Skip to main content

How accurate are the hacks in Mr. Robot? WIRED uncovers the show's secrets

How accurate are the hacks in Mr. Robot? WIRED uncovers the show's secrets

WIRED meets the show's team of security consultants and experts
Forget the story, characters, or acting, the first season of Mr. Robot grabbed attention because of its incredibly accurate portrayal of hacking.
Like the rest of us, show creator Sam Esmail must have had enough of the kind of nonsense computer scenes littering the likes of CSI Cyber and Swordfish, so he hired help in the form of ex-hackers and former FBI investigators as consultants on the Anonymous-themed show.
The attacks Elliot Alderson uses? They all work (for the most part – and we’ll get to the one big misstep in season one). The screenshots you’re picking apart on Reddit? They were snapped by infosec experts, not set designers.
“One of the things people don’t realise about the hacks on the show is I actually do them,” said Marc Rogers, one of the show’s tech consultants ahead of the arrival of season two this week. “When you see a hack take place on the screen I will have built that hack at home.”
And he knows his stuff: Rogers’ day job is head of information security at CloudFlare and he dabbles on the side running protection for DefCon.
Rogers' boss on Mr. Robot is Kor Adana, who sports an unlikely CV as a hacker-turned-writer. Adana’s job starts in the writer’s room, where he pitches story ideas and researches hacks to make sure they’re plausible, with support from Rogers and the rest of the team of security consultants. “I’ll reach out to them and ask: ‘this is what we’re trying to do – do you have any better ideas’?” Adana said.
Actor Rami Malek with director Sam Esmail are seen on the set of 'Mr. Robot' in Coney Island on June 16, 2016 in New York City
Actor Rami Malek with director Sam Esmail are seen on the set of 'Mr. Robot' in Coney Island on June 16, 2016 in New York City
Getty/Bobby Bank
Once in production, the team moves beyond talk, testing hacks to see if they actually work, all while snapping screenshots and recording video. “Because we’re going to have to show it on screen,” Adana explained. “We’re going to have to show the code or the software or the formatting,” and that can take multiple weeks to get just right.
“If you screenshot that second [of the show]...it’s going to be completely accurate,” he said. “That’s a very intensive kind of job.”

This is necessary, given Mr. Robot fans will screenshot the show for careful examination. “You’ll see little groups of people forming on Reddit, taking a look and dissecting what we’re doing,” said Rogers. “So everything we do has to be real.” People of Reddit, they do it for you.
In a way, Adana and his team are the Reddit of Mr. Robot’s writing team – nit-picking to keep it authentic. “The other writers are very respectful of the fact we’re an authentic show and we want to keep it grounded in reality,” Adana said. “However, that doesn’t stop everyone from pitching out crazy ideas. Usually I need to be the bad guy that says, ‘No, that’s not possible. We have to do it this way’.”
Just because a hack is possible doesn’t mean it’s likely a hacker will try it, either. They’re “lazy”, said Rogers, and take the most straightforward route to their goal. The more dramatic hacks are more often the preserve of security researchers, like Rogers himself. That means Rogers’ own real-world hack of a Tesla Model S last year was questioned by the writing team – it’s technically possible, and good TV, but still a bit unlikely for .
However, sometimes the story does get in the way of absolute accuracy. Time is often compressed, as no-one wants to watch Elliot stare at a computer for seven days straight surrounded by cold pizza.Neither Adana or Rogers were keen to discuss the show’s more major missteps, but Rogers admitted there was one hack he “didn’t like” and chortled in agreement at the suggestion it may be episode six’s great escape sequence, which saw Elliot hop onto a prison network via a police car radio to open all the cell doors.
“At a stretch, I’d say it’s plausible,” Rogers said, noting that more odd cases have happened. “There are some fantastic prison escapes I’ve heard of – one guy faxed himself out of prison,” Rogers said, describing how the inmate spoofed release papers to the court, which in turn sent them back to the prison. “He walked out.”
Adana defends the prison break stunt, saying the Stuxnet-inspired hack is possible. “I can justify those steps, I can go through those steps,” he says. “However, we didn’t show every single step, so if you’re watching it...I can see how it could be perceived as something that may be fantastical.”

As silly as the prison break was, it stands out because it’s one of few mistakes on the show – and even then, it’s a far cry from NCSI’s two characters typing on the same keyboard at once. “In this day and age where the average viewer of these programmes is actually quite seriously computer literate, you just don’t get away with that kind of stuff,” said Rogers.
Hacks aside, how realistic are the hackers themselves? Rogers recognises himself in awkward Elliot. “When I grew up and started hacking, I was painfully shy – it was hacking that made me into more of an extrovert,” he said, describing the “big shot of confidence” the power of intrusion gave him and the conversational skills that social engineering taught him.
Elliot’s unlikely to emerge as a social butterfly thanks to his social engineering attempts, but that’d still make more sense than most hacking shows.

Comments

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

Explainer: The nico-teen brain

Explainer: The nico-teen brain The adolescent brain is especially vulnerable to the addictive effects of nicotine BY  TERESA SHIPLEY FELDHAUSEN 7:00AM, AUGUST 19, 2015 Nicotine (black triangle towards center left) tricks the nerve cell (neuron) into sending a message to release more dopamine (yellow dots). Those molecules enter the space (synapse) between one nerve cell and the next. When they get picked up by neighboring cells, this gives users a feel-good high. It also creates the risk of addiction and other health problems.  EMail Print Twitter Facebook Reddit Google+ NATIONAL INSTITUTE ON DRUG ABUSE, ADAPTED BY J. HIRSHFELD Nicotine is the addictive chemical in tobacco smoke and e-cigarette vapors. And doctors say the teenage brain is no place for it to end up. Nicotine can reach the brain within seven seconds of puffing on a cigar, hookah, cigarette or electronic cigarette.
The area of the brain responsible for emotions and controlling our wild impulses is known as the prefrontal c…

fix idm integration on chrome

Chrome Browser IntegrationI do not see IDM extension in Chrome extensions list. How can I install it? 
How to configure IDM extension for Chrome?Please note that all IDM extensions that can be found in Google Store are fake and should not be used. You need to install IDM extension manually from IDM installation folder. Read in step 2 how to do it.

1. Please update IDM to the latest version by using "IDM Help->Check for updates..." menu item

2. I don't see "IDM Integration module" extension in the list of extensions in Chrome. How can I install it?

Press on Chrome menu (arrow 1 on the image), select "Settings" menu item (arrow 2 on the image) and then select "Extensions" tab (arrow 3 on the image). After this open IDM installation folder ("C:\Program Files (x86)\Internet Download Manager" by default, arrow 4 on the image) and drag and drop "IDMGCExt.crx" (arrow 5 on the image) file into "Extensions" page opened in…