4min chapter

CYBER cover image

How Journalists Work With Hacktivists

CYBER

CHAPTER

How Do You Authenticate an Anonymous Hacker?

How do you work with an anonymous heck or invent their information? Ye, sure. I mean, this will often happen over in cryptochat channel,. You know, wicker or a jabber. And i wouldn't say it's a negotiation, because that's a sort of the wrong connotation. But ther there's a back and forth or conversation where i'm basically trying to establish, first of all, how the gip this feels. Er, obviously, who the target is and what the data involves. A and then ultimately being able to obtain that data so we can authenticate it.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode