Do the creators of Polish series, using hacking threads in their productions, sometimes are not true? – find out how much fiction and joyful creativity are in these scenes.
Themes related to breaking into a network or computer, i.e. in a word, all crimes related to the actions of hackers, are nothing new in Polish series. However, have you paid attention to how much truth and how much fiction there is in these scenes? Is everything a crime? What is the truth of the screen, the truth of time, and what is the truth of hackers.
These questions were answered in detail by Wiktor Szymański from safe.blog, who carried out a professional analysis of hacking scenes from popular Polish series. He took a closer look at such titles as “1983” (Netflix), “Belfer 2” (Canal +), “Chyłka – disappearance” (TVN), “Illegals” (Canal +), “Agata’s Law” (TVN) or “Ultraviolet” (AXN).
Wiktor deals with security on a daily basis, I know a man (sic!), So you can trust the substantive basis of this very interesting material. As he writes, he looks for a hole in the whole, an example of which is the great analysis on hacking in Polish series! In his entry entitled Hacking in Polish series and movies he caught bugs and perhaps insufficient knowledge of the series creators who used hacking threads in their productions.
Fortunately, the series is not an educational material and is not intended to indicate how to do or not do something. We are well aware that many stories are stretched, many actions of the heroes are exaggerated, hence hackers are often only pseudo-hackers. However, thanks to the thorough catching of mishaps by specialists, we can understand some mechanisms related to electronic security and how real hackers work.
The creators of the series should not forget about it when writing the script and then making films that should be reliable in this aspect.
What is worth paying attention to?
First, remember that any activity related to a breach of privacy or security breaches without consent is a criminal offense with legal and / or financial consequences!
Perhaps you have had to deal with the actions of hackers, maybe you know a little about their actions from Polish or foreign series (e.g. “Mr. Robot”), however, be aware that not everything you see on the screen is true.
In the article on Bezpieczna.blog you will learn, among other things:
- Could a hacker from the Belfer 2 series Tymon Karski hack into the Pentagon’s servers?
- Are the scenes related to the Darknet (i.e. the dark and for some mysterious side of the Internet) in Belfry 2 credible and where the authors have slightly colored it? As Wiktor recalls: The hog animation shown in the film does not in any way match the pages on the TOR network. You will learn about this too, why 🙂
- How is it possible that the contents of the iPhone 6s were cloned in the series Illegals without connecting any cable? – as a specialist writes – it is impossible! The iPhone was turned off, which means that the data contained in it was encrypted (data decryption takes place after turning on and unlocking the phone with a PIN).
- How did Kormak (aka Kormaczysko) from the series Chyłka – Disappearance recover deleted SMSs from an iPhone? and why should a hacker update his 2002 nmap v3.00 software to the current version 7.7?
- How was the tracking device used in the 1983 series?
- Why are flash drives so dangerous? and in which series was it used?
- How did the heroes of the Belfer 2 series get to the Police’s servers using a networked printer?
In addition, from the article on secure.blog find out what are the most popular hacker jargon sayings and phrases that appear on television series? What tools and commands are used most often by our cute TV hackers!
All the discussed scenes are accompanied by a detailed explanation and video fragments, thanks to which you will remember what moments we are talking about! I recommend!
You might also like:
source: safe.blog