Learn about data exfiltration techniques using social media platforms in this 21-minute conference talk from BSidesLV 2015. Explore the concept of the "sneaky creeper" and its implications for cybersecurity. Discover various modules and tools used for data extraction, including Github, Twitter, and Textsecure. Examine defensive strategies, multichannel capabilities, and message size limits. Gain insights into exfil checksum methods and understand the potential risks associated with social media-based data exfiltration.