Linus Tech Tips (LTT) YouTube channel is hacked

Linus Tech Tips (LTT) is one of the largest and most popular technology YouTube channels with 15.8 million subscribers.

  • The channel was hacked on March 23, 2023 by unknown attackers who changed its name, deleted its original videos, and uploaded fake livestreams featuring Elon Musk and Jack Dorsey promoting crypto scams.
  • The livestreams were part of The B Word conference held by Ark Invest in June 2020, but they were edited with overlays linking to fraudulent crypto sites.
  • YouTube suspended the channel for violating its community guidelines, but the hackers also targeted other LTT channels such as TechLinked and Techquickie.
  • The owner of LTT, Linus Sebastian, tweeted that he was aware of the situation, but did not provide any details on how the breach occurred or when the channels would be restored.

The exact method that LTT got hacked is not known, but some of the possible ways that YouTube channels get hacked are:

  • Data breach: The hackers may have obtained the login information of LTT from a data breach of YouTube or another website or app that LTT used. They may have also exploited a vulnerability in YouTube’s system to gain access to the channel.
  • Phishing: The hackers may have sent LTT a fake email or message that appeared to come from a legitimate source, such as a sponsor, a media outlet, or a friend. They may have tricked LTT into clicking on a malicious link, downloading a malicious file, or entering their credentials on a fake website. They may have then used this information to log into the channel and take control of it.
  • Weak password: The hackers may have guessed or cracked the password of LTT by using brute force attacks, dictionary attacks, or social engineering techniques. They may have also used stolen passwords from other breaches that LTT reused for their YouTube account.
  • Cookie theft: The hackers may have infected LTT’s device with malware that stole their session cookies from their browser. Session cookies are data that confirm that the user has successfully logged into their account. The hackers may have then uploaded these cookies to a malicious server and used them to impersonate LTT and access their channel without needing their password.
LTT YouTube channel got hacked
LTT YouTube channel got hacked

To prevent getting hacked, YouTube channel owners should always use strong and unique passwords for their accounts, enable two-factor authentication, avoid clicking on suspicious links or attachments, verify the source and legitimacy of any communication they receive, and scan their devices regularly for malware.

Crypto scams are fraudulent schemes that use cryptocurrency or related technology to deceive people and steal their money or digital assets. Crypto scams can work in different ways, but some of the common ones are:

  • Bitcoin investment schemes: Scammers pretend to be experienced investors who can help people make money by investing in bitcoin or other cryptocurrencies. They ask for an upfront fee or personal information, and then disappear with the money or hack the victims’ accounts.
  • Rug pull scams: Scammers hype up a new project, coin or nonfungible token (NFT) and persuade people to buy it. Then they withdraw all the funds and leave the investors with worthless tokens that they cannot sell1.
  • Fake trading platforms or crypto wallets: Scammers create fake websites or apps that look like legitimate exchanges or wallets, but they either steal the users’ money or credentials, or manipulate the prices and transactions to their advantage.
  • Fake crypto tokens, investments or jobs: Scammers create fake cryptocurrencies or offer fake opportunities to invest in or work with crypto projects. They may use fake celebrity endorsements, fake news articles or fake social media accounts to lure people in. They then ask for money or personal information, and never deliver on their promises.
  • Crypto phishing: Scammers send emails, texts or messages that appear to com from a trusted source, such as a crypto exchange, wallet provider or friend. They try to trick the recipients into clicking on a link, downloading a file or entering their credentials on a fake website. They then use this information to access the victims’ crypto accounts and steal their funds.

To avoid crypto scams, you should always do your own research before investing in any cryptocurrency project, verify the source and legitimacy of any communication you receive, use secure passwords and two-factor authentication for your crypto accounts, and never share your private keys or wallet addresses with anyone.

Would you pay 648 million dollars for two pizzas?

On May 22, 2010, a man named Laszlo Hanyecz made history by purchasing two pizzas for 10,000 bitcoins. At the time, the transaction was relatively insignificant, as the cryptocurrency was still in its infancy. Little did he know that his small purchase would become a legendary story in the world of finance, as bitcoin’s value skyrocketed over the next decade.

This is the original Laszlo’s post where he announces his purchase:
https://bitcointalk.org/index.php?topic=137.msg1195#msg1195

10,000 bitcoin pizza

The Birth of Bitcoin and Laszlo Hanyecz’s Purchase

In 2009, the world was introduced to a new form of digital currency called Bitcoin. Created by an anonymous individual or group of people under the pseudonym Satoshi Nakamoto, Bitcoin was a decentralized currency that operated on a peer-to-peer network called blockchain. Despite its revolutionary potential, Bitcoin had little real-world value at the time.

Fast forward to May 22, 2010, when Laszlo Hanyecz, a programmer from Jacksonville, Florida, decided to use his hard-earned bitcoins to make a purchase. Hanyecz was an early Bitcoin miner, and he had accumulated a significant amount of the cryptocurrency. He offered 10,000 bitcoins to anyone willing to deliver two large pizzas to his house. A fellow user on a Bitcoin forum accepted the offer, and the pizzas were delivered. The transaction was valued at approximately $41, as each bitcoin was worth less than a penny at the time.

The Rise of Bitcoin

Over the next decade, Bitcoin gained mainstream attention and underwent several boom and bust cycles. Its value soared, driven by factors such as growing public interest, increased media coverage, and the entry of institutional investors into the cryptocurrency market. The digital currency reached an all-time high in 2021 when it surpassed the $60,000 mark.

If we consider Bitcoin’s peak value, Laszlo Hanyecz’s two pizzas would have been worth a staggering $648 million, making them the most expensive pizzas ever purchased. Today, May 22 is celebrated as “Bitcoin Pizza Day” by cryptocurrency enthusiasts worldwide to commemorate this historic transaction.

The Legacy of Laszlo Hanyecz

Laszlo Hanyecz’s pizza purchase has become a symbol of the massive growth of cryptocurrency, specifically Bitcoin. It serves as a reminder of the humble beginnings of a digital currency that has disrupted traditional finance and created a new asset class. Hanyecz’s story is often cited as an example of the importance of understanding the potential of emerging technologies and the possible rewards for early adopters.

In conclusion, Laszlo Hanyecz’s seemingly insignificant purchase of two pizzas for 10,000 bitcoins has become a legendary story in the cryptocurrency world. The value of those bitcoins has increased astronomically since that fateful day in 2010, highlighting the incredible rise of digital currencies and their impact on our global financial landscape.

How to use Windows built-in firewall and open ports

FirewallFirewall protects your computer from intrusion by filtering incoming and outgoing traffic. It can be implemented as software or hardware. A hardware firewall is usually a box sitting next to your physical network connection (like DSL or cable modem) and local network computers are connected to it directly or though router or switch.

Internet Connection Firewall (ICF) that is built into Windows is software firewall. This means that it is a software application that runs on your computer and filters network traffic. First you need to enable it and set it up.

Continue reading

How to clear cache, cookies, history, forms and passwords in Mozilla Firefox

Cleaning Mozilla FirefoxSame as Internet Explorer, Firefox stores all visited pages with images and sounds in cache (temporary Internet files). You should clear cache from time to time to allow Firefox to function more efficiently. Of course, if you are concerned about your privacy you should delete from time to time cookies, history, forms data and passwords. If you are having trouble accessing some web site, clearing cache might help.

Continue reading

How to clear cache, cookies, history, auto complete and passwords in Internet Explorer

Cleaning Internet ExplorerTemporary Internet files or cache is folder with copies of all web pages you visited, including images, sounds and cookies. Cache makes Internet browsing faster because browser can display files from cache instead of downloading them. If cache grows to big, it can have negative affect on browsing speed and can make IE act sluggish. If you are concerned about your privacy you should delete cookies, history, auto complete and passwords from time to time.

Continue reading

How to speed up slow network browsing in Windows

NetworkThere is a bug in MS Windows that can slow up network browsing. It can take up to 30 seconds to browse remote computer. Reason of this delay is that Windows is scanning remote computer for Scheduled tasks.

There is a simple registry tweak to fix this problem.

Continue reading