Connect with us

Entertainment

Following Your Stolen Data Through The Dark Web | Incognito Mode | WIRED

People and companies get hacked all the time. Corporate secrets, credit card numbers, password to your email, your medical information—even your Netflix login might get stolen. But where does that data go once it’s been stolen? Today, WIRED’s Andrew Couts takes a deep dive into the hacked data economy. Director: Efrat Kashai Director of Photography:…

Published

on

People and companies get hacked all the time. Corporate secrets, credit card numbers, password to your email, your medical information—even your Netflix login might get stolen. But where does that data go once it’s been stolen? Today, WIRED’s Andrew Couts takes a deep dive into the hacked data economy.

Director: Efrat Kashai
Director of Photography: Mar Alfonso
Editor: Matthew Colby
Host: Andrew Couts
Guest: Troy Hunt
Camera Operator: Jeremy Harris
Gaffer: Salif Soumahoro
Sound Mixer: Sean Paulsen
Production Assistant: Shanti Cuizon-Burden
Post Production Supervisor: Christian Olguin
Supervising Editor: Eduardo Araujo
Assistant Editor: Andy Morell

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading
Advertisement
88 Comments

88 Comments

  1. @lolnhr

    October 16, 2025 at 12:01 pm

    cool

  2. @Redon-r5f

    October 16, 2025 at 12:01 pm

    🔥

  3. @vikramguptavlog06

    October 16, 2025 at 12:16 pm

    good thing for introverts

  4. @g-e-n-t-o-o

    October 16, 2025 at 12:33 pm

    the problem with all this is most people cant be bothered. they think its all difficult wizardry stuff when its in fact just as straightforward as putting hot water into your coffee

    • @spacedustcowboy7555

      October 16, 2025 at 4:10 pm

      A lot of people are probably not as familiar with modern basic cybersecurity. Computers have gotten more advanced and at a certain point people feel like they can’t keep up so they hope for the best instead of going out of their way to learn with rapidly advancing tech

  5. @sugarandspice4815

    October 16, 2025 at 12:37 pm

    1:40 They hacked both the DNC and RNC in that breach. The DNC data was leaked, for the purposes stated in this video. The RNC data… was not. I leave it up to your imagination as to why.

  6. @zhandanning8503

    October 16, 2025 at 12:56 pm

    I wonder with the data that is one degree hashed, it means that it is only hashed once right? Usually are used for authenticating but that also means the hash function must be reused right? So is that not super unsafe as the hash function can usually be found super-easily or bruteforced?

  7. @not.skelly

    October 16, 2025 at 1:01 pm

    why does this whole video sounds like AI

    • @tracykaebisch987

      October 16, 2025 at 3:50 pm

      He made a similar video a little bit ago. Ai deep faking hacking videos… hello Meta.

    • @Yyy000aa

      October 16, 2025 at 5:19 pm

      I don’t get that vibe

  8. @deleted-something

    October 16, 2025 at 1:07 pm

    Guys the solution is very trivial just give me your house and become homeless!

  9. @accordiongordon

    October 16, 2025 at 1:31 pm

    Thanks Simon Whistler

  10. @in-kognito8997

    October 16, 2025 at 1:58 pm

    Its all in the .WAD file. 😂

  11. @userunknown2771

    October 16, 2025 at 2:10 pm

    no ad for incogni? for real now. is it worth it and works ?

    • @snoozydoozy0

      October 16, 2025 at 4:28 pm

      I don’t think it really does anything to remove your data, my understanding is they just make a request on your behalf to data brokers to remove/stop selling you data. But it just a request at the end of the day.
      I recommend you research it more if you’re interested, and I’ve seen a few YT vids about incongi/delete me.

  12. @nikyabodigital

    October 16, 2025 at 3:22 pm

    I can imagine legion army of best hackers in the future… Like internet police.

  13. @spacedustcowboy7555

    October 16, 2025 at 4:03 pm

    This is so depressing. I literally didn’t ask for tech to be pushed onto me and now it’s just another way I can get screwed over

    • @ryanf1425

      October 16, 2025 at 5:53 pm

      Did you literally didn’t ask? Did you write a book?

    • @VectorAlphaSec

      October 17, 2025 at 1:16 am

      There is nothing you can do about it besides become a nomad and live off the grid without any technology.

    • @yunggoosbumps215

      October 17, 2025 at 4:03 pm

      Get used to it. Your information will probably be in a breach. I just had someone try and charge my credit card for a sams club membership in Florida, which I’ve never been to. You just deal with it and move on. Learn more about it so it’s less scary when it happens to you. Something to comfort people is that there are ways to mitigate the damage. Once you learn about those, then you have a plan when shih hits the fan.

    • @dogeeee606

      October 17, 2025 at 7:23 pm

      you’re not that special lmao..

  14. @JasonScottqw

    October 16, 2025 at 4:17 pm

    Comparing mevolaxy PnL-TVL, with market players instantly reveals that its capital is being used more efficiently. See for yourself.

  15. @Paulqe

    October 16, 2025 at 4:18 pm

    mevstake profitability isnt chained to market swings-whether the market climbs or slides.

  16. @laurabrescia2673

    October 16, 2025 at 5:44 pm

    how come SMS two factor authentication isn’t as safe?

    • @MTGeomancer

      October 16, 2025 at 5:52 pm

      It’s trivially easy for a hacker to redirect text messages to a different SIM. SMS messages are also sent in clear text.

    • @Suzumes527

      October 17, 2025 at 1:35 pm

      ⁠@MTGeomancerThis method is also called SIM Swapping scam

  17. @VE9911

    October 16, 2025 at 5:58 pm

    More importantly, is it Da-hta or Da-yta..

  18. @motherflerkentannhauser8152

    October 16, 2025 at 6:17 pm

    Whenever you use a question as your title I always thought “incognito mode” is the solution.

  19. @5TC

    October 16, 2025 at 7:19 pm

    Nice video to watch while eating dinner 😂

  20. @Judy-q7u9y

    October 16, 2025 at 8:09 pm

    AI men

    • @Judy-q7u9y

      October 16, 2025 at 8:12 pm

      I have been Spammed bad❤

    • @diw92ifnqowj29akg9fj

      October 17, 2025 at 2:12 am

      Who scammed you babe?

  21. @Judy-q7u9y

    October 16, 2025 at 8:17 pm

    They have even my dead family. But I don’t have money or value of nothing. But Amazon and they won’t help. I’ve been everywhere ss# bank account had to change everything.

  22. @sparrow4980

    October 16, 2025 at 10:40 pm

    AND HENCE THE DIGITAL BS..
    ITS EVIL

  23. @christinegagnon6622

    October 16, 2025 at 11:22 pm

    😷☕

  24. @urbanstrencan

    October 17, 2025 at 12:54 am

    This is just scary when you think how much personal data is online 😮😢

  25. @VectorAlphaSec

    October 17, 2025 at 1:16 am

    In a technological world, hackers are the most dangerous individuals alive.

  26. @Bormeth

    October 17, 2025 at 2:13 am

    Use Proton Hide-My-Alias, that way bad people don’t have 50% of the puzzle for logins, due to same email all over the place. 🤓

  27. @Lacze__na__Odysee__Mastodon

    October 17, 2025 at 3:43 am

    *BTW I use GrapheneOS*

  28. @MetuBlackwell

    October 17, 2025 at 3:55 am

    Crypto is risk – say those who never heard about mevstake, there everything stable and smooth like water surface.

  29. @5TC

    October 17, 2025 at 8:03 am

    I’ll have to say, this video was pretty good to inform people about data breaches.

  30. @christopherdaly1399

    October 17, 2025 at 3:24 pm

    clear as mud

  31. @codyeivers10

    October 17, 2025 at 5:26 pm

    I have a Master’s in Cybersecurity and I can tell you first hand, I still see horrendous security practices even at large enterprises. I’m working as a contractor for a company now that has still given previous employees full access to systems. Their credentials are still there and can be logged in with. And this is a multi-billion dollar company.

    People severely underestimate the importance of cybersecurity

  32. @paulocarreiro5855

    October 17, 2025 at 5:41 pm

    Thanks for the heads-up!

  33. @FredMoore-h3h

    October 17, 2025 at 6:47 pm

    I’m old enough to remember when we believed computers would help simplify our lives.
    Instead, the exact opposite has happened.
    It’s horrible!

  34. @FredMoore-h3h

    October 17, 2025 at 6:56 pm

    I vaguely remember when privacy and freedom existed in the US.
    Yeah, I’m THAT OLD!

  35. @latoyatramill6633

    October 17, 2025 at 9:52 pm

    I hoe my school system because I was college prep scholarship program with credits in middle school and high schools.

  36. @latoyatramill6633

    October 17, 2025 at 9:58 pm

    People sell data personal information identity data

  37. @latoyatramill6633

    October 17, 2025 at 9:59 pm

    Government stole my personal identity and uses it for the clone.

  38. @latoyatramill6633

    October 17, 2025 at 10:00 pm

    Government data identity gets stolen sold too.

  39. @latoyatramill6633

    October 17, 2025 at 10:03 pm

    Americans are born wirh good credit but let people use it and ruin it.

  40. @latoyatramill6633

    October 17, 2025 at 10:05 pm

    Government black men in the mothers and my face supposed to use me for everything didn’t do nothing to the white man or brainwashing and the police or military or presidents or anyone but us. Not to another man neither.

  41. @latoyatramill6633

    October 17, 2025 at 10:06 pm

    Government black men thinking they could use me the mother for anything didn’t do nothing to germany.

  42. @latoyatramill6633

    October 17, 2025 at 10:09 pm

    Stalkers are what you get when your information is leaked with the government.

  43. @latoyatramill6633

    October 17, 2025 at 10:12 pm

    They say change your password often.

  44. @latoyatramill6633

    October 17, 2025 at 10:17 pm

    Bankruptcies are listed publicly in the newspaper wirh name and creditors medical bills and auto loans and other credit cards and credit card information. People were starting my credit card information and able to all use it so I had to pay them off to use them myself after my credit score kept tanking.

  45. @latoyatramill6633

    October 17, 2025 at 10:18 pm

    Best friends use your name identity credit life and their parents boyfriends your boyfriends their women etc.

  46. @latoyatramill6633

    October 17, 2025 at 10:21 pm

    Mothers fake boyfriends use her identity plus her children they sometimes only want anyway. Women said men date marry women because they want the children.

  47. @latoyatramill6633

    October 17, 2025 at 10:22 pm

    Government finds out who is living off of the mother with children.

  48. @latoyatramill6633

    October 17, 2025 at 10:22 pm

    Men get women pregnant to live off of them.

  49. @latoyatramill6633

    October 17, 2025 at 10:24 pm

    Men steal women’s identity to steal their jobs.

  50. @latoyatramill6633

    October 17, 2025 at 10:24 pm

    Men came around me pretending to want to date and relationship to steal my jobs and more especially ones with children.

  51. @YEM_

    October 17, 2025 at 10:25 pm

    It’s pronounced data.

  52. @latoyatramill6633

    October 17, 2025 at 10:30 pm

    People kill men who use the mother but wont reciprocate.

  53. @abdakka0

    October 17, 2025 at 10:43 pm

    nice joke bro!

  54. @latoyatramill6633

    October 17, 2025 at 10:48 pm

    Fake husbands in the family get identity data more stolen plus children women etc.

  55. @sandydiller4828

    October 17, 2025 at 11:12 pm

    After multiple cc number thefts, I’ve been paranoid of identity theft more than anything else (I’m boring, lol)l. After the AT&T breach, I froze my SS number with the Social Security Administration. It would cost me $ to unfreeze my account in order to get a loan. I also put a credit freeze at all three credit bureaus. It’s my first line of defense. My husband doesn’t believe anything bad can happen to him financially (he refuses a solar generator too and laughs at my prepping), and his personal/online/medical/professional life was just as boring as mine. Maybe he’ll be lucky.

  56. @sfdcubfan

    October 17, 2025 at 11:12 pm

    After multiple cc number thefts, I’ve been paranoid of identity theft more than anything else (I’m boring, lol)l. After the AT&T breach, I froze my SS number with the Social Security Administration. It would cost me $ to unfreeze my account in order to get a loan. I also put a credit freeze at all three credit bureaus. It’s my first line of defense. My husband doesn’t believe anything bad can happen to him financially (he refuses a solar generator too and laughs at my prepping), and his personal/online/medical/professional life was just as boring as mine. Maybe he’ll be lucky.

  57. @Raiden-if2be

    October 18, 2025 at 2:10 am

    Don’t use Google 2FA, they have been hacked and hackers get control of it via gmail username and password. use Authy 2FA or others

  58. @KethGladnev

    October 18, 2025 at 9:57 am

    I’ll give it credit, this video was pretty informative about data breaches. For cybersecurity or blockchain help, reach out to Graylan on here @graylandmitrii. He’s really helpful!

  59. @realdealonlyco

    October 18, 2025 at 11:48 am

    I once used cryptocurrency websites with your WIRED name in it. I had multi million dollars and I am still trying to see those cryptocurrency platforms online again.

  60. @imoshtokill

    October 18, 2025 at 1:28 pm

    I would have loved for you to include legitimate security researchers / “white hat” hackers in the overview. These are the people who are trying to help keep everyday Joe’s data safe. Awesome video!

  61. @megamanx466

    October 19, 2025 at 12:06 am

    Don’t use a “password manager”; they can be hacked into too. Criminals thrive on those-with-money’s laziness along with ignorance. Physical 2FA is likely the best way to help yourself, but if stolen… those could be hacked also like a house key. SMS & even email 2FA is “hackable”, but it’s online so someone sitting in a country across the world could do it. A notepad might be the best way to store passwords if kept in an obscure, safe place.

    p.s. Using a TOR browser is a good way to get yourself watched by “the authorities”, for those concerned in authoritarian regimes! All internet traffic goes through “nodes” and sometimes a country can see who’s using those nodes to access outside nodes. 🤷‍♂

  62. @0ClaudioPin0

    October 19, 2025 at 5:38 pm

    What a disgusting piece of propaganda. Russia, China and North Korea: BAD!!! USA/West: victim/hero. If you believe this, congrats: your mind has been pawned and you’re officially brainwashed.

  63. @Innoodrr

    October 19, 2025 at 7:16 pm

    Can we invited you

  64. @user-fed-yum

    October 20, 2025 at 7:39 am

    The video editing is terrible and unwatchable 🤦

  65. @myfavsss

    October 20, 2025 at 12:40 pm

    Why SMS two factor authentication no good????

    • @DrewtheShrew

      October 22, 2025 at 2:35 pm

  66. @stygianx3

    October 21, 2025 at 5:31 am

    make more mathematician answers questions. PLEASE they’re so entertaining

  67. @deliriumofnegation

    October 21, 2025 at 9:16 pm

    Found out some of my acct’s were sold on dw. And guess what, it’s MySpace and like 3 others that I lost around 2008-2010.. thank god it’s out there

  68. @fresh-kiwi

    October 22, 2025 at 8:30 pm

    If only hackers can put money on my bank account then we can talk business

  69. @qokolladaqikita

    October 23, 2025 at 1:44 pm

    Why avoid sms authentification? Twice I got a whatsapp code sent to me as an sms (without me requiring one). I thought to myself they can’t get in because they don’t have the code sent via sms. Now I’m scared.

    • @SkiDaBird

      November 12, 2025 at 11:02 am

      SMS authentication is vulnerable to a few attacks like SIM swapping that other ways to deliver a 2FA code aren’t. It’s much better than nothing, but easy to improve on still.

  70. @duffthepsych

    October 26, 2025 at 2:59 am

    Why avoid SMS 2-factor authentication?

  71. @zierlichglöckchen

    October 26, 2025 at 5:42 am

    We have one of the worldwide best DATA security laws in the EU … just have a look to homeland of democracys spirit hahaha

  72. @barelyalive-v8l9n

    October 28, 2025 at 8:51 pm

    You’re telling me there are forums of discussing crimes and DOING CRIMES and nobody stops them anywhere in the world? WHAT??? This is insane…

  73. @miketomas8564

    October 31, 2025 at 4:21 pm

    That Downward bald head shot angle though….

    Not Good.

  74. @dbkeenan

    November 8, 2025 at 8:34 am

    Palantir is amassing a huge database on US citizens and selling it to the US (and probably other) governments. There is no freedom without anonymity.

Leave a Reply

Your email address will not be published. Required fields are marked *

Entertainment

Professional Birder Answers Birding Questions | Tech Support | WIRED

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear…

Published

on

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear in nature? What gear does Christian Cooper use while birding? Answers to these questions and plenty more await on Birding Support.

0:00 Quoth the raven…
0:30 Bird accents
1:34 Finding birds
2:52 Birding demonstration
4:20 Mating dances
5:25 Male coloring vs. Female
6:38 Sense of direction
7:06 Solo birding or group birding
8:01 Nothing but respect for pigeons
8:54 Rise and shine
9:33 Identifying bird calls
10:56 Christian Cooper’s birding gear essentials
12:24 Hummingbird brawls
13:06 How do I attract more birds to my garden?
14:03 Is it okay to put a baby bird back in its nest?
14:39 I hear you but I can’t see you
15:17 Bird feeders
17:06 Unique bird abilities
18:44 Who’s that corvid?
20:09 Spotting scope or binoculars?
20:50 Identifying nests and eggs
22:02 Faking bird calls to attract birds
22:57 Birding journals
24:44 Birds and big cities
26:16 IDing birds in flight
27:09 Birdhouse in your soul
28:20 Respect in birding
29:20 Best birding app
29:48 Best time of day for bird watching
30:42 Finding local birdwatching communities
31:03 The sighting that took the most effort for Christian Cooper
31:37 Bird law
32:34 Bucket list birding locations

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Former Deputy National Security Advisor Answers Geopolitics Questions | Tech Support | WIRED

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here. 0:00 Geopolitics Support 0:14 WW3 2:31 China and the AI Race 6:26 Why Iran and The U.S. are at odds 11:02…

Published

on

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here.

0:00 Geopolitics Support
0:14 WW3
2:31 China and the AI Race
6:26 Why Iran and The U.S. are at odds
11:02 Sanctions
13:34 When did “globalist” become derogatory?
15:40 The ascendency of The Right
19:28 Solutions for Gaza
22:37 Israel and The West Bank
24:47 Why do people use the term genocide to describe Israeli actions in Gaza?
30:20 Osama bin Laden and post-9/11 America
33:09 Nukes for peace
34:54 US/China relations timeline
38:13 When will Xi invade Taiwan?
45:42 China in the South China Sea
48:22 Why does Putin want Ukraine?
51:38 Ukraine War Outcomes
55:13 US/EU Troops in Ukraine
56:08 Is Putin playing Trump?
59:09 Trump’s Greenland aspirations
1:02:25 Trump’s accurate critiques
1:03:40 Why did the Biden Administration allow so many immigrants to enter the US?
1:08:52 Maduro
1:10:10 Who is running Venezuela right now?
1:11:46 What does the U.S. actually gain from intervening around the world?
1:14:09 Another Arab Spring?
1:15:17 Cyberattacks
1:18:08 Modi and Trump
1:22:46 The geopolitical implications of year round Arctic shipping

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Project Hail Mary: Why Is He All Alone?

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them? Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►► Want more WIRED? Get the magazine ►► Follow WIRED: Instagram ►► Twitter ►►…

Published

on

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them?

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending