There’s an invisible war being waged. And we’re all part of it. Foreign governments are hacking major corporations. Major corporations are collecting massive amounts of consumer data. And the NSA is listening…to everything. But a new generation of programmers armed with powerful technology is rising up and fighting back. Freethink presents a new original series about the latest hacking news: Coded. Watch the Trailer
Coded Season 3
Pentesters use the same methods of breaching as criminal hackers, with one key distinction: they’re hired by the owner of the system and perform the attack with permission.
Coded Season 2
Jay Leiderman isn’t your normal defense attorney. He’s committed his career to defending hackers, including Anonymous, the world’s most secretive and famous hacking organization.
Why This Hacker Was Arrested The super-secretive hacker known as MalwareTech became famous when he dismantled the WannaCry computer virus, one of the most alarming privacy threats in recent memory. But the praise was cut short when the hacker was arrested by the FBI for creating a virus that gave digital thieves access to people’s banking credentials. Was he just doing research to stop criminal activity or engaging in...
In the wake of the Panama Papers hacking scandal, computer programmer Smári McCarthy decided he needed to apply his "hacking for good" philosophy to politics. As a member of the Pirate Party - a political party formed around the concept of extreme transparency - Smári was elected to Parliament in Iceland and is trying to use a hacker mindset to improve his country and the world.
What happens when an SUV going 75 miles-per-hour down a highway is hacked from a remote computer? Two researchers in Pittsburgh want to make sure we never find out. As cars have become more automated, they’re becoming more hackable. But the only way to stop car hacking is to actually learn how to hack into cars and uncover their vulnerabilities.
Around 1 in 60 people on the globe rely on the coffee supply chain for their livelihood. But it’s an antiquated system, rife with uncertainty, unfairness, and even corruption. Bext360 wants to change that. They’re using machine vision, artificial intelligence, and blockchain payments to bring the largest un-automated system in the world into the digital age.
Coded Season 1
Ladar Levison’s email service counted Edward Snowden among its users. But, when the FBI demanded Levison hand over Snowden’s communications, Levison destroyed the company’s servers. Now, he’s back with a more secure version of the service that could make mass surveillance obsolete.
At an undisclosed location in Sarajevo, a group of hackers are working with journalists to expose organized crime and corruption. But those engaged in illicit activity respond with cyber attacks and other intimidation tactics. Can the group fight off the attacks and help journalists bring the truth to light?
In Ethiopia, the main prison is divided into eight zones. Many refer to the rest of the country as “Zone 9.” But Endalk Chala is fighting back. Chala moonlights as an encryption expert, helping bloggers in his native Ethiopia escape capture and torture.
Charlie Shrem went from multi-millionaire to having almost nothing. Shrem was a Bitcoin pioneer. And it paid off big time. Until he was sent to jail for allowing a customer to resell bitcoin on Silk Road. Now, he’s out and wants to convince the world that Bitcoin is the future of finance.
There is an incredible amount of data in your DNA. Heather Dewey-Hagborg wants to make sure you have control over that data. She developed a spray that masks your DNA wherever it’s left. Is it a new frontier in personal privacy or a handy tool for criminals?
In our hyper-connected world, hacking is a superpower. And Nico Sell wants to make sure that power ends up in the right hands. She started Rootz Asylum to teach kids how to hack and encourage them to use their new-found talents for good.
More on Hackers
One unfortunate truth that anyone involved in a missing person case quickly learns is that there are more missing people in the world than there are available resources to find them. The first few days after a person goes missing are the most crucial for finding them safe and sound. However, since missing people tend to turn up on their own, these cases are initially given low priority. The exception is if there's a strong...
Subscribe for More Stories From the Digital Detectives Series Email Subscribe Meaghan Good has made it her life’s mission to track missing people. She runs The Charley Project, an important database compiling information on thousands of missing...
We all get tired of our internet service. Too expensive, too slow, too many lost signals. But what if instead of just restarting your router, you started your own internet service? Sounds crazy, but that’s exactly what one man did.
Deepfake videos use video manipulation to show people saying and doing things they never have. These engineers are using blockchain technology to separate fact from fiction. Deepfakes, fake videos generated using artificial intelligence technology, could be the next frontier in misinformation. While news video has historically been the gold standard of veracity, an era where video can be easily created could further erode...
Deepfakes have ignited fierce media criticism and call into question the public’s ability to discern fact from fiction. But the technology behind Deepfakes, called GANs, has enormous potential to drive innovation beyond fake social media videos. Read more to find out some of the amazing things being done with this technology.
Sharing nude selfies with partners is increasingly common. Too often, though, these images end up posted online without consent. BADASS Army is an army of volunteers getting these images taken down and punishing people who upload them without consent—whether they’re exes posting revenge porn, a hacker releasing them, or someone stealing them through other means. What is Revenge Porn? Revenge porn, also known as...