Todayโs article is going to be a more Darker toned one where I elaborate on why I became a professional Hacker, diving more into the deep complexities and mysteries behind my overall skills sets as well as one of the true hidden purposes behind my brand and what it is I aim to achieve with it on top of the many things it does/plans to do already. This article is going to be a bit on the 5 to 6 min read side so do be warned!
๐ Article ๐ Glossary ๐ Catalog ๐ Home ๐ Search ModeTodayโs article is going to be a more Darker toned one where I elaborate on why I became a professional Hacker, diving more into the deep complexities and mysteries behind my overall skills sets as well as one of the true hidden purposes behind my brand and what it is I aim to achieve with it on top of the many things it does/plans to do already. This article is going to be a bit on the 5 to 6 min read side so do be warned! Iโm also going to further elaborate on WHY I identify as a โGray Hatโ Hacker, something Iโve mentioned before but never really dived into much which plays a HUGE role in explaining the overall premise of this article. Iโll brush up on what a Gray Hat Hacker is so that anyone reading this can follow along smoothly, as well as leaving a link to the various Hat Archetypes that define each hacker and their overall purpose. Most people when theyโre looking to get into Hacking/Cyber Security their overall purpose is to either do it for fun or to pursue it as a professional career. Usually itโs a mixture of the two which is also part of the main reason I do it. HOWEVER, like Iโve stated in the main premise, thereโs another hidden reason I do this, and why my skill sets are so broad for what they are.
I want you to pay CLOSE attention to the title of this article, as itโs symbolic and serves a purpose. Fair warning before I begin, this article will contain SENSITIVE topics that might be faint for the heart, so feel free to click off this if this ainโt your cup of tea. I want to experiment with writing articles that address real world matters and how Hacking/Cyber Security applies to it, rather, what we can do as Hackers/Cyber Security professionals to address it.I'll be discussing the following topics in order: ๐ What is a Gray Hat Hacker? ๐ Hunter Hunter ๐ Why I Became A Hacker? ๐ What Inspired me to Hunt Predators? ๐ The Evil HERO You can click on any of the topics to simply check that one out if it interests you! NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!
Here's a quick run down on all the main links that are in the article in case you want to check them out first. ๐ LinkedIn Version ๐ Types of Hackers Article ๐ The One Above All Article ๐ Fighting CSAM Articles ๐ Inspirational Post
Gray Hat Hackers are a mixture of quality traits between White Hat Hackers, whom are good guys, and Black Hat Hackers, whom are bad guys, incorporating a series of ethical and unethical means in order to achieve their objective which tends to be more along the lines of โHacktivismโ for a greater cause or purpose. To put it into better perspective, they are GOOD guys that arenโt afraid to get their hands dirty, hence being in the gray area swaying either way. Their skill sets also tend to be a bit broad while having a certain niche.
A PERFECT example of one would be the infamous โAnonymousโ group, where they target a lot of terrorist groups and corrupt organizations and expose them for the betterment of the world! They do whatever it takes to get the job done incorporating a wide variety of techniques, which allows them to achieve feats the ordinary Hacker/Cyber Security professional might have never thought were possible.
Be mindful, although Gray Hats arenโt afraid to get their hands dirty and will do ANYTHING to get the job done, they donโt usually resort to killing, as they tend to be more on the pacifist side, not ALL, but most in general.
You can find out more about the various "Hats" in this article I wrote here.
Iโve talked about this before in my โThe One Above Allโ article, but one of the main reasons why hackers do what they do is because THEY LOVE the THRILL of the hunt. What it is they like to hunt depends on the hacker which will greatly influence the skill sets they possess.
For example, CTF players that hack on a comptetional level, love the overall thrill of finding the exploit to secure the flag which tests the full limits of their capabilities. Itโs exhilarating knowing youโve pwned a system and have TOTAL control over it, as well as the many secrets it possesses. Itโs even more exhilarating if you apply it on an unethical level and dabble in what you shouldnโt (Iโm NOT encouraging you to do this!)
In this case, since weโre talking about Gray Hats, the thrill of the hunt for us is hunting whatever it is weโre most passionate about when it comes to activism.
The main reason I became a Hacker as well as a Cyber Security professional is to assist organizations that help track down and stop human trafficking operations, as well as anything along the lines of CSAM content distribution and a lot more. In other wordsโฆ.. I HUNT PREDATORS AND AM OBSESSED WITH DOING SO! If you would like to find out more about what CSAM is and why I fight against it, you can find out more about that in this article here. I wrote it a while back to help raise awareness for how end to end encryption assists Child Predators online.
Although there are MANY things I would do to a predator if one were presented in front of meโฆ I need a way to get my hands dirty while keeping it ethical! By working with organizations, even ghost ones for example that assist law enforcement, I can do just that, creating a world safer for women and children, most of which are the main target for these forms of operations.
There are also many other areas of activism I fancy such as hunt
๐ Hunting scammers (Iโm looking at you JOB SCAMMERS)
๐ Hunting domestic violence perpetrators
and a lot more.
Iโve talked about this before, but my best friend was almost a victim of sexual assault and a lot more, where her step father abused her and put her in situations no little girl should have to go through, her mother being one of the many bystanders that allowed this to happen. Thereโs an inspirational video here you should check out if you wanna hear my view points on why we need to teach children how to protect themselves online.
A lot of Child predators exist among us, most of which go unnoticed since their targets are usually those that are unable to defend themselves and or unable to tell when theyโre being taken advantage of. There are also groups of people, usually on the dark net, that create content and distribute it amongst themselves as some sort of fetish party, often getting away with it due to various protocols such as the TOR onion one that assist in protecting their anonymity online.
By hunting predators and exposing their identities as well as how they are able to do what they do, I aim to help clean up the internet and help make it a safer place for Children online. All of this, of course, could also apply to what Iโve stated before about help fighting human traffic operations.
The Evil HERO is a side brand that Iโll be launching in the near future that focuses on partnering with organizations that help combat the things Iโve talked about in this article. It is symbolic for a HERO, or rather, an Anti-HERO that is willing to do whatever it takes in order to fight predatory activities.
Iโll be having side content that will strictly be there, focusing on news and updates regarding various predatory activities and what we can do to stop them.
If you enjoyed this post give it a thumbs up! Iโll be keeping track of whose reacting from now on as there is a โspecialโ reason for it. Just know the more you support my content the more there is in stored!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ