High Definition Standard Definition Theater
Video id : 15MaSayc28c
ImmersiveAmbientModecolor: #db94a2 (color 1)
Video Format : 22 (720p) openh264 ( https://github.com/cisco/openh264) mp4a.40.2 | 44100Hz
Audio Format: Opus - Normalized audio
PokeTubeEncryptID: cf25d073332071e40ece65d29685e07820cb82b7d608cd8f9e3d8264d408742d5279dad8d3dd50f46abf17e1334a1ef8
Proxy : eu-proxy.poketube.fun - refresh the page to change the proxy location
Date : 1715994617951 - unknown on Apple WebKit
Mystery text : MTVNYVNheWMyOGMgaSAgbG92ICB1IGV1LXByb3h5LnBva2V0dWJlLmZ1bg==
143 : true
2,187,867 Views • Feb 14, 2024 • Click to toggle off description
Cyber Warfare, Explained
Use code JOHNNYHARRIS at the link below to get an exclusive 60% off an annual Incogni plan: incogni.com/johnnyharris

From influencing elections to disrupting nuclear facilities, the threat of cyber warfare is both ever-present and mostly ignored. Israel, America, and Russia are just a few of the countries in the ever growing cyber arms race.

My videos go live early on Nebula. Sign up now and get my next video before everyone else: www.nebula.com/johnnyharris

Check out all my sources for this video here: docs.google.com/document/d/1gaOjUIm3ucnKpQawfkaP_Y…

-- VIDEO CHAPTERS --
0:00 Intro
3:13 A New Type of Weapon
5:50 Zero Days
12:52 Cyber Warfare 2.0
24:49 Silent Timebombs
28:18 Outro

Check out my new channel with Sam Ellis - Search Party:    / @search-party  

Get access to behind-the-scenes vlogs, my scripts, and extended interviews over at www.patreon.com/johnnyharris

Do you have an insider tip or unique information on a story? Do you have a suggestion for a story you want us to cover? Submit to the Tip Line: docs.google.com/forms/d/e/1FAIpQLSdpNs1ykIwd7KNkwn…

I made a poster about maps - check it out: store.dftba.com/products/all-...

Custom Presets & LUTs [what we use]: store.dftba.com/products/john...

The music for this video, created by our in house composer Tom Fox, is available on our music channel, The Music Room! Follow the link to hear this soundtrack and many more:    • Cyberwar | A Dark Synthwave Mix For C...  

About:
Johnny Harris is an Emmy-winning independent journalist and contributor to the New York Times. Based in Washington, DC, Harris reports on interesting trends and stories domestically and around the globe, publishing to his audience of over 3.5 million on Youtube. Harris produced and hosted the twice Emmy-nominated series Borders for Vox Media. His visual style blends motion graphics with cinematic videography to create content that explains complex issues in relatable ways.

- press -
NYTimes: www.nytimes.com/2021/11/09/opinion/democrats-blue-…
NYTimes: www.nytimes.com/video/opinion/100000007358968/covi…
Vox Borders:    • Inside Hong Kong’s cage homes  
NPR Planet Money: www.npr.org/transcripts/1072164745


- where to find me -
Instagram: www.instagram.com/johnny.harris/
Tiktok: www.tiktok.com/@johnny.harris
Facebook: www.facebook.com/JohnnyHarrisVox
Iz's (my wife’s) channel: youtube.com/iz-harris

- how i make my videos -
Tom Fox makes my music, work with him here: tfbeats.com/
I make maps using this AE Plugin: aescripts.com/geolayers/?aff=77
All the gear I use: www.izharris.com/gear-guide

- my courses -
Learn a language: brighttrip.com/course/language/
Visual storytelling: www.brighttrip.com/courses/visual-storytelling
Metadata And Engagement

Views : 2,187,867
Genre: Travel & Events
Date of upload: Feb 14, 2024 ^^


Rating : 4.903 (1,647/66,225 LTDR)
RYD date created : 2024-05-18T01:10:13.171284Z
See in json
Tags
Connections

YouTube Comments - 2,866 Comments

Top Comments of this video!! :3

@johnnyharris

3 months ago

Use code JOHNNYHARRIS at the link below to get an exclusive 60% off an annual Incogni plan: incogni.com/johnnyharris

228 |

@williemaxt

3 months ago

As a senior software engineer working in the cyber security space. The castle analogy is one of the best explanations I've heard in a while. I'll be using this to explain these to people in the future

4.2K |

@mirceacelbatran1107

3 months ago

Cyber warfare is cruel. Romanian hospitals recently got attacked via ransomware and many hospitals are unoperable. For instance, my mum suffers from cancer and she had to do her treatment tomorrow, 15th of February, but she can't because the system got hacked...

766 |

@greghodges2116

2 months ago

Back in the 1990s I met a guy who got busted by our university for hacking into the campus computer network. He was given an ultimatum, get expelled or work at the university in the IT department. He took the job but grumbled a lot about the workload. I suspect the USA has hired some hackers in the same way.

17 |

@davidkovar7486

3 months ago

Thank you for the video, Johnny. I really appreciate what you do. Each of your videos gives me a new kind of perspective on the world, its connections, functionality, dependencies, and geopolitics. Many people aren't even aware of things like cyber warfare or the hidden files waiting for their time to disrupt the infrastructure, thus making them more vulnerable to these kinds of attacks. You and your team are doing great work!

17 |

@jameshughes6078

3 months ago

Nitpick: 1. Not all vendors have bug bounties anywbere near what google/apple pays out 2. Sometimes google/apple try not to pay out 3. Black hat pays much better (which was covered in the video), like 100x more in some cases 4. Sometimes white/grey hats get flamed or threatened with lawsuits on disclosure, or get the ring around in the pre disclosure period as the company does nothing Sorry to only throw mud but security posture and whistleblower peotection are things i'm passionate about improving

763 |

@thumpertorque_

3 months ago

This video is more engaging than most sci fi movies because it’s non fiction and Johnny’s ability to narrate and edit serious topics. Any software engineer/ cyber security student should watch this.

337 |

@puneet7768

2 months ago

dude has changed the title and the thumbnail almost 4 times, was struggling a bit to find the video in my watch later list lol

160 |

@godgige

2 months ago

I am network engineer and boy believe me there are attacks happening all over the place all the time. Either by bots or on some specific service in our datacenters. Its constant at this point.

4 |

@elmerp

3 months ago

The castle animation is the sort of thing a movie would have to show the hackers are getting in.

631 |

@brilliantroads

3 months ago

Fun fact: Recently, a research by a journalist of De Volkskrant in the Netherlands showed that it was a Dutch/Iranian citizen who brought Stuxnet physically into the factiory and installed onto the computers there. It was a collaboration with the AIVD (Dutch intelligence services).

650 |

@neanda

3 months ago

one of your most informative prescient videos, and i love the anology with the nuclear warfare - that it's gearing up to be another 'mutually assured destruction' threat as the superpowers are now showing each other that they too have the capailibites. thank you Johnny, that was a very interesting perspective, and i hope many more people get to watch this videoso they are both informed and reassured (to some extent) about the very near future we're entering

76 |

@szarmeign1723

3 months ago

This is more than we can ask for. Kudos to the production team and researcher. especially to Mr. Johnny!

9 |

@chupasaurus

3 months ago

A side note everyone misses: WannaCry and NotPetya used a vulnerability in Windows that had a fix 1/3 months before the initial deployment respectively. The simple variant of this exploit was founded back in 2009 with Microsoft's employee stating in personal blog that they put a duck tape over a hole in Hoover Dam, the "fix" 8 years later just disabled the vulnerable part completely.

513 |

@diegomarconi524

3 months ago

The analog oscilloscope behind you connected to the microphone is fantastic

327 |

@juanpiss

2 months ago

i've seen johnny change the title and thumbnail of this video exactly 5 times by now

25 |

@AGENTX506

3 months ago

What's not stated clearly enough in the castle metaphor is that essentially everyone uses the same blueprints to build their castle. >90% of people use Windows, and >90% of servers use Linux. In this sense cyberwarfare has this odd symmetry to it: Developing new attack methods often exposes vulnerabilities in your own systems, but in order to patch your own vulnerabilities you must often report them to the developer, for example Microsoft, who will then roll out a fix to *everybody*, including your opponent. Then remember that world powers often sit on exploits like these, rather than reporting them. Evidently, multiple people in power sat down and decided that holding on to an exploit to attack some theoretical future enemy was worth more than protecting their own people, hospitals, and power grids from real, known threats.

5 |

@bloom5086

3 months ago

I remember "Petya" virus hits us when I was in university, it caused a lot of panic back there. You mostly was put in a hard choice like "do I turn on my PC to save my files risking getting this virus or do I just wait and hope for the best"

346 |

@ClifBratcher

3 months ago

Very few great infosec folks work for the US government directly. The private sector pays WAAAY more and there's much less regulation. It also gives the public sector plausible deniability. Btw "APT" (advanced persistent threat) is the term for what you're referring to at the end. They're a pretty big signature of a nation-state.

452 |

@LostMane

2 months ago

😂 US hypocrisy does get us into a lot of bull

12 |

Go To Top