Is Your Child A Hacker?

Parents in Liverpool, UK, are being prepared to spot the signs that their children might be hackers. The Liverpool Echo reports on the launch of a “Hackers To Heroes” scheme targeting youngsters at risk of donning a black hat, and has an expert on hand, one [Vince Warrington], to come up with a handy cut-out-and-keep list. Because you never know when you’re going to need one, and he’s helped the Government so should know what he’s talking about.

Of course, they’re talking about “Hacker” (cybercriminal) while for us the word has much more positive connotations. And it’s yet another piece of ill-informed media scaremongering about technology that probably fits like so many others in the “People are having fun. Something Must Be Done About It!” category. But it’s still something that will probably result in hassle for a few youngsters with an interest in technology, and that’s not encouraging.

The full list is reproduced below, if you’re a parent it seems you will need to watch your children if:

  1. They spend most of their free time alone with their computer
  2. They have few real friends, but talk extensively to online friends about computers
  3. Teachers say the child has a keen interest in computers, almost to the exclusion of all other subjects
  4. They’re online so much it affects their sleeping habits
  5. They use the language of hacking, with terms such as ‘DdoS’ (pronounced D-dos), Dossing, pwnd, Doxing, Bots, Botnets, Cracking, Hash (refers to a type of encryption rather than cannabis), Keylogger, Lulz, Phishing, Spoof or Spoofing. Members of the Anonymous Hackivist group refer to their attacks as ‘Ops’
  6. They refer to themselves and their friends as hackers or script kiddies
  7. They have multiple social media profiles on one platform
  8. They have multiple email addresses
  9. They have an odd sounding nickname (famous ones include MafiaBoy and CyberZeist)
  10. Their computer has a web browser called ToR (The Onion Router) which is used to access hacking forums on the dark web
  11. Monitoring tools you’ve put on the computer might suddenly stop working
  12. They can connect to the wifi of nearby houses (especially concerning if they have no legitimate reason to have the password)
  13. They claim to be making money from online computer games (many hackers get started by trying to break computer games in order to exploit flaws in the game. They will then sell these ‘cheats’ online).
  14. They might know more than they should about parents and siblings, not being able to resist hacking your email or social media
  15. Your internet connection slows or goes off, as their hacker rivals try to take them down
  16. Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.

Reading the list, we can’t help wondering how many Hackaday readers would recognise as perfectly normal behaviours from their own formative years. And some of them look ripe for misinterpretation, for example your internet connection slowing down does not automatically mean that little [Jimmy] is selling a billion compromised social media accounts on the Dark Web.

Particularly concerning though is the final association of computer crime with children who are autistic or have Asperger’s Syndrome. Picking on a minority as a scapegoat for a public moral panic is reprehensible, and is not responsible journalism.

Still, you have to laugh. They remembered to include a stock photo of a hacker using a keyboard, but they’ve completely missed the telltale sign of a real hacker, which is of course wr1t1n9 11k3 r341 1337 h4xxx0rzzz.

Via The Register.

Liverpool skyline, G-Man (Public domain) via Wikimedia Commons.

109 thoughts on “Is Your Child A Hacker?

    1. From that:
      “If your son has requested a new “processor” from a company called “AMD”, this is genuine cause for alarm. AMD is a third-world based company who make inferior, “knock-off” copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well. “

      1. WTF?!?

        American Processor Chips…. So do they think the Ti-OMAP is American processor chips (Think of them saying they want to boot WinXP under DOS to run linux on DOSSHELL, type gibberish) or does their (COMPLETE) (UN)intelligence stop where their mental wardrobe walls finish?

        This reads like the genuine tin-foil-hatter* like writing. (On par with Jessie Ventura and Alex Jones…. Maybe they were an inspiration to this linked…WTF-story?)

        *Not referring to those whom came to their own conclusions about the world around them based on thorough self-investigation, skepticism, experiences and/or those whom think through the means of compare-simulate-and-re-compare (As a mental exercise of learning) thus including free-thinkers (to the extent those whom freely think are not auto-rejectees of factual information)

          1. Only realised that later when I could bare to read more than the first few lines.
            So take your “Mr.IamVerySmart” comment, hence forth and multiply like a hermaphrodite.
            People make mistakes. No need for such childish name calling (Unless you are genuinely below the age of 7? Then have fun, it is the internets after all)

        1. Oh wait, it’s from a satirical writeup. Nevermind.

          “Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

          If your son is using Quake, you should make him understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.”

      2. American Processor Chip? I see you are an agent of ISIS, everyone knows that AMD stands for Arabian Master Designs. It’s how they get inside our childrens heads. The processors are made in caves by slave goats and sold to the free world.

        All of this was told to us by the All Knowing Trump.

      1. Then you haven’t met the average society pleb.

        Seriously…. Because of the history channel, Ancient aliens show has gone through a phase of the (younger) general population believing it as factual, that somehow all religions are connected because the English language (That didn’t exist at the conception/event of those religions, thanks Mr Maxwell, Sitchin and Eric Von-skaam-again).

        The ensuing arguments and their refusal to watch the debunking thereof whilst claiming they know better and labeling others as Mr Knowi Tall!

        That is just one example out of the limitlessness of human stupidity (Or should I say, stupidity of the average Anglospherian society pleb!)

    2. Lol! From post: “BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War.” The best part has to be this though: “If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying ” glow-sticks” and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them.”

      1. I was going to post that bit, but that it was, too, much of a wall of text.
        That is what I was referring to as the author being off their rocker.

        — Linux is illegal……whaaat ?

        “They may take to carrying ” glow-sticks” and some wear pacifiers around their necks.”

        — I don’t thinkl they understand who they are talking about…..that sounds an awful lot like someone who dos ecstasy and/or other drugs.

        1. The pacifier thing was from the very early rave days. Various stimulant drugs make one grind one’s teeth, hence they’d wear a pacifier, which sort of became a fashion statement. The dayglo stuff was a repeat of the same thing from the first Summer Of Love in the ’60s. As a description of rave culture, it’s about 30 years out of date.

    1. Ok…. This was finally explained to me by a person who’s literacy in computing is barely past the on/off button:

      The two in the show want an excuse to get close and the computer happens to “Have a virus” (A Virus/app/self-duplicating-batch-file type application bomb).
      They both start to try to “Close everything” (So to speak, I actually don’t know what they were trying to achieve). As in blagging it so hard that their supervisor knew two people on one keyboard is plain stupid.
      The supervisor pulls the plug and gives them “the look” as a way of gently telling them off and in a way to mean he knows they were trying to flirt in a creative way…

      With that as the basis… This scenario now (Somewhat) looks a lot more valid…

    1. Pretty much every one of those applies more to a competitive team-based gamer than a hacker… Even 5 and 6 are terms that get used by gamers. 10 and 15 scream of pirating media…

    2. OF COURSE people that are interested in computers and so on are a really bad thing!!!!!! They would quickly unterstand what the NSA and other the-letter-criminals really do and how this affects your privacy and is a real problem, the gouvernment really dont want this to happen, so OF COURSE the call everybody that knows even just some Arduino-stuff a dangerous hacker-criminal-terrorist.

  1. I’m lucky I didn’t have a computer when I was in high school or I would have been locked up.

    I recall the teaches been concerned and contacting my parents because I spent all my lunch time in the library reading electronics magazines.

    1. Ditto. I was in Jr high when the CB craze hit its peak. Our neighbor had one, thought it was cool. I ended up getting a shortwave, that made me a chick magnet.

      The TRS-80 didn’t hit until I was a Sr. in high school. Of course, back then there was limited trouble you could get in, unless you dialed into NORAD and accidentally started a global thermonuclear war. That would of been bad.

    1. I taught high school physics and math in the U.S. and number 16 looks reasonable to me. Love the virtue signals from HaD, and extra points for working in “minority”, “scapegoat”, and “public moral panic”.

      And I have to ask, does HaD think of this type of hacking as an interest in technology? Isn’t it much closer to analyzing a language? They spend their time trying to figure out the rules of algorithms developed by someone else. Computers are just the media. The reward is in being able to read their Rosetta Stone and gain status among their fellow translators. The downside is that destroying other people’s work or business is of no concern. Their morals and ethics are like those of any other gang.

      1. As a director of and member of a range of different organisations within this sphere I’d say I have a significant number of friends somwhere on the aspie/autistic spectrum. There’s no virtue signalling, these are my friends, and bad journalism like that about them or people like them pissed me off royally.

        1. “Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.” You are a lot more sensitive to “circumstantial” and “some could” than I. Were you triggered? The experts in the schools a lot together under “autistic”, and “undiagnosed Aspergers” (which one sees fairly often) in order to meet the requirements for funding. The circumstantial evidence is probably the ability to concentrate to the exclusion of everything else. They called anything like that daydreaming when I was a kid, and I am darn good at it.

          By the way, your response is virtue signaling.

  2. Even better is the fact that their stock-photo hacker is using a Powerbook G4 judging by the keyboard. The likelihood that any brute force methods could be carried out in a short mount of time on a Powerbook is rather low.

    All goofiness aside, it is still concerning that they would choose to pick on kids with Asperger’s. That is multiple levels of not ok.

    1. I completely agree, i spent 3 years attending an education specifically for people with autism interested in IT, and I just so happen to be studying offensive security, however i have never met another autist(that i know of) that had any interest in security.
      I can’t speak for all autists, but to me it seems each of us have a unique interest that we are able to put enormous amouts of energy and effort into, for some it’s 3D modeling, for some(quite a few) it’s quality assurance, for me it’s security.

      1. There is an IT-company that ONLY hires people with autism because these people are REALLY good for checking source code and stuff like this, they can understand really complex stuff and so on. They also have people that are trained to “interface” betwen the “normal” people and the autism-people. http://specialisterne.com/

  3. Ironically, I was (initially properly and thoroughly) diagnosed with disorders within the autism spectrum, Namely having close likeness to Asperger’s syndrome.
    Through the rough childhood, In hell (One carehome I was at for 8 years, ran by a married couple as “staff”) the creature (I wouldn’t call it a womman because it would be an unintentional insult to all women!) wouldn’t allow me to use computer, learn about electronics,
    or anything at that matter (I kept moving between subjects as a result).
    I had to get hold of books and other reading resources to hide between story books and use a torch at night for reading.
    Heck, couldn’t make a lego-anything (For example) and say “Look a model car” to another young resident (same age group) without being told by the creature that I was talking out of my back side.

    In case anyone liked to know:
    That place is why I refuse TV altogether: about 10 years not owning an “installed TV” (By definition of OFCOM UK==FCC, Installed means antenna hooked up and tuned in… Nope, only a HDMI/DVI monitor: Tuner smashed to pieces and in an envelope to send to OFCOM if they try to be funny, Also legally it is up to OFCOM/BBC to prove internet usage of their site(s) for watching something “as it is being shown on TV”… However my proof is in my attitude about TV in general and especially others’ witness/personality-statements of my attitude)

      1. that is just horrible! does the couple still run a carehome?
        I think the law should equip children with clear and just rights, and schools should educate children about these rights, i.e. also explain where to find the authoritative source for these rights in addition to introductory summaries of them, and have access to a neutral form of arbitration/court so they’re armed with more than just words…
        it’s not gonna happen soon in this world/economy which depends (or perhaps erroneously thinks it depends!) on having a substantial fraction of the populace to be uncritical and obedient, which can only be achieved by raising a similar fraction of children uncritically and obediently…

  4. Hmmmm….. I scored about 75% in that little checklist.

    HOLY SHIT – I’M A HACKER!!! YAY!!
    I m3an L33T H@X0R!!!!!!!111one

    I never even knew! Right I’m off to “Hack the Gibson!” *reference ;)

    I think [Vince Warrington] who made up that stupid list, has done all his “research” by watching shitty hacker movies and a quick wikipedia search. Possibly didn’t even do wikipedia…

    Also *NOBODY* who is a hacker is stupid enough to go around calling themselves a hacker – they don’t last long in the wild! Similarly, anyone who actually knows what a script kiddie is, would not call themselves that either.
    I also like how ‘game hackers’ are mixed in with the black hat ops, cause yeah they are the same level right?…

    Oooh and lets pick on the kids who are on the autistic spectrum, it’s not like they have a hard enough time dealing with the world already. No, lets keep them away from any technology just in case. Don’t allow them to be alone on a computer, force them to be sociable by taking them out to crowded shopping centres and other busy venues. Or better yet, simply BEAT the non normal functioning out of them on a daily basis – your kids will thank you for it when they eventually grow up to behave like you want them to. Cause, you know, computers – they’re scary!

    What a lazy bit of FUD for an article, and the list is simply bull shit.

    1. Don’t forget the cold showers whilst being slid around the bath like a stirring spoon!
      Also don’t forget to say they can’t possibly lie because they have ASD, but call them an effing lair!!!! At least half an hour later, and for no reason whilst saying something impossibly their fault IS their fault!

      Force them to watch so much TV so they become sick to death of TV and never watch TV as an adult!

      Any signs of intelligence, call them stupid and if they answer back: Ask them, “Are you insulting my intelligence?!?!?”

      Split them up from their family by police, have them stay with a police person that hates them and suddenly likes them after a blood test, just to freak them out. Also have the kid stuck in a house for 8 years (with only school for outside of house activities) where-in the police turn a blind eye.

      Perform illegal restraint maneuvers on them like sitting atop them in a folded position so their knees crush their ribs

      Drug them to high heaven on: Ritalin, rispiridone, sodium-valporate to the point they know that something bad is happening to them but they don’t know why, what and how about both what is going on and how to stop it.

      Have a random family member of said carer strangle the kid until they are in toxic shock from asphyxiation over a five pound note.

      so-on and so-forth….

      That is why I don’t like: TV, Police, Social workers, Violence, people who insult me for telling the truth (saying how it is), and this list is also dragging along as well.

      So those who slate people as “Tin-foil hatter”…. In my case the government (UK GOV’T BTW) DID GET ME!!!! (And many other unfortunate people)

      A lot of the issues were due to the laws of the 90’s to early 2000’s relating to who has control of the kids in a family when the family becomes unstable (Only the mother was unstable, but she ran-off, father and us were perfectly stable… but the law was back then: the mother is always right…. Even if completely deranged and sectioned!)

  5. I wrote this response on the Register but it doesn’t seem to have been accepted. We can’t have a little truth spoiling a good storey can we.

    1) They spend most of their free time alone with their computer
    -) This is equally likely to be the result of abuse or bullying, you should punish them for that

    2) They have few real friends, but talk extensively to online friends about computers
    -) They have lost faith and trust in people, restore faith by accusing them of hacking

    3) Teachers say the child has a keen interest in computers, almost to the exclusion of all other subjects
    -) This is definitely a reason to punish them, of course loosing interest in *all* subjects would be fine

    4) They’re online so much it affects their sleeping habits
    -) This could be a result of drug use but we will ignore that and find a better deficit model

    5) They use the language of hacking, with terms such as ‘DdoS’ (pronounced D-dos), Dossing, pwnd, Doxing, Bots, Botnets, Cracking, Hash (refers to a type of encryption rather than cannabis), Keylogger, Lulz, Phishing, Spoof or Spoofing. Members of the Anonymous Hackivist group refer to their attacks as ‘Ops’
    -) It’s called vocabulary, more intelligent people have a wider vocabulary, it’s time for that paternity test

    6) They refer to themselves and their friends as hackers or script kiddies
    -) What if they’re a white-hat? Should we also put all the police in prison because they have more association with criminals

    7) They have multiple social media profiles on one platform
    -) This is practically *all* children over 12

    8) They have multiple email addresses
    -) I do to and I didn’t even realize that I am a hacker

    9) They have an odd sounding nickname (famous ones include MafiaBoy and CyberZeist)
    -) How dare children express individuality

    10) Their computer has a web browser called ToR (The Onion Router) which is used to access hacking forums on the dark web
    –) TOR has just as many legitimate uses, better arrest the parents for having knives in the kitchen draw

    11) Monitoring tools you’ve put on the computer might suddenly stop working
    –) You’ve been *levelled up*, looks like there is going to be a big surprise then the paternity test gets back

    12) They can connect to the wifi of nearby houses (especially concerning if they have no legitimate reason to have the password)
    –) Or there was simply no password to start with

    13) They claim to be making money from online computer games (many hackers get started by trying to break computer games in order to exploit flaws in the game. They will then sell these ‘cheats’ online).
    –) Perhaps they’re dealing drugs, nah couldn’t be

    14) They might know more than they should about parents and siblings, not being able to resist hacking your email or social media
    –) Intelligent people are also very observant, they’re probably trying to work out who their real dad is

    15) Your internet connection slows or goes off, as their hacker rivals try to take them down
    –) Or is just one of those normal technical problems that happen from time to time, It’s pronounced para|noia

    16) Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.
    –) How dare you take the conditions like these and use peoples personal biases as a tool to draw a negative association to these conditions, that’s just plain sick (in a bad way)

    By the way, I am a technologist so I probably have a fairly good idea.

    1. As a teen who frequents this site, I can say I agree with all of these. It sometimes sucks to have someone say that you are wrong because of your age, then google it, find that you are right, and try to retain dignity by not admitting your blunder. Many people think all things are magic and its one thing to think everything is magic and admit it, it’s another to try to act smarter when you have no clues. Its sad when people try to blame thinks like slow internet on hacking (ever heard of H.D. Streaming and bandwidth?) Also it seems 99.99% of the time these “Hackers” are fakers. Connecting to the dark net by entering a special URL? Its on the verge of depressing when the librarian at school bans “Hacking The Website” (I wanted to see how an iframe embed worked) just because they don’t understand it.

  6. non-criminal/normal teen explanations:
    1. porn addiction
    2. gaming
    3. boring school
    4. facebook/pinterest
    5. they watch tv/film
    6. watched jurassic park or did something cool. isn’t script kiddie derogatory?
    7. got banned for sharing porn or used racial slur… probably porn.
    8. see above.
    9. who doesn’t?
    10. watching porn at school
    11. followed youtube instructions
    12. stupid neighbors/default password/youtube tutorial again.
    13. your kid’s pewdiepie
    14. parents write down password/store on computer/leave computer logged in/talk too loud
    15. downloading too much porn
    16. that one’s just a stereotype

    1. When I was a teen (VIC-20/C64 times), the biggest parental/police concern was drugs, specially “the killer drug hash(isch), which they inject… bla,bla”, that’s why, some will find it funny.
      The other concern was the “hacking” of the technical speed limitation of motor-bicycles (30Km/h).

      1. Like when the reefer madness adverts on baitbook says, “Injecting too many marijuanaS”
        Because two sheeps, ten fishes, five cat and one swans.

        Mixed with: wouldn’t injecting anything that contained large lumps of non-dissolve-able (i.e. Leaves, mud, dust-material) material cause death?? Through clogging and/or clotting of the arteries at minimum, and additionally toxins???

        I know the answer, Just food for thought.

        1. This is why you can’t argue with “you can die from injecting marijuanas” statement, it’s technically true.
          There’s this “Christians Against Drugs” Facebook page that’s full of those (satirical, but some people seem to still take it seriously).

  7. So what? When I was a kid I was always getting a raft of sh*t from my technophobic dad for all these reasons (like somebody had sent this list back in time 25 years, or more likely, this list is just a collection of the insecurities of non-geeks about a technological and social phenomenon they just can’t grok or can’t be bothered to try).
    I dabbled in some ‘naughty’ applications for my geeky skills but ultimately basically grew out of that phase and went on to turn my former hobby into a career (who knew all those nights staying up till dawn programming or disassembling my BIOS or whatever else that freaked my dad out was also teaching me a useful trade; it was only a year or two after I’d flown the nest and essentially for the hell of it taken a road trip he’d always wanted to take but never been able to wrangle the cash and time off at the same time that he finally realized that I’d actually been doing something worthwhile with my time all those years of nights and weekends).
    I had really hoped that by now there would be no computer illiterate / technophobic parents left to pull this sort of nonsense…

  8. Last names are no longer being used in naming diseases or maladies per UN WHO directive.
    Autism spectrum, or such is used. First names aren’t welcome either. My first name is Ed. No problem here. Storms and hurricanes are next.

    1. hopefully none of these journalists is semi-intelligent enough to recommend browsing to 192.0.1.168 ;-) use a bit of 1337 alphabet skillz (AKA reading and writing) to ban that specific hackerday domain, and last but not least put the cherry on top by throwing the wireless router in some locked cabinet…

      1. Nope, can’t do that, he’d have an apoplectic fit! That computer is the only thing that keeps his Assburglars syndrome in check! He actually once spent a year fact checking Wikipedia.

  9. “Particularly concerning though is the final association of computer crime with children who are autistic or have Asperger’s Syndrome. Picking on a minority as a scapegoat for a public moral panic is reprehensible, and is not responsible journalism.”

    “16. Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.”

    As a non-perpetual victim I don’t have any problems with these kind of statements ;D
    Perhaps more unsettling is the fact that such a claim is being made without substantiation, which I would regard as ‘particulary concerning’ and ‘not responsible journalism’ more so then some statement which could be deemed ‘reprehensible’….

      1. I notice CNN actually has misrepresented Nancy Sinatra twice, first with the original article and afterwards with the edit.. the second time is much worse! (yet people haven’t noticed yet it seems?)

        The first time was when they claimed she was unhappy that Trump used the song ‘My Way’ for the inaugural ball by referring to a very cryptic tweet. To be honest the tweet did seem to suggest she was somewhat unhappy however it’s of course irresponsible to claim that as a fact.

        The second time however is beyond redemption and is some next level bullshit:

        “Nancy Sinatra, when asked for a response about the song selection on Twitter, said, in a now-deleted tweet: “Just remember the first line of the song.”
        The first line of the song is, “And now, the end is near.”
        Sinatra tweeted a link to this article, saying: “That’s not true. I never said that. Why do you lie, CNN?”
        Sinatra deleted her tweet regarding the song after CNN published this article.”

        They seem to heavily if not outright imply that Nancy is claiming that she never tweeted “Just remember the first line of the song” when she was actually referring to the statement CNN claimed she made in the original article!
        So if they can’t use twist her messages into anti-Trump propaganda and she puts them on the spot they attack her credibility?

        See CNN twitter post for the original post from Nancy, the reaction of CNN, and Nancy’s counter reaction (screenshots in comments):

        And the article in question:
        http://edition.cnn.com/2017/01/19/politics/nancy-sinatra-donald-trump-my-way/index.html?sr=twCNN011917/nancy-sinatra-donald-trump-my-way0645PMStoryLink&linkId=33568369

        tl;dr
        People upset that CNN misquoted Nancy Sinatra, Nancy Sinatra puts them on the spot, CNN attacks her credibility by changing the article and misquoting her again but people either haven’t noticed or aren’t upset about it.

  10. I hope they are not saying hacking is a bad thing.
    Systems are made be broken. Every time a flaw is found eventually it results in a stronger system.
    The very nature of an exploit is doing something within the bounds defined by the system that allows an action not planned for.
    Therefore by hacking you are not doing anything wrong because you are following the rules.

    1. Of course it’s a bad thing. Things are either bad or good. And you can tell straight away, by whether they’re associated in your mind with other good or bad things. If you’re not sure, the answer’s in every paper and on every TV. And Facebook.

      1. “Everybody else is threatened by it.”
        Unlike us, everybody else _feels_ threatened by it.
        But we too like everybody else are in fact threatened by neglect (part their own neglect of blindly trusting a system without requiring and checking any form of proof, part neglect of those makers who advertise a system as “safe” without actually developing -let alone providing- a proof of reasonable guarantees in terms of reasonable hypotheses involving a potential attacker’s means)

  11. The crazy thing is, when I read the headline, I thought “cool, an article about how to support understimulated prodigys”… I always give hackaday way too much benefit of the doubt when I read headlines…

  12. That’s the sort of shite that someone hasn’t even seen a film about hacking would report. Could be a parody except it’s not funny and is actually exaggerated too far to be one.

    I dunno who the Liverpool Echo is aimed at. Apart from people who aren’t too bright, and don’t have any decent sources of information. Goes to show though, the garbage quality, lack of fact checking, lack of qualification or knowledge, bias, and utter lazy half-arsedness, that goes into modern news media.

    There’s no reason to expect this is just an unusual low. Treat everything else you read in a paper with equal contempt as this article. If this can get printed, any old shit can.

  13. my grandfather sometimes warned me not to get involved with computers saying how people who knew how to make computers often used them to hurt or kill people and did this in front of my parents… needless to say my parents were slightly more educated on this matter and knew more about computers and the people who use them then can be learned from hollywood movies.

    oddly enough he would test a car’s coil and distributor system by getting someone ELSE to hold the spark-plug and chassis with two hands while HE cranked the key… better then jolt-cola

  14. This is a quick advice for anyone in my shoes, suffering from infidelity. if you suspect your partner is cheating on you, or he/she is gradually changing in attitude, i advice you try to monitor him before its too late. contact SCOTT CYBERLORD to help you monitor your partner’s phone and computer activities, with this you will be able to know all his cheating activities. My partner cheated for many months, i was suspecting him but i couldn’t catch him until i used Scott’s service, he help me in hacking all his social media account, monitor his call logs, text messages, i only pay for the software he used and I easily got proof he was cheating, then i confronted him, he told me he was honestly sorry and he has stopped since then. That was what i had to do to save my relationship. You may need such service to save yours too, contact him at ( scottcyberlord11 @ gmail com ) or text, call, Whatsapp him via +1 (628) 204 3588 and tell him Allinson referred you, thank me later.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s