case of cyber harassment, let alone for this.

58:15

Yes, and you leave the budget, the desire, the staff, the capacity, many times.

58:21

Yes, the capacity, more than anything. So, most of the time mostly went out with our own. It was easy for us, we didn't do it with nerves. And the last time was when, by mistake, I've always said that the biggest exploit of a system is the human. By mistake we left the car in front of a security camera of the C5.

58:44

So all our route we had disappeared. They took 40 minutes to catch us, but... Anyway, when they caught us, they crashed us. There were like 20 patrols when they were passing us to the MP. He was going up a bridge, and when we were going down, we saw all the patrols, and were passing us to the MP, he was going up a bridge, and when we were going down and we saw all the patrols, I told the officer, because she was a female,

59:09

I said, well, who did they catch? And they tell us, no, because we have been looking for them for a long time. And we say, but why so many operatives? They are not catching a cop, right? And the police tell me. It's just that they already had a rat and we couldn't find them. And if we didn't catch them, they'd scold us. That's what they told us.

59:27

That's also great, how the police suddenly works conveniently because when they have an operation and a clear objective, they can catch it 100% and they are trained. There is a lot of technology, the cameras, all the E5s have a 4K, 8K capacity, you zoom in, you can see the camera perfectly,

59:45

you can see the face of the person, you go under, you can hear everything. Everything, everything, and if they want, they can grab you. But very selectively, right?

59:54

Yes, the coordination that C5 has with the ground patrols is very good. They have an extremely good coordination capacity. But if someone turns around, knows where the cameras are, knows which ones work, knows which ones don't, it's going to be very complicated because you appear in one camera here and then you appear in another one here.

1:00:17

And the difference is about five minutes. So to go back to triangulate you, it's another five minutes. So our strategy was to do that and jump to the state. Because when you jump to the state to change the PITASO, it's 15 minutes because the Patriots can't get there.

1:00:33

So I'm like with the tickets, right? You have your fines in the CDMX and you pay your... You have your tickets in the EDOMEX and they don't show up. Like there's a a gap between systems.

1:00:46

Yes, there's a gap between systems because I don't know why they have their servers divided. I don't know if they think it gives them more security.

1:00:54

Who knows?

1:00:55

But I don't know why they divide things. They divide things a lot. Something I also realized is that the INE has its servers, most of them are public.

1:01:09

That's bad, right? Yes, too bad.

1:01:11

That's why it's so easy to hack, not directly to the INE, but its servers, where they store the information.

1:01:17

Well, that's the worst part, because with the INE they can really make you crazy. Yes, too much.

1:01:21

And they've done it countless times, and those data are sold like hot cake. You can get them on Telegram. If you say, I want 100 INES, no, 100 INES will give you 1500. Give them to me.

1:01:36

No, they store it, because every photo they take of you, when they print your IN is saved. It's saved. They give you a printout. And all that information, before you print it, is saved. So that's what they want.

1:01:54

The passport is already there. I scanned the iris and a lot of things.

1:01:57

Yes, the biometric data is something else. In fact, there was a company that I think if you scanned it in a little ball, it would give you so much money. I've heard of that.

1:02:05

Look, let's see what you can deduce from this. We realized that in very, very vulnerable areas, let's say where there are people in a street situation or out of hospitals, there are people who come up to you and realize that I tell you, hey, let me scan your iris and take a picture of you. And what people were explaining to me was that they create an account, I don't know what account, because they couldn't explain. I give you 100 pesos and I scan you, and they leave you.

1:02:30

So, what did they do? Like an account of what?

1:02:33

Because I think they were given money there. Yes, they were given money. Yes, they give you, in fact, in Ciudad Jardín, in that one, there's one of those balls. You enter the square and there are those balls. They give you 500 pesos if you register. It's because they collect your biometric data

1:02:51

to be able to use it in a base later. It can't be for something bad. It can be simply to collect information... From people.

1:03:00

From people.

1:03:01

But it's a lot of money, right? Yes, it's a lot of money, right? Yes, it's a lot of money, but you don't know what purpose they will use it for.

1:03:06

It's very dangerous.

1:03:07

Yes, it's a double-edged sword. It can be that it's good or it can be that it's not.

1:03:12

I don't trust anyone anymore.

1:03:14

The truth is that it's highly recommended not to trust anyone anymore. It's very distrustful. Because the more the world is digitalized, more security will be needed. And Mexico is the security that is lacking.

1:03:28

You leave me very impressed with all the topics we have discussed. I don't know if you want to add another one or something else.

1:03:34

We touched on several. Yes, we touched on many. I don't know if you want to go into more. What else can I tell you? Besides what people know, the staff, how easy it is to access this kind of information.

1:03:49

I think it was very complete.

1:03:51

I tried to explain.

1:03:53

Yes, you explained it very well, but let them know that he has more songs still. So, maybe we can talk about a second part if people like it.

99.9% Accurate90+ LanguagesInstant ResultsPrivate & Secure

Transcribe all your audio with Cockatoo

Get started free
1:04:01

If they are interested and want to know.

1:04:03

We can do a second part.

1:04:05

I do have other songs to play. Too many, I think.

1:04:09

Or more specific doubts, maybe. We could do it. Because it's very extensive, all of this is very extensive.

1:04:15

Yes, I tried to summarize as much as I could the songs you asked me about, because if not, I would have spent an hour on one song. So, maybe I didn't explain it well, or maybe I cut a topic too short. But I tried to explain it as best I could. For people who don't know these topics,

1:04:35

maybe people who know these topics will find it easier, or maybe it will contradict me. It could be because there are do the same thing. So, if you're interested or want to know more...

1:04:47

Yes, let's leave it to the...

1:04:49

To the incognito.

1:04:50

Yes, to the incognito. I thank you very much for being here, Jack.

1:04:53

Thank you very much.

1:04:54

For sharing all this with us. And I hope people found this episode very interesting. I think these are topics that need to be covered more, because right now everything is digitalizing. Cybersecurity issues. because right now everything is digitalizing. Cyber security is the most common thing, and I think that a time of fraud is coming.

1:05:12

Extremely big.

1:05:14

With artificial intelligence.

1:05:16

That's another topic I'd like to talk about, because there are many scams. Look, people who like minors, create these accounts with artificial intelligence, and monetize them, not only fans,

1:05:29

monetize them with these types of characters created, or also to grab them.

1:05:34

It's more difficult.

1:05:35

You can't just quote them, and then they assault them, or expose them. There are two.

1:05:41

But with artificial intelligence, many people think that it will replace us No, pero pues sí, también con la inteligencia artificial. Mucha gente piensa que va a reemplazar a nosotros como trabajadores o como gente. Pero les quiero explicar algo, que la inteligencia artificial siempre va a ser creada para que nunca sea superior al ser humano. Ningún dispositivo va a ser superior al humano, ni a la inteligencia humana. Entonces que se queden tranquilos de que la mayoría de sus trabajos, pues, los even to the human intelligence. So, they can stay calm, I know that most of their jobs

1:06:05

they will be able to keep.

1:06:06

But...

1:06:07

Okay. This...

1:06:09

Well, I'll leave Nia's side, that they make me, but they even put me with a Spanish voice saying, only donate money to this account.

1:06:16

And I'm like, no, no.

1:06:17

It's like the ones that say,

1:06:18

I'm Chico Perez, give me 5,000 pesos. Yes, it's great. I mean, there are some that look very realistic, but it would be good. And leave us in the comments if you want to see more information about this topic. I found it super interesting. Thank you very much for sharing with us. Thank you very much for sharing with us. And I hope you liked it a lot.

Get ultra fast and accurate AI transcription with Cockatoo

Get started free →

Cockatoo