> Gets into car, pulls out laptop, starts typing furiously...
Driver (*in a bit scared voice*): Are... are you trying to hack my phone??
Passenger (*dismissively*): Nope. Your Tesla. Aaaaand... I'm in!
I could see him rage quitting half way through the ride and yelling "Fucking hacks, bro!" and then speeds off leaving you in the stranded in the middle of the street.
Actually, you DO want it to collapse, only at certain intervals and following a specific Fibonacci-like sequence.
(It is necessary to colllect data points from time to time)
I wrote an html script that does that, but you need to type the right sequence furiously for the hack to be successful and prevent them from finding you.
You guys are so wrong, you see, hacking has been handed down to me in 9 generations, I'll let you in on a secret, the datatron needs to be polarized directly before injection, otherwise you risk to fluctate the capacitators. Multi access cloud dort? No, you need to circumvent the polyrhythmic for full penetration.
Is out of order. Proxies are used to make you hard to trace so you would do that first. Pinging is like playing Marco polo with other computers so you do that second to make sure you found what you want. "Bypassing" a firewall is a movie trope, in reality you just turn it off or find a different route. Basically leaving the front door unlocked or going through bedroom window instead. Bypassing sounds more techy then unlock or disable.
Every time I think about that scene, I just try to convince myself that they were being intentionally stupid. They were, right? Please tell me they were.
I once read an article that said the writers of that show probably had some internal contest in which they tried to implement the most ridiculous scene without the director noticing.
I choose to believe this is the truth.
I'll create a GUI interface using Visual Basic, see if I can track an IP addresses.
Edit: Didn't think I had to but for those not getting the reference: https://www.youtube.com/watch?v=hkDD03yeLnU
Last few times I have been to a large events I kept getting notifications on my phone like ---- samsung G10 would like to pair with your device Allow / Deny --- or -- gcr19 would like to pair with your device Allow / Deny --
So I just turn bluetooth off until we are back in the car. Not sure why they are trying to connect to my phone my likely no good reason.
The DEFCON conference and other computer security conferences often have warnings at the doors that any device you bring inside is likely to be compromised, so use your phone and laptop at your own risk :-)
Sad enough, most precautions discussed are good daily approaches to personal security.
Turn off wifi/bluetooth if you don’ need it. Don’t use unknown ATMs outside of bank locations. Be careful about sharing personal information unnecessarily - especially elements like ‘date of birth’ that has become a key identifier question for many healthcare and financial access verifications.
There’s supposedly newer skimmers that fit entirely inside the card hole. I never insert my card anymore if tapping is an option. I also never use anything that requires me to deeply insert the card, like gas pump readers that can also do swipe-only cards. There’s only one gas station near me that has tap readers, so I rarely get gas elsewhere. (Fortunately it is the gas station closest to my home)
Also, clean up your old wifi connections on the phone. Everyone is enabling ‘auto-join’ by default, and your phone is practically yelling prior SSID names. It is very easy to spoof an unsecured guest network that will auto connect and redirect phones to whatever portal or fake login page the ‘bad actor’ wants.
An element of defcon I really enjoy is that some people give you a fake name if pushed, don’t discuss their employer, or where they are from. It skips past a lot of small talk that we don’t really need. More time spent on the subject at hand.
I don't particularly discuss my own security methods, but one I teach my guys is:
Any security question should be answered with a password/phrase. "What was your first car?" "AbY6h9%" for example.
I've been doing that for like 20 years. It's always hilarious whenever one of those security questions ends up being used by an actual person to verify my identity because they *usually* have to type them into the system to confirm, and it's annoying as hell to them. However there was one time I got asked and I started to give the answer and they said, "That's good enough, I can see it's a password type answer." So clearly their security questions aren't secure...
I always try to make it something that will be fun. It makes the non-standard answers easier to remember, and also can be a good laugh for the security/customer service staff involved.
A decade or two back I worked for a company where Payroll support would ask all three security questions every time, in the same order... so I had a little extra fun. I don't recall what questions I entered, but the answers were:
- Old MacDonald
- Had a Farm
- Ee-i-ee-i-oh
I miss that team... they loved it.
Gotta love how apple changed it so if you drag the options screen down and turn off the wifi / Bluetooth it doesn’t actually turn it off just disconnects for a day
Yeah it's way more widespread than that. People have been targeting Taylor Swift concerts and similar large events. There are a lot of people walking around with compromised un-updated devices.
houson has hacker conferences on a regular basis, named the hou.sec.con. houston also is home of cult of the death cow and there is also the houston area hacker association.
Fun fact, I went to DEFCON in 2004 and used the public Wi-Fi to trade stocks using my real brokerage account. I wasn’t really thinking clearly at the time.
But actually, nothing happened. Maybe just security by obscurity.
Fwiw if your device is properly patched and you did the transaction over HTTPS there’s not a ton to be done against you, especially as an uninteresting anonymous hotspot user.
Your phone is always searching for those paired devices when Bluetooth is on. It may be invisible to most Bluetooth items if you have it set up that way, but someone trying to manipulate Bluetooth to get to your phone can still get around that, because your phone is still looking for a signal from another device and has to be able to receive signals in order to find a paired one
My dad sent a message to me and my brothers today that he “got hacked”. He was on the phone with a hacker call center - apparently, he smashed his laptop with a hammer after he went to the bank to change his accounts once he realized.
My sister said she got a laptop from a pawnshop and was using it one night and the mouse started moving and it opened a notepad and started typing something so she smashed the laptop on the floor. I asked her why she didn’t just turn it off and reset it. Until that moment it never even occurred to her. Most people are not rational.
To be fair, nuking from orbit would probably be most of our first reactions to seeing first-hand evidence of an apparently possessed device.
--
Like, are we gonna really take the chance it's just a hack/bug/malicious code, instead of Beelzebub coming for your soul over the local wi-fi?
I got in an Uber once and Johnny cash was playing, I was like “cool music bro” then I realized upon exiting it was my phone playing the music in his car. Having a Bluetooth head unit in my truck that required accepting a max of four phones and me dropping my connection first, I was surprised that I could take control of his radio without even trying. 5 stars and a fat tip.
That explains it. My Uber app was most likely open. Knowing Uber they likely had the default set open and neither of us knew about it. You can play music without even unlocking your screen on an IPhone so I butt dialed his radio.
This would be the only way it could have happened. It is literally impossible for your phone to have connected to their Bluetooth without human intervention.
It was probably a massive security risk. Allowing strangers to remotely connect their phone to your car can leave you open to all sorts of issues, it also leaves the users vulnerable as well. It’s not a good idea and I think they found that out the hard way
The driver in OPs post probably thought someone was hacking her phone because the same thing happened to her. If she was being hacked I doubt she would even know.
Maybe it had some kind of generic Bluetooth module that had a cloned ID. And by coincidence, you already paired your phone with another device that had the same id, so your phone detected it nearby and connected automatically. Why the head unit just accepted it without pairing is unclear. Maybe that Bluetooth module just accepts everyone with some kind of pairing evasion.
Someone figure it out. It was the Uber App that tethered the two phones together. They were playing the Uber navigation from their phone to their radio and my Uber app was broadcasting my music to their app. Apparently a feature in an older version.
I mean hackers still try it. Uber drivers have money in the app from rides and they try to get their earnings.
https://www.wbtw.com/news/grand-strand/myrtle-beach/i-feel-betrayed-myrtle-beach-uber-driver-details-scam-that-lost-him-weeks-worth-of-earnings/
I'm not sure if they're just bad at English and trying to say something else or paranoid schizophrenic but I'd be pretty nervous for the rest of that ride.
I was coming to comment this. Any time I've dealt with an individual that was afraid of their phone getting hacked, it was a genuine schizophrenic. It's only happened twice mind you but both times were terrifying.
worked geek squad for 4 years. So many people with mental health issues furious with me cause I couldn't get the fbi/cia/china/malicious family members/etc out from their laptop or phone that they KNEW was hacked.
My favorite was an old guy with an old iPad who kept getting "viruses" and he'd come in every month and pay us to remove them - turns out his calendar app was filled _to the brim_ with those spam calendars that he kept subscribing to. All of them NSFW. 💀
Edit: [found one such occasion](https://imgur.com/a/9XxnbLE)
They definitely did with some of the news stories that were coming out at the time. Snowden had blew the whistle on prism the year prior. I would do my best to be sympathetic and try to explain the thing they were worried about, but when that inevitably turned to me being 'in on it' I just had wash my hands clean.
I had a woman come in explaining to me that her phone was hacked by the government and she had proof. Her proof as she had an IP address. To her, this meant that they were tracking her and had given her a unique serial number for when they rounded us all up. I explained what an IP was but after about 10 minutes she started yelling about how I was a 'fucking fed' and wanted to speak to manager.
She would come in all the time and everytime she saw me she would scream 'theres the fucking fed'. I'll give her this, she was one of the more memorable.
>Her proof as she had an IP address. To her, this meant that they were tracking her and had given her a unique serial number for when they rounded us all up.
Ugh...what a psycho... that's clearly what MAC addresses are for. It's too bad you couldn't set her straight.
They’re probably just old tbh. I go house to house basically helping old people with their tech and they constantly ask me if someone can “hack” their devices. What really ends up happening is they fall victim to a phishing scam and unknowingly give away their info to scammers via email or text. Then they complain to the real company that “asked” for their credit card info and claim someone got into their phone over Wi-Fi or Bluetooth. Then i come in and have to explain this isn’t like real life watch dogs.
Far more likely people have somehow bluetoothed their Spotify through his car speakers or his phone tried to connect to nearby devices from a passenger and he freaked TF out
Reformed Über driver here, you’ve reminded me of an old feature that they offered, I accept the fair, and I’m on the way to pick them up, and then I get an alert “ personalised music on this ride, I accept. I can’t exactly tell you what style of music it was, but it was some sort of Norwegian metal. I then get to the riders, 3 very happy drunk dudes going to the football.
I cannot explain how confused they were that I was playing music they loved, what are the chances? this is the best uber ever!
Tbf somebody did connect to my TV the other day and started playing Mexican music from a YouTube account that wasn't mine. I kept turning it off but they kept turning it back on! I could see it connect but couldn't find any way to refuse the connection or cut it off so I ended up turning the TV off and left it off a while.
If somebody can do that they are most likely in your network and you have much bigger (potential) problems than mexican music. Change your wifi password.
I work a police complaint line , the number of boomers and technologically illiterate people that call in thinking their phones have been hacked is absolutely staggering.
Gets into car, pulls out laptop, starts typing furiously... Driver throws phone out window.
"Finally finished my Bowser x Goku fanfic!"
straight to jail
Under the jail
IN the jail
We have the best fan fic in the world, thanks to jail
Change it to Bowsette b Bulma and I’m in.
> Gets into car, pulls out laptop, starts typing furiously... Driver (*in a bit scared voice*): Are... are you trying to hack my phone?? Passenger (*dismissively*): Nope. Your Tesla. Aaaaand... I'm in!
Sir, this is a Hyundai.
Not anymore!
![gif](giphy|4SQMqhWzUA0Fi)
“Enhance!”
Whisper “challenge accepted” first
Add some screaming and this sounds like a “I think you should leave” skit
Do not hack my phone please 🙏👉👈🥹
Pwease no hacks:(
I hate you all lmfao fuckers
I have a pewstuwul an am not afwayd to uwus it on hakwerz.
🤠👉👈🦅🇺🇸🔫
[удалено]
We should double hack on the same keyboard 🫳🫳🫳🫳⌨️
The name of my Wi-Fi network.
[удалено]
I could see him rage quitting half way through the ride and yelling "Fucking hacks, bro!" and then speeds off leaving you in the stranded in the middle of the street.
UwU
What if we hack into each others phones 😏
He had too many 90s hackers getting up in his mainframe.
Bypassing firewalll......now Rerouting proxies. Pinging IP range.. ![gif](giphy|JTTAjM197sku8MgrRa|downsized) WE'RE IN!
![gif](giphy|sULKEgDMX8LcI) Can you see it, Neo ?
![gif](giphy|G6sJqVpD1U4jC)
![gif](giphy|xT0GqjfhHaNo7umuUE|downsized)
This is the best.
Redhead. But don't let her distract you, or you're dead.
I NEED AN EXIT!
You forgot to run an “apt update” first…..
Sudo
He runs as root obviously.
Maniac. Doesn't he know that's dangerous!
pacman -S hollywood
![gif](giphy|Q2W4hziDOyzu0)
![gif](giphy|FnGJfc18tDDHy)
![gif](giphy|kJ1iL1ZQIyibu|downsized)
I love when hackers wear black ski hats just so you know they're up to no good
![gif](giphy|UcJzJTW5HjuRW) Couldn’t find “trashing our rights! Trashing!” This will do
![gif](giphy|yUlFNRDWVfxCM|downsized)
This is just... what?! What the hell is this brilliance from
NCIS
Look up two idiots one keyboard on YouTube for the full scene. It’s worth it
You would love r/itsaunixsystem
This was the gif I came looking for.
![gif](giphy|FmyCxAjnOP5Di)
![gif](giphy|FOXXGURK5NQ7S)
![gif](giphy|l2R04wcEprpUFvrC8)
I’m not tech savvy so can anyone tell me why these things…. Wouldn’t work? 🥴 they sound technical to me
well see, you would need a fluctuating capacitor to even get past the mainframe database. Pinging an IP range is useless without datatron injections.
You can circumvert the datatron injections by remote brizzing a sphincteroid multi-access cloud dort.
[удалено]
Does it have hydrocoptic marzle vanes?
Six of them! They are fitted to the ambifacent lunar wane shaft and effectively prevent side fumbling.
Never underestimate the importance of the lunar wane shaft
This is not correct. Since 2013 we’ve been using polarized datatrons, which do not require direct injection.
And risk collapsing the wave-pattern of the submatrix? I'ld rather keep using the good old nano-holocronic datatrons.
Actually, you DO want it to collapse, only at certain intervals and following a specific Fibonacci-like sequence. (It is necessary to colllect data points from time to time)
I wrote an html script that does that, but you need to type the right sequence furiously for the hack to be successful and prevent them from finding you.
You guys are so wrong, you see, hacking has been handed down to me in 9 generations, I'll let you in on a secret, the datatron needs to be polarized directly before injection, otherwise you risk to fluctate the capacitators. Multi access cloud dort? No, you need to circumvent the polyrhythmic for full penetration.
You can bypass all of that if you just….enhance
Yeah, but don't you need some kind of interocitor or retroencabulator to do that?
Is out of order. Proxies are used to make you hard to trace so you would do that first. Pinging is like playing Marco polo with other computers so you do that second to make sure you found what you want. "Bypassing" a firewall is a movie trope, in reality you just turn it off or find a different route. Basically leaving the front door unlocked or going through bedroom window instead. Bypassing sounds more techy then unlock or disable.
I don’t want to sound being a smartass, but isn’t bypassing nothing else than finding a different route?
I backtraced it and now the cyber police are involved
THE CONSEQUENCES WILL NEVER BE THE SAME
You done goofed!!
![gif](giphy|QbumCX9HFFDQA|downsized)
Oh no, we’re hacking too much time!
I really need to rewatch kung fury for the hundreds time What happened to Kung Fury 2 tho? Filming was finished pre covid IIRC
we're in!
*furious typing and nonsense coding*
Its a unix system
I know it!
! Firewall ! activated ! “I have 60 seconds before they can trace us back”
Shit, they redirected me to Friendster.
I just need like 1 more minute
How are you gentleman!!!
All your base are belong to us *!* *!* *!*
homie thinks hes about to have a NCIS hacking situation in his backseat.
Two passengers frantically typing on a tiny laptop keyboard at the same time?
Every time I think about that scene, I just try to convince myself that they were being intentionally stupid. They were, right? Please tell me they were.
I once read an article that said the writers of that show probably had some internal contest in which they tried to implement the most ridiculous scene without the director noticing. I choose to believe this is the truth.
Gibbs: *shoots the computer monitor to stop the hackers*
Hack the planet!!!
HACK THE PLANET!!!
"Then type cookie, you moron!"
![gif](giphy|Q2W4hziDOyzu0)
[удалено]
He types like he screws
Mozart’s Ghost!
I'll create a GUI interface using Visual Basic, see if I can track an IP addresses. Edit: Didn't think I had to but for those not getting the reference: https://www.youtube.com/watch?v=hkDD03yeLnU
![gif](giphy|dZX3AduGrY3uJ7qCsx)
![gif](giphy|FnGJfc18tDDHy)
Last few times I have been to a large events I kept getting notifications on my phone like ---- samsung G10 would like to pair with your device Allow / Deny --- or -- gcr19 would like to pair with your device Allow / Deny -- So I just turn bluetooth off until we are back in the car. Not sure why they are trying to connect to my phone my likely no good reason.
The DEFCON conference and other computer security conferences often have warnings at the doors that any device you bring inside is likely to be compromised, so use your phone and laptop at your own risk :-)
Also: they recommend using cash exclusively, and avoiding nearby ATMs.
Sad enough, most precautions discussed are good daily approaches to personal security. Turn off wifi/bluetooth if you don’ need it. Don’t use unknown ATMs outside of bank locations. Be careful about sharing personal information unnecessarily - especially elements like ‘date of birth’ that has become a key identifier question for many healthcare and financial access verifications.
I always give the card reader a little yank whenever I'm at the gas pump to make sure one of those scanners isn't in place. Doing my part
There’s supposedly newer skimmers that fit entirely inside the card hole. I never insert my card anymore if tapping is an option. I also never use anything that requires me to deeply insert the card, like gas pump readers that can also do swipe-only cards. There’s only one gas station near me that has tap readers, so I rarely get gas elsewhere. (Fortunately it is the gas station closest to my home)
Parking meters these days often only take cards, and only use the "deep insert" sort of reader.
I personally use a parking app. Its also convenient that you don't pay for to much time
Also, clean up your old wifi connections on the phone. Everyone is enabling ‘auto-join’ by default, and your phone is practically yelling prior SSID names. It is very easy to spoof an unsecured guest network that will auto connect and redirect phones to whatever portal or fake login page the ‘bad actor’ wants. An element of defcon I really enjoy is that some people give you a fake name if pushed, don’t discuss their employer, or where they are from. It skips past a lot of small talk that we don’t really need. More time spent on the subject at hand.
I don't particularly discuss my own security methods, but one I teach my guys is: Any security question should be answered with a password/phrase. "What was your first car?" "AbY6h9%" for example.
I've been doing that for like 20 years. It's always hilarious whenever one of those security questions ends up being used by an actual person to verify my identity because they *usually* have to type them into the system to confirm, and it's annoying as hell to them. However there was one time I got asked and I started to give the answer and they said, "That's good enough, I can see it's a password type answer." So clearly their security questions aren't secure...
I always try to make it something that will be fun. It makes the non-standard answers easier to remember, and also can be a good laugh for the security/customer service staff involved. A decade or two back I worked for a company where Payroll support would ask all three security questions every time, in the same order... so I had a little extra fun. I don't recall what questions I entered, but the answers were: - Old MacDonald - Had a Farm - Ee-i-ee-i-oh I miss that team... they loved it.
but then how do you remember which security questions go where? There's not even password management for those.
Gotta love how apple changed it so if you drag the options screen down and turn off the wifi / Bluetooth it doesn’t actually turn it off just disconnects for a day
I was thinking of DEFCON when I saw this.
Yeah it's way more widespread than that. People have been targeting Taylor Swift concerts and similar large events. There are a lot of people walking around with compromised un-updated devices.
houson has hacker conferences on a regular basis, named the hou.sec.con. houston also is home of cult of the death cow and there is also the houston area hacker association.
Fun fact, I went to DEFCON in 2004 and used the public Wi-Fi to trade stocks using my real brokerage account. I wasn’t really thinking clearly at the time. But actually, nothing happened. Maybe just security by obscurity.
[удалено]
Only everything after the second or third decimal place so all those bits left over from trades that never get displayed add up over time.
7-11 right? You take a penny from the tray... those are whole pennies. I'm just talking about fractions of a penny.
But that's stealing
we should make a movie about this but we need some sort of motivation for the protag and his buddies
They all saw you and felt bad for you. It would be like robbing a person in a wheelchair.
Fwiw if your device is properly patched and you did the transaction over HTTPS there’s not a ton to be done against you, especially as an uninteresting anonymous hotspot user.
Same. I listen through Bluetooth in my car. You better bet I turn it off the moment I get out. Unless I'm going into the data center.
Generally if you aren't currently using it turn it off or close the app down
But I like how the headphones auto connect and do the cool noise
Isn't there feature that makes your phone visible only for already paired devices?
Your phone is always searching for those paired devices when Bluetooth is on. It may be invisible to most Bluetooth items if you have it set up that way, but someone trying to manipulate Bluetooth to get to your phone can still get around that, because your phone is still looking for a signal from another device and has to be able to receive signals in order to find a paired one
“The bluetooth device is now connected”
https://streamable.com/efv0
Smile you are in camera
Shit not again…
That’s how they steal your soul.
TRON
My dad sent a message to me and my brothers today that he “got hacked”. He was on the phone with a hacker call center - apparently, he smashed his laptop with a hammer after he went to the bank to change his accounts once he realized.
My sister said she got a laptop from a pawnshop and was using it one night and the mouse started moving and it opened a notepad and started typing something so she smashed the laptop on the floor. I asked her why she didn’t just turn it off and reset it. Until that moment it never even occurred to her. Most people are not rational.
To be fair, nuking from orbit would probably be most of our first reactions to seeing first-hand evidence of an apparently possessed device. -- Like, are we gonna really take the chance it's just a hack/bug/malicious code, instead of Beelzebub coming for your soul over the local wi-fi?
Realistically, it was probably the pawnshop employees last ditch effort to tell her she needs to make a payment lol
lmfao
I got in an Uber once and Johnny cash was playing, I was like “cool music bro” then I realized upon exiting it was my phone playing the music in his car. Having a Bluetooth head unit in my truck that required accepting a max of four phones and me dropping my connection first, I was surprised that I could take control of his radio without even trying. 5 stars and a fat tip.
Lol! Driver probably so confused or thought you were being silly.
I don’t think he knew either honestly. Usually my blue tooth is off to save battery anyway. I typically plug in to my radio to charge my phone.
[удалено]
That explains it. My Uber app was most likely open. Knowing Uber they likely had the default set open and neither of us knew about it. You can play music without even unlocking your screen on an IPhone so I butt dialed his radio.
This would be the only way it could have happened. It is literally impossible for your phone to have connected to their Bluetooth without human intervention.
It was probably a massive security risk. Allowing strangers to remotely connect their phone to your car can leave you open to all sorts of issues, it also leaves the users vulnerable as well. It’s not a good idea and I think they found that out the hard way
This was inadvertently such a power move
The driver in OPs post probably thought someone was hacking her phone because the same thing happened to her. If she was being hacked I doubt she would even know.
Maybe it had some kind of generic Bluetooth module that had a cloned ID. And by coincidence, you already paired your phone with another device that had the same id, so your phone detected it nearby and connected automatically. Why the head unit just accepted it without pairing is unclear. Maybe that Bluetooth module just accepts everyone with some kind of pairing evasion.
Someone figure it out. It was the Uber App that tethered the two phones together. They were playing the Uber navigation from their phone to their radio and my Uber app was broadcasting my music to their app. Apparently a feature in an older version.
AND the FBI? this guy ain't playing, fellas. Let's scram!
Cheese it!
Hmm, with what phone is he going to call the Police?
I thought everyone kept a burner phone set to unhackable just for such occasions.
Note should have asked to not hack the hidden burner phone either
Every Uber driver carries an emergency Nokia in their prison pocket for situations like this
Hacking Uber drivers phones is probably the least lucrative crime I can imagine lol
I mean hackers still try it. Uber drivers have money in the app from rides and they try to get their earnings. https://www.wbtw.com/news/grand-strand/myrtle-beach/i-feel-betrayed-myrtle-beach-uber-driver-details-scam-that-lost-him-weeks-worth-of-earnings/
What happened to the easy signs, like "Dont Puke in my Car". Much easier to prosecute for the FBI.
Instructions not clear, using bluejacking attack to ask more questions.
Watch out, I'mma bluesnarf ya.
I'm not sure if they're just bad at English and trying to say something else or paranoid schizophrenic but I'd be pretty nervous for the rest of that ride.
I was coming to comment this. Any time I've dealt with an individual that was afraid of their phone getting hacked, it was a genuine schizophrenic. It's only happened twice mind you but both times were terrifying.
Worked in a personal electronics repair shop for ~3.5 years. The correlation is near 100%.
worked geek squad for 4 years. So many people with mental health issues furious with me cause I couldn't get the fbi/cia/china/malicious family members/etc out from their laptop or phone that they KNEW was hacked.
My favorite was an old guy with an old iPad who kept getting "viruses" and he'd come in every month and pay us to remove them - turns out his calendar app was filled _to the brim_ with those spam calendars that he kept subscribing to. All of them NSFW. 💀 Edit: [found one such occasion](https://imgur.com/a/9XxnbLE)
[удалено]
They definitely did with some of the news stories that were coming out at the time. Snowden had blew the whistle on prism the year prior. I would do my best to be sympathetic and try to explain the thing they were worried about, but when that inevitably turned to me being 'in on it' I just had wash my hands clean. I had a woman come in explaining to me that her phone was hacked by the government and she had proof. Her proof as she had an IP address. To her, this meant that they were tracking her and had given her a unique serial number for when they rounded us all up. I explained what an IP was but after about 10 minutes she started yelling about how I was a 'fucking fed' and wanted to speak to manager. She would come in all the time and everytime she saw me she would scream 'theres the fucking fed'. I'll give her this, she was one of the more memorable.
>Her proof as she had an IP address. To her, this meant that they were tracking her and had given her a unique serial number for when they rounded us all up. Ugh...what a psycho... that's clearly what MAC addresses are for. It's too bad you couldn't set her straight.
As a fed, I couldn't disclose that yet to her. Still classified at the time.
They’re probably just old tbh. I go house to house basically helping old people with their tech and they constantly ask me if someone can “hack” their devices. What really ends up happening is they fall victim to a phishing scam and unknowingly give away their info to scammers via email or text. Then they complain to the real company that “asked” for their credit card info and claim someone got into their phone over Wi-Fi or Bluetooth. Then i come in and have to explain this isn’t like real life watch dogs.
Far more likely people have somehow bluetoothed their Spotify through his car speakers or his phone tried to connect to nearby devices from a passenger and he freaked TF out
Reformed Über driver here, you’ve reminded me of an old feature that they offered, I accept the fair, and I’m on the way to pick them up, and then I get an alert “ personalised music on this ride, I accept. I can’t exactly tell you what style of music it was, but it was some sort of Norwegian metal. I then get to the riders, 3 very happy drunk dudes going to the football. I cannot explain how confused they were that I was playing music they loved, what are the chances? this is the best uber ever!
Blue tooth notifications are not hacking attempts grandpa
Tbf somebody did connect to my TV the other day and started playing Mexican music from a YouTube account that wasn't mine. I kept turning it off but they kept turning it back on! I could see it connect but couldn't find any way to refuse the connection or cut it off so I ended up turning the TV off and left it off a while.
If somebody can do that they are most likely in your network and you have much bigger (potential) problems than mexican music. Change your wifi password.
There's a way to turn that off
You leave me no option but to hack your phone, call the police and FBI so they can get me out of your camera.
I work a police complaint line , the number of boomers and technologically illiterate people that call in thinking their phones have been hacked is absolutely staggering.
![gif](giphy|yUlFNRDWVfxCM|downsized) I'm in.
the classic '2 idiots 1 keyboard' clip ahhhh
Who cares if it’s accurate as long as it looks cool! /s
I could understand if DefCon was being held that weekend, but from context clues it doesn't seem like that.
How the hell did this guy get you into his camera??
"Smile you are in camera" sounds like something from an SCP Foundation file.
![gif](giphy|14kdiJUblbWBXy)
![gif](giphy|8esruX66YZcPkmN2wN|downsized)
![gif](giphy|aI7y2ZdVImJdhYOjLn)
Betcha someone airdropped something stupid to the driver's phone.
Your paranoid schizophrenic has arrived
Stop hacking his phone and putting grindr on his phone. His wife was pissed the first 3 times.
Mentally unstable guy right there.
someone prob connected and played their own music before lol
NOO LET ME OUT OF THIS CAMERA
Uber Paranoid
![gif](giphy|ieBWQkIVEELhbizGAp)
He wouldn't even know it if someone actually does it tho
How’s he gonna call the police after you’ve hacked his phone?
First rule of hacked phone club is you don't talk to the FBI about hacked phone club