Hacker Communication Secrets

✨ Megiddo

✨ President ✨
Staff member
Joined
May 15, 2016
Messages
13,734
Likes
2,643
Points
1,730
Secret greeting

Members of active hacker groups can be the last to be free every day, but the most annoying thing is that on any day, instead of a partner, a law enforcement representative can get in touch. This is an old and favorite technique, when the arrested hacker is taken away by a technique or he is forced to write to his accomplices and get some valuable information from the investigators. Not always the goal is the accomplices, sometimes the main task is to collect compromising material on the detainee himself, who cleaned up the correspondence and “forgot” about his participation in the crimes. It is then that accomplices may remind the operative staff of the affairs of the arrested person, inform the details, which then will form the basis of the criminal case. But hackers have a trick to protect against such a threat - a confirmation through a greeting and a secret alarm signal. Humanity came up with many different greetings: buen día, buon giorno, o zi buna and others. Hackers choose three unusual and begin to greet each other only by them. For example, you can welcome partner “Liberte, Egalite, Fraternite!”, And he will welcome you “Ave, Caesar!”. But this is not the main thing; greetings should change in a certain order: one day, one other, so that the person from the outside, without understanding, greeted incorrectly. In case the partner has problems, there should be a special greeting, for example, “Salute, buddy!”. It will mean “I have serious problems, no matter what I write further, it’s either not me or I write under duress. Pretend that nothing is happening and take care of yourself. ” Hackers choose three unusual and begin to greet each other only by them. For example, you can welcome partner “Liberte, Egalite, Fraternite!”, And he will welcome you “Ave, Caesar!”. But this is not the main thing; greetings should change in a certain order: one day, one other, so that the person from the outside, without understanding, greeted incorrectly. In case the partner has problems, there should be a special greeting, for example, “Salute, buddy!”. It will mean “I have serious problems, no matter what I write further, it’s either not me or I write under duress. Pretend that nothing is happening and take care of yourself. ” Hackers choose three unusual and begin to greet each other only by them. For example, you can welcome partner “Liberte, Egalite, Fraternite!”, And he will welcome you “Ave, Caesar!”. But this is not the main thing; greetings should change in a certain order: one day, one other, so that the person from the outside, without understanding, greeted incorrectly. In case the partner has problems, there should be a special greeting, for example, “Salute, buddy!”. It will mean “I have serious problems, no matter what I write further, it’s either not me or I write under duress. Pretend that nothing is happening and take care of yourself. ” so that a person from the outside, without understanding, greeted incorrectly. In case the partner has problems, there should be a special greeting, for example, “Salute, buddy!”. It will mean “I have serious problems, no matter what I write further, it’s either not me or I write under duress. Pretend that nothing is happening and take care of yourself. ” so that a person from the outside, without understanding, greeted incorrectly. In case the partner has problems, there should be a special greeting, for example, “Salute, buddy!”. It will mean “I have serious problems, no matter what I write further, it’s either not me or I write under duress. Pretend that nothing is happening and take care of yourself. ”

Constant change of accounts

When this article was written, there appeared information in the media about the leakage into the network of personal data of German politicians, including their passport data and bank card information. Behind the attack was a hacker who called himself Orbit. Literally within several days the hacker was calculated and detained. He used Telegram, issued on his personal number, - it is difficult for me to explain such carelessness. Hackers of the old school not only did not indicate any of their data during registration, but also regularly changed accounts. Sometimes this was done every week, and all contacts of interest to the hacker were transferred, and those with whom it was no longer along the way, went down in history. And it was a sensible step ...

Every contact is proof.

Hackers are well aware that every contact can be in the wrong hands a weapon against them. Imagine a situation: a hacker deletes correspondence, but if the equipment gets to the ill-wishers, one of the contacts will write, “So, bro, will we break the Pentagon?”. Therefore, a real hacker, concerned about his security, must remove all unnecessary contacts and, of course, regularly change the account.

What will they say about you at the investigation?


Imagine yourself a hacker, whose accomplice is caught by law enforcement agencies. Further, during the interrogation, he is asked about other participants, asking to indicate contacts. What will he say about you? Nothing can be said about a real hacker, since the contact of a real cybercriminal should be incoherent, poorly remembered, unsystematic. In Jabber, you can use a combination of characters that have neither order nor sense.
 

SmithOvil

New Member
Registered User
Joined
Jun 28, 2021
Messages
3
Likes
0
Points
1
Age
43
Very long article but thanks for sharing
 
Top Bottom