Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "phone hackers"
-
So today (or a day ago or whatever), Pavel Durov attacked Signal by saying that he wouldn't be surprised if a backdoor would be discovered in Signal because it's partially funded by the US government (or, some part of the us govt).
Let's break down why this is utter bullshit.
First, he wouldn't be surprised if a backdoor would be discovered 'within 5 years from now'.
- Teeny tiny little detail: THE FUCKING APP IS OPEN SOURCE. So yeah sure, go look through the code! Good idea! You might actually learn something from it as your own crypto seems to be broken! (for the record, I never said anything about telegram not being open source as it is)
sources:
http://cryptofails.com/post/...
http://theregister.co.uk/2015/11/...
https://security.stackexchange.com/...
- The server side code is closed (of signal and telegram both). Well, if your app is open source, enrolled with one of the strongest cryptographic protocols in the world and has been audited, then even if the server gets compromised, the hackers are still nowhere.
- Metadata. Signal saves the following and ONLY the following: timestamp of registration, timestamp of the last connection with the server (both rounded to the day so not on the second), your phone number and your contact details (if you authorize it) (only phone numbers) in HASHED (BCrypt I thought?) format.
There have been multiple telegram metadata leaks and it's pretty known that it saves way more than neccesary.
So, before you start judging an app which is open, uses one of the best crypto protocols in the world while you use your own homegrown horribly insecure protocol AND actually tries its best to save the least possible, maybe try to fix your own shit!
*gets ready for heavy criticism*19 -
Once upon a time in Devland, there were two best friends @Alice and @Michelle and they worked together at The DevCo company as developers.
After a tough day handling an @-ANGRY-CLIENT-, they thought that they had to go and @RantSomewhere and so they went to a café. At the café, they ranted about some stupid clients, and @theItalianGuy at the third floor of their office building who never picked up calls, and @thatJavaGuy from the second floor who, they thought, was @notarealDev, and the usual stuff about their work. Somewhere in between, @Alice thought it would be @funvengeance to @hack @theNSA; “@karma is coming to get them”, said @Michelle.
To do this, they knew they’d have to take help from none other than @Gandalf who lived in a nearby @cave. So, the next day, taking a leave from work, @Alice and @Michelle embarked on journey to meet @Gandalf. After about an hour’s drive, they reached @Gandalf’s @cave. @Michelle went ahead to knock on @Gandalf’s rusty cave door. Being a lazy @necromancer, he magically opened his door 2 minutes later. “Who is't dares to disturb me in mine own catch but a wink?” shouted a voice from the back; “We’re two developers from DevCo and we need your help in our mission to @hack @theNSA”, shouted @Michelle. After a few seconds, he replied, ”Hmm… N'rmally I wouldst sendeth thee to mine own cousin @Hagrid, but in thy case, I sayeth thee shouldst visiteth the detective who is't goeth by the nameth @S-Holmes”. @Alice replied back, “Thank you, Sir @Gandalf, we’ll get help from this @S-Holmes, I’ve heard that he’s an @exceptionalGuy”; “Mine own pleasure, Farewell!” said @Gandalf, and the door closed shut.
So, @Alice and @Michelle went back to their car, and that time @Alice raised a question, “How are we gonna find this @S-Holmes? We don’t have a phone number or anything so we could contact this guy.”
“We should call @thatJavaGuy from work, I’ve heard he is a man of resources, he must know how to contact @S-Holmes”, said @Michelle.
And it was true, after a call with @thatJavaGuy, they were able to obtain @S-Holmes’s phone number.
“Howdy, this is @S-Holmes, what can I diddily ding dong do you for?”
“Hi, I’m @Alice, I’m from DevCo and I was hoping that I could get your help in our mission.”
“What kind of mission?”, asked @S-Holmes.
“We want to @hack @theNSA.”, replied @Alice.
“Okay… I think I might be able to hel-diddly-elp you! There’s an old and abandoned laberino noodly-near @stacked Street. It was made in @1989 and since then, it houses a magical computeroo that can hel-diddly-elp you in your mission. So, you just have to connect the computeroo to the Internet and you can diddily ding dong do your programmeroo thing and then you'll have access to the the noodly-nsa diddily ding dong database!”, answered @S-Holmes.
S-Holmes continued, “But I shall warn you, there's a riddly-rumorino that the laberino was abandoned because of an @electric-ghost that lurks there, but I bel-diddly-elieve it is just a computeroo program that was diddily ding dong designed to try to @stop hackers from accessing the top secret stuff!".
“Okay, thanks for your help! I bet we can handle whatever this @electric-ghost thing is, so… Goodbye!”, replied @Alice.
“Goodbye!”, said @S-Holmes and that ended their conversation.
Luckily, the @stacked Street was just a couple of miles away from them, so they reached the lab quickly.
As they got close to the lab they saw something that really surprised them…
--------
To be continued in part two...
(Do you want a part two? :/)
My first ever story is a little special because it is kind of dev related at it has "cameos" by various devranters, as you might have noticed.
How many did you count?
More in Part Two.
Thank you for reading and please, any feedback is welcome. Did you like it?
I haven't really revised it once, it is straight out of the keyboard.
Should I drop the "@" ?
But then it would impossible to spot some of the devRanters .
Let me know.
PS
What should be the title?
1)Alice in DevLand?
2)Adventures of Alice and Friends: Hacking the NSA?
You decide..(or maybe I'll pick the second one :D)21 -
Man, what a way to start the week. Our mailserver went nuts (something about a Shellbot virus, I don't know) and we were forced to migrate to a new one. Clients calling in panic and threatening to sue us and shit. I was the one tasked to fix the problem (I am a developer mind you, my sysadmin knowledge is limited to google searching and contacting support). At the same time, Turkish hackers attacked our other server and forced me to fetch backups and clear spamming scripts. And to top it all, I was forced to answer the phone calls and respond to the threats. Man, I must have been a complete prick in my previous lifetime to deserve this.4
-
When i started to get into computers i didn't know a shit about Linux, i had the typical idea that is for hackers. Now i see how things that we use everyday like the phone uses it.
#againstignorance3 -
I was helping a client launch a new website. We met in a restaurant to do the final launch work. I mentioned I use VPN software to protect my computer on public WiFI and taught him what it means. He said it sounds hackerish and untrustworthy and I had a hard time explaining how it’s actually a countermeasure to hackers.
The next day he calls and says his cell phone is acting up and wants to know what my VPN software might have done to cause that.
How do some people get dressed in the morning?2 -
At a previous job I bumped heads with the IT person a lot because he would spread misinformation about technology so the owners would never replace him. This was conversation with the VP:
VP: Hey I just got a new security setup at my house and I can monitor everything with my phone.
Me: That's cool.
VP: I'm rethinking it because [IT guy] said it was very dangerous to have, what do you think?
Me: ....? What did he say was dangerous about it?
VP: He said hackers could then gain access to cameras and plan the perfect time to rob me since it's in the cloud.
Me: I seriously doubt anyone is planning an Ocean's 11 heist to steal your TV.
VP: Yea I thought it sounded weird when he told me.3 -
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5 -
Fuck the feelings of powerlessness and helplessness. when a friend comes crying for you for help with their hacked account and you keep asking them about what they did to protect it in the first place and they reply with nothing, no recovery email, no recover phone, no secondary verification, NOTHING. and you can do nothing but stand there and watch them cry while you can literally do nothing because there literally nothing you can do to retrieve their stolen accounts. FUCK BLACK HAT HACKERS.3
-
Enter one word in terminal and hack fucking government's, CIA's, NSA's, websites, database and servers, just like hackers in movies do.
If I failed to achieve this, would love to hack Sony's website and post a message on all their websites
"We make terrible mobile phone" -
That moment you setup 17 domains on sparkpost as a email delivery system
make your account secure with 2 factor authentication like a good infoSec enthusiast
Go on with your life
Having a Phone crash but nothing to worry because you made them backupz
Restore backupz
once again go on with your happy life.
Having to setup a different bounce action on sparkpost
logging in to sparkpost to make the adjustments
opening google authenticator
realising the backup you restored was before you added the sparkpost entry
mailing sparkpost asking to deactivate 2factor authentication
Having them tell me that they have no access to Google authenticator so they can't help me and all they can do for me is delete my account if i answer their 7569357 questions that i entered a year ago ..
--
You have access to your database yes ? You can delete my account but you can't adjust a fcking Boolean column from true to false? #@?#&!
Why even offer a feature where you have apparently no control over. Stuff like this happens all the time and almost no one saves that fcking authenticator secret.
Make people use authenticators to keep the hackers out, forces them out instead.4 -
You may be suspecting that your wife is cheating on you. The doubts linger, causing anxiety and sleepless nights. In a desperate search for the truth, he turns to TrustGeeks Hack Expert, a renowned digital forensics company known for its expertise in uncovering hidden information. And so, the curious case begins. TrustGeeks Hack Expert embarked on a mission to unveil the hidden messages that held the potential to confirm or dispel the husband's suspicions. Using their arsenal of expert techniques, they began the intricate digital investigation process. The first step involved collecting all the necessary details, such as the communication platforms used, usernames, and any available passwords.
With the information in hand, the team at TrustGeeks Hack Expert delved deep into the digital realm, employing cutting-edge forensic tools to recover deleted messages and uncover hidden conversations. Once the messages were retrieved, they underwent a meticulous examination, deciphering the content and ensuring their authenticity for future use. The final step involved presenting the uncovered messages to the client, providing him with the concrete evidence he needed to confront his wife and make informed decisions about his relationship. Thanks to the wizardry of TrustGeeks Hack Expert, the truth was uncovered, and the husband was equipped with the knowledge he sought. A selection of services designed especially to unearth the truth behind messages from an unfaithful spouse are provided by TrustGeeks Hack Expert. Their team of professionals is proficient in data recovery, digital forensics, and meticulous tracking methods. With their help, people can obtain the proof they require to validate their suspicions and make wise choices regarding their relationships. Even though there may be a lot of grounds for suspicion, it's crucial to conduct the inquiry in an ethical manner. TrustGeeks Hack Expert is aware of how delicate these circumstances can be, and they take care to make sure that all of their procedures follow moral and legal guidelines. Their mission is to give people the information they need while protecting their right to privacy and secrecy. TrustGeeks Hack Expert proficiency in digital forensics and data recovery is just one of their many skills. They have the ability to retrieve erased emails, messages, and other digital traces that might contain information about the secrets of an unfaithful spouse. They are able to resurrect material that has been concealed and offer it as proof by employing sophisticated strategies. TrustGeeks Hack Expert is aware of the significance of social media surveillance in this day and age, as these platforms play a big part in communication. They are able to monitor messaging apps, keep tabs on online activities, and even offer phone tracking services. People can use their knowledge to better understand their partner's interactions, which enables them to make defensible decisions. Remember, while discovering a cheating spouse can be a painful experience, having access to expert techniques like those offered by TrustGeeks Hack Expert can provide the clarity and evidence needed to move forward. Trust in their expertise and let them guide you through the process, armed with wit, personality, and a dash of digital magic.
Communicate with TrustGeeks Hack Expert through:
whats App +1 406- 218- 6900
Telegram User: @ Trustgeekshackexpert
Best Wishes -
I FOUND OUT ABOUT MY WIFE’S INFIDELITY USING GRAYHATHACKS CONTRACTOR
I was in a situation that I never thought I'd find myself in. My wife and I had been together for five years, and I had noticed some changes in her behavior lately. She was distant, secretive, and always had her phone glued to her hand. I tried talking to her, but she'd just brush me off, saying it was work stress. I knew deep down it was more than that. I couldn't just ignore the gut feeling that something was off.
So, I did what any desperate, confused, and heartbroken person would do - I started looking for answers. That's when I stumbled upon the world of hackers and investigators. I first came across the Beviant Group of Hackers. They promised me the moon and stars, but all they delivered was a bunch of empty promises and a lighter wallet. I was about to give up hope when my cousin, who had been a silent witness to my pain, suggested I try Grayhathacks Contractor.
It's no exaggeration that it was the best decision I ever made. I was skeptical at first, I'll admit. I mean, I had just been burned by another group, so how could I trust them? But something about their approach was different. They were professional, empathetic, and above all, discreet. They assured me that they'd help me find the truth without invading my wife's privacy any more than necessary.
They set up a plan to track her movements, intercept her calls, and read her messages and emails. The first few days were nerve-wracking, but then the information started to trickle in. It was like they had a map of her life laid out in front of them. They were so precise with their work, it was unbelievable. They pinpointed her location down to the minute, showed me the calls she was making, and even provided me with transcripts of her chats.
What they uncovered was like a punch in the gut. My wife had been fooling around with a coworker, someone she claimed was just a friend. They had planned vacation trips together, all under the guise of work. The nerve of her. But here's the kicker - she had been using our joint account to fund these little escapades. The betrayal was unreal.
The confrontation was hard, but with the solid proof in my hand, I couldn't deny the truth anymore. It was a mix of anger, sadness, and relief, really. I finally had the answers I needed to move forward. And even though it's been a tough road, I'm starting to pick up the pieces of my life, thanks to Grayhathacks Contractor.
If you're in a similar situation, I can't recommend them enough. -
GRAYHATHACKS CONTRACTOR HELPED ME GET PROOF THAT MY HUSBAND WAS HAVING AN AFFAIR
Hi there. You know, the kind of situation where you're not sure if you're making the right decision, but you know you need answers. That's where I was a few months ago. My husband had been acting so distant, so suspicious, and so overprotective of his phone. The gut-wrenching feeling of not knowing what was happening was eating me up inside. I'd catch him smiling at his screen when he thought I wasn't looking, and then he'd quickly switch it off when I walked into the room. The whispers and secret calls were just too much to bear.
That's when I stumbled upon Grayhathacks Contractor. At first, I was skeptical, but desperation can make you consider things you never thought you would. I reached out to them, and from the get-go, they were so understanding and professional. They made me feel like I wasn't alone, like I was doing the right thing for my peace of mind. And boy, did they come through for me!
The process was surprisingly simple. They had me send over my husband's phone details, and they got to work right away. Within a week, they sent me a detailed report that had me floored. It was like they had peeled back the layers of deceit and laid bare his infidelity. The damning data they harvested from his phone and laptop was overwhelming. They found text messages, emails, and WhatsApp chats that left no doubt in my mind. He was having an affair with a colleague from work. The conversations were explicit, filled with lovey-dovey language and promises that should've been reserved for me. There were dates, times, and even hotel bookings that coincided with nights he claimed to be working late. And the photos! The raw pain of seeing those images of him with someone else is something I'll never forget.
The thing that really got me, though, was the voice memos. Hearing his voice, saying things to her that he hadn't said to me in years, was devastating. But it was also the proof I needed to finally confront him. And when I did, he couldn't lie his way out of it. The evidence was right there, cold and clear. Their spyware was top-notch. It was undetectable, and it gave me access to everything: his calls, messages, emails, social media, and even his location history. It was like having a pair of invisible eyes and ears. They even helped me understand the technical side of things, guiding me through the process of checking the data they had collected.
If you're in the same boat I was, I totally get it. The thought of hiring a hacker is daunting, but sometimes you just need to know the truth. And let me tell you, Grayhathacks Contractor will give you that truth. They're not just hackers; they're detectives of the digital age, helping people like you and me uncover the painful realities that are often hidden in plain sight.
I'm not saying what they do is pretty, but sometimes you have to get a little dirty to find the truth. And when you do, you can start to rebuild your life, piece by piece. It's been a tough journey, but thanks to Grayhathacks Contractor, I'm on the path to healing. I now know exactly what happened, and I can make informed decisions about my future.
So, if you're feeling lost and need answers, don't hesitate to reach out to them. And who knows, maybe one day you'll be writing a review like this, sharing your own story of how they helped you get your life back.