True stories from the dark side of the Internet.


Listen on Spotify


Donate


Cryptography

In the 1990’s the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the governme...


Waiting at airport

What happens when an innovative tech company, that’s trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a sur...


Valenberg

In today’s world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it’s done. This should be exciting so s...


Bitcoin vanishing

Mt. Gox was the largest bitcoin exchange in the world. It was processing over $15 million a day in transactions. But suddenly, without warning, the website went down. The CEO said the bitcoins were...


Manfred

Hacking Online Video Games for Profit Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and...


Manfred

Hacking Online Video Games for Fun Manfred has had the most epic story of all online video game stories. For the last 20 years, he’s been hacking online games. In this episode he tells us stories ...


Jayson E. Street

Jayson E. Street has been working in infosec for almost 2 decades. He’s both a defender and does offensive missions too. In this episode he tells us a story about the time he broke into a bank in B...


Broken Router

Security researcher Kyle Lovett bought a new Asus router. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router,...


Torn TalkTalk Logo

Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get ...


DigitNotar website screen shot

The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached. Thanks to guests...



More podcasts like Darknet Diaries >>
Darknet Diaries Donate

Free Python Quick Reference Guide