Joseph Cox
👤 PersonAppearances Over Time
Podcast Appearances
The first is that secure apps give more data to the authorities. You know, oh, you send a subpoena to Signal, they give information about the user. That's pretty problematic because that could be very easily abused for various reasons and it would undermine the security of the apps. Okay, sure.
The first is that secure apps give more data to the authorities. You know, oh, you send a subpoena to Signal, they give information about the user. That's pretty problematic because that could be very easily abused for various reasons and it would undermine the security of the apps. Okay, sure.
You have the second one, which is like, well, let's just run the apps and get all of the messages on it like they did with Anom, which obviously to me is insane, compromising the entire communication platform. You then have something else, which I believe, and I know people will disagree with me, there is another option of targeted hacking.
You have the second one, which is like, well, let's just run the apps and get all of the messages on it like they did with Anom, which obviously to me is insane, compromising the entire communication platform. You then have something else, which I believe, and I know people will disagree with me, there is another option of targeted hacking.
You have the second one, which is like, well, let's just run the apps and get all of the messages on it like they did with Anom, which obviously to me is insane, compromising the entire communication platform. You then have something else, which I believe, and I know people will disagree with me, there is another option of targeted hacking.
You have malware that can be delivered to a specific device, to a specific user, and harvest only a small particular amount of information which is allowed under that country's or agency's laws or whatever. If those are the three options, I would take the hacking one just because it's the less bad out of all of those. And some people will come forward and say, why do you have to pick one?
You have malware that can be delivered to a specific device, to a specific user, and harvest only a small particular amount of information which is allowed under that country's or agency's laws or whatever. If those are the three options, I would take the hacking one just because it's the less bad out of all of those. And some people will come forward and say, why do you have to pick one?
You have malware that can be delivered to a specific device, to a specific user, and harvest only a small particular amount of information which is allowed under that country's or agency's laws or whatever. If those are the three options, I would take the hacking one just because it's the less bad out of all of those. And some people will come forward and say, why do you have to pick one?
And I think it's because the status quo is just not sustainable. We had the status quo for ages, and then the FBI decided to run its own tech company. That's what happens when there's a status quo. They'll keep doing these crazy brazen operations. Do you want them to do that, or do you want them to do something less invasive? Right, because the thing that you're pointing to is
And I think it's because the status quo is just not sustainable. We had the status quo for ages, and then the FBI decided to run its own tech company. That's what happens when there's a status quo. They'll keep doing these crazy brazen operations. Do you want them to do that, or do you want them to do something less invasive? Right, because the thing that you're pointing to is
And I think it's because the status quo is just not sustainable. We had the status quo for ages, and then the FBI decided to run its own tech company. That's what happens when there's a status quo. They'll keep doing these crazy brazen operations. Do you want them to do that, or do you want them to do something less invasive? Right, because the thing that you're pointing to is
Yeah, and there's a lot of nuance to it in that, you know, the FBI will have an exploit to get into an iPhone, and that will allow them into it. And then Apple will learn about that and get very, very mad, and then they'll fix it. And then the FBI will have to buy another exploit. And yes, there's a lot of money involved. I've reported a lot on the people who sell exploits for iPhones.
Yeah, and there's a lot of nuance to it in that, you know, the FBI will have an exploit to get into an iPhone, and that will allow them into it. And then Apple will learn about that and get very, very mad, and then they'll fix it. And then the FBI will have to buy another exploit. And yes, there's a lot of money involved. I've reported a lot on the people who sell exploits for iPhones.
Yeah, and there's a lot of nuance to it in that, you know, the FBI will have an exploit to get into an iPhone, and that will allow them into it. And then Apple will learn about that and get very, very mad, and then they'll fix it. And then the FBI will have to buy another exploit. And yes, there's a lot of money involved. I've reported a lot on the people who sell exploits for iPhones.
And it's something like $5 million for a full iOS end-to-end chain, which is break into the phone and get the data and extract it. That's a lot of money, but I don't know, FBI, just get more money or something. I don't know, just figure it out. And of course, that's kind of easy for me to say, but I would take that over.
And it's something like $5 million for a full iOS end-to-end chain, which is break into the phone and get the data and extract it. That's a lot of money, but I don't know, FBI, just get more money or something. I don't know, just figure it out. And of course, that's kind of easy for me to say, but I would take that over.
And it's something like $5 million for a full iOS end-to-end chain, which is break into the phone and get the data and extract it. That's a lot of money, but I don't know, FBI, just get more money or something. I don't know, just figure it out. And of course, that's kind of easy for me to say, but I would take that over.
Well, now we have a turnkey solution where we could just read all messages all the time. And again, I'm not saying they've done that. I'm not even saying they would do that, but I know... the FBI is looking for the next iteration of this operation because they've said so as much.
Well, now we have a turnkey solution where we could just read all messages all the time. And again, I'm not saying they've done that. I'm not even saying they would do that, but I know... the FBI is looking for the next iteration of this operation because they've said so as much.
Well, now we have a turnkey solution where we could just read all messages all the time. And again, I'm not saying they've done that. I'm not even saying they would do that, but I know... the FBI is looking for the next iteration of this operation because they've said so as much.