Victor's story emphasizes the importance of responsible disclosure and the need for stronger security measures, such as two-factor authentication, on platforms like Twitter.
Victor's journey highlights the ongoing challenges in cybersecurity, where ethical boundaries and legal consequences must be carefully navigated, while also highlighting the need for improved cybersecurity measures and fostering a culture of responsible disclosure.
Deep dives
Victor, the Internet Janitor: Cleaning Up Vulnerabilities
Victor, a self-proclaimed janitor of the internet and member of the guild of the grumpy old hackers, has made a life out of filing coordinated vulnerability disclosures. With over 20 years of experience, he has reported thousands of vulnerabilities and believes in responsible disclosure. The story begins with Victor discovering a vulnerability in a video store's inventory computer when he was younger. This sparked his passion for finding vulnerabilities and reporting them. He later founded the GDI Foundation, a non-profit organization focused on finding and reporting vulnerabilities to help secure the internet. Victor also played a role in exposing the lack of security in Donald Trump's Twitter account by hacking into it twice, emphasizing the importance of two-factor authentication. Victor faced criticism and legal consequences, but his actions were ultimately deemed ethical, and he continues his work in securing the digital world.
The Ethics of Hacking: Responsible Disclosure and Gray Areas
Victor's story raises important ethical questions about hacking and responsible disclosure. While gaining unauthorized access to someone else's account is illegal, Victor firmly believes in responsible disclosure and the greater good it serves. He carefully avoids doing anything malicious during his investigations and adheres to a strict code of conduct. The story also highlights the need for platforms like Twitter to enforce stronger security measures, such as two-factor authentication for verified and influential accounts. Victor hopes that this incident encourages individuals to take their own account security seriously, leading to more widespread adoption of two-factor authentication.
The Pressure and Consequences of Reporting Vulnerabilities
Victor's journey is filled with stress, pressure, and potential consequences. His actions in exposing vulnerabilities have had significant impacts on his professional and personal life. He faced criticism, accusations, and even a criminal investigation by the Dutch authorities. Victor's commitment to responsible disclosure and his extensive experience in the field ultimately prevailed, leading to an official ruling that his actions were ethical. Despite the challenges, Victor continues his work in helping secure the internet and is launching the DIVD Academy to teach young adults IT security and research skills.
Lessons Learned and the Future of Cybersecurity
Victor's story highlights the need for improved cybersecurity measures, responsible disclosure practices, and increased awareness among individuals and organizations. Lessons learned include the importance of implementing two-factor authentication, conducting regular security assessments, and fostering a culture of responsible disclosure. Victor's dedication to securing the internet and coaching the younger generation reflects a collective effort to build a safer digital future. The story also underscores the ongoing challenges and gray areas in cybersecurity, where ethical boundaries and legal consequences must be carefully navigated.
Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
Listen to episodes 86, and 87 before this one to be caught up on the story leading up to this.
Sponsors
This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.
This podcast is sponsored by the JSCM Group. They have a service called ClosedPort: Scan, and it’s is a monthly Penetration Test performed by Cyber Security Experts. Contact JSCM Group today at jscmgroup.com/darknet.
Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode