The ones who are crazy enough to think that they can change the world are the ones who do.
John McAfee
The gig economy is empowerment. This new business paradigm empowers individuals to better shape their own destiny and leverage their existing assets to their benefit.
Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.
The most astonishing subset of the Deep Web is a collection of dark alleys called the Dark Web. The Dark Web is generally thought of as a collection of criminal elements intent on subverting the law, stealing our money, and possibly kidnapping our daughters.
Our mobile phones have become the greatest spy on the planet.
Making money is easy. It is. The difficult thing in life is not making it, it's keeping it.
In this age of communications that span both distance and time, the only tool we have that approximates a 'whisper' is encryption. When I cannot whisper in my wife's ear or the ears of my business partners, and have to communicate electronically, then encryption is our tool to keep our secrets secret.
Governments are composed of human beings, and all of the frailties that humans possess are absorbed into these governments and become active within these governments. Hatred, anger, jealousy, fear, greed, distrust and the whole host of afflictions that humans must bear, lurk just beneath the surface of civility displayed by 'government.'
I think that it's when we step out of the road, step outside the box, become our own person, and we walk fearlessly down paths other people wouldn't look at, that true progress comes. And sometimes true beauty as well.
There's not a single flashlight app that's not spying on you right now.
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.
Any idiot can make money. Keeping money, very few can do.
I think the thing that our government lacks - just about more than anything else - is technological competence. We have some of the greatest white-hat hackers in the world here in the U.S., but the government seems to be technologically illiterate.
Dwight Eisenhower warned American citizens at the end of his presidency about the implications of the military-industrial complex and its influence over government. We have now gone well beyond any of the wildest imaginations that could have entered Eisenhower's mind.
Let me tell you what the truth is... I have learned one thing in life: there is no such thing as bad press. There is not. That's a fundamental truth. The more bad things said about you, the more power they give to you.
Private communication systems have been around since the beginning of human culture.
Really, what the government is asking Apple to do is to make every individual who uses an iPhone susceptible to hacking by bad people, foreign governments, and anyone who wants.
One who understands the relationships between the human heart and the human mind will always out-hack those who chase after an ever-changing technology.
When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.
My well-discussed 'paranoia' urges me to believe that some tiny segment of the NSA's parsing algorithm is finely tuned to my voice.
Belize is still a pirate haven and is run more or less along the lines established centuries ago by the likes of Captain Morgan, Blackbeard, and Captain Barrow.
Jealousy, greed, fear. We're all full of these things. But also love and compassion. If you saw a drowning baby, it wouldn't matter if you were wearing a tuxedo on the way to your own wedding. You'd jump in to save him.
A simple social engineering hack might involve leaving a thumb drive on the pavement close to the driver's door of a car.
I trust and use RakEM for my private messages and calls. Other messengers collected metadata about who I messaged, when and where - RakEM does not collect metadata, encrypts local files, and uses the strongest end-to-end encryption around.
I was one of the first practitioners of social engineering as a hacking technique, and today it is my only tool of use, aside from a smartphone - in a purely white hat sort of way. But if you don't trust me, then ask any reasonably competent social engineer.
Hackers rarely have full knowledge of the technology stack of a target.
Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.
In America, we have bible-reading applications: every single one of those applications asks permission to turn on your microphone, your camera; it wants permission to read your e-mails and the right to send e-mails wherever it chooses.
My most heartfelt thank you goes to Impact Future Media and Cartoon Monkey Studio. Their dedication to the truth is very uncommon in the world we live in today. I am now, and will always be, grateful to their organizations.
Donald Trump is proud of the fact that he's never written an e-mail.
I have dual citizenship; I would be happy to go to England. I would be very happy to go to America.
If operating in a network environment, do not place public domain or shareware programs in a common file-server directory that could be accessible to any other PC on the network.
I think that the world has largely ignored Belize and the political situation and the plight of its people because it's one of the smallest countries and, in terms of the world economy, one of the least significant.
We are losing privacy at an alarming rate - we have none left.
The most promising privacy thing is stupid phones. I'm dumping all my smart phones.
I would describe myself as quite sane and lucid, which is why I'm still alive.
These 'free' applications ask for permission to read your emails, your text messages, listen to your phone calls, record video from your phone. Why else would someone spend millions developing an application which they then give away? Kind-hearted, maybe? Get real.
Liability is being assessed against companies who inadvertently have shipped a virus to another company. Rather than risk the incredibly bad PR, these companies fork over.
When individuals become angry with one another, an injury of some sort will likely occur. When governments become angry, entire civilisations are wiped out.
People are afraid of their own lives. Shouldn't your goal be to have a meaningful life? Unknown, mysterious, thrilling?
Every newspaper on earth has called me a liar.
I, perhaps wrongly, assume that people actually read articles that interest them rather than just headlines.
Politicon should be applauded for recognizing the increasing impact of technology, not only on American social and economic systems but on the very structure of our system of politics.
Hillary Clinton was asked if she wiped the disc she was using for her email; she said, 'Do you mean with a damp cloth?' This, to me, is frightening.
Corporations understand the value of security because the leakage of their competitive information could be the end of the corporation.
Is Snowden a good man or a bad man? I have no clue and even less interest.
I gravitate to the world's outcasts.
Limit use of shareware and public domain software to systems without fixed disks. If you do use them on fixed disks, allocate separate subdirectories... Public domain or shareware software should never be placed in the root directory.
Steve Jobs would have wanted his words to change not just technology but politics itself.
As the economy goes south, petty theft begins. And then grand theft. And then muggings.