Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

What Mr. Robot gets right and wrong about hacking

By Chris Hayner November 9, 2017, 5:49 PM PST

Image
1
of 17

elliott.jpg
elliott.jpg
What Mr. Robot gets right and wrong about hacking

What Mr. Robot gets wrong (and right)!

USA

What Mr. Robot gets wrong (and right)!

For three seasons, Mr. Robot has showcased the gritty world of cybersecurity. And star Rami Malek has put a pop-culture face on hacktivism. But how close does the show get to the realities of hacking?

Actually, the USA series gets more right than you might expect…

Don’t miss: TechRepublic Senior Writer Dan Patterson’s interview with Mr. Robot’s cybersecurity advisor James Plouffe

USA
10-mr-robotw710h4732x.jpg
10-mr-robotw710h4732x.jpg
What Mr. Robot gets right and wrong about hacking

Right: USB drives as bait

USA

Right: USB drives as bait

In the sixth episode of Season 1, several USB keys are dropped in a parking lot as a kind of bait, and it works. It gives Elliot Alderson access to a prison’s systems. That’s pretty basic Hacking 101, though the success rate is typically around 50 percent.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: The HVAC hack

USA

Wrong: The HVAC hack

In theory, this hack from Season 1, Episode 4 is possible. But it’s pretty unlikely. Its success depends on nobody in the world’s “most impenetrable” datacenter paying attention to suddenly-sweltering temperatures.

USA
What Mr. Robot gets right and wrong about hacking

Right: The Pwn Phone

USA

Right: The Pwn Phone

In Season 2, Elliot gets his hands on a “Pwn Phone,” which he uses to hack into other devices. He calls it “a dream device for pentesters and hackers,” and it was actually real. The phones were created by Pwnie Express, though the company has since removed them from the market.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: Super-duper fast hacking

USA

Wrong: Super-duper fast hacking

Sure, Mr. Robot is a one-hour drama, so showing hacks in real time would be tough. Still, hacking ain’t that quick. For instance, it would take as long as long as 11 hours for a computer to crack an iPhone passcode.

USA
What Mr. Robot gets right and wrong about hacking

Right: Social justice goals

USA

Right: Social justice goals

Elliot breaks laws and invades people’s privacy, but his overall motive is justice, not greed. That makes fsociety similar to that of Anonymous members, who, whether you agree with them or not, consider themselves artists, with the goal of righting wrongs.

USA
What Mr. Robot gets right and wrong about hacking

Wrong: Eerie timing

USA

Wrong: Eerie timing

In the Mr. Robot series premiere, Elliot uses his hacking skills to bring down a child pornographer. And right then: Voila! The police arrive. No hacker’s timing is that good.

USA
What Mr. Robot gets right and wrong about hacking

Right: Court-ordered therapy

USA

Right: Court-ordered therapy

It’s revealed in Season 1 that Elliot attend court-ordered therapy after a hacking arrest. In the real world, hackers aren’t often given that option. But one very famous hacker — Kevin Mitnick — sure was.

USA
hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceablew1456.jpg
hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceablew1456.jpg
What Mr. Robot gets right and wrong about hacking

Right: The terminology

USA

Right: The terminology

It would be simple for Mr. Robot writes to create their own jargon, but instead the series relies on actual hacker terms — everything from rootkit to Tor to daemons.

USA
What Mr. Robot gets right and wrong about hacking

Kinda wrong: The US Cyber Command

USA

Kinda wrong: The US Cyber Command

In the first season, E-Corp officials joined the FBI and the US Cyber Command to learn what Elliot learned from hacking Allsafe. In reality, US Cyber Command is mostly tasked with military support.

USA
1506172875087eps10hellofriendmovanvver14.jpg
1506172875087eps10hellofriendmovanvver14.jpg
What Mr. Robot gets right and wrong about hacking

Right: Everything can be hacked

USA

Right: Everything can be hacked

Mr. Robot characters hack everything from laptops to cellphones to police cars to air conditioners. Some hacks may be more difficult than others, but it’s generally agreed that almost anything with a computer in it can be taken over.

USA
mr-robot-2-season-5514x3764-mask-fsociety-best-tv-series-11893.jpg
mr-robot-2-season-5514x3764-mask-fsociety-best-tv-series-11893.jpg
What Mr. Robot gets right and wrong about hacking

Right: fsociety masks

USA

Right: fsociety masks

Fsociety is a fictional hacker collective, but the group is inspired by real-life hacktivists Anonymous. The fsociety mask is an easy-to-spot tribute to Anonymous members, who often wear Guy Fawkes masks to conceal their identities.

USA
What Mr. Robot gets right and wrong about hacking

Right: Fake identities and social engineering

USA

Right: Fake identities and social engineering

Hackers on Mr. Robot, including Elliot, create fake personas, backed up with faux documentation online, to access forbidden places. In real life, it’s called social engineering, of course, and it’s been around for decades.

USA
What Mr. Robot gets right and wrong about hacking

Right: The DDoS hack

USA

Right: The DDoS hack

One of Mr. Robot’s earliest hacks is also one of the most common in the real world. The DDoS (distributed denial-of-service) attack overloads servers, causing them to crash.

USA
What Mr. Robot gets right and wrong about hacking

Right: The file extensions

USA

Right: The file extensions

Every episode’s title is a filename, complete with an extension. The series premiere, for example, is called “eps1.0_hellofriend.mov.” The series has yet to repeat a file extension type, and they’re all real, from .r00 to .sme.

USA
What Mr. Robot gets right and wrong about hacking

Right: Omegas, LulzSec, what's the diff?

USA

Right: Omegas, LulzSec, what's the diff?

In the show, a hacking collective known as the Omegas gets busted after members get a little too sloppy online — a fate eerily similar to that of IRL Sony hacking collective LulzSec.

USA
nup1780530375.jpg
nup1780530375.jpg
What Mr. Robot gets right and wrong about hacking

Right: The fire sale

USA

Right: The fire sale

The idea of hackers bringing down financial institutions and governments isn’t unique to Mr. Robot; it’s a real worry in real life. It’s debatable whether such a thing could actually happen, but it is a popular topic among hackers.

USA
  • Security
  • Account Information

    Share with Your Friends

    What Mr. Robot gets right and wrong about hacking

    Your email has been sent

Share: What Mr. Robot gets right and wrong about hacking
Image of Chris Hayner
By Chris Hayner
  • Account Information

    Contact Chris Hayner

    Your message has been sent

  • |
  • See all of Chris's content

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Business information analyst

    PURPOSE A large segment of internal and external modern business now takes place on computers, tablets and other mobile devices. The information technology infrastructure that has sprung up around that business can be daunting in its scope. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 27, 2023, 7:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Grant writing guide

    PURPOSE This grant writing guide from TechRepublic Premium will help you identify a grant that fits your idea, build a team to help you compile a proposal, and set a timeline to meet the application deadline. From the guide: BEFORE YOU START This list of steps will help the grant writing process go more smoothly. ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 27, 2023, 6:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Guidelines for building security policies

    PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Artificial intelligence architect

    PURPOSE Recruiting an Artificial Intelligence Architect with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice