Home Real Estate This Text Can Hack Your Phone, Even If You Never Open It🎙 Darknet Diaries Ep. 47: Project Raven

This Text Can Hack Your Phone, Even If You Never Open It🎙 Darknet Diaries Ep. 47: Project Raven

44
This Text Can Hack Your Phone, Even If You Never Open It🎙 Darknet Diaries Ep. 47: Project Raven

An ex-NSA hacker went to work for a private company in the United Arab Emirates. A good gig turned into some sketchy spy craft, including the super malware that can invade iPhones through un-opened text messages.

Visit for a list of sources, full transcripts, and to listen to all episodes.

source

44 COMMENTS

  1. Listen I normally love this podcast fellow Jack but this a new kind of sickness. The one that makes me question why I like cyber security talks like these. I know enough to ruffle anybodys feathers… And just like that he queued up another DND podcast with his favorite hoodie and shades man.

  2. Just curious about the unique way you lay your content out. David, get on these motherf****s who took over my parents life via DSL subscriber line. I get a lot of foreign IP breaches in this area… A lot of southern people with little to limited understanding, I'm not from here I just falling out of touch in the past three or four years. Am I wrong, have things not goth really bad in the last couple years especially the past year? Sorry, I'm rambling thank you guys over yet another awesome informational ssh 👍

  3. Kinda not surprised that imessage was trying to peek inside zips. if you save a qr code onto your mac, finder will try and scan it to get more info about it.

  4. Booz Allen has an entire business unit dedicated to this type of work in countries across the middle east.

    They stood this initiative up in the 2012-2014ish timeframe. And yes, it was basically pitched as a "build your own NSA" team.

    OSINT – especially non-offensive online collection like social media and other pattern-of-life analysis – is another HUGE capability that many nations are pouring a ton of money into…

  5. this is interesting 😁 however i do not like when they are saying they are doing bad thing when it comes to them performing information gathering on americans, does the moral line come in when the target are Americans? 😄. mind you foreign nationals work in america to do information gathering on their home country and america even use them as translators 🤣. or is lori a spy for usa

  6. I love the whole concept and idea behind this podcast. I love the guests, the host etc. I love hearing all the really fine technical parts of a story like this, nitty gritty tech geek nerd shit. HOWEVER, my only gripe is with the copycat Freakonomics style or format this podcast is in or trending towards. I hate it. Just let the conversation flow naturally. Either tell a story with NO guests. Or have guests and have an ACTUAL FUCKING CONVERSATION. Not this half weird conversation where you insert yourself asking questions or making statements later edited in or layered on top of the actual normal human conversation that had to have taken place somehow somewhere. Podcasts are highly popular because people love listening to like Joe Rogan talk to someone for 3 hours. You can do it too Jack! Don't fall into this Freakonomics way of editing and crafting your podcast in some weird readers digest digital version. Please. Stop.

  7. This is a form of recruitment in 2022. To each his own. Some numbers…Population by city/group…LA, NYC, and 3rd place is population of US Government approaching 9 million and growing. If you consider this a good thing with $50 trillion in growing debt, just follow the money. Also, taking your wife to Abu Dabi – again, to each his own. What happened to America over the years? I wish I knew. I am sorry for my part in it, for it becoming this way while I was occupied with everyday life and entertainment…then I opened my eyes. Nothing is normal anymore.

  8. admin admin…. LMAO… i mean 12345 is bad too but admin admin? LMAO… for every 1 'weakness in the armor'… there are more often than not MULTIPLE vectors of attack that can be successful… and oh… Metasploit? … what a WONDERFUL set of 'tools'… NOT the only set of packaged 'tools' of decent quality… but something that nearly everyone on every level can use… which makes it 'dangerous' but also VERY helpful in finding the weaknesses that can spell disaster.

  9. The moment he mentioned sports bidding, I knew who this foreign country target was. Thanks for the new upload, Jack, any plans to cover the cyber warfare occurring in the Russo-Ukrainian war or Russian attacks on Baltic states' infrastructure in the past decade?

LEAVE A REPLY

Please enter your comment!
Please enter your name here