Skip to main content

How accurate are the hacks in Mr. Robot? WIRED uncovers the show's secrets

How accurate are the hacks in Mr. Robot? WIRED uncovers the show's secrets

WIRED meets the show's team of security consultants and experts
Forget the story, characters, or acting, the first season of Mr. Robot grabbed attention because of its incredibly accurate portrayal of hacking.
Like the rest of us, show creator Sam Esmail must have had enough of the kind of nonsense computer scenes littering the likes of CSI Cyber and Swordfish, so he hired help in the form of ex-hackers and former FBI investigators as consultants on the Anonymous-themed show.
The attacks Elliot Alderson uses? They all work (for the most part – and we’ll get to the one big misstep in season one). The screenshots you’re picking apart on Reddit? They were snapped by infosec experts, not set designers.
“One of the things people don’t realise about the hacks on the show is I actually do them,” said Marc Rogers, one of the show’s tech consultants ahead of the arrival of season two this week. “When you see a hack take place on the screen I will have built that hack at home.”
And he knows his stuff: Rogers’ day job is head of information security at CloudFlare and he dabbles on the side running protection for DefCon.
Rogers' boss on Mr. Robot is Kor Adana, who sports an unlikely CV as a hacker-turned-writer. Adana’s job starts in the writer’s room, where he pitches story ideas and researches hacks to make sure they’re plausible, with support from Rogers and the rest of the team of security consultants. “I’ll reach out to them and ask: ‘this is what we’re trying to do – do you have any better ideas’?” Adana said.
Actor Rami Malek with director Sam Esmail are seen on the set of 'Mr. Robot' in Coney Island on June 16, 2016 in New York City
Actor Rami Malek with director Sam Esmail are seen on the set of 'Mr. Robot' in Coney Island on June 16, 2016 in New York City
Getty/Bobby Bank
Once in production, the team moves beyond talk, testing hacks to see if they actually work, all while snapping screenshots and recording video. “Because we’re going to have to show it on screen,” Adana explained. “We’re going to have to show the code or the software or the formatting,” and that can take multiple weeks to get just right.
“If you screenshot that second [of the show]’s going to be completely accurate,” he said. “That’s a very intensive kind of job.”

This is necessary, given Mr. Robot fans will screenshot the show for careful examination. “You’ll see little groups of people forming on Reddit, taking a look and dissecting what we’re doing,” said Rogers. “So everything we do has to be real.” People of Reddit, they do it for you.
In a way, Adana and his team are the Reddit of Mr. Robot’s writing team – nit-picking to keep it authentic. “The other writers are very respectful of the fact we’re an authentic show and we want to keep it grounded in reality,” Adana said. “However, that doesn’t stop everyone from pitching out crazy ideas. Usually I need to be the bad guy that says, ‘No, that’s not possible. We have to do it this way’.”
Just because a hack is possible doesn’t mean it’s likely a hacker will try it, either. They’re “lazy”, said Rogers, and take the most straightforward route to their goal. The more dramatic hacks are more often the preserve of security researchers, like Rogers himself. That means Rogers’ own real-world hack of a Tesla Model S last year was questioned by the writing team – it’s technically possible, and good TV, but still a bit unlikely for .
However, sometimes the story does get in the way of absolute accuracy. Time is often compressed, as no-one wants to watch Elliot stare at a computer for seven days straight surrounded by cold pizza.Neither Adana or Rogers were keen to discuss the show’s more major missteps, but Rogers admitted there was one hack he “didn’t like” and chortled in agreement at the suggestion it may be episode six’s great escape sequence, which saw Elliot hop onto a prison network via a police car radio to open all the cell doors.
“At a stretch, I’d say it’s plausible,” Rogers said, noting that more odd cases have happened. “There are some fantastic prison escapes I’ve heard of – one guy faxed himself out of prison,” Rogers said, describing how the inmate spoofed release papers to the court, which in turn sent them back to the prison. “He walked out.”
Adana defends the prison break stunt, saying the Stuxnet-inspired hack is possible. “I can justify those steps, I can go through those steps,” he says. “However, we didn’t show every single step, so if you’re watching it...I can see how it could be perceived as something that may be fantastical.”

As silly as the prison break was, it stands out because it’s one of few mistakes on the show – and even then, it’s a far cry from NCSI’s two characters typing on the same keyboard at once. “In this day and age where the average viewer of these programmes is actually quite seriously computer literate, you just don’t get away with that kind of stuff,” said Rogers.
Hacks aside, how realistic are the hackers themselves? Rogers recognises himself in awkward Elliot. “When I grew up and started hacking, I was painfully shy – it was hacking that made me into more of an extrovert,” he said, describing the “big shot of confidence” the power of intrusion gave him and the conversational skills that social engineering taught him.
Elliot’s unlikely to emerge as a social butterfly thanks to his social engineering attempts, but that’d still make more sense than most hacking shows.


Popular posts from this blog

sxhkd volume andbrightness config for dwm on void

xbps-install  sxhkd ------------ mkdir .config/sxhkd cd .config/sxhkd nano/vim sxhkdrc -------------------------------- XF86AudioRaiseVolume         amixer -c 1 -- sset Master 2db+ XF86AudioLowerVolume         amixer -c 1 -- sset Master 2db- XF86AudioMute         amixer -c 1 -- sset Master toggle alt + shift + Escape         pkill -USR1 -x sxhkd XF86MonBrightnessUp          xbacklight -inc 20 XF86MonBrightnessDown          xbacklight -dec 20 ------------------------------------------------------------- amixer -c card_no -- sset Interface volume run alsamixer to find card no and interface names xbps-install -S git git clone xbps-install -S base-devel libX11-devel libXft-devel libXinerama-devel  vim # FREETYPEINC = ${X11INC}/freetype2 #comment for non-bsd make clean install   cp config.def.h config.h vim config.h xbps-install -S font-symbola #for emoji on statusbar support     void audio config xbps-i

download office 2021 and activate

get office from here open powershell as admin (win+x and a ) type cmd  goto insall dir 1.         cd /d %ProgramFiles(x86)%\Microsoft Office\Office16 2.           cd /d %ProgramFiles%\Microsoft Office\Office16 try 1 or 2 depending on installation  install volume license  for /f %x in ('dir /b ..\root\Licenses16\ProPlus2021VL_KMS*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%x" activate using kms cscript ospp.vbs /setprt:1688 cscript ospp.vbs /unpkey:6F7TH >nul cscript ospp.vbs /inpkey:FXYTK-NJJ8C-GB6DW-3DYQT-6F7TH cscript ospp.vbs / cscript ospp.vbs /act Automatic script (windefender may block it) ------------------------------------------------------------------------------------------------------------------- @echo off title Activate Microsoft Office 2021 (ALL versions) for FREE - =====================================================================================&

Hidden Wiki

Welcome to The Hidden Wiki New hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!! Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it. The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with. Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction Points - Clearnet search engine for Tor Hidden Services (allows you