Did Apple Create This Backdoor for the NSA?

Sdílet
Vložit
  • čas přidán 2. 06. 2024
  • $5 Free Credit 👉 PCBWay pcbway.com/g/gS3qI9
    Timestamps:
    0:00 Privacy?
    0:27 Discovering TRIANGULATION
    1:14 How iPhones were Hacked
    3:13 Who’s Behind It?
    4:20 Apple collusion
    6:50 How can you detect TRIANGULATION?
    7:40 PCBWay
    8:21 Outro
    Sources:
    www.darkreading.com/endpoint/...
    therecord.media/russia-accuss...
    securityaffairs.com/146954/in...
    securityaffairs.com/146939/ap...
    go.theregister.com/feed/www.t...
    www.wired.com/story/kaspersky...
    arstechnica.com/?p=1943622
    www.bleepingcomputer.com/news...
    www.hackread.com/kaspersky-em...
    arstechnica.com/gadgets/2023/...
    www.cve.org/CVERecord?id=CVE-...
    www.fsb.ru/fsb/press/message/s...
    securelist.com/operation-tria...
    thehackernews.com/2023/06/new...
    eugene.kaspersky.com/2023/06/...
    ===============================================
    My Website: www.seytonic.com/
    Follow me on TWTR: / seytonic
    Follow me on INSTA: / jhonti
    ===============================================
  • Zábava

Komentáře • 788

  • @wyattchilton15
    @wyattchilton15 Před rokem +571

    I can confirm I'm sitting down for this one

    • @juusojuuso9214
      @juusojuuso9214 Před rokem +17

      I didn't now I'm all mangled up in my under desk treadmill

    • @Tr3xShad
      @Tr3xShad Před rokem +10

      Move over bro, I brought popcorn

    • @danielreed5199
      @danielreed5199 Před rokem +3

      I was shocked that he suggested that I may be standing in the first place.

    • @usernametaken3098
      @usernametaken3098 Před rokem +1

      anyways

    • @internet_userr
      @internet_userr Před rokem +2

      ​@@usernametaken3098 no need for your comment your comment fulfills no purpose nothing has changed because of your comment your comment didn't change the world the word anyways is unrelated to the video and I don't think anyone really asked because your comment is a bit of a joke really I mean maybe it would be better if you removed it it could actually help people but of course there are always gonna be people like you out there in the world and I do blame you

  • @StephenGillie
    @StephenGillie Před rokem +585

    Not "NSA Made Apple Add A Back Door" but "NSA quietly helped guide Apple's development efforts to other services, and to neglect these weird parts of iMessage, while NSA's other teams worked on iMessage exploits". This is basically the NSA's day job.

    • @Akash.Chopra
      @Akash.Chopra Před rokem +29

      The NSA wouldn't guide apple to do anything. Apple would have literally nothing to gain and everything to lose from that relationship.

    • @StephenGillie
      @StephenGillie Před rokem +66

      @@Akash.Chopra Government funding, government contracts, government approvals, oversight, etc.

    • @tellmey1
      @tellmey1 Před rokem +45

      @@StephenGillie apple is the most profitable and richest company in the world. They do not depend on government for funding or contracts or whatever. Unlike tesla and spaceX

    • @StephenGillie
      @StephenGillie Před rokem +28

      ​@@tellmey1 You'd think the most profitable and richest company in the world could hire better security testing, to find and fix these bugs before they become an advertising blunder like this one. Edit: How do these overwhelmingly expensive projects keep finding it too expensive to fire the wrong people and hire the right people, leading to gaffes in everything from our culture to our banking to our science (quantum relativity lol) to our communications technology here. This whole thing is coming unraveled, it's the Apple Chapter of the Great Unraveling.

    • @internet_userr
      @internet_userr Před rokem +11

      ​@@StephenGillie everyone makes mistakes

  • @WalnutBun
    @WalnutBun Před rokem +112

    Something to note about the lack of persistence: it doesn't really matter if the attacker can just send you another infected message. If the malware regularly calls back, a missed callback could automatically trigger a new message, which (assuming the phone was rebooted) would be received automatically once the phone turns back on.

    • @Fatman305
      @Fatman305 Před 11 měsíci +3

      Exactly. OBVIOUSLY the phone retains settings upon reboots, so the spyware can detect when phone is about to reboot, silence phone, send s.o.s to command server, and on reboot they immediately send that sms if they know the reboot was automatic (software update, not user running out of battery...virtually no user reboots for fun). But then again, I find a logical flaw in the declaration that the spyware disappears on reboot... If spyware gains root access, then it can install any app... It can emulate any user touch... Hence it would download some NSA-controlled app from the App store and remain alive after reboots with no need for further "sms in middle of the night" chance of discovery... I'm basically saying Kaspersky is wrong - they're missing a major piece of the puzzle on how NONE of these SECURITY EXPERTS reported no weird behavior on their phones and the spyware remained persistent for 4 d*** years...

    • @Stitch42
      @Stitch42 Před 11 měsíci +7

      @@Fatman305 you can’t get root access on iOS 15+, the phone just won’t boot if you edit the root, that’s why, also to install an app like u said, you’ll need a core trust bypass exploit and that’s not what’s used here

    • @Fatman305
      @Fatman305 Před 11 měsíci

      @@Stitch42 So basically just imessage is hacked and only data imessage could gain is at risk (file attachments etc)? So they couldn't really listen in via mic, see your email, etc?

    • @godwinojeiwa
      @godwinojeiwa Před 11 měsíci +5

      ​@@Fatman305 . If you have full access control of imessage, you could simply turn the mic on or off at will.

    • @Jermainelamar
      @Jermainelamar Před 11 měsíci

      @@godwinojeiwa but when your mic is turned on on an IOS, a yellow light appears in the sensor beside your camera. So you will know if someone is spying via mic

  • @kimmeex
    @kimmeex Před rokem +73

    "It's easier to fool people than convince them they've been fooled" - Ronald Reagan

    • @ak5659
      @ak5659 Před rokem +6

      While I believe Reagan said this, I think LBJ was the one who said it first.

    • @orion10x10
      @orion10x10 Před rokem +2

      Very fitting coming from him

    • @SunBlissDreams
      @SunBlissDreams Před rokem +1

      ⁠@@ak5659 mark Twain actually

    • @Randelia
      @Randelia Před 11 měsíci

      Mark Twain

  • @atpray
    @atpray Před rokem +285

    Since this kind of exploit has already happened before, it is very unlikely that Apple included a backdoor. It might just be another bug.

    • @npoaccount9154
      @npoaccount9154 Před rokem

      I trust kaspersky, they ain't lying. With the increasing survelience in the US alone (passing of fancy new data privacy compromising laws) I'm sure as hell this is intentional by apple. Afterall, almost every journalist out in the wild uses an iPhone. The US goverment has some sweet sweet data

    • @ujjvalw2684
      @ujjvalw2684 Před rokem +86

      Look its a glowie y'all

    • @shapelessed
      @shapelessed Před rokem

      @@ujjvalw2684 Trust me, unless you're a software developer, you've got no idea what little details can lead to huge exploits.
      Intentional or not, we probably won't ever know for certain. On one side it could be true, which is very likely, but on the other side what can also be true is Russians trying to make a mess in the media so they can do their job in the shade of the drama that could follow the news such as this. It's wiser to look at both sides.

    • @fracturedrealitygaming1326
      @fracturedrealitygaming1326 Před rokem

      @@ujjvalw2684 or someone who just uses common sense? Do you not remember the entire debacle with the FBI regarding the San Bernardino shooter and his iPhone? You know, where the fbi had to go to an Israeli state sponsored hacking group to get access?

    • @doingbettereveryday
      @doingbettereveryday Před rokem +14

      ​@@ujjvalw2684 Can you please tell me why everyone calls them "glowies"? Sorry for being a noob/out of the loop.

  • @RealCyberCrime
    @RealCyberCrime Před rokem +150

    A video on FBI viruses and keyloggers that mainstream anti viruses can't legally detect would be cool (magic lantern, cipav, carnivore)
    I’m thinking about making a similar video

    • @anteshell
      @anteshell Před rokem +19

      "Can't legally detect." Now this is the place where you refer to the relevant law to not make yourself a fool.

    • @furkanveliisk4113
      @furkanveliisk4113 Před rokem +1

      subscribed and waiting for the said video

    • @Anon_1003
      @Anon_1003 Před rokem

      @@anteshell They literally cited their sources?

    • @anteshell
      @anteshell Před rokem

      @@Anon_1003 what are you, five? "Trust me bro" is not a source. "Law" is not a source. Neither is listing the names of some random software.
      I'm not sure if you blatantly lie or are just too stupid to think you are in a place to tell anyone what a "source" means when knowing shit.

    • @CrittingOut
      @CrittingOut Před rokem

      @@strapsgamingvids yes, similar to XKEYSCORE

  • @fredrikzels2637
    @fredrikzels2637 Před rokem +7

    I just love Seytonic and his infosec news!! Keep up the great work!!

  • @blimeycrikey
    @blimeycrikey Před rokem +65

    Lets face it, there's no such thing as privacy in today's world.

    • @Swaeggi
      @Swaeggi Před 11 měsíci +6

      Was just looking for this..
      Best part and most comedic part ..people share their whole life’s on social media all on their own.. but complaining someone gets access to their data 😂😂

    • @dodo19923
      @dodo19923 Před 11 měsíci

      @@Swaeggi It's why i stick to anonymous comments like here on youtube. My facebook is a dead account and has been for 5 years now. Haven't posted, liked, shared or even DM'd on there since i gave it up. Not one social media account apart from that has my actual name/details on and that's how it'll stay.
      "BuT HoW Do yOu lIvE WiThOuT PoAsTiNg aLl dAy EvErY DaY On fAcEbOoOoOk???"
      Pretty well actually. I work and go outside and live in the real world lmao😂

    • @entertain8648
      @entertain8648 Před 11 měsíci +7

      Privacy exists, but you have to go to the neardy side.

    • @amentco8445
      @amentco8445 Před 11 měsíci +7

      ​@@Swaeggi most actually caring about their privacy don't overlap with social media sellouts.

    • @raybod1775
      @raybod1775 Před 11 měsíci

      There is no privacy on the phone and anything connected to the internet. Anything completely unplugged is safe.

  • @pauldean9671
    @pauldean9671 Před 11 měsíci +7

    I enjoy the way you explain complex cyber topics in a simple and accessible way. As you say these claims are unlikely.
    The best advice I saw about these sorts of exploits was to restart your phone if you receive an unusual text. Lockdown mode of course would block many of these exploits.

  • @Alexander-ix2jp
    @Alexander-ix2jp Před rokem +144

    Everything based in the US will always be subjective to US laws, privacy related concerns, politics, pantents, and yes even surveillance. Apple, Microsoft and more have to comply and grant access, and the ppl purchasing these products are willingly accepting this too - even outside of US territory. Russia is onto something here. Even Linus Torvalds father and the man himself have stated being approached by US surveillance agencies to open their doors for US surveillance / agendas, which is now even easier than before seeing how Linus is now living in the States.

    • @internet_userr
      @internet_userr Před rokem +4

      Im not reading that long paragraph lol

    • @notcrediblesolipsism3851
      @notcrediblesolipsism3851 Před 11 měsíci +59

      I read it, it wasn't long and it was interesting. Give it a go, you can do it, we believe in you 😊

    • @daleblomgren7527
      @daleblomgren7527 Před 11 měsíci +18

      @@internet_userr lol enjoy grasping nuanced discussion

    • @TomTom-gx1sm
      @TomTom-gx1sm Před 11 měsíci +3

      Source for Linux being contacted ?

    • @Alexander-ix2jp
      @Alexander-ix2jp Před 11 měsíci +14

      @@TomTom-gx1sm I quote: "Far from being a rumour, word of the approach comes via Linus’ father, Nils Torvalds.
      As a Member of the European Parliament (MEP), Nils was present at recent committee inquiry held on the “Mass Surveillance of EU Citizens”. Here, representatives from a number of companies named in documents leaked by NSA whistleblower Edward Snowden were questioned about their own (alleged) involvement.
      Following a question put to a Microsoft spokeswoman by Pirate Party MEP Christian Engström on whether the company willingly include “backdoors” for the NSA in their system, Nils Torvalds MEP said:
      When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer …everybody understood that the NSA had approached him.
      If that sounds familiar to you then you might have seen the snippet on CZcams. Linus went on to insist that he was joking, and that the NSA had not approached him.
      But, speaking at November 11th’s inquiry, his father seems to think otherwise.
      Following on from allegations that Google, Yahoo!, Facebook and, indeed, Microsoft are among the many companies wilfully cooperating with the agency to provide “backdoor” access to their systems, this revelation is far from earth-shattering. In fact, is makes sense in the grand scheme of things. After all, why wouldn’t the NSA ask Linus to do this?
      While Nils doesn’t explain how Linus responded - I’d like to think it involved two fingers - we can be sure that it, at the very least, involved an explanation of how open source prevents something like that being possible.
      If any holes were left around for the NSA’s overly-long tentacles to creep into, you can bet your bottom dollar that they’d have been found, exposed and rooted out long before now."
      End of quote. Just one snippet from Omgubuntu, but there are many more, see Google for mainstream and other sources that go deeper down the rabbit hole for more info on the subject. That said, the last part is pretty amusing to me, considering how old security exploits, some of which went undetected and are many years old, have been found in recent years, meaning that there is no 100% security - ever. There is "more secure" but no "completely immune or 100% secure". In other words, I believe it's totally possible that there are security holes left open to exploit and I believe there always will be.
      There is a video about Nils, feel free to check it out. 👍🏻

  • @onemoreguyonline7878
    @onemoreguyonline7878 Před rokem +8

    "Privacy" is actually a registered trademark for a service, much as "100% Beef" is a McDonald's product.

  • @1manorgy
    @1manorgy Před rokem +32

    I dunno if it would ruin Apple in the unlikely event they did cooperate willingly, consaidering how little people seem to care about these things, and how readily these news get swept under the rug

    • @paarker
      @paarker Před rokem

      Secret FISA courts mean they have to comply and cannot tell anyone.

    • @babybirdhome
      @babybirdhome Před rokem +4

      This is false. It would be true if Apple hadn't made any statements, but they did make a statement, and an incredibly damning one if they had actually done something like that. They would be fully legally liable not just for compromising every customer's privacy and security in violation of their own terms and contracts, but it would also constitute just flat out fraud at a scale that would end the company once it hit a court and a judge - even one friendly to Apple. Their statement didn't leave any legal wiggle room, and the only way the legal department at a company like Apple would _ever_ sign off on that kind of statement would be if it were 100% factual.

    • @1manorgy
      @1manorgy Před rokem

      @@babybirdhome Sure, and then they'll have to pay a sum that amounts to a slap on the wrist at best, because Apple actually being ruined means a bunch of exonomies also get ruined, which nobody in charge of anything really wants or is in a position to allow. There'll be a little hullabaloo about it for a week at best and then the news cycle will move on and everything will be forgotten except for the part where precedent gets set that you can basically just do this semi-publicly and get away with it. It's just not happening, my guy.

  • @NateTmi
    @NateTmi Před rokem +5

    it is more likely that regardless of what backdoor bug is there or is fixed/removed that they would find a way if they had the need for such a backdoor. They can request information to find such explodes regardless of if it was intentional or not. They have the authority to at least ask, not for the backdoor itself but for information that could lead to such a thing. No system is perfectly protected.

  • @rkvkydqf
    @rkvkydqf Před rokem +11

    6:35 As far as I know, Aurora isn't their own OS, but a licensed local brand of Sailfish by Jolla, a Finnish company, a niche mobile Linux OS built for paranoid enterprises that is mostly open-source.

  • @JohnDlugosz
    @JohnDlugosz Před rokem +54

    What if it's not "Apple" the company, but individual developers working _at_ Apple?
    They could be blackmailed into introducing mistakes, or enticed into reporting any found flaws to the external agency and not reporting it (or fixing it) at work.

    • @anon_y_mousse
      @anon_y_mousse Před 11 měsíci +19

      Or paid to introduce mistakes.

    • @Fatman305
      @Fatman305 Před 11 měsíci +5

      I think it would be a risky move on the NSA's part. It's MUCH less risky for them to hack the Apple employees life (all dig devices) and cause him to infect Apple work machines, so the NSA can see the actual source code. With that, they can EASILY find numerous exploits... If GPT can do it, well, the NSA had GPT-4 level AI probably 5 years ago already. Basically I'm saying with the source code, but maybe now even with binaries, the NSA can find numerous exploits... They probably use 3 out of 100 they have at the "exploit bank"...

    • @c5cha7
      @c5cha7 Před 11 měsíci +2

      The software goes through pr reviews and QA testing and apple also have pair programming so it'd mean the whole dev department would have to be in on it which is unlikely.
      I imagine the NSA have an internal bounty they use to employ well known hackers, this way the exploit never gets exposed externally until someone picks it up like Kaspersky.

    • @anon_y_mousse
      @anon_y_mousse Před 11 měsíci +2

      @@c5cha7 How many employees do you think they employ that can read IOCCC entries and figure out what's going on? Sure, they don't use C, but it's possible with most languages to obfuscate them in that way. Do it right and people might not understand that they're looking at a security hole, especially considering how many bugs there are that have decade long lifespans.

    • @c5cha7
      @c5cha7 Před 11 měsíci

      @@anon_y_mousse but they don't need to, they have unit tests and code reviews before the code even gets compiled? And PR reviews require more than one approval so again it'd be very hard to miss, even then, if you overcomplicate code to hide something it's so easy to spot and your linters would pick it up and quality gates would flag it...

  • @carrioncrow8191
    @carrioncrow8191 Před 11 měsíci

    Good updates, I love this channel, even if I get to the videos a little late

  • @mohamadsami7131
    @mohamadsami7131 Před 11 měsíci

    Thanks for sharing this!

  • @chloeleo
    @chloeleo Před rokem

    loving these longer videos

  • @alethephobe7586
    @alethephobe7586 Před rokem

    Great video, thank you.

  • @funil6871
    @funil6871 Před rokem

    Great video seytonic, you have a nice voice XD

  • @isbestlizard
    @isbestlizard Před rokem +6

    Maybe. How many days has it been since the latest 'Oopsie doopsie we accidentally left some hard-coded back door credentials in our router operating system!' Cisco statement?

  • @diesertesch
    @diesertesch Před rokem +84

    I think it's pretty naive to think that the us government couldn't force apple to behave in their favour.

    • @kiiturii
      @kiiturii Před rokem +17

      force? nah. coerce? maybe

    • @ko-Daegu
      @ko-Daegu Před rokem

      6:40 same could been said about Stuxnet and Microsoft with NSA
      but guess what Microsoft didn't batch the vul deliberately waited so NSA can spread the worm

    • @momgetthecamera981
      @momgetthecamera981 Před rokem

      you know what's naive OP? believing anything that comes out of russia

    • @johanngambolputty5351
      @johanngambolputty5351 Před rokem +1

      @@kiiturii potato potado

    • @Anon_1003
      @Anon_1003 Před rokem

      Give them enough money, and they’ll do it.

  • @ashishpatel350
    @ashishpatel350 Před rokem +22

    Apple was in on it. Their privacy marketing is just marketing they don't care

    • @IdentifiantE.S
      @IdentifiantE.S Před 11 měsíci +2

      Fr

    • @abcdef-fo1tf
      @abcdef-fo1tf Před 11 měsíci +3

      even the prism leaks show apple cooperating with NSA, why is seytonic ignoring this?

    • @Anon_1003
      @Anon_1003 Před 11 měsíci +1

      @@abcdef-fo1tf Exactly, they were considered a strategic NSA partner by the agency.

    • @runed0s86
      @runed0s86 Před 11 měsíci +1

      "Macs don't get viruses" lol

  • @Hydra-BR
    @Hydra-BR Před rokem

    that "maybe" "probably" at the end made me laugh 🤣

  • @0SPwn
    @0SPwn Před 11 měsíci +4

    Extremely interesting. Though I do not see why I’d be of any importance to the NSA if they’re behind this, my iPhone does show an error every time I try to update and as someone in security, I’m intrigued why. Time to backup and shift through logs!

    • @anon_y_mousse
      @anon_y_mousse Před 11 měsíci +2

      If you really do care about security, just don't keep anything on your cell phone of any importance, and especially don't use 2FA with anything through your cell phone.

    • @Fatman305
      @Fatman305 Před 11 měsíci +1

      ​@@anon_y_mousse The exact opposite. I trust my phone way more than all PCs, even my hardened main PC. My concern are commercial hackers, not state sponsored spies... Those can get into any target's secrets, no matter where they're kept.
      But you're right about 2fa via sms. That one is a big no-no mainly due to the sim-swap attack vector.

    • @0SPwn
      @0SPwn Před 11 měsíci +1

      @@anon_y_mousse Nothing on my phone is of importance though I’d rather not be pwned regardless. Just got to find the time to look into it, doubt it’s me being pwned.

    • @anon_y_mousse
      @anon_y_mousse Před 11 měsíci

      @@Fatman305 Interesting, considering how many chips are made by foreign companies in foreign lands that go into your cell phone compared to your desktop computer. Although, to be fair, neither should be trusted because even American companies can't be trusted.

  • @cedricvillani8502
    @cedricvillani8502 Před rokem +11

    Do a story about the long (2016) forgotten AUDIO hack no being used in Taiwan by a company called SenseTime, using audio to take pictures (Ultrasonics and Array mics etc..)

  • @grandsome1
    @grandsome1 Před 11 měsíci +3

    I don't think the NSA needs Apple's permission to get inside info from the company nor need their permission to hack them and their products.

  • @anon_y_mousse
    @anon_y_mousse Před 11 měsíci +4

    If, and I stress the if, if Apple collaborated with the NSA to add a backdoor, it will do nothing to their bottom line. They'll keep doing what they're doing and the sheep will keep buying it. In fact, in a sane world, whether it's due to negligence or intentionality shouldn't matter one bit and it *should* affect their bottom line drastically, but we all know we don't live in a sane world. The sad fact is that Android devices aren't any more secure, by default, but if one really cares one can make them hardier. However, we can't even be sure about a proper Linux phone, i.e. using a mainline build of the Linux kernel, because the chips were mostly manufactured by either an enemy state or by a US company where the NSA could influence them to add exploits anyway.

    • @PumpkinPanda-
      @PumpkinPanda- Před 11 měsíci

      I am only saying PRISM to that. Bottom line wasn't hurt

  • @NoahNobody
    @NoahNobody Před rokem +3

    I would like to be in control of my device. It would be good to be able to simply removing any feature of the phone, like SMS.

  • @allezvenga7617
    @allezvenga7617 Před 11 měsíci

    Thanks for your sharing

  • @kcnl2522
    @kcnl2522 Před 11 měsíci

    0:20 oh really????? Never thought of that before, wow.

  • @brandonw1604
    @brandonw1604 Před rokem +18

    They can set behaviors of the phone based on geo-location. I wouldn't put it passed them to set every iPhone in Russia to have the backdoor.

    • @lpnp9477
      @lpnp9477 Před rokem +2

      If they do it for Russia what's to stop them from doing it everywhere?
      That's like saying oh I'll just have one chocolate when the whole box is up for grabs

    • @brandonw1604
      @brandonw1604 Před rokem +3

      @@lpnp9477 I agree. It is shady.

    • @Fatman305
      @Fatman305 Před 11 měsíci

      But Kaspersky tells you they only found it at few high profile individuals. Why would they risk earlier-than-absolutely-necessary discovery by infecting indiscriminately, then inevitably hitting some very smart and curious Russians that'll blow your undercover work 1 month in, instead of the ACTUAL FOUR YEARS. In a word, no, spy agencies are usually very picky with who they infect. No idea why they went crazy with Kaspersky employees. I guess at least one of those employees holds the keys to some critical secret knowledge (world war, wmd level), and they don't know which employee it is, so they have to spy on them all...

  • @elekktrikk_home_video
    @elekktrikk_home_video Před rokem +5

    They didn’t encrypt the icloud as result of the encryption wars and delivered data when subpoenaed. Why shouldn’t they comply if asked with the necessary persistence to make iMessage accept psd or some other format, which then allows for exploits.

  • @tytalksYT
    @tytalksYT Před rokem +2

    Privacy is core to their work...... UNLESS it's nsa or gov that wants something then it's backdoor

  • @stash2823
    @stash2823 Před rokem

    Usually i stand up when i watch videos but since you said to sit down.. well.. i sit down

  • @AradijePresveti
    @AradijePresveti Před rokem

    Yes!
    Next question

  • @PumpkinPanda-
    @PumpkinPanda- Před 11 měsíci +8

    I mean wasn't apple literally part of the NSA's PRISM program that did exactly that back in 2012? It's not hard to believe this is still happening

  • @aquarianking2336
    @aquarianking2336 Před 11 měsíci

    I can confirm as well I will be sitting down for this one

  • @AP_HITLER
    @AP_HITLER Před rokem

    I'm laying down for this one we love you syi❤❤

  • @HydrarDraconis
    @HydrarDraconis Před 11 měsíci +3

    "They can't force apple to do something like that", Have the US removed the patriot act and gag order provisions yet? If they haven't, all they need to do is force that on one or two apple employees under threat of lifetime in prison and apple can't say no, or the employee personally gets to take the hit.

  • @iyeetsecurity922
    @iyeetsecurity922 Před rokem +3

    Basically, learn your way to being able to keep secure yourself, because there's nobody else you can trust.

    • @Walter_
      @Walter_ Před rokem +1

      Yeah that's a good idea.
      Simplest route to a safe phone i can think of is:
      - Look for an open-source android OS
      - Inspect the source code for backdoors
      - Disable and enable the specific features you want
      - Flash it to your phone, overwriting the bootloader, recovery image, kernel, etc, in the process
      I don't recommend this for everyone
      since this level of security is only really required for people in dangerous positions
      like being a high-tier trader, celebrity, government person, etc.
      You could still do it for fun though, so you can help others if they need it
      or if you accidentally become a high-value target yourself.

    • @Fatman305
      @Fatman305 Před 11 měsíci

      @@Walter_ I side with GPT-4 on this. Both choices are equally hackable by state sponsored hackers, and against lower level hackers, a cautious user would be equally protected.
      Would an open source android OS be more secure than latest closed source iOS? Will it be easier for an advanced hacker to find exploits in one of them? Use your knowledge of historical actual hacks of high profile individuals and what they could have done to prevent it.
      Whether an open-source Android OS is more secure than a closed-source iOS can depend on several factors, including how each system is maintained and updated, the security practices of the user, and the specific threat model the user faces.
      Historically, both Android and iOS have had vulnerabilities, and both have been the target of attacks. Android, being open-source, allows anyone to inspect its source code for security flaws. This transparency can lead to earlier detection and patching of vulnerabilities, making the system more secure. However, this also means that potential attackers can inspect the code for vulnerabilities, potentially making it easier to find and exploit them. Furthermore, because Android is more open, it allows users (and potentially malicious apps) more freedom to modify the system, which can introduce additional security risks.
      iOS, on the other hand, is closed-source, which means that only Apple and approved developers can inspect its source code. This makes it harder for potential attackers to find vulnerabilities, but also means that users and independent security researchers have to trust that Apple is doing a good job of maintaining security. Apple has a good track record in this regard, and iOS is generally considered to be secure. However, iOS has still been the target of successful attacks, and high-profile individuals have had their iPhones hacked.
      Many security experts would argue that the most important factor in securing a device is not the choice between Android and iOS, but rather how the device is used. Good security practices, such as keeping the device updated, only downloading apps from trusted sources, not clicking on suspicious links, and using strong, unique passwords, can significantly reduce the risk of being hacked.
      As of my knowledge cut-off in September 2021, one of the most famous hacks of a high-profile individual was the 2016 hack of John Podesta, the chairman of Hillary Clinton's presidential campaign. Podesta fell victim to a phishing attack, which tricked him into entering his email password into a fake Google login page. This allowed the attackers to access his email account. This attack could have been prevented by using two-factor authentication, a security measure that requires a second form of verification in addition to a password. In this case, the choice of operating system (Android or iOS) would not have made a difference.
      There have also been targeted attacks against specific individuals that have exploited vulnerabilities in both Android and iOS. For example, in 2020, it was reported that sophisticated spyware developed by the Israeli company NSO Group was being used to target human rights activists and journalists. The spyware, known as Pegasus, could exploit vulnerabilities in both Android and iOS to gain full control of a device. These attacks are difficult to prevent because they exploit previously unknown vulnerabilities, known as zero-days, which have not yet been patched by the software developers. However, they are also very expensive to carry out, and are usually only used against high-value targets.
      In conclusion, there is no definitive answer to whether an open-source Android OS or a closed-source iOS is more secure. Both have their advantages and disadvantages, and both have been the target of successful attacks. The most effective way to secure a device is often to follow good security practices, regardless of the operating system.

  • @Omegashotgun
    @Omegashotgun Před 10 měsíci +1

    Misread NSA as NASA in the headline. I was very concerned what the spacemen wanted to do with my personal data for a moment.

  • @Wayzor_
    @Wayzor_ Před rokem +2

    FYI. They don't need a backdoor.

  • @jim9463
    @jim9463 Před rokem +2

    Being a diplomat is scary

    • @lpnp9477
      @lpnp9477 Před rokem

      As though they aren't surveilling citizens of every country

  • @orion10x10
    @orion10x10 Před rokem +2

    I’m shocked, shocked I tell you! Well, not that shocked.

  • @Blarnix
    @Blarnix Před 11 měsíci

    Oh boy, here we go.

  • @N3CR0LICH
    @N3CR0LICH Před 11 měsíci +1

    This popped up on my CZcams feed and peeked my interest.
    In the video there is no mention of which iOS this effect or referenced in kasperkey article. Seeing as this video was only posted 5 days ago. I figured pretty recent update. Not quite from the little googling I did. iOS 15.7 is the latest this has been found on.
    If those executive people hadn’t updated there phone in 9 months. Then that’s on them.

  • @alexander_adnan
    @alexander_adnan Před 11 měsíci

    Damn it … man. Its 4am .. getting news like this one .. my day, week and month have a new agenda now .

  • @Brahmdagh
    @Brahmdagh Před rokem

    Shocking

  • @max_ishere
    @max_ishere Před 11 měsíci

    NSA: sends a message
    User: reboots

  • @TheChocolatBlanc
    @TheChocolatBlanc Před rokem

    What a surprise…

  • @zyxwvutsrqponmlkh
    @zyxwvutsrqponmlkh Před 11 měsíci +3

    We know beyond a doubt that Microsoft has included NSA backdoors. And Apple would not have to do so willingly, they could be given a sealed warrant with a gagged order. FISA courts have previsions for just such things.

    • @aaaaaa-hh8cq
      @aaaaaa-hh8cq Před 10 měsíci +1

      Funny how you think apple doesn't profit from working with the government. I prefer android a 100 times over the whole IOS mess. Android is open source , and that means a lot of experts and casual users will be checking the code and fixing the vulnerabilities and as a result it has very little serious security bugs. IOS is closed source , that means there will be sh*t ton of exploits all over it. Normal users won't be able to inspect the code and it's hard for them to reverse engineer the code while hackers wouldn't have a problem at all. When a hacker finds an exploit on IOS , if they keep it to themselves and not report it to apple, that means the exploit will be there for a LONG time and the hacker can do anything with it..

    • @Living_Dead_Girrl
      @Living_Dead_Girrl Před 7 měsíci

      Yep. Plus Apple has repeatedly lied about patching major exploits its been made aware of for over a decade, that in practice, act as a “backdoor” or zero day exploit. Apple’s been pushed by cyber security research orgs, human rights orgs, and yes, even the non-Spook side of the US government to *patch that ish* - but cyber security firms like the Hacking Team, Fin Fisher, and yes, the Tony Blair owned NSO Group (founded in Israel under the IDF in 2008, sold to shell corp in San Francisco in 2012 - now NSO Group’s based in Jordan and CEOs are a former-British PM & his wife) fought back with money. Apple likes money, it’s a corporation. These tools have been used to spy on Congress - its not as simple as being for or against the American government. The NSA, initially a temporary war time institution under the State Dept & Pentagon, became a permanent program shortly after the CIA began in 1952 (just in time to do Cold War stuffs). Now it operates giving illegally collected data on American citizens (violation of 4th Amendment regardless of FISA courts, due to lack of transparency & rubber-stamping Judge appointments) to primarily the Dubbya created Dept of Homeland Security and the CIA. Neither is allowed to spy on American citizens… but no one can reform or control the CIA - modeled after British MI6, who convinced the rogue elements in the State Dept (i.e. the Nazi sympathizers working to undermine FDR at the heigh of WWII) that the OSS should be made a permanent fixture in “peace time,” but be exactly like them.
      See the movie: *The Good Shepard* - extremely underrated, but is the most honest and revealing film ever [publcily] released outlining exactly how the CIA came to be. It was panned by critics for reasons that can only be explained by attempts to suppress and censor the film. Anyone can see it was beyond Oscar worthy.
      Now, the bigger concern, quite frankly, are the institutions far bigger than the NSA, that the NSA was modeled after - primarily, the British *GCHQ* . All of Snowden’s disclosures on the GCHQ were forcibly destroyed by the founders of The Guardian, one of the two people entrusted with the only copies Snowden made, since he had to destroy his own before traveling outside of Hong Kong so they wouldn’t get into the wrong hands. The Guard then idiotically opted to just let grifter, and secret Children of God (Australian Nazi Youth cult made of mostly kidnapped blonde children and nurses working in maternity wards known as “Aunts” - the inspiration for the name used for the enforcers in The Handmaid’s Tale), Julian Assange, turn their news room into a zoo where he’d use the powerful information shared by altruistic Whistleblowers, into selectively outing “secrets” to exact revenge on a country he hated, but rode the coattails of enough legit activists to convince us for a good while that he somehow cared about “rescuing” our democracy. This was the op where he released hundreds of thousands of underacted diplomatic cables, one of several big scores he successfully coerced out of very vulnerable isolated Chelsea Manning (who only intended to whistleblow on the drone operations and that infamous incident she witnessed of Reuters journalists being targeted, but was convinced to go back and access specific databases approx 5 times until Assange got ~300,000 pages of classified documents). This opened up The Guardian to massive liability, lawsuits, and criminal threats by the British government - preventing them from reporting on the GCHQ findings, and “settling” out of court by agreeing to destroy the highly encrypted drive where Snowden’s entire archive lived. Can’t recall if it’s “Risk,” or a different documentary, but one of the Assange focused documentaries captures the moment The Guardian co-founders take a drill to the hard drive.
      And then, of course, there’s Russia’s own NSA - *SORM* …which the public knows far less about. Russian government likes to distract. All of these operations go against humanity, but I can’t suspend my disbelief enough to _ever_ hear from a Brit or a Russian about how evil the NSA is when they’re arguably running operations far more expansive, and better “utilized.” The issue with the NSA is the privatization by putting it in the hands of Private Contractors. Snowden was working as a contractor for Dell when he copied all that data off the servers, and researched Journalists to disclose to, after spending months researching and gauging who had the personality type that would willing to publish findings from it no matter what. Greenwald was actually brought in by Laura Portis. While many powerpoints outlined diff NSA programs, like XKEYSTORE, PRISM, etc - it collected too much data, too much noise, and greedy private contractors will never give the manpower needed to create dystopian databases reaching the level of effectiveness like the CCP has. Capitalism, in this way, stifled the NSA’s ability to be as powerful as the CIA wanted it to be. And once the whistle was blown by Snowden, they could no longer operate in the shadows and move freely, like the GCHQ & SORM, and the rest presently still do. GCHQ has ALL of the NSA’s data in real time, under the Atlantic agreement (whatever it was officially called) between the US & UK to “openly share” mass surveillance with each other. On the NSA’s end, this was a loophole to get around the laws banning it from wiretapping American citizens by funneling it thru British GCHQ. A pretty weak loophole that obviously wouldn’t hold up to legal scrutiny. The open sharing never ended. GCHQ could swallow the NSA in one tiny gulp. Real power is secret power. Hence why the FISA courts were quite powerful, until these literal secret courts were brought into the harsh light of day.
      Anyway, people need to start going back 10 years ago, and fully appreciating and examining the Snowden disclosures, the documentaries, the reports in The Guardian, and ignoring the red herring that was “WikiLeaks.” You’ll find it informs more about today, and and provides far more information than anything written in the last 5+ years. Russia’s SORM was in the Snowden leaks. Watch the Snowden Biopic for tons of Easter eggs and real world ish. Like the fact that the NSA was behind the infamous STUXNET operation… and when caught by the Iranians due to their own extreme incompetence (it could’ve otherwise secretly hid in their nuclear reactors never being detected… disrupting their nuclear weapons in the safest way possible should they ever use them, in the fallout of the horrible “Iranian Nuclear Deal”). In the film, right in front of Snowden, the head of that program said, “we’ll just blame it on the Israelis” in order to misdirect the blowback that could’ve thrown us into yet another war, or worse.
      Tangential, but important to take this further than Apple - a willing participant that’s own Privacy Policy states they will hand over your iCloud data with or without a warrant when they feel a compelling reason to give it, that they hold a copy of your decryption key on their servers, and that even when a warrant allows them to disclose your data was given to LE, they “may or may not disclose” it to you… prob for PR reasons. Seriously, everyone needs to read it. Its only 2.5 pages.

    • @Living_Dead_Girrl
      @Living_Dead_Girrl Před 7 měsíci

      @@aaaaaa-hh8cq Exactly, except Apple has a very long track record of doing absolutely _nothing_ when zero day exploits are reported to them by top cyber security researchers and governments _repeatedly_ . Apple lied about patching the Pegasus exploit since it was first reported by Citizen Lab in 2012. 2016, Apple assured the public the next iOS 9 update patched it. It didn’t, obviously. That was some decade old Trojan Apple knew about and refused to fix this entire time. I’m with you on Android 100%. Switched over mid-2017 after yet another expensive iPhone repair, and have never looked back. I’m still on an iPad Pro, but I’ve been waiting and waiting for a worthy Android tablet to replace this junk. Not even the MacBook Pros are able to handle editing and professional software like they used to. Bought into the whole Apple ecosystem for a long time. No one even considers how much money Android users save not having to buy the insanely overpriced App Store apps that are virtually all paywalled these days… especially using the subscription model. Plus, the minute your iPhone’s no longer receiving software support (aka iOS updates), it’s just a matter of time before apps get removed off your device the moment the developers stop supporting your iOS version. I’ve lost so much crucial app data I can never ever recover or get back because of it. Android, I can just access the entire file system, and easily backup anything I want to Drive… or _any_ cloud service of my choosing… except for iCloud Drive because they refuse to make it compatible on Android. So for a while now, I’ve been forced to pay for both cloud services…

  • @nico96gmail
    @nico96gmail Před rokem +9

    It’s not that iMessage supports .psd files. macOS and therefore iOS supports those files at a systemwide level

    • @schwingedeshaehers
      @schwingedeshaehers Před 11 měsíci

      it supports AND renders them. if you treat files, that you cant be sure about, as files, that dont need to have a preview/need a generated bild, you dont have the problem,

  • @damiankaleomontero496
    @damiankaleomontero496 Před rokem +1

    Are you gonna make a video about the malware found in minecraft mods recently? Fractureizer?

  • @lancemarchetti8673
    @lancemarchetti8673 Před 2 měsíci

    Very interesting topic.
    I think embedding in psd binary is somewhat old. and so it's least expected. Also AV and Malware scanners don't dissect data embedded in pixels, and sometimes not even if the encoded data is plain ascii. Completely open, not even stealth.

  • @motichel
    @motichel Před rokem

    Sounds pretty accurate lol!

  • @fenixarson
    @fenixarson Před 11 měsíci

    me and my artist friends send each other psd files on a regular, i had no idea it could be used for malicious purposes, thats mad interesting

  • @mohamadsami7131
    @mohamadsami7131 Před 11 měsíci

    Commenting for the algorithm!

  • @guruoo
    @guruoo Před 11 měsíci +10

    Best way to maintain your privacy is by always acting by the assumption that someone has a backdoor into your device.

    • @WillSmith63957
      @WillSmith63957 Před 8 měsíci

      Run a google pixel with Graphene OS. Apple products are the most overpriced trash technology the tech world has ever seen

  • @Phil-D83
    @Phil-D83 Před 11 měsíci

    National security letters have that effect

  • @commandcracker42
    @commandcracker42 Před rokem +55

    The more a company talks about security, the more unsecure they are.

    • @maksymplv9310
      @maksymplv9310 Před rokem +5

      BS. OS-level security is just hard and there are no economic incentives to invest more than they already do. AFAIK: Apple does already a lot of things right security-wise.

    • @peterr3527
      @peterr3527 Před rokem +3

      LOL at you thinking Android is more secured.

    • @commandcracker42
      @commandcracker42 Před rokem +1

      @@peterr3527 Its not, but a rooted phone with fully sandboxed apps is!

    • @commandcracker42
      @commandcracker42 Před rokem +1

      @@maksymplv9310 Nothing is secure! This is not an OS-Level issue, Its apps having a feature overload with potential security risks.

    • @commandcracker42
      @commandcracker42 Před rokem +1

      Your booth seam like hardcore apples fans because you mention apple in some way, when I'm referring to all companies.

  • @FLUFFYCAT_PNW
    @FLUFFYCAT_PNW Před 5 měsíci

    The guys at NSA have to be crying watching the reverse engineers pour over this beautiful backdoor and exposing it to the world.

  • @user-kw9cu
    @user-kw9cu Před 11 měsíci

    it glows in here

  • @cylian91
    @cylian91 Před 11 měsíci

    they don't need a backdoor to get all the information on you

  • @Ammon6
    @Ammon6 Před 11 měsíci

    Don't they all, have it? Years ago i heard that every company has to give that, otherwise they can't operate in that country.

  • @ejonesss
    @ejonesss Před rokem

    how do we find the process backupagent on the iphone since the iphone is so locked down i doubt you can even run a terminal let alone top.

  • @FLUFFYCAT_PNW
    @FLUFFYCAT_PNW Před 5 měsíci

    The collision comes from the fact that this backdoor was built upon a hardware feature that was never documented, writing data to "random" registers that nobody knew about except Apple. Sure, it could've been a simple case of "security through obscurity", but it's just so unlikely that this hardware feature was discovered by accident.

  • @JohanRealman
    @JohanRealman Před rokem +27

    Apple themselves probably aren't involved although it wouldn't be too much of a stretch to suspect that the NSA or some other agency had some of their people inserted into Apple to cause these kinds of vulnerabilities.

    • @garywatson
      @garywatson Před 11 měsíci +6

      Yes, that is what I would do if I were them. Have a trusted cleared guy install an extraordinarily subtle bug to be exploited. You have to assume many other countries are also trying to do the same thing at every major electronics vendor. I mean, why wouldn’t they?

    • @bobweiram6321
      @bobweiram6321 Před 11 měsíci

      The US government serves corporations owned by the top 1%. The laws exist for the mere appearances of protecting its citizens freedoms and rights. The NSA has been caught violating the fundamental constitutional rights of citizens, yet no action has been taken against them and even continue to do so. Apple and other big corporations will happily assist them as their interests are in perfect alignment.

  • @Baasta
    @Baasta Před 11 měsíci

    Am not sure but I heard this only effects old iPhone and old iOS software

  • @prpl-wtf
    @prpl-wtf Před rokem +12

    MacOS has a built-in Console application that can be used to view the console log of iPads and iPhones. Wouldn't this help with detecting if a phone is infected or am I missing something here.

    • @prpl-wtf
      @prpl-wtf Před rokem +3

      @@flippermetimbers There is also an official "Console" application on MacOS that is preinstalled.

    • @markm0000
      @markm0000 Před rokem

      @@carltonwilson2668 People blindly trust that any closed source software given to them was designed by monks.

  • @BesteWare
    @BesteWare Před 11 měsíci +1

    NSA has their people anyways inside apple...

  • @wildweasel3001
    @wildweasel3001 Před 11 měsíci

    They certainly might, a company under US jurisdiction certainly could be pressured too. Just the same as Chinese companies are susceptible to pressures there. However my observation is NSA are more subtle. They have access to the src code, so are more than capable of finding 0 days without deliberate back doors by apple.

  • @r8gg
    @r8gg Před rokem

    2:25 yeah bro iMac to iMac is pretty fast over iMessage, a lot of photographers, editors videographers etc use Photoshop and just texting it to someone else is quite easy especially someone in your work or something

  • @jonnygiantrobot
    @jonnygiantrobot Před 11 měsíci

    If you buy "their" products and sign or activate items, you are agreeing to a myriad of stipulations that if you were to ever take someone to court, they could say; "but you agreed to..." This is one reason whistleblowing is important.

  • @erdembey2568
    @erdembey2568 Před rokem +2

    An this is why i use Kaspersky

  • @idedary
    @idedary Před rokem

    We had a speaker from NSA for our school math trip. 2 days later I was googling how to switch to linux.

    • @Samsamsam261
      @Samsamsam261 Před rokem

      What did the speaker say?

    • @Fatman305
      @Fatman305 Před rokem

      Nobody can hide from the NSA. My only concern with security is from commercial hackers doing it for $$$

    • @idedary
      @idedary Před rokem +3

      @@Fatman305 I am not US citizen, so I can hide. But he was talking about how they collect data and everything about other countries and non US citizens, bcs there is really nothing stopping them (He was talking to a group of Americans, I was a foreign exception). I was sitting there having a conflict of emotion. On one side it was cool as hell but on the other side he was basically talking about me. Not funny.

    • @Fatman305
      @Fatman305 Před rokem

      @@idedary Nobody can hide from the NSA if they're targeted by the NSA. You could make it harder for them, but that would probably just cause their AI to pay even more attention to you, since now you're actively hiding something, rather than being totally naked in front of them, the way they like it...

  • @EnlightenedSavage
    @EnlightenedSavage Před 11 měsíci +1

    This is something that the NSA has been doing with all technology for decades. The surveillance state is real folks.

  • @sluge1
    @sluge1 Před 11 měsíci +2

    Apple is a strategic NSA partner, this means Apple will do everything that NSA said

  • @UVClay
    @UVClay Před rokem +10

    Surely there's no major geopolitical reason why the FSB would want to cast a negative light on major western companies right now.

    • @gravity00x
      @gravity00x Před rokem

      there is no need to sully apples name. they are already one of the worst companies concerning trust. nobody thinks apple is a good guy and doesnt spy on their users or sell their data. ud have to be a looney to think that launching an attack against apple has anything on the line for either side.

  • @DavidWTube
    @DavidWTube Před rokem +4

    Lol yes. They very publicly stated that they didn't, so they for sure did.

    • @desertdude540
      @desertdude540 Před rokem +3

      More significantly, they offered a curiously specific denial of *adding* a bug at the glowies' request, which leaves open the possibility that the glowies found a bug and Apple agreed to leave it unfixed.

    • @schwingedeshaehers
      @schwingedeshaehers Před 11 měsíci

      @@desertdude540 or added it preemtively, without the question (and hand it over themselfes, or after the request)

  • @gazj
    @gazj Před 11 měsíci

    the nsa can force u.s based companies to leave known backdoors or vulnerabilities in hardware or software

  • @paarker
    @paarker Před rokem +6

    Of course they have. Every time there is a rapid update, it’s fixing the back door that has been found.
    Hackers know one exists so once it’s patched, they look for the next one. It’s probably in the hardware or linked to it.
    I was once a year iPhone buyer. Im down to three years now. I have to use a phone but im trying to limit the money they get from me.

    • @runed0s86
      @runed0s86 Před 11 měsíci

      You don't have to use apple devices to communicate with your family.

    • @PKVeteran
      @PKVeteran Před 10 měsíci

      Yearly phone is fine if you make good money. What else are you going to do with it. Go eat at Michelin 3 star restaurant?

  • @Bartek2OO219
    @Bartek2OO219 Před rokem

    NSA could develop exploit by themselves but it's cheaper to just send a letter

  • @NickDoddTV
    @NickDoddTV Před 11 měsíci

    Examining an iPhone backup is not the only way to forensically inspect an iPhone...

  • @turolretar
    @turolretar Před rokem

    I was standing up by the end of this video

  • @AtmosPres
    @AtmosPres Před 11 měsíci

    I swear to god, people always find huge exploits that can execute arbitrary code, yet we don’t have jailbreak

  • @Aura_Mancer
    @Aura_Mancer Před rokem +1

    Seytonic you should look at the self-replicating Minecraft mods virus is quite the thing that happen.

    • @Xnoob545
      @Xnoob545 Před rokem +1

      That malware from what I know is broken

  • @WillSmith63957
    @WillSmith63957 Před 8 měsíci

    Of course they are lying. There are still idiotic bots on forums saying “Hacking an iPhone is impossible” lol

  • @zedev444
    @zedev444 Před 3 měsíci

    "victims didn't make any security mistakes"
    Using a proprietary OS is one of the biggest security mistakes tho

  • @cpuuk
    @cpuuk Před rokem +1

    NSA could put a hack into a tree if they wanted to. And NSA will almost certainly be breaking into Aurora.

  • @ing3888
    @ing3888 Před 10 měsíci

    Didn't NSA take apple to court demanding that Apple needed to have a backdoor open for them for like 6 years ago?

    • @PKVeteran
      @PKVeteran Před 10 měsíci

      Ever heard of smog and mirror? True or not I don’t know. I just do not trust info. Especially the free one they hand out. nSA file court bla blah. Since when do they have a regard for law and public hearing

  • @g0ste
    @g0ste Před rokem +11

    Claims made without evidence can also be dismissed without evidence. However, confidently making claims without evidence is a great way to plant the seed of doubt (which may be the objective here).

    • @StopTh3Idiots
      @StopTh3Idiots Před 11 měsíci

      USA before 2020 - There are no alieans , stop the conspiracy theories
      USA after 2020 - There are aliens

    • @schwingedeshaehers
      @schwingedeshaehers Před 11 měsíci

      Do you know PRISM? If not, may search it (even if apple denies it (and the other companies, they are not allowed to talk about it))

  • @lukewilliamrimmington
    @lukewilliamrimmington Před 11 měsíci

    This doesn't surprise me.

  • @zoyita04
    @zoyita04 Před 11 měsíci

    My iphone got hacked by a T-Mobile employee and Apple didn’t move a single finger to help.

  • @johanngambolputty5351
    @johanngambolputty5351 Před rokem +1

    This is why we need to stop accepting unnecessary prorietaryness, if your bottom line mostly doesn't depend on protecting IP, if you mostly make money selling hardware, or running cloud solutions, then there's no reason to hide what goes on client side. There might be no reason to believe you're malicious, because you're a benevolent big tech company and you surely would never do anything wrong... but either way you're still a stranger and I'm not handing you a blank check, automatically trusting you with running arbitrary code on my device with no way to verify it (or have some peace of mind that it can be easily verified/hard to hide nastiness).

  • @barkmaker
    @barkmaker Před rokem +1

    Alphabet people working for alphabet agencies? Say it ain't so. 😁

  • @Randelia
    @Randelia Před 11 měsíci

    Russia accuses Apple & NSA of spying. 3 hours later: Russia announces it's own smartphone OS. LMAO.

  • @bcuzimfromva1
    @bcuzimfromva1 Před 11 měsíci

    I've always thought the Tim Cook an apple top executives uses different iphones than the consumers, because of this reason!

  • @bem121
    @bem121 Před 11 měsíci

    yes they did a few years ago that started

  • @Shrek5when
    @Shrek5when Před rokem +1

    New video! 👀