COSAS DE HACKER de Aliexpress, de las que te enloquecerás / Cosas locas de Aliexpress + COMPETICIÓN - Summary

Summary

The video discusses various devices commonly used by hackers, including tools for copying keys, night vision goggles, hidden cameras, and more. It highlights their potential dangers and legal implications. The presenter also mentions a giveaway contest for a Samsung Galaxy A21 smartphone. The video concludes by encouraging viewers to participate in the contest.

Facts

1. The host is on the Alex channel and has prepared a selection of items from 'hackers'.
2. Some of these items can be used legally, while others can be dangerous.
3. The host does not recommend directly selecting these items for educational purposes, as users are obliged to share them.
4. The host mentions a conference at the end of the video on the Samsung Galaxy A21 smartphone, which can be won for free.
5. The first item discussed in the 'hackers' universe is for keys and key cards, which resemble a green car village.
6. The host discusses a smart device that allows you to copy data, Griffith, and Jan Efe, a method of automatic identification used in everyday life.
7. The technology can be found in the form of payment cards for public transport or phases for turnstiles.
8. The host warns against using an incentive device to illegally gain access to another person's wallet.
9. The host introduces a device that can copy the same chipperfield and io stores to a base and then simulate it in use.
10. The host mentions that the hyperactive copy process itself takes no more than 30 seconds.
11. The host discusses another device, a hidden camera built into a pen, and its prohibited use for surveillance purposes.
12. The pen writes in a resolution of 1080p and has a slot for an SD card. It also has informative indicators and useful buttons.
13. The host mentions a micro microphone that can be installed anywhere.
14. The host discusses a product that enjoyed immense publicity in 2012 when it sold more than 35 million copies.
15. The product is a small computer the size of a bank card with a quad-core processor.
16. The host warns about a radio station capable of intercepting the signal of specific frequencies, which is illegal.
17. The host discusses various types of lario transmitters, which can be cameras, bugs, and other instruments.
18. The host warns about the dangers of using jammers or chimeres, which can be used for pranks or serious crimes.
19. The host discusses a class of devices called blockers, which can be used to create false access points.
20. The host warns about the dangers of using invisible tools to intercept network information.
21. The host discusses a device called a killer, a USB drive infected with a virus that disables a computer or any other device.
22. The host discusses a container for 10 flash drives with a speed of 90 MB per second, which plays the role of an SSD.
23. The host mentions a wireless model headset that can connect via Bluetooth.
24. The host discusses an endoscope that connects to any smartphone, allowing the user to see what is happening around them.
25. The host mentions an adapter that captures the network signal, which can be used for good or bad intentions.
26. The host discusses a starter kit for a hacker robot that includes basic devices that are essential for hacking.
27. The host encourages viewers to participate in the channel's activities and win prizes.