Entertainment
Following Your Stolen Data Through The Dark Web | Incognito Mode | WIRED
People and companies get hacked all the time. Corporate secrets, credit card numbers, password to your email, your medical information—even your Netflix login might get stolen. But where does that data go once it’s been stolen? Today, WIRED’s Andrew Couts takes a deep dive into the hacked data economy. Director: Efrat Kashai Director of Photography:…
Entertainment
Professional Birder Answers Birding Questions | Tech Support | WIRED
Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear…
Entertainment
Former Deputy National Security Advisor Answers Geopolitics Questions | Tech Support | WIRED
Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here. 0:00 Geopolitics Support 0:14 WW3 2:31 China and the AI Race 6:26 Why Iran and The U.S. are at odds 11:02…
Entertainment
Project Hail Mary: Why Is He All Alone?
When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them? Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►► Want more WIRED? Get the magazine ►► Follow WIRED: Instagram ►► Twitter ►►…
-
Science & Technology6 years agoNitya Subramanian: Products and Protocol
-
People & Blogs4 years agoSleep Expert Answers Questions From Twitter ???? | Tech Support | WIRED
-
CNET6 years agoWays you can help Black Lives Matter movement (links, orgs, and more) ????????
-
Wired7 years agoHow This Guy Became a World Champion Boomerang Thrower | WIRED
-
Wired7 years agoNeuroscientist Explains ASMR’s Effects on the Brain & The Body | WIRED
-
Wired7 years agoWhy It’s Almost Impossible to Solve a Rubik’s Cube in Under 3 Seconds | WIRED
-
Wired7 years agoFormer FBI Agent Explains How to Read Body Language | Tradecraft | WIRED
-
CNET6 years agoSurface Pro 7 review: Hello, old friend ????

@lolnhr
October 16, 2025 at 12:01 pm
cool
@Redon-r5f
October 16, 2025 at 12:01 pm
🔥
@vikramguptavlog06
October 16, 2025 at 12:16 pm
good thing for introverts
@g-e-n-t-o-o
October 16, 2025 at 12:33 pm
the problem with all this is most people cant be bothered. they think its all difficult wizardry stuff when its in fact just as straightforward as putting hot water into your coffee
@spacedustcowboy7555
October 16, 2025 at 4:10 pm
A lot of people are probably not as familiar with modern basic cybersecurity. Computers have gotten more advanced and at a certain point people feel like they can’t keep up so they hope for the best instead of going out of their way to learn with rapidly advancing tech
@sugarandspice4815
October 16, 2025 at 12:37 pm
1:40 They hacked both the DNC and RNC in that breach. The DNC data was leaked, for the purposes stated in this video. The RNC data… was not. I leave it up to your imagination as to why.
@zhandanning8503
October 16, 2025 at 12:56 pm
I wonder with the data that is one degree hashed, it means that it is only hashed once right? Usually are used for authenticating but that also means the hash function must be reused right? So is that not super unsafe as the hash function can usually be found super-easily or bruteforced?
@not.skelly
October 16, 2025 at 1:01 pm
why does this whole video sounds like AI
@tracykaebisch987
October 16, 2025 at 3:50 pm
He made a similar video a little bit ago. Ai deep faking hacking videos… hello Meta.
@Yyy000aa
October 16, 2025 at 5:19 pm
I don’t get that vibe
@deleted-something
October 16, 2025 at 1:07 pm
Guys the solution is very trivial just give me your house and become homeless!
@accordiongordon
October 16, 2025 at 1:31 pm
Thanks Simon Whistler
@in-kognito8997
October 16, 2025 at 1:58 pm
Its all in the .WAD file. 😂
@userunknown2771
October 16, 2025 at 2:10 pm
no ad for incogni? for real now. is it worth it and works ?
@snoozydoozy0
October 16, 2025 at 4:28 pm
I don’t think it really does anything to remove your data, my understanding is they just make a request on your behalf to data brokers to remove/stop selling you data. But it just a request at the end of the day.
I recommend you research it more if you’re interested, and I’ve seen a few YT vids about incongi/delete me.
@nikyabodigital
October 16, 2025 at 3:22 pm
I can imagine legion army of best hackers in the future… Like internet police.
@spacedustcowboy7555
October 16, 2025 at 4:03 pm
This is so depressing. I literally didn’t ask for tech to be pushed onto me and now it’s just another way I can get screwed over
@ryanf1425
October 16, 2025 at 5:53 pm
Did you literally didn’t ask? Did you write a book?
@VectorAlphaSec
October 17, 2025 at 1:16 am
There is nothing you can do about it besides become a nomad and live off the grid without any technology.
@yunggoosbumps215
October 17, 2025 at 4:03 pm
Get used to it. Your information will probably be in a breach. I just had someone try and charge my credit card for a sams club membership in Florida, which I’ve never been to. You just deal with it and move on. Learn more about it so it’s less scary when it happens to you. Something to comfort people is that there are ways to mitigate the damage. Once you learn about those, then you have a plan when shih hits the fan.
@dogeeee606
October 17, 2025 at 7:23 pm
you’re not that special lmao..
@JasonScottqw
October 16, 2025 at 4:17 pm
Comparing mevolaxy PnL-TVL, with market players instantly reveals that its capital is being used more efficiently. See for yourself.
@Paulqe
October 16, 2025 at 4:18 pm
mevstake profitability isnt chained to market swings-whether the market climbs or slides.
@laurabrescia2673
October 16, 2025 at 5:44 pm
how come SMS two factor authentication isn’t as safe?
@MTGeomancer
October 16, 2025 at 5:52 pm
It’s trivially easy for a hacker to redirect text messages to a different SIM. SMS messages are also sent in clear text.
@Suzumes527
October 17, 2025 at 1:35 pm
@MTGeomancerThis method is also called SIM Swapping scam
@VE9911
October 16, 2025 at 5:58 pm
More importantly, is it Da-hta or Da-yta..
@motherflerkentannhauser8152
October 16, 2025 at 6:17 pm
Whenever you use a question as your title I always thought “incognito mode” is the solution.
@5TC
October 16, 2025 at 7:19 pm
Nice video to watch while eating dinner 😂
@Judy-q7u9y
October 16, 2025 at 8:09 pm
AI men
@Judy-q7u9y
October 16, 2025 at 8:12 pm
I have been Spammed bad❤
@diw92ifnqowj29akg9fj
October 17, 2025 at 2:12 am
Who scammed you babe?
@Judy-q7u9y
October 16, 2025 at 8:17 pm
They have even my dead family. But I don’t have money or value of nothing. But Amazon and they won’t help. I’ve been everywhere ss# bank account had to change everything.
@sparrow4980
October 16, 2025 at 10:40 pm
AND HENCE THE DIGITAL BS..
ITS EVIL
@christinegagnon6622
October 16, 2025 at 11:22 pm
😷☕
@urbanstrencan
October 17, 2025 at 12:54 am
This is just scary when you think how much personal data is online 😮😢
@VectorAlphaSec
October 17, 2025 at 1:16 am
In a technological world, hackers are the most dangerous individuals alive.
@Bormeth
October 17, 2025 at 2:13 am
Use Proton Hide-My-Alias, that way bad people don’t have 50% of the puzzle for logins, due to same email all over the place. 🤓
@Lacze__na__Odysee__Mastodon
October 17, 2025 at 3:43 am
*BTW I use GrapheneOS*
@MetuBlackwell
October 17, 2025 at 3:55 am
Crypto is risk – say those who never heard about mevstake, there everything stable and smooth like water surface.
@5TC
October 17, 2025 at 8:03 am
I’ll have to say, this video was pretty good to inform people about data breaches.
@christopherdaly1399
October 17, 2025 at 3:24 pm
clear as mud
@codyeivers10
October 17, 2025 at 5:26 pm
I have a Master’s in Cybersecurity and I can tell you first hand, I still see horrendous security practices even at large enterprises. I’m working as a contractor for a company now that has still given previous employees full access to systems. Their credentials are still there and can be logged in with. And this is a multi-billion dollar company.
People severely underestimate the importance of cybersecurity
@paulocarreiro5855
October 17, 2025 at 5:41 pm
Thanks for the heads-up!
@FredMoore-h3h
October 17, 2025 at 6:47 pm
I’m old enough to remember when we believed computers would help simplify our lives.
Instead, the exact opposite has happened.
It’s horrible!
@FredMoore-h3h
October 17, 2025 at 6:56 pm
I vaguely remember when privacy and freedom existed in the US.
Yeah, I’m THAT OLD!
@latoyatramill6633
October 17, 2025 at 9:52 pm
I hoe my school system because I was college prep scholarship program with credits in middle school and high schools.
@latoyatramill6633
October 17, 2025 at 9:58 pm
People sell data personal information identity data
@latoyatramill6633
October 17, 2025 at 9:59 pm
Government stole my personal identity and uses it for the clone.
@latoyatramill6633
October 17, 2025 at 10:00 pm
Government data identity gets stolen sold too.
@latoyatramill6633
October 17, 2025 at 10:03 pm
Americans are born wirh good credit but let people use it and ruin it.
@latoyatramill6633
October 17, 2025 at 10:05 pm
Government black men in the mothers and my face supposed to use me for everything didn’t do nothing to the white man or brainwashing and the police or military or presidents or anyone but us. Not to another man neither.
@latoyatramill6633
October 17, 2025 at 10:06 pm
Government black men thinking they could use me the mother for anything didn’t do nothing to germany.
@latoyatramill6633
October 17, 2025 at 10:09 pm
Stalkers are what you get when your information is leaked with the government.
@latoyatramill6633
October 17, 2025 at 10:12 pm
They say change your password often.
@latoyatramill6633
October 17, 2025 at 10:17 pm
Bankruptcies are listed publicly in the newspaper wirh name and creditors medical bills and auto loans and other credit cards and credit card information. People were starting my credit card information and able to all use it so I had to pay them off to use them myself after my credit score kept tanking.
@latoyatramill6633
October 17, 2025 at 10:18 pm
Best friends use your name identity credit life and their parents boyfriends your boyfriends their women etc.
@latoyatramill6633
October 17, 2025 at 10:21 pm
Mothers fake boyfriends use her identity plus her children they sometimes only want anyway. Women said men date marry women because they want the children.
@latoyatramill6633
October 17, 2025 at 10:22 pm
Government finds out who is living off of the mother with children.
@latoyatramill6633
October 17, 2025 at 10:22 pm
Men get women pregnant to live off of them.
@latoyatramill6633
October 17, 2025 at 10:24 pm
Men steal women’s identity to steal their jobs.
@latoyatramill6633
October 17, 2025 at 10:24 pm
Men came around me pretending to want to date and relationship to steal my jobs and more especially ones with children.
@YEM_
October 17, 2025 at 10:25 pm
It’s pronounced data.
@latoyatramill6633
October 17, 2025 at 10:30 pm
People kill men who use the mother but wont reciprocate.
@abdakka0
October 17, 2025 at 10:43 pm
nice joke bro!
@latoyatramill6633
October 17, 2025 at 10:48 pm
Fake husbands in the family get identity data more stolen plus children women etc.
@sandydiller4828
October 17, 2025 at 11:12 pm
After multiple cc number thefts, I’ve been paranoid of identity theft more than anything else (I’m boring, lol)l. After the AT&T breach, I froze my SS number with the Social Security Administration. It would cost me $ to unfreeze my account in order to get a loan. I also put a credit freeze at all three credit bureaus. It’s my first line of defense. My husband doesn’t believe anything bad can happen to him financially (he refuses a solar generator too and laughs at my prepping), and his personal/online/medical/professional life was just as boring as mine. Maybe he’ll be lucky.
@sfdcubfan
October 17, 2025 at 11:12 pm
After multiple cc number thefts, I’ve been paranoid of identity theft more than anything else (I’m boring, lol)l. After the AT&T breach, I froze my SS number with the Social Security Administration. It would cost me $ to unfreeze my account in order to get a loan. I also put a credit freeze at all three credit bureaus. It’s my first line of defense. My husband doesn’t believe anything bad can happen to him financially (he refuses a solar generator too and laughs at my prepping), and his personal/online/medical/professional life was just as boring as mine. Maybe he’ll be lucky.
@Raiden-if2be
October 18, 2025 at 2:10 am
Don’t use Google 2FA, they have been hacked and hackers get control of it via gmail username and password. use Authy 2FA or others
@KethGladnev
October 18, 2025 at 9:57 am
I’ll give it credit, this video was pretty informative about data breaches. For cybersecurity or blockchain help, reach out to Graylan on here @graylandmitrii. He’s really helpful!
@realdealonlyco
October 18, 2025 at 11:48 am
I once used cryptocurrency websites with your WIRED name in it. I had multi million dollars and I am still trying to see those cryptocurrency platforms online again.
@imoshtokill
October 18, 2025 at 1:28 pm
I would have loved for you to include legitimate security researchers / “white hat” hackers in the overview. These are the people who are trying to help keep everyday Joe’s data safe. Awesome video!
@megamanx466
October 19, 2025 at 12:06 am
Don’t use a “password manager”; they can be hacked into too. Criminals thrive on those-with-money’s laziness along with ignorance. Physical 2FA is likely the best way to help yourself, but if stolen… those could be hacked also like a house key. SMS & even email 2FA is “hackable”, but it’s online so someone sitting in a country across the world could do it. A notepad might be the best way to store passwords if kept in an obscure, safe place.
p.s. Using a TOR browser is a good way to get yourself watched by “the authorities”, for those concerned in authoritarian regimes! All internet traffic goes through “nodes” and sometimes a country can see who’s using those nodes to access outside nodes. 🤷♂
@0ClaudioPin0
October 19, 2025 at 5:38 pm
What a disgusting piece of propaganda. Russia, China and North Korea: BAD!!! USA/West: victim/hero. If you believe this, congrats: your mind has been pawned and you’re officially brainwashed.
@Innoodrr
October 19, 2025 at 7:16 pm
Can we invited you
@user-fed-yum
October 20, 2025 at 7:39 am
The video editing is terrible and unwatchable 🤦
@myfavsss
October 20, 2025 at 12:40 pm
Why SMS two factor authentication no good????
@DrewtheShrew
October 22, 2025 at 2:35 pm
@stygianx3
October 21, 2025 at 5:31 am
make more mathematician answers questions. PLEASE they’re so entertaining
@deliriumofnegation
October 21, 2025 at 9:16 pm
Found out some of my acct’s were sold on dw. And guess what, it’s MySpace and like 3 others that I lost around 2008-2010.. thank god it’s out there
@fresh-kiwi
October 22, 2025 at 8:30 pm
If only hackers can put money on my bank account then we can talk business
@qokolladaqikita
October 23, 2025 at 1:44 pm
Why avoid sms authentification? Twice I got a whatsapp code sent to me as an sms (without me requiring one). I thought to myself they can’t get in because they don’t have the code sent via sms. Now I’m scared.
@SkiDaBird
November 12, 2025 at 11:02 am
SMS authentication is vulnerable to a few attacks like SIM swapping that other ways to deliver a 2FA code aren’t. It’s much better than nothing, but easy to improve on still.
@duffthepsych
October 26, 2025 at 2:59 am
Why avoid SMS 2-factor authentication?
@zierlichglöckchen
October 26, 2025 at 5:42 am
We have one of the worldwide best DATA security laws in the EU … just have a look to homeland of democracys spirit hahaha
@barelyalive-v8l9n
October 28, 2025 at 8:51 pm
You’re telling me there are forums of discussing crimes and DOING CRIMES and nobody stops them anywhere in the world? WHAT??? This is insane…
@miketomas8564
October 31, 2025 at 4:21 pm
That Downward bald head shot angle though….
Not Good.
@dbkeenan
November 8, 2025 at 8:34 am
Palantir is amassing a huge database on US citizens and selling it to the US (and probably other) governments. There is no freedom without anonymity.