Former NSA Hacker Reveals 5 Ways To Protect Yourself Online

September 16, 2019 posted by

– Mr. Robot is probably
one of the most accurate portrayals of what
hackers can actively do. If you’re interested in hacking and don’t understand a lot of this, the TV show itself
actually employs hackers to work on the show to
depict real life hacks that could happen in real life and it’s a very very accurate portrayal of everything that we see today. From being able to hack smartphones to getting access to a big corporation and being able to bring
them to their knees from a cyber perspective. So what’s the top five
things that you can do to make yourself more secure both at your business and your home? Number one, use two factor authentication or two step verification
everywhere that you can. Your banking systems, Twitter, Facebook all support the ability for you to enable an additional security
feature that you may not know. You go to your settings, it’s in there. You can enable it and
every time that you log in, it’ll register your computer, and you can then get a text message to go into that system as a
second form of verification. And why that’s important
is because if a hacker gets access to your
password, they still have to have access to your phone
to get access to your account. And that’s really important by enabling that specific security
step, probably number one. Number two, don’t use the
same password everywhere. I know it’s hard, but using
the same password everywhere is one of probably the easiest ways that we break in as hackers. So if you have the same Twitter password as your same banking information, those are things that can get
you in some serious trouble. Number three, make sure
that you stay up to date. Those security patches. Every time you have a Windows update that says “Hyy I need to
update your computer,” it’s usually to fix a known attack that hackers have figured out to get access to your computer. So keep up to date whether
you’re using a Mac, they aren’t impervious to attack, or you’re using Windows, same thing, update your systems. That’s the most important thing, always keep up to date with
what you’re having out there. Same thing for third-party applications. If you’re using Java, Adobe,
PDFs, Office documents, those are all things that
you want to keep up to date and that makes it much
harder for us as hackers to break in to your system. Number four, social media, be careful with how much information
you actually put online. We as attackers can look at that. Look at what you do, your spending habits, what you might be doing from
a day-to-day perspective, going and buying Starbucks
at a certain location. Those are all things that
we can use to identify when you’re gonna be out of the country or when you’re gonna be
at a business meeting. We can use that as a method to attack you. One of the main things
that we do as hackers, especially when it comes
to social engineering, is we create a sense of urgency. Something that you’re familiar with, but you have to take action upon. So let’s just say for example,
I’m a Verizon customer and I have an Amazon package
that’s getting delivered. Well, if I, as an attacker,
know an Amazon package is getting delivered,
sending a text message from a Verizon customer
support service line coming from Amazon
saying “Hey your package is being rerouted,” you
need to log into the site to get it delivered again, is something that an attacker can use. So those are things that
attackers can leverage is urgency, how you actually operate, and all that information
that you post online are things that we can use as attacks. And last but not least,
personal information. That’s one of the biggest
things that attackers can leverage to get access to your data. Things like social security numbers, your credit card numbers. A person is not going
to call you on the phone from a banking service and ask you for that type of information. So whenever you get a call,
that’s too good to be true, or a call that is a fraud
services line, call them back. Look at the number on
the website themselves and call it back cause a
lot of times attackers will impersonate financial services. They’ll impersonate
different organizations to try to get your personal information and use that to be able to
make fraudulent charges. So when it comes to that,
your phone, verify first. Go to their site, call the
site itself, off from there and then call to an actual
person that’s actually at that institute itself.


100 Replies to “Former NSA Hacker Reveals 5 Ways To Protect Yourself Online”

  1. Iliana B. says:

    hacker with a suit

  2. RyoMassaki says:

    He forgot the most important option to keep private/important data absolutely safe.
    Have an computer which is not and never will connect to the net. The best hackers of the world, nor the NSA can hack a computer they don't know exists and is physically unable to connect to the web (unless they have access to the actual computer).

  3. Z PATRIOT says:

    Talking point 1 – FB is a data mining app. If you have not already done so, delete your account. Read the TOS carefully, slowly, you surrendered your right to privacy.

  4. Z PATRIOT says:

    Talking point 2 – Updating your OS especially W10, is foolish if you assume MICROSOFT had your best interests at heart. MICROSOFT = PARTICIPATED WILLINGLY NSA SPYING "P.R.I.S.M."

  5. Z PATRIOT says:

    Background… multiple security and network degrees across all OS platforms. BACK DOORS are rampant in both MS & APPLE. Professional advice? Switch to Linux-based OS.

  6. Z PATRIOT says:

    Security advice? Change password, often, never reuse past code, augment random characters, complex combinations, special characters, 10+ length (longer, better).

  7. Z PATRIOT says:

    Authentication? DO NOT USE YOUR MOBILE DEVICE. Invest in KEY FOB [Ex.,RSA SecurID] separate code generator. Linking anything to your phone is pure stupidity.

  8. Roman Kurzwernhart says:

    good tips. but i would say .. instead of patching windows or mac systems … use chromebooks instead. if you have the need for one of the old school OSs … ok … but do not connect them to the internet. then you are as safe as you can get.

  9. Thomas says:

    Quick and to the point. 👍

  10. EvoPortal says:

    ROFL, this is an "NSA" hacker yet he speaks nothing of VPN. ROFL what a stupid fake video.

  11. B c says:

    2-factor to your phone doesn't work if hackers are able to port your number to theirs. telecom companies might not be big on security.

  12. hyou zan ren says:

    Is this is why most rich guys didnt use social media? Gonna hard to adding them as my virtual friends for virtual money!

  13. tams996 says:

    Yo relik, wearing pants? 😛

  14. notanewbie dude says:

    I've seen everywhere to not use just one computer, but how many passwords should I have? I have 3.

  15. True Nord says:

    I guess

  16. Ko- Jap says:

    This guy probably hacked us and took away our privacy…the irony

  17. Martin Lefebvre says:

    best top 3. don't use windows or any apple product and also don't use social media 🙂

  18. Cell m8 says:

    there is a reason why he knows the stuff!

  19. Joseph Lauren says:

    "Don't use the word password as your password"
    — John "pedo" Podesta

  20. Topher S says:

    I'm always getting early wishes of "Happy birthday" because there's no way I'm giving Facebook my real birth date. Tech wise, change your router's administration password to something strong. It's also a good idea to use a reputable VPN (not those free ones, except possibly Proton VPN). A VPN is a necessity if you use public wifi. If you want an added layer of privacy use a browser that accesses Tor.

  21. ravi shankar says:

    don't use windows and mac

  22. Sub 4 no reason says:

    Tip : live under a rock

  23. Crazy Minions says:

    I will trust Rami malek not you

  24. Balaj Amjad says:

    Isn’t that man from Twilight?

  25. Tagæyan says:

    My Grandma could have listed those 5 points… I'm pretty sure he could have said a lot more interesting stuff…

  26. 優さん says:

    he did not even mention all the porn sites and how they can infect the computer, regardless of what antovirus one may have.

  27. Anon Anonme says:

    A lot of this shyte is. Oming from india, Pakistan, china.
    I used a VM and destroyed a scammer site by wiping and bit locking their drives

  28. blizzy1978 says:

    NSA -> English:
    1. Use 2-factor authentication, because an attacker would need your phone. – Doesn't matter, we can access your phone, too.
    2. Don't use the same password everywhere. – Doesn't matter, if we can crack one password, we can crack many.
    3. Stay up to date with patches. – Please install our latest "security updates."
    4. Be careful with how much you post online. – Doesn't matter, we can access your home computer anyway. (And your phone, remember?)
    5. Be careful when sharing personal info. – See #4

    Now, why should I trust a "former NSA hacker" again?

  29. Typical User says:

    Obvious advices

  30. Mo A says:

    Now it may sound a bit obvious, because it is obvious.

  31. Peter Lind says:

    what a load of… common sense

  32. Eliaz McNaught says:

    Sometime 2FA is worse than normal authentication

  33. Aloy Sobeck says:

    Aaaayy that boy Eliot 😎

  34. WeldHog says:

    I've got a best advice….Don't use computer.

  35. Svarte Dauden says:

    real life hacks that can happen in real life… 0:16

  36. Andrei Predescu says:

    The SMS 2-factor authentication can also be broken.
    I remember a video Linus posted a while back (1-2 years ago) where he had one or more accounts hacked.
    The hacker basically went into his carrier's store, pretended to be him and requested a replacement SIM card which not only helped at 2-factor authentication, but also changing the passwords in the first place. Quite clever.

  37. Tiem says:

    "To depict real-life hacks that could happen in real life." IRL YOU SAY? *jaw drops

  38. REVMr SubG3N3 says:

    Missing instructions…. run windows on VM in Linux with a couple of firewalls; DON'T save passwords in browser (use a password manager); use iptables or other rules settings; use a couple of Pi's between your wifi adapter or dongle in front of your router; and most importantly; Don't use a phone for anything but a phone; NEVER use social media on your bank box… tons of missing recommends… lame. I don't use them all, but am I a honeypot or a pot of gold? lol

  39. 0x1A3C3E7 says:

    But two factor requires a cell phone. I don't have a cell phone.

  40. Kristian Gundersen says:

    subject taste lab inuhqu attention argument alive fishing tower holiday still.

  41. BecomingMike says:

    These tips were completely decent, apart from the fact they don't mention VPN.
    Though I would have liked them to be a bit more… sophisticated. I shouldn't have, as a I have worked in IT security as an intern, but still…

  42. shooter Mcgavin says:

    "A person is not going to call from a bank and ask you for your SSN"….Actually, just yesterday this happened to me. Obviously, I was very suspicious and asked what the call was in regards too, and some of my personal info to verify they were who they said….They were not able to provide me with anything until I verified my info. So, I asked them for their work number and I would verify and look it up. She gave me the number, and I didnt even bother to listen or write it down. I looked at the banks website, and found the number regarding the department they said they were from. I called, and guess what….it was the same person…it was a legit call. I told them that was a bad policy to do that, especially considering you wouldn't even give info out without verifying so why would I? My point is, banks do indeed do that.

  43. Naqib Jabar says:

    His security tips are weak af. You don't want to get hacked? Don't use any devices, if not use devices that doesn't have any connection. Someone please hire me already…

  44. Odriew says:

    You can use the same password for things you don't really care about, but use special passwords for the important things like main email, and bank accounts.

  45. Odriew says:

    Also use fake information whenever you can.

  46. Odriew says:

    BTW how do we protect ourselves from the NSA?

  47. john jr. - Lt. Col. Al F. Simmons says:

    this guy has a nice beard

  48. Muhammad Ahmed says:

    Mr. Robot .. the most accurate, reasonable and the greatest demo to show how technology can be useful to minority .. .. F* society!

  49. Playonmob says:

    I don't understand how there is not a criminal a "white hacker" that works for government and hacks your whole life (phone calls, internet data and all you constitutional rights) and a randoom guy is a black hat hacker just because is not working for anyone. Form me there is no diference between them.

  50. NoComment NoName says:

    nothing new.

  51. timmy falcon says:

    that's so amazing !!
    I can surf securely now, thanks for this amazing advices that i've never ever found elsewhere !

    seriously that's so basic, blah blah blah ,i'm sure this gonna be helpfull for granny or for people whom doesn't understand what is internet and how it's working

  52. Gustavo M's Trash Can says:

    That face of regret @ the end, tho

  53. Patrick Duncan says:

    I really wish your radio mic cable was hidden away properly.

  54. Jonti Singh says:

    What about linux

  55. Jim Faulk says:


  56. ARIES says:

    I thought that the last man on the video was Manu Ginobili…

  57. ifoundthistoday says:

    well that was something

  58. youreale says:

    The only way to protect yourself from being hacked is by not using computers or smarthphones in first place. It may sound silly, but the moment you turned the thing on, you are a potential target. It's just the way it is, you like it or not.

  59. Keifus V says:

    SMS is not a safe 2FA. Use Google 2FA or Authy instead. I'm shocked that he didn't clarify this.

  60. Jeong-hun Sin says:

    That is all? Too basic. Everyone should also know these.

  61. Uncinematographable Screenshot Cinema says:

    I run 1700 windows on all our computers. I stop hackers dead in they tracks after the bluetooth midi arrives.


    Only 3 minutes. One more. Make sure your router updates itself. If it doesn't, update your router software when updates come out.

  63. Cats, Coffee & Guitars says:

    If you need a former hacker to tell you these 5 things then you deserve to be hacked.

  64. netik says:

    Thanks for this advices for noobs

  65. animus hack says:

    dont forget that your password should be 12 to 16 charaters long with upper lower case letters numbers aswell, and dont forget the special characters

  66. Добар човек says:

    One thing I need to add to this list, don't use windows. Go with some GNU/Linux distribution, it's more secure than windows and you have better controll over your computer…

  67. Johnny says:

    deleting fb is the best solution….

  68. Lukson says:

    Apparently they found a way to bypass 2 step authentication, the highest security for yourself possibly you can do is to encore the security system itself

  69. Ch Da says:

    The only reason I took the phone call from my ex at work is because I suspect that people thought I was using my phone to talk about them . Texting someone 😒so paranoid. Besides I ate lunch at my desk.

  70. Help Me Reach 1,000 Subscribers says:

    I just watch YouTube that's it

  71. Derp Guy says:

    How to be safe on the internet
    1. Don’t go to the internet

  72. truthsout says:

    Good boy, thanks.

  73. kinglyar Luyear says:

    NSA? why he didnt talk about that backdoor back in the days from iPhone? like still a second factor authentication will help you" kiss my ass

  74. MoEE says:

    can we talk about the phone at 0:57 ??

  75. Killer Demon says:

    After I updated my phone is more like my phone get hacked losing battery very fast phone shut down most of the day

  76. Merx says:

    What if you got sim swapped, 2fa is out the window no?

  77. James Holloway says:

    There are basic hackers, and there are professional hackers. It is fact that top companies and governments engage the services of professional hackers for various reasons. In the modern world, where innovation and technology is driving and pushing today's business. Top Governments across the world have intelligence agencies for the purpose of security, financial or physical, hence, off the book operations are reserved for the hackers. Cyberadvance at protonmailcom has created a niche for itself and regarded as one of the best currently, with strong reviews and recommendation from various companies. The key words here are financial, cyber and territorial security.

  78. Mr. LucK says:

    here is tipp for all of you, just use incognito mode + VPN. the safest way to surf in the dangerous cyber network 🙂

  79. Sawbones says:


  80. Akshat Joon says:

    Read a book on that

  81. Felix Lagerfield says:

    cyberevolutionUSA @ protonmail . com
    protect your assets from the real hackers.

  82. Goals 4k6 says:

    Google is already watching you why you need protect yourself from hackers

  83. James-lewi Voss says:

    Great post..

  84. MAN IN RED says:


  85. Ryan Bradley says:

    Can I have this hacker's phone no. Cause I seriously need some help!

  86. Jose Archila says:

    First sentence: How to protect your information
    Second sentence: when you sign to facebook…

  87. Lane Romel says:

    Considering that the NSA has more security leaks than Windows 1.0, the NSA is the last people I would listen to about security.
    If the goal of the NSA is to look stupid, then mission accomplished.

  88. Gia Regency says:

    I love this clip bec it is BRIEF yet very informative with NEW info not heard elsewhere.

  89. SmithN' Wesson says:

    So Hackers are unattractive, Virgin, Nerds who stalk old crushes? Got it 😆

  90. Enigma Unresolved says:

    He talks about windows and Mac…but makes no mention of Linux. Propaganda galore over here.

  91. Zvjai plays says:

    Anyone i need help..last week i downloaded .exe file and i cant open it and then i delete it ..after few hr someone was using my game account and steal my data like fortnite acc and paypal and so on i use my premier avast to scan viruses and malware and it show i m safe(i forget what it say)and i scare to use my pc and play game on it ..also i scare my mom use my pc please help .

  92. Adriel Diaz says:

    2019 ?

  93. Riactious says:

    I got ddosed on PS4

  94. David Ross says:

    So many people commenting on this video are suffering from the ubiquitous Dunning Kruger effect. You are too stupid to know how stupid you are.

  95. M4A1 says:

    #6: Use Nord VPN

  96. patoloco1000 says:

    The list should really be like this:

    1. Don't use facebook

    2. Always use a good GNU/Linux distribution, never malware like Windows or MacOS

    3. Don't use a smartphone

    4. Use 2 factor authentication
    5. Don't use same password everywhere
    6. Update the software on your computer
    7. Be careful when sharing personal info

  97. Sodiq Abiola says:

    I can tell you all with all sincerity and trust I now have for [email protected]  that he is legitimate and very good with his hacking work

  98. Hakuru Bappa says:

    Never trust what NSA says
    1) use 3 factor authentication
    2) Watch porn only when ur single
    3) Use VPN
    4) wear a hat

  99. Ducks Dog says:

    good I'm so scared of hackers

  100. likira111 says:

    What if my hacker stole my phone?

Leave a Comment

Your email address will not be published. Required fields are marked *