background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "⚠️ Как взламывают телефоны и мессенджеры // Group-IB"

input logo icon
Table of contents
|

Table of contents

0:00
В этом выпуске
0:35
Гетконтакт (Getcontact)
1:20
Смешные истории, пробив, черное SEO
5:07
Безопасность и уязвимость Jabber (XMPP)
8:00
iMessage от Apple, безопасность новых чипов M1
9:28
Сообщения с iMessage Дудя, «Большой брат за всеми следит»
11:43
Дискорд (Discord), VIPole
13:11
Element.io
15:30
Приложения для клавиатуры
15:45
Прошивка от iOS 14, обновления, сбор данных, отслеживание с айфона (iPhone)
22:20
Face ID в связке со смарт часами
23:20
Всем пока, не забывайте обновлять ПО на гаджетах
Video tags
|

Video tags

хакеры
киберпреступность
Group-IB
компьютерные взломы
кардинг
кардеры
киберпреступления
carding
касперский
расследования
фсб
фбр
сачков
илья сачков
киберпреступники
криминал
преступники
преступления
трояны
вирусы
андроид вирусы
android
банки
взлом банка
кибербезопасность
безопасность
русские хакеры
взлом телефона
люди про
андроид
мошенничество
развод
мессенджер
взлом
взломать телефон
взломать мессенджер
мессенджеры
взломать айфон
взломать андроид
jabber
джаббер
обнал
коррупция
cybersecurity
информационнаябезопасность
бизнес
groupib
взломатьмессенджер
взломатьтелефон
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:01
hacker, what's the difference and
00:00:04
we love everyone to him that to me they are 106 apartments gives
00:00:09
everyone there her husband beer and his wife's phone from
00:00:12
going crazy I had in my hands and a
00:00:15
message from the phone yes if you're not so
00:00:19
afraid Western intelligence agencies date and image is an
00:00:23
excellent option, but in fact we
00:00:25
talk so much about Apple technology,
00:00:27
because the sponsor of this issue could have
00:00:29
been a restaurant, you’ll see, I didn’t and
00:00:36
now let’s use messengers, what can you
00:00:39
say for get contact or a similar
00:00:41
application,
00:00:42
well, first of all, an hour there are bots in
00:00:45
telegram that where the contact goes both
00:00:48
yes yes yes that is, the foreman there this database
00:00:51
get the contact you can get through people,
00:00:53
but the idea itself got infected, that is, the
00:00:55
main idea that quickly came out was that people
00:00:58
themselves share their own contacts, that
00:01:00
is, there on Android when it was installed
00:01:01
you need to provide your database and then it
00:01:05
gives access to the go itself, but here you can
00:01:10
say, well, you probably shouldn’t give away the
00:01:12
database of people who you
00:01:15
have written down there somehow differently, sometimes this causes
00:01:17
very awkward stories,
00:01:19
but we also have funny ones jokes,
00:01:23
that is, we have some employees
00:01:25
and you type in the phone number and it
00:01:29
says hacker such and such but there is something to
00:01:31
say and then the cat is safer than the
00:01:32
hacker, who cares and then
00:01:35
everyone’s favorite is not there, that is, there is a
00:01:38
person doing work in a group guilt
00:01:40
is recorded as someone like a hacker such and such
00:01:42
such and such is for and quite funny but it
00:01:44
happens and there are whole scandals and because
00:01:47
there since he is like they are 106 apartments
00:01:50
gives all the ladies the husband beer and the wife’s phone number
00:01:53
from the
00:01:54
mind, well that’s why how for
00:01:58
having broken through, you can use again, here
00:02:01
you need to understand that there is, including
00:02:03
every black village, yes, that is, you can
00:02:05
some people unwanted beer reputation
00:02:08
yes yes in by kill their numbers and give
00:02:10
them contact bazookas and there no matter what I don’t
00:02:14
know Alexey Pavlovich FSB agent there’s
00:02:17
something like that,
00:02:18
naturally, you can do all sorts of things, I
00:02:20
have at least two in the tower and one of
00:02:23
them, I know that he’s there, men we
00:02:26
know down in and or I’m an FSB major,
00:02:29
and by the way, I also had a
00:02:32
funny story with this she reminded me that it’s
00:02:35
not awkward at all, she’s very clever, but it
00:02:37
happened after the fact and I was filming an interview
00:02:40
there with that girl that porn star, there
00:02:41
were two parts you can watch here is
00:02:43
the link in the corner of the screen and I’m saying you
00:02:46
[ __ ] for money, it’s just new in this is out of
00:02:50
scope there is its own ax for activity, it
00:02:51
burns no, that there is work separately and I do
00:02:54
n’t know, I typed it into contacts and get
00:02:56
contact then my phone number she is there that
00:02:58
total q Pryazkina there and then and
00:03:00
one person had Tanya sex 50000
00:03:02
writing this on her conscience, we have
00:03:05
no evidence, yes, but nevertheless,
00:03:07
someone had it written down in this way, so
00:03:09
give lunch to the contact, your
00:03:11
data agrees, yes, that is, be
00:03:13
prepared for the fact that they can write him down with
00:03:16
some name or
00:03:19
write off about 2 apartments as lovers you
00:03:21
definitely need to approach this with a
00:03:24
certain amount of skepticism and
00:03:26
caution in this video there will be no
00:03:31
advertising of my book because it is already
00:03:34
selling well on the site the link is in the
00:03:36
description I will tell you about my
00:03:38
other cashback service business secret
00:03:41
discounter dot com and if you
00:03:43
you buy something on the Internet and soon
00:03:46
in offline stores and do it not
00:03:49
through a cashback service, then you lose from 50
00:03:52
to 200 dollars monthly what the
00:03:56
process of buying through cashback looks like, it’s very
00:03:58
simple, register on my website
00:04:00
link in the description under the video,
00:04:02
choose any store booking
00:04:05
aliexpress aviasales adidas furniture
00:04:07
store have several thousand more
00:04:09
stores go to it from our
00:04:13
website the store sees that you were brought for a purchase
00:04:15
we give us a commission
00:04:18
like urai we subsequently share with you and
00:04:20
you get more than us and I will leave a
00:04:23
link under the video
00:04:24
and in this corner of the screen, when registering
00:04:27
for which you will receive
00:04:29
gold, that is, almost the maximum
00:04:31
loyalty status in our system,
00:04:33
from the first day you will receive cashback
00:04:35
20 percent more than other
00:04:37
users
00:04:38
oh yes, I completely forgot, there are promo codes on the site
00:04:41
that work great in conjunction with
00:04:43
cashback and you get benefits with a
00:04:45
coupon and cashback on top
00:04:47
tracking of parcels more than 400 postal
00:04:49
and courier services verified
00:04:52
delivery companies purchases abroad much
00:04:54
more
00:04:55
register and save soon the
00:04:58
money saved as Henry
00:05:00
Ford said is the money earned link
00:05:03
here what can you say about the security
00:05:09
and vulnerabilities of the jagger there is
00:05:12
one peak of the same and it remained until the
00:05:15
pidgin of this system, who is it, that is, it is
00:05:18
built into stealth, in fact, the
00:05:21
xmpp protocol itself, and there is some version of ours that is
00:05:24
old enough for it, there is such a
00:05:28
thing as water, that is, one-time
00:05:30
encryption ciphers for each a separate
00:05:32
message was encrypted, in principle, the thing is
00:05:35
quite strong, but the
00:05:37
question immediately arises of how sedate and who
00:05:39
organized the jabber server, who
00:05:41
administers it, who can be sure that
00:05:42
it was not broken
00:05:43
because intelligence services can undergo
00:05:45
active actions and there were a lot of examples
00:05:47
when vzlom were a jabber server of hackers of
00:05:50
entire cyber criminal groups are
00:05:52
Western intelligence services and Western and
00:05:54
Russian, that is, there were examples, they wouldn’t
00:05:57
necessarily hack there in the literal
00:05:58
sense, but I can take this admin and he
00:06:01
himself will give all the access and everything, all this
00:06:03
jabber will be collected immediately and even
00:06:08
if you configure what it does not store
00:06:09
the history will begin to store it and so on and so on,
00:06:12
that is, I’ll take it right away, that is, the
00:06:14
protocol itself doesn’t have many questions
00:06:16
if you turn on encryption,
00:06:21
and here the most important question is
00:06:25
that we’ll imagine you there where two people
00:06:27
are communicating, a group of people of some kind, and
00:06:29
there’s someone who is the admin you are that
00:06:31
jabber server sun where the server is located
00:06:34
physically how it is configured really
00:06:37
this person he is not just some
00:06:38
hacker there I don’t know anyone but he is also
00:06:41
safer who can be sure that I won’t break
00:06:42
him no matter what they break this
00:06:45
server will not get access there that he
00:06:48
will then monitor will be updated, but
00:06:50
everything that we have talked about many times here is
00:06:52
immediately a question of trust in the server, if there is such
00:06:54
trust, use Jaber,
00:06:56
of course such a right will rush, that is, we
00:06:58
need to raise, for example, our dick, it
00:07:00
definitely must be evil, it’s expensive, there is no
00:07:03
here is a question of a different qualification of trust, yes,
00:07:05
that is, it doesn’t matter, yes, if you have a
00:07:06
group of people who do this, and
00:07:08
how much do you trust him, maybe he is
00:07:09
there due to the Turkish gene shift, or
00:07:12
simply the qualification is not enough to
00:07:14
make a high-quality area with a
00:07:16
manual from the Internet that may
00:07:18
contain all sorts of information, including something that’s
00:07:21
not completely normal, I’m
00:07:24
just carrying a bunch of ready-made rifles and my foam,
00:07:26
and they have questions about why using the
00:07:29
most resistant of that same weak
00:07:30
encryption by default, you can’t drink
00:07:32
speed, well, that is,
00:07:34
standing like that like that is not you delve into this and launched
00:07:36
do my pen ready because you use it here
00:07:39
the question is precisely the trust
00:07:40
brought to the server administrator of your
00:07:43
server, naturally, so it is necessary if
00:07:45
this is already being done, that is, to
00:07:47
set it up yourself, to study qualitatively how to
00:07:49
eliminate contradictions in the manuals, then
00:07:51
it is possible that it is available, it needs to be sorted out
00:07:54
clearly because it is thoughtless it’s
00:07:56
normal to do what to do with the edge, is
00:08:00
this some kind of unreliably encrypted or is it
00:08:02
like ordinary grease through the towers isn’t it
00:08:04
really like a message with
00:08:06
tigers everyone is screaming and that is, this and
00:08:08
the encryption here in England we
00:08:11
recently released our freshness, nod
00:08:13
to the guide is why it’s more interesting, I urge everyone
00:08:16
to read it and apple haters, including
00:08:18
why it’s interesting and they finally
00:08:20
described a huge number of other things
00:08:22
that they were previously silent about, for example, about the
00:08:24
m1 pro security of these new magicians,
00:08:27
they all turn out to be, for example, that they make
00:08:30
changes to the processor and there are different
00:08:32
revisions of processors if you
00:08:34
bought an iPhone at one time and at another there
00:08:36
will be different ones from the point of view of
00:08:39
hardware security, so they add
00:08:42
new security functions directly to the
00:08:44
processor and which they have
00:08:46
never talked about publicly before and also with the whole
00:08:48
There are signs and, among other things, they always
00:08:50
describe in detail how they work in
00:08:52
the end, encryption,
00:08:53
how the widths of the keys are there, what
00:08:55
length they have, and so on and so on, let’s say
00:08:59
frankly without, that is, without access by their
00:09:02
server, and despite the fact that they
00:09:06
claim that we are writing this intent kukri
00:09:08
anyway, there are all sorts of questions, but
00:09:10
still, without access you to their server and
00:09:11
message can be considered absolutely
00:09:12
protected, not some kind of not with this, it’s
00:09:14
just an intu en encrypted
00:09:18
messenger, that’s how we install them,
00:09:20
but it doesn’t save you from a mole inside the company
00:09:23
because I had in my
00:09:26
hands and a message from the phone spirit, which I
00:09:30
told you about right now, what the moment is
00:09:32
now and the car can recently become
00:09:35
possible in about 2 years, probably how it
00:09:37
is synchronized with the cloud, that is, you can
00:09:40
put a separate checkbox they will be
00:09:42
unloaded likelihood and then
00:09:43
no encryption will work anymore if you steal the
00:09:45
cloud from there, you will have
00:09:47
everyone with the entire correspondence history and
00:09:49
most likely I think that this is
00:09:50
exactly such a case,
00:09:51
that is, this is not a hack there and not a mole in
00:09:54
apple,
00:09:55
but this is precisely because of the cloud
00:09:58
info stolen somehow the
00:09:59
second moment again Snowdon
00:10:03
told everyone about how these
00:10:04
American companies operate, what google, what
00:10:06
apple and so on,
00:10:07
they don’t give direct access, but they
00:10:10
make a mirror of certain traffic, that
00:10:12
is, right from the 1st time encrypted, so
00:10:15
do it, analyze it’s whatever you want,
00:10:18
we’ll do it there like a dream and we don’t
00:10:20
notice it, and maybe it’s huge,
00:10:22
of course the employees don’t even know
00:10:23
that this is happening, but again there are two
00:10:28
wires for secret surveillance
00:10:30
because in criminal cases if this
00:10:31
was used it would have already become known about it
00:10:34
from this it’s more for nb yes yes it’s
00:10:36
more for mbt it’s a shame about this it
00:10:38
again says yes what are
00:10:40
these mirror ruins
00:10:42
prism and other different names I’m sure
00:10:44
that in the years that have passed since its
00:10:46
leak everything has changed a lot there and
00:10:48
improved and the big brother there is even
00:10:51
stronger behind everyone, but if you are not
00:10:55
so afraid of Western intelligence services, do to
00:10:57
emerge is an excellent option, faced with
00:11:04
verification of the tincture, do not want
00:11:06
to reveal your identity or need viliv
00:11:08
many accounts, contact us
00:11:10
service of mother's mailbox addresses,
00:11:12
we confirm the identity or sell
00:11:14
ready-made a cold is very fom we work with
00:11:16
scripts exchanges bookmakers casinos
00:11:18
banks and payment systems
00:11:20
rendering printing of material according to our minds
00:11:23
we will make rz bar codes and opposition and
00:11:26
other methods we need 100 passports per
00:11:28
day not a problem any volume and any
00:11:31
country uploaded to the mother’s
00:11:33
rendering service cove number one for rendering on the
00:11:35
Internet link in the description I would like to
00:11:44
know about security in discord discord
00:11:49
they do not use intu en encryption, that
00:11:52
is, here absolutely everything is transferred to
00:11:55
discord of the north if you trust from the
00:11:56
cord in general you trust no no it
00:12:00
itself naturally the traffic is encrypted 1
00:12:02
regular and with el but they have access to it
00:12:05
a tight and end there is no with
00:12:07
discord they use it for some kind of
00:12:10
confidential negotiations or,
00:12:12
especially, shady matters you can’t just
00:12:14
okay and write down what about fell
00:12:18
fell there is a separate option when
00:12:21
you use the so-called enterprise
00:12:23
server that is, they they give their server
00:12:25
to you, you can deploy it anywhere there
00:12:28
is encryption, Anton, in principle, in some
00:12:31
kind of corporate environment it is quite
00:12:33
possible to use it to deploy a server
00:12:36
on your server and there to protect it,
00:12:38
encrypt it, I’ll go straight to the disk and
00:12:40
encrypt it and configure it,
00:12:44
as far as I remember it doesn’t have open
00:12:46
source code, so there are
00:12:49
certain points here, as far as you can
00:12:51
trust him, but here they are enterprise,
00:12:54
its edition, yes, when they have their own server, they
00:12:57
and ain’t encryption is possible in theory,
00:12:59
and again, the lack of source
00:13:03
code is open, yes, that is, it is not known what
00:13:05
they stuffed there yes, someone
00:13:08
cheats tucked
00:13:09
and how will I rate the flower messenger and this is the
00:13:12
first time I see it,
00:13:13
maybe you know the element and this is another
00:13:15
one, also often using corporate
00:13:17
use, he also knows how to use intent
00:13:20
encryption there, too, you can have cereals for
00:13:22
each one, yes there you can raise it too By the
00:13:25
way, in my opinion, it is based on matrix
00:13:28
or something like that, there are some
00:13:29
open source codes, that is,
00:13:32
you can look at it as an option, as an option,
00:13:35
yes, you can use it on your server,
00:13:38
but specifically on your center and encryption,
00:13:41
but what about keyboard applications, here
00:13:45
they are also theoretically they can, this is an
00:13:47
excellent question, in fact, the dark
00:13:49
keyboard application very simply
00:13:50
said sorry this secret chat this in a
00:13:52
telegram and so on, well, as if it’s
00:13:55
impossible for them there is a process when reinstalling a
00:13:57
SIM card and there and so on on or when
00:13:58
the special services duplicate your SIM card made
00:14:00
it the
00:14:01
keyboard application that you enter
00:14:04
there is like a candle that or
00:14:06
that slowly it means that you can
00:14:08
even on an iphone put the left
00:14:09
keyboard on google or something else and they
00:14:12
immediately start yelling about it
00:14:14
like look this is very dangerous
00:14:17
because it can collect everything
00:14:18
and there is even a separate checkbox
00:14:20
local access 2 got access to
00:14:23
all fields in general
00:14:24
and this is a dangerous story for sure, that
00:14:27
is, using third-party keyboards
00:14:29
except for the blog on the
00:14:32
sake of its flatness and with apple this is always a
00:14:34
big risk because they collect everything
00:14:36
you drive here is a keylogger
00:14:39
that you yourself resolved this matter
00:14:41
absolutely absolutely, and
00:14:43
very often it collects data only from input fields
00:14:45
in general from the entire page so that the
00:14:47
text formatting and positioning works correctly there
00:14:49
and this is definitely a
00:14:52
dangerous story, it can be anything, including
00:14:57
me right off the bat they will name when choosing and
00:15:00
the nose and before which they worked like that, but this is a
00:15:02
big fee and in apple it happens in mine there are
00:15:07
special fields which
00:15:09
type they have on them with a specially marked
00:15:10
sticker and on them only
00:15:12
their native keyboard is always called up, that’s when there are
00:15:15
passwords with asterisks but far away not
00:15:17
in all application sites and other
00:15:21
programmers have marked this field in a
00:15:23
special way and then in general these
00:15:25
passwords are collected without problems, plus there
00:15:28
is a setting of this type to always
00:15:29
display passwords to make it
00:15:31
more convenient and then this general field is
00:15:33
ignored and there is always access to all
00:15:36
keyboards to it in in general, from the body side, you
00:15:38
really need to be
00:15:39
careful with tours, I don’t need them then
00:15:42
okay, I don’t install them and I don’t use them, but
00:15:44
now the guys are asking me to figure out the new
00:15:46
firmware from iOS 14 where quite a lot of
00:15:49
nuances have appeared with tracking and
00:15:51
system services, there’s an interesting story here,
00:15:54
it’s a big struggle Apple will give
00:15:56
tracking First of all, it
00:15:58
all started with the fact that now it is
00:16:00
always displayed there when the
00:16:02
microphone or camera is on, yes you will
00:16:05
see it in the upper right corner there will be a
00:16:07
green or red icon this is a private
00:16:09
microphone green to the camera in my opinion
00:16:12
and it is very convenient it is immediately
00:16:13
noticeable it stands out and, among other things, there
00:16:18
you can see what was the last
00:16:19
application that was used,
00:16:20
well, this particular function is the second
00:16:23
point in this very appstore they are
00:16:27
now forcing all the applications that
00:16:30
were there for you after the new year
00:16:32
to show all the data that they
00:16:34
collect for you and there is a funny one here moment that
00:16:37
google you can look at the
00:16:39
update schedule of the same there is the google application
00:16:41
Anton G mail and other things
00:16:43
and there is a funny thing there that after
00:16:45
this policy was applied they
00:16:46
did not update their application for three months
00:16:49
there was just a failure and then they updated
00:16:51
theirs here because google didn’t want
00:16:53
to tell what it collects about
00:16:54
users they didn’t think how to
00:16:56
get around it they’ll do something something on in the end
00:16:58
they now published 1 1 from youtube
00:17:02
because they couldn’t do it for three months without
00:17:04
updates and they’re all there now in the
00:17:06
appstore For all the latest updates, you can
00:17:07
go directly to see everything that is
00:17:09
collected for the impressionable, I
00:17:11
recommend going to see how much
00:17:13
facebook is collecting on a computer record holder, am I
00:17:15
tired of becoming just Pepe,
00:17:17
we are collecting already about it was more convenient, you can even
00:17:19
open the scam, that is, the application once
00:17:21
someone has an appstore through the website, open and
00:17:23
look at what is not going to be seen,
00:17:26
plus they also want to do what they want to do
00:17:29
before half for the apple newspaper,
00:17:31
etc. they used to prohibit the track from going
00:17:34
through safari through a browser, that is, they
00:17:36
want to make that type of don track, but
00:17:39
now they want to make it so that the
00:17:40
application cannot track you,
00:17:42
conditionally, if you went to room 1 there is
00:17:44
Facebook so that the Facebook day cannot be
00:17:48
transferred to other applications and sites
00:17:50
and they can’t force
00:17:53
developers to do this directly, but they
00:17:55
do it in such a way that the user asks
00:17:58
this application not to do this, and
00:17:59
then it’s up to the developer’s conscience and
00:18:01
the possibility that the developer will lie to him,
00:18:03
then he’ll be satisfied with this function already
00:18:06
added, you can check there directly in
00:18:09
confidentiality security there is
00:18:10
such a thing as not asking hellishly not from
00:18:12
investigators something like that is called and it
00:18:15
now works not only in safari
00:18:17
it’s not it’s right in the iPhone it’s right in the
00:18:20
iPhone in I can even say a second and
00:18:25
spend here it’s tracking right that’s what it’s
00:18:27
called here it is tracking and
00:18:31
here there are a couple of applications that
00:18:32
wanted to track me, I didn’t allow them the
00:18:35
results of the rule to fill in this rule
00:18:38
considers a new story it appeared to the
00:18:40
degree of touching, that is, if before there were
00:18:42
no tracks only for the browser, now you
00:18:44
can’t touch them directly for
00:18:48
applications here this will be gradually
00:18:50
added
00:18:51
but this is the story and because of this struggle
00:18:54
before Facebook it’s just going crazy there now
00:18:56
you can read they are preparing
00:18:58
all sorts of anti-monopoly lawsuits they are fighting as best they
00:19:01
can the cycle because this could
00:19:04
greatly undermine their advertising market yes
00:19:05
they don’t live off
00:19:07
targeted advertising targeted from them they
00:19:10
specially make their Facebook again
00:19:11
which is embedded in a bunch of applications I and
00:19:14
all this is a track itza for a person but the
00:19:16
advertising pixel of Facebook that reaches up
00:19:18
to and here about apple actually bans
00:19:21
it it’s no longer like apple and has a
00:19:23
tool for users to ban
00:19:25
to use this and the user
00:19:27
naturally in most cases, of course, I do
00:19:28
n’t want it not to be tracked and it
00:19:30
just causes colossal losses there, then
00:19:32
billions of dollars
00:19:33
to go to MTS cashback services this also
00:19:35
now does not cause losses because for
00:19:37
example, we are now entering the
00:19:39
US market Thomas my browser safari safari I
00:19:41
see now it’s very much
00:19:43
interrupting cookies and so on, even
00:19:45
my cashback is swearing at me that you
00:19:48
opened a safari pancake cookie, I can’t track it and,
00:19:49
accordingly, the purchase will be lost,
00:19:51
not only Facebook will suffer, I don’t
00:19:54
know what’s better, that’s it, that is, there is such a
00:19:57
story, that’s it here, from the
00:20:00
security features, it is clear that they also have their
00:20:05
own here, they are fighting for
00:20:07
users for their rights for a certain
00:20:10
privacy, including complaints, they
00:20:14
will suffer some financial losses
00:20:15
for this, but this is the path they chose
00:20:17
and
00:20:19
yes, so 14 it wins you greatly in terms of
00:20:23
security and privacy,
00:20:27
plus everyone definitely needs to update with
00:20:29
it 14 420 at the moment of launching
00:20:31
video recording may already be released soon and the 14th
00:20:33
half version why, unfortunately, apple is
00:20:39
not very good at sharing the details, but
00:20:42
every update it launches these verses,
00:20:44
these newsletters and and now 14 42 and release it in the
00:20:47
shortest possible time, just in emergency
00:20:49
mode because the
00:20:52
vulnerability in the bki was closed, they pull it in the engine which
00:20:56
they write that was actively exploited
00:20:58
for
00:20:59
attacks they call it, that is, in the real
00:21:02
world, well, that is, someone used
00:21:04
some layer you are talking about this whale, they
00:21:06
discovered it, released an urgent fix, and
00:21:08
they released it even for old
00:21:10
iPhones, that is, version 12 52 was released,
00:21:13
which are no longer updated, did not receive
00:21:15
13 did not receive 14 serious,
00:21:18
these are all sorts of 5s and so on, and they even
00:21:21
released them with 512 ouverte which is already there
00:21:24
and we find a phone for 7 years, here
00:21:26
they have all the news and updates to
00:21:28
close and such news that
00:21:31
some kind of vulnerability in iOS was used
00:21:33
and is being called more and more often, this of
00:21:36
course is annoying, but I will repeat it in
00:21:41
Tom purely mule ruet to update,
00:21:42
in any case, they are great for
00:21:45
releasing fixes very quickly, this is not Android, where is
00:21:47
Google releasing something in
00:21:49
six months to your vendor? It
00:21:51
was behind itself, in general, to
00:21:53
send you this patch, here everything
00:21:56
happens very quickly, but also for you
00:21:58
Today it came up that auto updates but
00:22:01
yesterday and when it came out, that is, just
00:22:03
auto update surazha,
00:22:04
but ios is not a panacea at all, as you can see, there
00:22:07
are also holes, they are also
00:22:08
exploited, but the main thing is
00:22:11
to update on time and so up to 14 now 14 5
00:22:14
will be released and then I’ll do it it will be possible to
00:22:17
unlock with a mask on your face if
00:22:19
you have a watch, well, this was just conveyed, it will spur the
00:22:22
sale of watches up to the price of more expensive watches,
00:22:25
and plus a tribute to the replacement of the tandem, and
00:22:27
because in most regions,
00:22:29
strangely enough, it’s not like in Russia, but here everything is
00:22:30
very relaxed, but so far since then there are
00:22:33
3 minds and regimes are very strict, everyone wears
00:22:37
masks and of course it’s not very convenient to use on the side,
00:22:39
but they also say that here’s
00:22:42
12 if at 13 which is now in September
00:22:44
they will also make a tachaidy under the
00:22:48
korando screen right under the screen of that one so that there is both a
00:22:50
face and a fingerprint under the screen is the most
00:22:53
convenient place where I saw tachaidi, yes, well, it’s
00:22:57
like there in Huawei, I had it
00:23:00
here, that is, you just take your
00:23:01
finger the fruits that in fact it
00:23:03
was very convenient, you get right into the center of the screen,
00:23:05
in general it’s cool but on in fact,
00:23:07
we talk so much about apple technology,
00:23:09
because this issue
00:23:11
could have been sponsored by restore now, you see, it didn’t,
00:23:13
but we hope that we’ll finish the topic of
00:23:20
telephony, all sorts of system updates and
00:23:23
other troubles with contacts, but
00:23:26
stay with us, there will be a next
00:23:28
issue already there a hundred Fifty-seventh in
00:23:30
a row, subscribe to my channel and to the
00:23:32
channel by group in YouTube and Telegram
00:23:35
and write some cool comment
00:23:37
under this video, an interesting one or a question
00:23:40
for the next possible releases, and then you
00:23:42
may end up with the thing or handbag
00:23:45
that you showed at the beginning of the release
00:23:47
thank you all for watching, share with
00:23:49
the video, update this apple all the time,
00:23:52
by the way, I have the setting turned on in my iPhone
00:23:54
so that it automatically updates itself, but from the
00:23:57
factory it couldn’t update at night
00:23:58
because I had less than 50
00:24:01
percent of the charge, or so it’s also time
00:24:03
to update at this point, of course not
00:24:05
only your mobile devices there, but
00:24:07
also the operating systems of your computers and even
00:24:10
operating systems and plugins on your
00:24:13
websites in countries, thank you all, hugs
00:24:22
[music]
00:24:31
[music]

Description:

💰 https://change.pro/ – купить/продать BTC, ETH, USDT и другие популярные криптовалюты 🛍️ Мой кэшбэк-сервис: https://secretdiscounter.com/?promo=youtubeall 🔥 Сервис Мамкиных отрисовщиков: https://t.me/mamkin_public ⚠️ Мой телеграм-канал со всеми удаленными Роскомнадзором видео: https://telegapro.com/ 📡 Мой телеграм-канал про YouTube (учу бесплатно от А до Я): https://t.me/PRO_YouTube_channel 👨‍💻 Мой телеграм-канал про хакеров и IT-технологии: https://t.me/glav_hack 👁 Новый Глаз Бога: https://blue.eog.bz/ 🆘 Нужна юридическая помощь? Обратись к юристам Люди PRO: https://lawproblems.ru/ 🔗 Проверенные лично мной сервисы для заработка в интернете: https://pavlovich.shop/proverennye-servisy.html 📕 Моя книга: https://pavlovich.shop/knigi.html 🔔 Интересное со съемок в Яндекс.Дзен: https://zen.yandex.ru/id/5fa82b772c18c8606f091685 👉 Моя инста: https://www.facebook.com/unsupportedbrowser 🎧 Мои подкасты: https://pavlovich.shop/kontakty.html 📹 Канал Сергея Никитина: https://www.youtube.com/channel/UCo35R3RoZkGCzCjk6s0wXOQ 🎞 Все выпуски с Никитиным из Group-IB: https://www.youtube.com/playlist?list=PL8Fj6Tf1y_zm-rHIfTUPrEfD14ujfsvL- 👉 Канал Group-IB в ютубе: https://www.youtube.com/GroupIB 👉 Канал Group-IB в телеграме: https://t.me/Group_IB ✅ Мой бот для проверки IP на чистоту, присутствие в блек-листах и пр. Требуется везде – https://t.me/ip_score_checker_bot ******************************** ★★★ ПОДАРОК ВСЕМ ПОДПИСЧИКАМ – ПОЖИЗНЕННЫЙ «ЗОЛОТОЙ» АККАУНТ В КЭШБЭК-СЕРВИС SECRETDISCOUNTER.COM. Регистрируйтесь по этой ссылке https://secretdiscounter.com/?promo=youtubeall и получайте самый высокий кэшбэк в Рунете. Booking, Aviasales, AliExpress и еще тысячи магазинов с кэшбеком ждут вас! ******************************** 🔥 Telegain – лучший сервис для покупки/продажи рекламы в Telegram: https://telega.in/ ******************************** 📦 Мой сайт по отслеживанию посылок: https://secretdiscounter.com/tracking 💰 Мой рейтинг кэшбэк-сервисов: https://best-cashback.ru/ В 199-м выпуске «Люди PRO» Сергей Павлович продолжает беседу c Сергеем Никитиным, заместителем лаборатории компьютерной криминалистики компании Group-IB – главного российского частного борца с хакерами и прочими киберпреступниками, и в десятом выпуске из серии говорим о .... ТАЙМКОДЫ: 00:00 – В этом выпуске 00:35 – Гетконтакт (Getcontact) 01:20 – Смешные истории, пробив, черное SEO 05:07 – Безопасность и уязвимость Jabber (XMPP) 08:00 – iMessage от Apple, безопасность новых чипов M1 09:28 – Сообщения с iMessage Дудя, «Большой брат за всеми следит» 11:43 – Дискорд (Discord), VIPole 13:11 – Element.io 15:30 – Приложения для клавиатуры 15:45 – Прошивка от iOS 14, обновления, сбор данных, отслеживание с айфона (iPhone) 22:20 – Face ID в связке со смарт часами 23:20 – Всем пока, не забывайте обновлять ПО на гаджетах Приятного просмотра! ******************** 🔵 МОИ КОНТАКТЫ ➤➤➤ https://linktr.ee/carding.pro ******************** ⚠️ КАК ВЗЛАМЫВАЮТ ТЕЛЕФОНЫ И МЕССЕНДЖЕРЫ // GROUP-IB

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "⚠️ Как взламывают телефоны и мессенджеры // Group-IB" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "⚠️ Как взламывают телефоны и мессенджеры // Group-IB" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "⚠️ Как взламывают телефоны и мессенджеры // Group-IB" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "⚠️ Как взламывают телефоны и мессенджеры // Group-IB" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "⚠️ Как взламывают телефоны и мессенджеры // Group-IB"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "⚠️ Как взламывают телефоны и мессенджеры // Group-IB"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.