How Mr. Robot ‘fudged’ its hacks to protect the public
Showrunners debated over how accurate to make the show’s exploits


AMC's Mr. Robot is a modern Robin Hood tale about a gang of hacktivists taking on a morally reprehensible multinational corporation. The show has garnered particular attention for the authenticity with which it portrays hacking and cybersecurity, and showrunner Sam Esmail went to great pains to make sure all of the hacks shown in the series were plausible and realistic up to a point.
James Plouffe, a strategic technologist at MobileIron, was one of many cybersecurity industry practitioners that Esmail brought in to advise the writers on the technical elements of fsociety's hacks and exploits. According to Plouffe, there was some debate among the show's writers and technical experts as to exactly how true to life the fictional anarcho-hacker collective's exploits should be.
"You wanted to get it right, but not right enough that someone could copy," he explained in an interview with IT Pro. "And I don't want to spoil it for folks who haven't seen some of the things that take place in season three, but I remember kicking around some of the ideas to make certain things happen. And there was this debate between those of us who are working as tech consultants about whether or not it was technically feasible, and a little bit of research suggested that it was."
"There were some folks on the side of 'we want to make this hyper accurate'. And my position was, for the safety of total strangers, let's maybe fudge the math a little bit, so that it doesn't become a public safety issue."
It's hard to argue Mr. Robot hasn't had a huge impact in the cybersecurity industry in the years since it first hit screens; various hackers (including black, white and grey hat varieties) have already begun adopting the show's iconography as part of their public personas.
For Plouffe, it's gratifying he gets to be a part of something that resonates so deeply with the cyber security community: "I appreciate it, in the sense that it was great to be part of something that I would have wanted to watch."
He also hopes that seeing the reality of cyber attacks as portrayed in Mr. Robot has helped contextualise cyber security issues for members of the general public, and raise awareness of threats.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"All the things that happened in Mr. Robot are practical, are based on real things. When you see them log into a firewall console, that's actually a piece of Cisco hardware that's been mocked up. So if anything, I hope that people see that the issues are real," said Plouffe.
"A lot of the activities in Mr. Robot hinge on pretty basic stuff, like getting people to do something dumb; pick up a USB drive in a parking lot, take a free CD from a musician, you know, social engineering stuff. Stuff that we're all susceptible to, potentially. I think people can understand those. And hopefully, it also underscored the ease with which some of that can happen and makes people think twice."
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Asus ZenScreen Fold OLED MQ17QH review
Reviews A stunning foldable 17.3in OLED display – but it's too expensive to be anything more than a thrilling tech demo
By Sasha Muller
-
How the UK MoJ achieved secure networks for prisons and offices with Palo Alto Networks
Case study Adopting zero trust is a necessity when your own users are trying to launch cyber attacks
By Rory Bathgate
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz