[ad_1]
It's no secret that popular movies and TV shows often contain intrigue that, while entertaining, tends to distort reality. For example, you can not really go beyond an explosion, because many action movies would make you believe. Another eloquent example, if you are stopped by the law enforcement authorities, you are not called by a phone call. The authorities can certainly give you one at their discretion, but it is certainly not a right conferred by the law, as Hollywood wants.
That said, one of the most inaccurately described tropes we tend to see – and enjoy – in movies and TV shows is piracy-centric. In light of this, wired Samy Kamkar, security researcher and hacker, recently reviewed 26 famous hacking scenes and then judged their authenticity. Although the description of piracy has become a little more realistic with broadcasts like Mr. RobotOver the past three decades, movies and TV shows tend to be pirated scenes that leave the left field and become downright comical.
What is particularly interesting is that some older titles tend to portray the hacking experience well, while some of the newer TV shows and movies tend to turn everything upside down. 1995 The Internet, for example, accurately shows that Sandra Bullock dismounts a virus, although the interface used by Bullock has been slightly improved for entertainment reasons.
In contrast, Kamkar highlights an excerpt from the TV show Mandrel which depicts some hacking in the Federal Reserve. The hacking clip has a myriad of interfaces and an avalanche of windows filling the screen in rapid and confusing succession.
"In this clip, we see a common theme and pretty interfaces that really have nothing to do with hacking," says Kamkar. "There is too much information coming and going and it's too fast for you to get useful information. You'll almost never see pop-up ads when you program or edit in this way. "
The full video – which contains clips from 26 different hacking scenes – is well-designed and can be viewed below.
Source of the image: Shutterstock
Source link