All Episodes

November 28, 2023 • 8 mins

The hacker segment that got shut down

See omnystudio.com/listener for privacy information.

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:06):
Don't. It's got mega drawers, mate.

Speaker 2 (00:08):
You don't want to know.

Speaker 1 (00:10):
Is this is real? Behind the scenes, is you know where?
I don't know. There's a boarding here and there.

Speaker 3 (00:16):
Things to record and right now what's written on there
is mega draw what got in your pants? And Sam
Draper And we don't know what any of that means.
But at some point.

Speaker 2 (00:24):
Where Sam Draper's my password, there you go.

Speaker 3 (00:26):
If you want to get into wills, banking, Sam Draper
or capitals or.

Speaker 4 (00:30):
Any acts in there for the a's there's an iteration
of Sam Draper, which is my password for everything.

Speaker 1 (00:38):
Everything I think about his number. Guys, just good luck
to you.

Speaker 2 (00:43):
There's no one's going to get that. No one's going
to get that.

Speaker 1 (00:47):
I'll tell you what I'm going to try.

Speaker 2 (00:48):
You can try.

Speaker 5 (00:49):
I know that there are people out there that with
the information that's about you on public, Yeah, with that information,
they'll absolutely be able to hack everything.

Speaker 2 (00:57):
There's no way everyone's going to get that.

Speaker 1 (00:59):
Not everyone.

Speaker 2 (01:00):
It's a challenge that I'm laying down.

Speaker 5 (01:01):
There, not everyone, but people with a certain set of skills.

Speaker 3 (01:04):
Because actually, actually because Ed and I were talking to
a hacker, like quite seriously, this guy who is a hacker,
like he's hired by the government.

Speaker 1 (01:11):
It's super It gets real deep and weird.

Speaker 2 (01:13):
Anyway, good luck to him.

Speaker 3 (01:14):
He was saying, though, like we had to we had
to like and stand the dog down at some point,
because he was.

Speaker 2 (01:18):
Like, you'reilling him a dog.

Speaker 1 (01:20):
I'm calling him a dog because he was going to
follow me home.

Speaker 3 (01:22):
He was like, right, what I have to do is
I'm going to stalk Woody on his way home put
something put like a device on my car or bike.

Speaker 1 (01:29):
What which would then read be abut to like hang on?

Speaker 5 (01:32):
Have I The term that he used was a key logger,
and I think you're taking that quite literally. I think
that's like a cyber device.

Speaker 4 (01:40):
That's not a key I thought I thought was like
I thought it was.

Speaker 2 (01:46):
You thought it was a tracker. You thought he was
going to put a tracker.

Speaker 1 (01:48):
What is a keylogger? I'm pretty sure a key.

Speaker 4 (01:51):
Log monitors your keys on your computer, so you can
figure out what what.

Speaker 2 (01:54):
Which keys he hits. Then you can figure out what
your password.

Speaker 1 (01:56):
But he still needs to put.

Speaker 2 (01:57):
That No digitally, you don't need to do.

Speaker 4 (02:01):
He had He just promote He just promote access. He
just promote access to your computer.

Speaker 3 (02:05):
I've been checking my car with mirrors to see if
one of these galogers is stuck on my car.

Speaker 5 (02:09):
He had your day to birth, he had your full name,
I think, and maybe one other details. Why are we
doing it?

Speaker 2 (02:14):
Well? How did he get that by himself?

Speaker 5 (02:16):
He just googled it?

Speaker 2 (02:16):
Okay, so why can't work?

Speaker 3 (02:18):
I stood him down, stood him then because he was
because he wand down. He's threatened to Eddie was like,
I'm going to steal his money. I'm going to change
his banking passwords. I'm going to write emails. I'm going
to read all these emails. And I was like, can
we just get this guy to excuse.

Speaker 5 (02:30):
My friends about it's a full access of everything bank.

Speaker 2 (02:35):
It was just going to be like a practical like
it was just going to be done a.

Speaker 1 (02:38):
Little bit of fun.

Speaker 3 (02:39):
Then all of a sudden, I get a text message
from anonymous number and he goes, you know, transferd me
to ten grand otherwise I'll take you know what I mean?

Speaker 2 (02:44):
He works for the government, does he? I think he does.

Speaker 3 (02:48):
I don't trust him obviously anyway. Terrifying point is if
he gets that you're big trouble.

Speaker 2 (02:55):
Well he's got it now.

Speaker 4 (02:56):
It's Sam Driver and anyone else. It's not just Sam Draper.
By the way, there's an iteration of Sam Draper with
an extra. There's another word there as well.

Speaker 1 (03:05):
Like, no one's going to get his key loger might
be able to figure it out.

Speaker 4 (03:08):
Well, he needs to he needs to hack my computer
to log my keys, or he needs to rock up
to my house, break into my garage.

Speaker 2 (03:15):
And put a tracker on my bike.

Speaker 4 (03:17):
Which one of them is going to give him my
banking password. I'll let you guys figure out which one
it is.

Speaker 2 (03:24):
That you know, might take a bit.

Speaker 4 (03:27):
Of an ouse now, but key logers, Yeah, that's the I mean,
I think a lot of people would just use that
as a general hacking.

Speaker 2 (03:32):
That's when they get you to click on a link.
A lot of the time that's a key logger.

Speaker 4 (03:36):
Yeah, so they get you to it, they'll they'll yeah,
well sometimes that's that's the sort of malware that they'll download.
And then the mailweld will like get that information and
send it to them, so it will monitor how frequently
you hit which keys and then they can guess which
letters are used for your password, and then they can
gets your password.

Speaker 3 (03:50):
Do you think like this is a bit of a
more of a like a DIY sorry, just very quickly
you can figure out whether you've got that sort of
malware on your computer that you can check for it
it with like a you know software that does that
for your security software.

Speaker 2 (04:03):
Norton, Yeah, like a Norton.

Speaker 4 (04:06):
Or if your computers running it a high percentage of
power a lot of the time, that's often because you've
got something like that that's working behind the scenes without
you knowing.

Speaker 1 (04:14):
It, as in your battery drains a lot.

Speaker 4 (04:16):
Yeah, we're you're just using like a lot of percentage
of your power and that might lead to battery draining,
or or you notice the fan it's.

Speaker 2 (04:24):
Heating a lot. Either that or you just watching a
lot of porn.

Speaker 1 (04:26):
Oh, thank goodness, thank goodness.

Speaker 3 (04:30):
But more of a DIY. Key logger, do you think
you could? You know how there are keypads. I'm definitely
taking this from films, but you know how there are
keypads around.

Speaker 2 (04:40):
What are you doing?

Speaker 1 (04:40):
You know, keypads for a door? You got to put
in a password for a door.

Speaker 2 (04:43):
You mean like a like a like an access code
for it. Right?

Speaker 3 (04:46):
Do you think if I like sprayed on some total
and then sprinkle some talcum powder. Does that work? And
then you go, oh, so the password involves those four numbers.
I can see the fingers.

Speaker 2 (04:59):
We should I don't reckon you should be trying anything
in this space.

Speaker 1 (05:05):
I'm not going to do anything.

Speaker 3 (05:06):
I'll probably if I got in, If I got access,
I'd go, hey, guys, hey, you know, big bank figured
out your door.

Speaker 2 (05:13):
So that's all that this guy from the government was
going to do.

Speaker 1 (05:15):
He was going to get access, and I trust me,
but I don'trust him.

Speaker 4 (05:18):
He was going to get access, and then he was
going to go, hey, got in, mother view things around
a bit of a gag.

Speaker 2 (05:23):
He was going to turn your.

Speaker 4 (05:26):
Your savings account into you know, I Love Dick or
something like that, and the next time you look at
it would have been a great little gag.

Speaker 2 (05:31):
Apparently he got me.

Speaker 3 (05:33):
And he's going to be able to send bosses emails
and stuff as me have my voice, apparently make phone calls.

Speaker 1 (05:40):
He was legit.

Speaker 2 (05:42):
I'm really sad we didn't do this bit.

Speaker 1 (05:44):
We definitely still can flipped.

Speaker 2 (05:46):
On, well what were you both scared about.

Speaker 1 (05:49):
It's a bit of a lazy thing.

Speaker 3 (05:50):
But he said, well, after he does it, you have
to change everything, everything and I was like, no, no way.

Speaker 1 (05:57):
I've got it.

Speaker 2 (05:57):
It's fair enough. That's fair enough.

Speaker 1 (05:59):
So much add me afterwards?

Speaker 2 (06:00):
Like changing all your passwords?

Speaker 1 (06:02):
Yeah that was a bit, right, But if you want
to be hacked.

Speaker 4 (06:07):
Yeah, well, I mean I'm pretty I'm interested to see
how far you can go. But the other part about
this is like it kind of sounds like he can
do it, Like, so I'm not going to be like,
you know, like before this, I was like, I don't
know how far this guy is.

Speaker 5 (06:20):
Going to go.

Speaker 4 (06:21):
But now I know that he's just gonna you know,
he definitely can, right, Like he just definitely can't. I
think for me it's just going to be yeah, okay,
it's just going to be a time thing for me.
Like that's going to impress me most how.

Speaker 1 (06:32):
Quickly you can do it. I think he needed a
fair bit of time, is that right? Perfect?

Speaker 2 (06:36):
If he's following your home, he wasn't ever following Woody home,
was he.

Speaker 5 (06:39):
I don't think that was part of it.

Speaker 1 (06:41):
He said he was going to follow me. He needed
my route home.

Speaker 5 (06:44):
I think you're just reading in some words that the
work in a physical sense but also have cyber and digital.

Speaker 3 (06:50):
I've been I've been riding home the long way for
a very long time, just in case his little bastard
jumps out of a bush follow me.

Speaker 2 (07:00):
Yeah, but what's what's he going to do with that information?

Speaker 3 (07:01):
So he'll know that I always stop at a particular
traffic light, or I stopped to get a snack from
a colls on the way home.

Speaker 2 (07:06):
How is that going to help him to break into
your bank account?

Speaker 3 (07:09):
Because he'll he'll he'll know, he'll know I stop, and
then he'll walk past as he probably dressed up as
an old lady. And then the keylogger connects bluetooth wise
to my computer and then he's in.

Speaker 1 (07:21):
You said to me he needed to be within. Yeah,
read this, read the message. Here we go.

Speaker 4 (07:25):
Hey, we've got here we go, Here we go, Here
we go, plan some things out.

Speaker 2 (07:28):
Yeah.

Speaker 5 (07:29):
Easiest way for me to get access to his life
is via a device like phone or laptop. We can
insert a key logger. We can also use a radio jammer,
so I follow him from home home from work, so
he goes shopping or something. So if he leaves his
laptop in the car, I can put a keylogger on it.
Tod passwords and all these decat she told you, told

(07:49):
you then we can use his laptop to jump into
his phone account for it or SMUs accounts to me.
We reset his banking access, his email, knocking out of socials.

Speaker 1 (07:57):
So I haven't been going the same way home every
night since.

Speaker 2 (07:59):
Then. It really got seriously he really did.

Speaker 4 (08:02):
I mean, I said liam Neson before, but he really
got all very liam Nieson on you, very fast.

Speaker 1 (08:07):
Big time. Hence why we had to tell him to like.

Speaker 4 (08:09):
Imagine if I imagine if you had just like had
an altercation with him or something exactly.

Speaker 1 (08:13):
That's why I killed him exactly.

Speaker 4 (08:14):
Yeah, you're worried because you know, you just you know,
once you sort of start off that chain reaction, you're
you're a weapon out of his hands.

Speaker 3 (08:23):
Oh me, yeah, oh yeah, like they guy of conn Air.

Speaker 1 (08:29):
Nicholas Cage. Remember his fists were defined as weapons in court.
That's why the present

Speaker 2 (08:37):
All right, we'll see you guys, I reckon, yes, wrap
it then
Advertise With Us

Popular Podcasts

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.