Become a Creator today!Start creating today - Share your story with the world!
Start for free
00:00:00
00:00:01
Dystopian Stories About Cybercrime Meet Real-World Solutions image

Dystopian Stories About Cybercrime Meet Real-World Solutions

E17 · The PIPE gDAO Podcast
Avatar
16 Plays1 day ago

Welcome to the PIPE gDAO, where cybersecurity meets science fiction in a thrilling exploration of our digital future. Each episode dives into the world of threat detection, offering expert insights into unsupervised threat detection in cybersecurity and the cutting-edge use of CT-HMM in network security. But that’s just the beginning—we also deliver captivating dystopian stories about cybercrime, where technology and social inequality in the future shape a hauntingly plausible world.  

From the mysterious Silent Swarm to the subtle menace of beaconing behaviour in botnets, our tales weave together the technical and the imaginative, blurring the line between fiction and reality. Whether you’re a cybersecurity professional, a fan of dystopian future narratives, or simply curious about what lies ahead, the PIPE gDAO offers a fresh perspective on the challenges of our connected age. Tune in and join us as we explore the intersection of technology, society, and the human experience in this one-of-a-kind journey.

@ThePIPEgDAO | Instagram, Facebook | Linktree

Recommended
Transcript

University Startup Success Stories

00:00:00
Speaker
But before that, have you actually heard of a certain logo designer that managed to turn $2,000 into $200,000? I have not, please tell me more.
00:00:10
Speaker
Oh well, his name is Dustin Moskowitz, a simple designer whose genius foresight in an early university startup, Facebook, changed his life. Yes, he designed the Facebook logo.
00:00:22
Speaker
And you can do this too by contributing to nascent technology startups from universities of today through Pipe Associate Network. Find out how you can get started today by going into the description, our link tree and look for www.arbeto.io.
00:00:39
Speaker
But first, did you know that even top companies like Coinbase struggle with talent retention, averaging just about 0.8 years, so under one year? Web3 faces big problem with unqualified applicants, some scammers, overall CV spammers, leading to short-term hires.
00:00:57
Speaker
Applications like passion, they are misaligned with the project ethos. This disconnect reduces long-term commitment to missions and goals. Well, Arbito fixes this. Arbito is a limited membership Web3 jobs platform that combines AI tools, vetting and job management tools, as well as third-party ad boosts.
00:01:16
Speaker
We are maximizing the number of eyeballs on your job post. Join today by going to our link tree in the description and look for arbaito.io.

Innovations in Cybersecurity: NetSpectra Sentinel

00:01:25
Speaker
Hello everybody and welcome back to the Pipe GDAO podcast. It's episode 17 and as usual I'm your host Noodle, but to be honest if you don't know that by now I'm going to be taking it personally.
00:01:41
Speaker
um've been here for every single episode. So again, if you've not been listening, you know, and you don't know who I am, I'm upset. I'm upset with you. I am.
00:01:53
Speaker
Anyways, today we're going to be covering a another project on our platform, on our launchpad. This one is threat detection and response with heterogeneous, I believe that's Heterogeneous, sorry, heterogeneous data sources.
00:02:11
Speaker
It introduces the NetSpectra Sentinel or NSS, ah which is an unsupervised model designed to detect covert threats within the activities of seemingly benign applications.
00:02:25
Speaker
So by employing a continuous time hidden Markov model or a CT-HMM alongside time series de decomposition or TSD, NSS uncovers concealed patterns in system network logs, which effectively identifies complex beaconing behaviors.
00:02:46
Speaker
even without labeled data. This capability is particularly significant in detecting and mitigating botnets and their associated beaconing activities, which are often precursors to distributed denial of services or DDoS attacks.
00:03:03
Speaker
the project The project emphasizes addressing the challenges posed by attack-driven beaconing, a tactic where attackers will establish covert communication channels with comprised networks.
00:03:17
Speaker
So if you haven't gathered already, this is all about online security. It's basically an online threat detection. um Again, this is on our website.
00:03:30
Speaker
Launchpad. It's really interesting. And especially, i know i know this wasn't anything to do with botnets or a DDoS attack. It was quite simply a mistake.
00:03:42
Speaker
But ah security has been in the news recently, obviously with what's happened in America. ah again, that wasn't anything to do with hacking. They just accidentally added a journalist to a war group chat.
00:03:56
Speaker
So this wouldn't help them because that is...
00:04:02
Speaker
This won't be able to help them if they can't even know not to add a journalist, especially a political journalist, to a wartime group chat. Anyways, as usual, we're going to be covering a dystopian story that we have written ah to address what would happen if you, as a Pipe GDOW patron, do not invest into the...
00:04:28
Speaker
threat detection so it's going to be what the future looks like we've done this with the past two to three projects that we've covered and we're going to be doing it with every single one basically just to paint a picture of a world ah or a possible world that could happen if you don't invest basically so should we get started That was a rhetorical question.
00:04:52
Speaker
If you said no, I've got bad news here. Anyway, in the year 2055, the world has a fractured dystopia, torn apart by digital warfare.
00:05:04
Speaker
The event of NetSpectra Sentinel, or NSS, in the early 2020s had once promised salvation, a revolutionary system capable of detecting and neutralizing botnets before they could strike.
00:05:17
Speaker
But NSS never reached the masses. Mired in corporal greed, corporate greed, bureaucratic apathy, and the interior and in a area of legacy solution security solutions, it remained locked away in private vaults.
00:05:35
Speaker
Those who could afford protection thrived. Those who could not suffered in the shadows. And again, this is all about the 1% grabbing everything. That's actually what we're trying to work against.
00:05:47
Speaker
We're trying to bring lab projects away from just angel investors being able to see them and get the general public involved

Vision for a Secure Future

00:05:55
Speaker
as well. So the general public can also invest in projects that usually they wouldn't be able to see.
00:06:01
Speaker
All of those available on our launchpad So, the Skyhubs, towering cities floating above the Earth's surface, were sanctuaries for the privileged.
00:06:12
Speaker
Their networks remained resilient against the chaos below, safeguarded by hoarded NSS prototypes. Meanwhile, the ground zones, sprawling ruins of forgotten cities, became a haven for the exploited.
00:06:25
Speaker
Here, botnet's evolved. Unchecked. Sorry about that. Apologies for the yawn. Unchecked. infecting every piece of technology from bio implants to streetlights entire neighborhoods collapse under the weight of cybertack their infrastructure hijacked by the silent swarm of whisperers WhisperNet was unlike any botnet before it.
00:06:51
Speaker
Instead of crude brute force attacks, it whispered through the network. Its beacon signals indistinguishable from legitimate data streams.
00:07:03
Speaker
Legacy security systems reliant on outdated hirostricts have itrickx failed to detect it.
00:07:13
Speaker
Only NSS had the power to unravel its deception. But the elites had no incentive to share their shield with those who deemed unworthy.
00:07:25
Speaker
In the ground zones, a young hacker named Jace lived among the wreckage. He had grown up hearing about NSS, knowing it could have prevented the catastrophe that had consumed his world.
00:07:36
Speaker
When a Skyhub prototype crashed during a riot, he seized the opportunity scavenging the remnants. Among the charred circuits, he found a fragment of NSS's core code.
00:07:48
Speaker
Working in secret, Jace rebuilt the system on a salvage table, crude but functional. Late one night, the system flickered, a notification. He had detected a whisper net beacon in his own home, embedded in his sister's smart prosthetic.
00:08:05
Speaker
The infection was spreading. Within a few keystrokes, he isolated the connection, cutting it off before it could relay commands. For the first time, he had proof. NSS worked.
00:08:15
Speaker
It could fight back. But victory was fleeting. The moment he uploaded the decryption script to the underground network, Skyhub sent in forces. A drone descended through the smog-laden skies, firing an EMP pulse that fried his equipment.
00:08:32
Speaker
A voice crackled through the speaker. Unauthorized possession of proprietary technology is a capital offense. Jase knew that NSS wasn't lost because it had failed.
00:08:44
Speaker
It had been buried. The silent swarm wasn't the disease. It was the symptoms of a deeper sickness, one where power was hoarded at the expense of survival. As he stared at the smoking remains of his only hope, he understood if the system wouldn't save them, then they would have to find another way.
00:09:03
Speaker
Did you know up to 45% of Recruiter Talent Database are dormant? This means 45% of your revenue is left on the table. Wow. I know, right?
00:09:15
Speaker
but But if you repurpose your talent database by redirecting them to nascent industry technology in high growth, you can share a portion of the high growth sweat equity too.
00:09:27
Speaker
How? The Pipe Associate Network. Bring new opportunities to talent within university-born R&D IP startups worldwide and earn a part of the future.
00:09:41
Speaker
Go to our description for the link tree or sign up on www.thepipecompany.co.uk and start your adventure of the future today.
00:09:52
Speaker
The silent swarm grew louder. It reached... its reach expanding and in the shadows, the fight for the digital liberation had only just begun. So that was a little taste of our story that we have written about ah the threat detection and a world without it.
00:10:13
Speaker
Again, projects like these usually would end up in the hands of angel investors or the 1%. However, here, when we're here Now, with our launchpad, it's coming to people like you listening to this. Maybe you're listening to this on a clip.
00:10:29
Speaker
Maybe you're listening to this via Sankaster or whatever your preferred podcast platform is. We aim to bring lab projects to the general public so that you yourself can invest in them.
00:10:41
Speaker
um But we're going to be getting into that a little bit later. Anyways, we're going to be sort of listing some reasons here why threat detection and response it should really use with a catchier name. We're going to call it Net Spectre Sentinel.
00:10:57
Speaker
That's what we're going to call it. NetSpec for short. So the reasons why you yourself should invite involve yourself with NetSpec is you'd be basically looking at a world without cybercrime, with the vision being that NSS becomes the backbone of global security.
00:11:13
Speaker
Deployed across all devices, so like phones, IoT gadgets, critical infrastructure, would be able to detect and neutralize botnets before they can strike. it's an unsupervised letter It's unsupervised learning identifies threats without needing prior examples, catching even the most novel attacks in real time.
00:11:34
Speaker
So cyber crime itself would then be thwarted really with financial systems thrive without the ransomware hospitals will be able to operate without fears of being DDoSed and personal data will remain in in viable.
00:11:51
Speaker
Trust in digital technology will then go on to soar fostering a seamless secure global economy where innovation accelerates unhindered by malicious interface.

Lessons from Cybersecurity Incidents

00:12:02
Speaker
and then we'd also be looking at universal digital equity so the idea is that scaled affordability with the nss embedded in every device from high-end servers to low-cost smartphones will ensure that cyber security isn't a luxury but then becomes a universal standard developing nations leapfrog into the digital age their networks safeguarded by the same advanced protections as wealthy states the The digital divide will then close with rural farmers monitoring crops with secure IoT. Small businesses compete globally without fear of attacks and educations flourish as students will be able to access safe and reliable online sources, but which will then go on to lead a truly connected world where opportunity isn't gated, but it's able to be given to everybody
00:12:58
Speaker
same let playing field. And that's exactly what we're trying to do. Everyone's on the same playing field when it comes to these kinds of projects. Another thing you'd be looking at is maybe ah a sort of global peace through cyber stability.
00:13:12
Speaker
So nations go on to adopt and NSS as a shared defense platform. It's transparency and effectiveness, defusing cyber warfare with state sponsored botnets, once tools of espionage and sabotage Russia,
00:13:27
Speaker
are rendered obsolete as NSS detects their beaconing patterns across borders, alerting a unified global response network. So cyber stability will then go on to foster peace.
00:13:42
Speaker
Diplomatic tensions will ease as nations trust in a collective shield, reducing the risk of digital conflicts, escalating into physical ones. Resources once spent on cyber arms and racers...
00:13:55
Speaker
are redirected to education, healthcare, and climate solutions, ushering in an era of cooperation. So I did a bit of my outside research, and obviously there are top cybersecurity companies. Actually, a good friend of mine is studying cybersecurity right now.
00:14:15
Speaker
He works on all sorts of stuff. I don't know how much, if any, i can actually tell you. Can I tell you any of it? i actually not sure.
00:14:26
Speaker
um No. You know what? Better safe than sorry. So we'll be looking at stuff like Palo Alto Networks, which specializes in next-gen firewalls, cloud security, and AI-driven threat detection.
00:14:40
Speaker
Stuff like CrowdStrike, Cisco Secure, Checkpoint Software, IBM Security, mcafee McPhee. That one is You know, the video, I'm sure we've all seen it, how to uninstall it. The the guy that made that is insane.
00:15:00
Speaker
Absolute lunatic. It is a brilliant watch, though. google Google it if you get the chance, because it is just, he just is brilliant. It is absolutely brilliant. But, so you know, stuff it specializes in antivirus and endpoint security and all that.
00:15:16
Speaker
um So yeah, it's really, really interesting stuff. And I say that especially now with cybersecurity being not a major concern at the moment, but definitely security is in the headlines.
00:15:29
Speaker
So when we're talking about cybersecurity, I remember when there was frequent people trying to break into stuff like the Pentagon. You know, America is definitely susceptible to major problems.
00:15:43
Speaker
ah cyber attacks because everyone wants to know what's going on in America, especially with the CIA and stuff like that. So lying stuff that I can remember off of my head is WannaCry, 2017, which was a ransomware, which then went on to attack and affect over 200,000 computers, I think in 150 countries.
00:16:09
Speaker
And that exploited a Windows vulnerability. It hit hospitals, banks and telecom companies, causing billions in damages. And then there was also the SolarWinds hack, which happened, I think it was either during or just before lockdown, which that affected US government agencies, so stuff like the Pentagon.
00:16:31
Speaker
And it was attributed to Russian state-sponsored hackers. um and then the colonial pipeline ransomware attack which was a dark side ransomware attack that forced the shutdown of the largest u.s fuel pipeline which then caused fuel shortages across the east coast the company had to pay a 4.4 million
00:16:55
Speaker
Ransom, even though part of it was recovered by the FBI, it's telling me here. What else was there? Stuxnet, a cyber weapon that targeted irain i run a i Iran's nuclear program. It was believed to be developed by the US and Israel, which destroyed over 1,000 centrifuges of Iran's Natanz facility.
00:17:19
Speaker
So what we're looking at here is people are constantly being told to update software regularly to patch vulnerabilities, use strong passwords and 2FA, backup data to prevent ransomware damage, and beware of phishing emails that can lead data breaches.
00:17:37
Speaker
I

Connecting Innovations with Investors

00:17:38
Speaker
mean, cyber attacks still remain a major and growing threat, even in this year, obviously with technology completely, you know, always moving forward.
00:17:51
Speaker
cyber attacks are constantly going to happen. So stuff like ransomware attacks, which are still a major threat. So you're looking at like groups like Black Basta, Lockbit, Alfv, continue to target hospitals, banks, and governments.
00:18:08
Speaker
Attackers, they'll steal the data before encrypting it. So it's double extortion. Businesses can lose millions in ransom payments and recovery costs. Also now with AI powered cybercrime, so hackers can now use AI to create advanced phishing emails and deep fake videos.
00:18:25
Speaker
It can automate password cracking, social engineering and malware development. even with some chat bots being weaponized to spread misinformation and then supply chain attacks with hackers target third party software providers to breach multiple victims at once.
00:18:42
Speaker
It's, you know, it's all going on critical infrastructure attacks, banking and crypto hacks. I still remember. I remember recently there was the North Korea but is constantly trying to steal millions in cryptocurrency.
00:18:58
Speaker
Um, so Online banking systems are targeted with fraud and credential theft. Corporate and government espionage. China's APT41 and Russia's fancy bear spy.
00:19:11
Speaker
Again, it's you know all this stuff saying how to stay protected using multi-factor authentication, MFA, you know avoid clicking on suspicious links, backup important data online.
00:19:24
Speaker
This all goes back to What we are talking about here with NetSpectra, with threat detection and response, by employing a continuous time, you know, alongside time series decomposition, it can uncover concealed patterns and system network logs. I know I said that at the start, but I'm reiterating again.
00:19:45
Speaker
Anyway, this I think is one of our more important projects, not that they're not all important, but this is definitely one that i think should gain a lot of eyes, especially now the obviously the political climate being what it is, obviously the tech sector being what it is, everyone's brewing,
00:20:05
Speaker
A lot of technology is constantly coming out and people need to stay protected. We are now in a great sort of tech revolution right now. So what you're going to want to do obviously is go to the website, ah our website, pipe.gdow.io.
00:20:22
Speaker
The link will be there in the description. You're going want to go to the website and click invest to where you can see all the projects on our launch pad. Again, we've done a couple others.
00:20:33
Speaker
so We have covered ah stuff like, sorry, I'm just clicking back. I remember there was size saying, Yeah. And then there was also the boost to EV driving range.
00:20:46
Speaker
ah So boosting batteries and the size tank. Size tank, I know since the podcast has had a couple of eyes on it, which is really good. That's a very interesting one. And then we have done boost EV driving range as well. That was our last one.
00:21:01
Speaker
That was also really interesting one, especially with the development of... electric cars going through the roof so yeah it's really interesting project we've got going on here guys so yeah if you want to go and visit it go to the website click invest go through the launch pad and then if you want to you can become a pipe patron and you can go and join our network and see what happens so yeah my name has been noodle and i will see you in the next episode
00:21:33
Speaker
But before we continue, are you looking to invest in real-world asset innovation IPs? Maybe one coming from a university? I'll have you know they have an average ROI of 397%, aka X4.
00:21:45
Speaker
And did you know the likes of Gatorade and Google actually came out from universities? Then what you're looking for is the Pipe GDAO, a community-led protocol that fairly openly and honestly governs overall community ownership of the various protocols it creates.
00:22:03
Speaker
Join the web-free real-world asset revolution powered by PGF Launchpad with cutting-edge university laboratory inventions that could change the world with your support.
00:22:14
Speaker
bridging the gap between university IP real-world assets and web-free capital. The PGF Launchpad connects EU University Lab Innovators directly with retail investors on the blockchain, included but not limited to automated seizure prediction and prevention and boost EV driving range significantly. This could be up to 70%. You can join us by going into the link tree in the description, launchpad.thepipejadao.io.