Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

What Mr. Robot gets right and wrong about hacking

By Chris Hayner November 9, 2017, 5:49 PM PST

Image
1
of 17

elliott.jpg
elliott.jpg
What Mr. Robot gets right and wrong about hacking

What Mr. Robot gets wrong (and right)!

USA

What Mr. Robot gets wrong (and right)!

For three seasons, Mr. Robot has showcased the gritty world of cybersecurity. And star Rami Malek has put a pop-culture face on hacktivism. But how close does the show get to the realities of hacking?

Actually, the USA series gets more right than you might expect…

USA
10-mr-robotw710h4732x.jpg
10-mr-robotw710h4732x.jpg
What Mr. Robot gets right and wrong about hacking

Right: USB drives as bait

USA

Right: USB drives as bait

In the sixth episode of Season 1, several USB keys are dropped in a parking lot as a kind of bait, and it works. It gives Elliot Alderson access to a prison’s systems. That’s pretty basic Hacking 101, though the success rate is typically around 50 percent.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: The HVAC hack

USA

Wrong: The HVAC hack

In theory, this hack from Season 1, Episode 4 is possible. But it’s pretty unlikely. Its success depends on nobody in the world’s “most impenetrable” datacenter paying attention to suddenly-sweltering temperatures.

USA
What Mr. Robot gets right and wrong about hacking

Right: The Pwn Phone

USA

Right: The Pwn Phone

In Season 2, Elliot gets his hands on a “Pwn Phone,” which he uses to hack into other devices. He calls it “a dream device for pentesters and hackers,” and it was actually real. The phones were created by Pwnie Express, though the company has since removed them from the market.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: Super-duper fast hacking

USA

Wrong: Super-duper fast hacking

Sure, Mr. Robot is a one-hour drama, so showing hacks in real time would be tough. Still, hacking ain’t that quick. For instance, it would take as long as long as 11 hours for a computer to crack an iPhone passcode.

USA
What Mr. Robot gets right and wrong about hacking

Right: Social justice goals

USA

Right: Social justice goals

Elliot breaks laws and invades people’s privacy, but his overall motive is justice, not greed. That makes fsociety similar to that of Anonymous members, who, whether you agree with them or not, consider themselves artists, with the goal of righting wrongs.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: Eerie timing

USA

Wrong: Eerie timing

In the Mr. Robot series premiere, Elliot uses his hacking skills to bring down a child pornographer. And right then: Voila! The police arrive. No hacker’s timing is that good.

USA
What Mr. Robot gets right and wrong about hacking

Right: Court-ordered therapy

USA

Right: Court-ordered therapy

It’s revealed in Season 1 that Elliot attend court-ordered therapy after a hacking arrest. In the real world, hackers aren’t often given that option. But one very famous hacker — Kevin Mitnick — sure was.

USA
hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceablew1456.jpg
hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceablew1456.jpg
What Mr. Robot gets right and wrong about hacking

Right: The terminology

USA

Right: The terminology

It would be simple for Mr. Robot writes to create their own jargon, but instead the series relies on actual hacker terms — everything from rootkit to Tor to daemons.

USA
What Mr. Robot gets right and wrong about hacking

Kinda wrong: The US Cyber Command

USA

Kinda wrong: The US Cyber Command

In the first season, E-Corp officials joined the FBI and the US Cyber Command to learn what Elliot learned from hacking Allsafe. In reality, US Cyber Command is mostly tasked with military support.

USA
1506172875087eps10hellofriendmovanvver14.jpg
1506172875087eps10hellofriendmovanvver14.jpg
What Mr. Robot gets right and wrong about hacking

Right: Everything can be hacked

USA

Right: Everything can be hacked

Mr. Robot characters hack everything from laptops to cellphones to police cars to air conditioners. Some hacks may be more difficult than others, but it’s generally agreed that almost anything with a computer in it can be taken over.

USA
mr-robot-2-season-5514x3764-mask-fsociety-best-tv-series-11893.jpg
mr-robot-2-season-5514x3764-mask-fsociety-best-tv-series-11893.jpg
What Mr. Robot gets right and wrong about hacking

Right: fsociety masks

USA

Right: fsociety masks

Fsociety is a fictional hacker collective, but the group is inspired by real-life hacktivists Anonymous. The fsociety mask is an easy-to-spot tribute to Anonymous members, who often wear Guy Fawkes masks to conceal their identities.

USA
What Mr. Robot gets right and wrong about hacking

Right: Fake identities and social engineering

USA

Right: Fake identities and social engineering

Hackers on Mr. Robot, including Elliot, create fake personas, backed up with faux documentation online, to access forbidden places. In real life, it’s called social engineering, of course, and it’s been around for decades.

USA
What Mr. Robot gets right and wrong about hacking

Right: The DDoS hack

USA

Right: The DDoS hack

One of Mr. Robot’s earliest hacks is also one of the most common in the real world. The DDoS (distributed denial-of-service) attack overloads servers, causing them to crash.

USA
What Mr. Robot gets right and wrong about hacking

Right: The file extensions

USA

Right: The file extensions

Every episode’s title is a filename, complete with an extension. The series premiere, for example, is called “eps1.0_hellofriend.mov.” The series has yet to repeat a file extension type, and they’re all real, from .r00 to .sme.

USA
What Mr. Robot gets right and wrong about hacking

Right: Omegas, LulzSec, what's the diff?

USA

Right: Omegas, LulzSec, what's the diff?

In the show, a hacking collective known as the Omegas gets busted after members get a little too sloppy online — a fate eerily similar to that of IRL Sony hacking collective LulzSec.

USA
nup1780530375.jpg
nup1780530375.jpg
What Mr. Robot gets right and wrong about hacking

Right: The fire sale

USA

Right: The fire sale

The idea of hackers bringing down financial institutions and governments isn’t unique to Mr. Robot; it’s a real worry in real life. It’s debatable whether such a thing could actually happen, but it is a popular topic among hackers.

USA
  • Security
  • Account Information

    Share with Your Friends

    What Mr. Robot gets right and wrong about hacking

    Your email has been sent

Share: What Mr. Robot gets right and wrong about hacking
Image of Chris Hayner
By Chris Hayner
  • Account Information

    Contact Chris Hayner

    Your message has been sent

  • |
  • See all of Chris's content

TechRepublic Premium

  • TechRepublic Premium

    Identity Theft Protection Policy

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Home Office Deduction Guide and Checklist

    There are rules about what qualifies as a home office, what qualifies as a deductible expense and what method should be used to calculate the deduction assuming those rules and qualifications are met. This guide, and the accompanying checklist, from TechRepublic Premium will help you navigate the twists and turns of those regulations to arrive ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Malware

    Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms from TechRepublic Premium will help you grasp the vocabulary that describes malware and the technology that spawns it. From ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Internet of Things Policy

    The Internet of Things continues making inroads in the business world, so organizations should have a defined IoT structure in place to ensure that data and operations are properly secured. This policy from TechRepublic Premium provides guidelines for the procurement, usage and administration of IoT devices, whether company provided or employee-owned. From the policy: Since ...

    Downloads
    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice