Hacker Reacts to 23andme Data Leak

LiveOverflow ยท Beginner ยท๐Ÿ” Cybersecurity ยท2y ago
Learn Hacking (ad): https://hextree.io/ Buy my font (ad): https://shop.liveoverflow.com/ =[ ๐Ÿ“„ Info. ]= mattjay's Tweet: https://twitter.com/mattjay/status/1710370423311888724 Main Channel: https://youtube.com/@LiveOverflow Support LiveOverflow: โ†’ per Video: https://www.patreon.com/join/liveoverflow โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join =[ ๐Ÿ• Social ]= โ†’ Twitter: https://twitter.com/LiveOverflow/ โ†’ Instagram: https://instagram.com/LiveOverflow/ โ†’ TikTok: https://www.tiktok.com/@liveoverflow_ โ†’ Twitch: https://twitch.tv/LiveOverflow โ†’ Website: https://liveoverflow.com/ โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/ โ†’ Facebook: https://www.facebook.com/LiveOverflow/ Chapters: 00:00 - Intro 00:50 - 23andme Data Theft 03:44 - 23andme responsibilities? 05:33 - Facebook Cambridge Analytica 06:40 - Compromised Accounts Paper 07:44 - Personal Responsibility 10:54 - Outro =[ ๐Ÿ“„ P.S. ]= Hack the Planet!
Watch on YouTube โ†— (saves to browser)
Sign in to unlock AI tutor explanation ยท โšก30

Playlist

Uploads from LiveUnderflow ยท LiveUnderflow ยท 42 of 42

โ† Previous Next โ†’
1 BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow
2 LiveOverflow's Makeup Tutorial #1
LiveOverflow's Makeup Tutorial #1
LiveUnderflow
3 MakeUp Tutorial for Streaming and YouTube
MakeUp Tutorial for Streaming and YouTube
LiveUnderflow
4 MurmusCTF, SSD CTF Challenge, Google CTF writeups - PwnNews 27/06/19
MurmusCTF, SSD CTF Challenge, Google CTF writeups - PwnNews 27/06/19
LiveUnderflow
5 Google CTF 2019 Chat - Looking at Writeups
Google CTF 2019 Chat - Looking at Writeups
LiveUnderflow
6 Discussing Hacking Videos - Community Guidelines YouTube
Discussing Hacking Videos - Community Guidelines YouTube
LiveUnderflow
7 Hacking Skills Perspective
Hacking Skills Perspective
LiveUnderflow
8 Chatting about Cryptography and Exploit Regulations
Chatting about Cryptography and Exploit Regulations
LiveUnderflow
9 BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
LiveUnderflow
10 BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
LiveUnderflow
11 BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
LiveUnderflow
12 Studying Cybersecurity in USA vs. Germany | ReHacked
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow
13 Examining JavaScript Inter-Process Communication in Firefox | Watch Together & Q&A
Examining JavaScript Inter-Process Communication in Firefox | Watch Together & Q&A
LiveUnderflow
14 Reading SECRET U.S. Air Force HACKING Document!!
Reading SECRET U.S. Air Force HACKING Document!!
LiveUnderflow
15 Why Don't Use alert(1) for XSS? | Watch Together + Q&A
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
LiveUnderflow
16 Escaping from JavaScript Sandbox (AngularJS)
Escaping from JavaScript Sandbox (AngularJS)
LiveUnderflow
17 Why proofing impact for every XSS is "dumb" - Bug Bounty Reports
Why proofing impact for every XSS is "dumb" - Bug Bounty Reports
LiveUnderflow
18 Password Cracking Explained | ReHacked
Password Cracking Explained | ReHacked
LiveUnderflow
19 HTTP Desync Attack Explained With Paper
HTTP Desync Attack Explained With Paper
LiveUnderflow
20 Better than Stack Overflow for Development
Better than Stack Overflow for Development
LiveUnderflow
21 Thumbnail A/B Test Experiment for CTR
Thumbnail A/B Test Experiment for CTR
LiveUnderflow
22 How To Exploit a Heap Overflow
How To Exploit a Heap Overflow
LiveUnderflow
23 Log4Shell | Bug Bounty Public Service Announcement #shorts
Log4Shell | Bug Bounty Public Service Announcement #shorts
LiveUnderflow
24 New Details on Commercial Spyware Vendor Variston - Revisiting Firefox Sandbox Escape
New Details on Commercial Spyware Vendor Variston - Revisiting Firefox Sandbox Escape
LiveUnderflow
25 Can AI Hack Websites with XSS? #ChatGPT
Can AI Hack Websites with XSS? #ChatGPT
LiveUnderflow
26 ping Vulnerability Patch Analysis (with #ChatGPT) - CVE-2022-23093
ping Vulnerability Patch Analysis (with #ChatGPT) - CVE-2022-23093
LiveUnderflow
27 Using CodeQL to Investigate GraphQL Resolvers
Using CodeQL to Investigate GraphQL Resolvers
LiveUnderflow
28 Security Issue Found in US Gov CISA Tool?
Security Issue Found in US Gov CISA Tool?
LiveUnderflow
29 Using joern to Find GraphQL Authorization Issue
Using joern to Find GraphQL Authorization Issue
LiveUnderflow
30 Analytics from 7 Years on YouTube...
Analytics from 7 Years on YouTube...
LiveUnderflow
31 3D Printer Researching Igus Bearings - Prusa i3 MK3S+ (part 3)
3D Printer Researching Igus Bearings - Prusa i3 MK3S+ (part 3)
LiveOverflow
32 Attacking VSCode Extension from Browser? - Live Security Research
Attacking VSCode Extension from Browser? - Live Security Research
LiveOverflow
33 I Don't Trust Websites! - The Everything API with ChatGPT
I Don't Trust Websites! - The Everything API with ChatGPT
LiveOverflow
34 Do Hackers Need To Know Algorithms and Data Structures?
Do Hackers Need To Know Algorithms and Data Structures?
LiveOverflow
35 "Remove the video as soon as possible"
"Remove the video as soon as possible"
LiveOverflow
36 Armยฎ-based Video
Armยฎ-based Video
LiveOverflow
37 How to make good HACKING videos
How to make good HACKING videos
LiveOverflow
38 LEEROY fรคllt auf HACKER rein?
LEEROY fรคllt auf HACKER rein?
LiveOverflow
39 Hacking for an Intelligence Agency
Hacking for an Intelligence Agency
LiveOverflow
40 Tier List of My Worst Tweets
Tier List of My Worst Tweets
LiveOverflow
41 Step by Step Phishing Setup Tutorials are Unethical!
Step by Step Phishing Setup Tutorials are Unethical!
LiveOverflow
โ–ถ Hacker Reacts to 23andme Data Leak
Hacker Reacts to 23andme Data Leak
LiveOverflow

Related AI Lessons

โšก
Advancing Cloud-Native Cybersecurity and Intelligent IoT Infrastructure for Telecommunications
Advance cloud-native cybersecurity and intelligent IoT infrastructure for telecommunications with emerging technologies
Medium ยท AI
โšก
MartiniAD | Hack Smarter Labs Walkthrough
Learn to hack smarter with MartiniAD on Hack Smarter Labs, a walkthrough for cybersecurity enthusiasts
Medium ยท Cybersecurity
โšก
GDPR Compliant Web Hosting in the UK: What Every Website Owner Must Know in 2026
Ensure GDPR compliance for your UK website with the right web hosting, as it's legally required for sites serving UK visitors
Medium ยท Cybersecurity
โšก
Security Through Obscurity: The Comforting Lie We Need to Stop Telling Ourselves
Learn why security through obscurity is a flawed approach to cybersecurity and how it can put systems at risk
Medium ยท Cybersecurity

Chapters (7)

Intro
0:50 23andme Data Theft
3:44 23andme responsibilities?
5:33 Facebook Cambridge Analytica
6:40 Compromised Accounts Paper
7:44 Personal Responsibility
10:54 Outro
Up next
Secure Mobile, IoT & Secure Applications
Coursera
Watch โ†’