Google Android vs Apple iOS: Which is Better for Privacy and Cybersecurity?

Shared Security Podcast
3 Apr 202240:33

Summary

TLDRIn this episode of the Shared Security Show, co-hosts Scott Wright and Kevin Johnson join Tom to discuss a range of topics focusing on privacy and cybersecurity. They delve into the ongoing debate of Android vs. Apple iOS, examining the strengths and weaknesses of each platform concerning privacy, the app stores, operating system updates, device tracking, and text messaging security. The hosts also touch upon a recent social engineering attack on Apple and Facebook, highlighting the importance of validation and verification processes when dealing with sensitive data requests. The discussion underscores the need for individuals and organizations to be vigilant about data security, advocating for awareness and the use of secure communication platforms like Signal for sensitive information.

Takeaways

  • 🎶 The podcast begins with a humorous discussion about being 'rock stars' and the hosts' musical preferences, setting a light-hearted tone for the show.
  • 📱 The main topic of the episode is a comparison between Android and Apple iOS, focusing on privacy and cybersecurity aspects.
  • 🔒 A significant point made is that Blackberry currently offers the best privacy due to its minimal usage, highlighting the irony of security through obscurity.
  • 📚 The hosts reference the book 'Losing the Signal' for insights into BlackBerry's rise and fall, emphasizing the importance of understanding the past in cybersecurity.
  • 🤔 The discussion touches on a social engineering attack on Apple and Facebook, where forged emergency data requests were used to gain access to sensitive information.
  • 📉 There's a debate on the effectiveness of Apple's and Google's verification processes for apps, and the ongoing need for vigilance despite these measures.
  • 🚀 The hosts praise Apple's control over its ecosystem, including hardware and software updates, as a strength in ensuring security and privacy.
  • 📱 Fragmentation in the Android ecosystem is identified as a challenge, with varying OS versions across devices potentially leading to security vulnerabilities.
  • 🛍️ Google's business model, heavily reliant on advertising, is contrasted with Apple's focus on hardware sales, affecting their respective approaches to user privacy.
  • 📧 The episode covers the importance of secure text messaging, with recommendations for apps like Signal that offer end-to-end encryption.
  • ⚖️ The hosts express concern over political efforts to backdoor encryption, emphasizing the need for a balanced discussion on privacy and security.

Q & A

  • What is the main topic of discussion in episode 219 of the Shared Security Show?

    -The main topic of discussion is a comparison between Android and Apple iOS, focusing on which is better for privacy and cybersecurity.

  • What is the 'Aware Much' segment about in this episode?

    -The 'Aware Much' segment discusses a social engineering attack that targeted Apple and Facebook by impersonating law enforcement to gain access to sensitive information.

  • What is the significance of the discussion about BlackBerry in the context of privacy?

    -The discussion about BlackBerry highlights that it currently has the best privacy because of its low usage, implying that fewer users means fewer hacking attempts.

  • Why did the hosts mention Microsoft's biggest mistake in the mobile space?

    -The hosts mentioned that Microsoft's biggest mistake was not buying BlackBerry when they had the chance, as BlackBerry's enterprise services could have helped Microsoft secure a stronger position in the mobile market.

  • What book is recommended for understanding the rise and fall of BlackBerry?

    -The book recommended is 'Losing the Signal', which provides an in-depth look at BlackBerry's lifecycle, including internal interviews.

  • What is the primary business model of Google, and how does it affect their approach to privacy?

    -Google's primary business model is advertising, which influences their approach to privacy as they need to balance user data collection for ad personalization with growing privacy concerns and regulations.

  • What is Google's Privacy Sandbox initiative?

    -Google's Privacy Sandbox is a proposed solution for enhancing privacy on Android, which aims to change how user data is used for advertising while still maintaining Google's ad revenue streams.

  • Why is Apple's approach to app store security considered more stringent than Google's?

    -Apple's approach is considered more stringent because they have a closed ecosystem (the 'walled garden'), where they control both the hardware and software, enforce strict developer policies, and perform multiple verifications on apps before they are available for download.

  • What is the difference between Apple's iMessage and Android's default text messaging in terms of security?

    -iMessage uses end-to-end encryption by default for messages sent between Apple devices, while Android's default SMS messaging does not offer the same level of security. However, Google Messages can offer end-to-end encryption if both parties are using the app, but not when communicating with non-Google Messages or iMessage users.

  • What is the recommendation for secure messaging between friends who may not be in the security community?

    -The hosts recommend using Signal, an app known for its strong focus on privacy and end-to-end encryption, as it is considered one of the most secure messaging apps available.

  • What is the stance of some politicians regarding privacy and encryption?

    -Some politicians are advocating for privacy while simultaneously pushing for backdoors in encryption, which is a contradiction because backdoors weaken encryption and privacy.

Outlines

00:00

🎶 Introduction to the Shared Security Show 🎶

The script opens with a warm welcome to episode 219 of the Shared Security Show, featuring co-hosts Scott Wright and Kevin Johnson. The hosts, playfully referred to as 'rock stars,' discuss their lack of musical ability and the importance of privacy in technology. They touch upon the decline of BlackBerry and its current focus on cybersecurity. The episode's main topic is a comparison between Android and Apple iOS, focusing on privacy and cybersecurity. There's also a mention of an 'aware much' segment that discusses a social engineering attack on Apple and Facebook.

05:01

🚨 Social Engineering Attacks and Data Compromises 🚨

The discussion delves into a social engineering attack where Apple and Facebook were tricked into granting access to sensitive information by forged emergency data requests. The hosts debate the effectiveness of the emergency process for data access and the need for better validation efforts. They also highlight the critical balance between saving lives through such processes and the potential for misuse, emphasizing the importance of security training and awareness.

10:01

📱 Android vs. Apple: Privacy and Cybersecurity 📱

The hosts compare Android and Apple iOS in terms of privacy and cybersecurity. They discuss the control Apple has over its ecosystem, including app stores and operating system updates, and how this contrasts with Google's approach, which involves collaboration with multiple manufacturers. The conversation touches on device fragmentation in the Android market and the security implications of this diversity. They also mention alternative Android operating systems that allow for greater privacy but may come with their own set of challenges.

15:01

🛡️ The Impact of Device Tracking and Privacy 🛡️

The script addresses the issue of device tracking and privacy, particularly focusing on ad tracking. It contrasts Apple's App Tracking Transparency feature, which has significantly limited ad tracking on iOS, with Google's slower approach to providing users with opt-out features. The hosts discuss the business models of both companies, with Google's reliance on advertising being a key point of discussion. They also mention Google's Privacy Sandbox initiative, which aims to improve privacy on Android.

20:02

💬 Text Messaging Privacy and Security 💬

The final topic of the script is text messaging privacy and security. It outlines the differences between Apple's iMessage, which is encrypted by default, and Android's default messaging, which relies on SMS and is not encrypted. The hosts discuss the limitations of SMS and the potential risks associated with sending sensitive information via unencrypted messages. They also mention the use of Signal as a secure messaging app and the challenges of convincing non-security-focused individuals to adopt such apps.

25:03

📉 The Risks of Defaulting to Unsecured Communications 📉

The hosts wrap up the discussion by emphasizing the importance of being aware of the risks associated with different communication methods. They stress the need for individuals to understand their threat model and make informed decisions about their privacy and security. The conversation also touches on the potential for legislation to impact encryption and the desire to engage with politicians on these topics. The script concludes with a call to action for listeners to join the conversation on Reddit and to follow the show for more insights.

30:05

📢 Closing Remarks and Call to Action 📢

The script concludes with a reminder for listeners to engage with the podcast, subscribe to the channel, and participate in the Shared Security Show's online community. The hosts express their gratitude for the audience's attention and tease the prospect of future episodes, inviting listeners to continue the conversation on Reddit and to follow them on social media.

Mindmap

Keywords

💡Social Engineering

Social engineering is a deceptive strategy used by attackers to manipulate individuals into divulging confidential information or performing certain actions. In the video, it is discussed how Apple and Facebook fell victim to a social engineering attack that impersonated law enforcement to gain access to sensitive information. This highlights the importance of security awareness and the need for robust validation processes to prevent such incidents.

💡Lawful Access

Lawful access refers to the legal process where law enforcement can make formal requests to access data belonging to companies, such as social media platforms. The video mentions that there are normal processes involving subpoenas or warrants, but also emergency processes for situations like potential suicides or threats to safety. The discussion emphasizes the need for strong validation of these requests to prevent exploitation.

💡Privacy Sandbox

Google's Privacy Sandbox is an initiative aimed at improving privacy on the web, particularly within the Android ecosystem. The video discusses how Google, as an advertising company, needs to adapt its business model to comply with increasing privacy regulations and user expectations. Privacy Sandbox represents a significant shift in Google's approach to user data and online advertising.

💡App Tracking Transparency

App Tracking Transparency is a feature introduced by Apple starting with iOS 14.5, which requires apps to obtain user consent before tracking them or accessing their device's advertising identifier. The video highlights the impact of this feature on companies like Facebook, which rely heavily on ad tracking for revenue. It represents a significant move towards user privacy and control over personal data.

💡Device Fragmentation

Device fragmentation in the context of the video refers to the variety of different Android devices and versions that exist in the market, which can make it challenging to provide timely and consistent operating system updates. Fragmentation can lead to security vulnerabilities as not all devices receive critical security patches at the same time. The video contrasts this with Apple's more controlled ecosystem, where updates are uniform across devices.

💡End-to-End Encryption

End-to-end encryption is a method of secure communication where only the communicating users can access the content of the communication. The video discusses the use of end-to-end encryption in messaging apps like Signal, which ensures that messages remain private and secure. The topic is relevant as there are ongoing discussions in various countries about potentially banning or backdooring encryption, which could impact the privacy and security of digital communications.

💡Operating System (OS) Updates

Operating system updates are crucial for the security and functionality of devices. The video emphasizes the difference in update practices between Apple and Android devices. Apple controls both hardware and software, allowing for a more streamlined update process, whereas Android devices, due to fragmentation, may not receive updates as consistently, which can lead to security risks.

💡Jailbreaking

Jailbreaking refers to the process of removing software restrictions imposed by the device manufacturer or operating system, which allows users to install unauthorized apps and make system changes. In the video, jailbreaking is mentioned in the context of Apple devices and the potential security risks it introduces, as well as the comparison to using alternative operating systems on Android devices.

💡Mobile Device Management (MDM)

Mobile Device Management is a strategy that allows organizations to manage and secure mobile devices that are used within the company. The video briefly touches on MDM in the context of how it may restrict the use of jailbroken phones or phones with alternative operating systems, as they could pose security risks to the corporate network.

💡Signal

Signal is a secure messaging app that uses end-to-end encryption to protect messages, calls, and even video chats from being intercepted or read by third parties. The video recommends Signal as a preferred messaging app for privacy-conscious users, noting its strong security features and the trustworthiness of its developers. The discussion also touches on the challenges of convincing non-security-focused individuals to adopt Signal or similar secure messaging apps.

💡SMS vs. iMessage

SMS (Short Message Service) and iMessage are two different messaging protocols. iMessage is Apple's messaging service that provides encryption for messages sent between Apple devices, while SMS is a standard messaging protocol that does not inherently offer the same level of security. The video discusses the visual distinction between the two in terms of color-coding in message threads and the security implications of each.

Highlights

The podcast discusses the comparison between Android and Apple iOS in terms of privacy and cybersecurity.

The hosts mention that BlackBerry currently has the best privacy due to its minimal usage and thus fewer hacks.

Apple's strict developer policy and closed-source ecosystem are highlighted as a strong point for security.

Google's business model, heavily reliant on advertising, is contrasted with Apple's hardware sales focus.

The discussion touches on the importance of OS updates for security, where Apple's control over its ecosystem is seen as advantageous.

Fragmentation in the Android ecosystem is identified as a significant issue affecting update consistency and security.

The concept of 'jailbreaking' and using alternative OS like Lineage OS on Android devices is explored.

Apple's App Tracking Transparency feature is discussed and its impact on Facebook and Instagram's ad tracking capabilities.

Google's slow rollout of opt-out features for ad tracking and its Privacy Sandbox initiative are mentioned.

The hosts debate the lack of interoperability between iMessage and Android's messaging systems and its security implications.

Signal is recommended as a secure messaging app, with a discussion on the potential for it to be banned or outlawed in some regions.

The importance of understanding and accepting the risks associated with personalized ads is emphasized.

The podcast concludes with a call for politicians to discuss the balance between privacy and encryption backdoors.

The hosts encourage listeners to join their Reddit community for further discussion on privacy and cybersecurity.

The podcast stresses the need for individuals to be aware of the privacy decisions they are making with their technology choices.

The episode ends with a reminder for listeners to like, subscribe, and engage with the Shared Security Show's online community.

Transcripts

play00:01

[Music]

play00:06

welcome to episode 219 of the shared

play00:09

security show and joining me this week

play00:12

are my rock star co-hosts

play00:15

scott wright and kevin johnson

play00:20

rock star

play00:21

always wanted a rock star i have my foo

play00:24

fighters uh shirt oh contribute in

play00:26

memory

play00:27

yeah

play00:31

one of my favorite bands foo fighters so

play00:34

uh yeah i am i am definitely sad but uh

play00:37

of the situation but um but nonetheless

play00:39

you guys are rock stars in my eyes so i

play00:42

figured we could never

play00:44

no no i'm sorry that's true i'll be

play00:47

honest i uh i barely know how to to hold

play00:51

an instrument

play00:52

um

play00:53

playing instruments would not be part of

play00:56

my skill set

play00:58

and that's okay we can have things

play01:00

davey jones holding the tampering yeah

play01:03

yeah oh that we see i have no i have no

play01:05

sense of uh timing like the beep

play01:08

so i'd hold the tambourine but i'd like

play01:09

get twitches and stuff and it would make

play01:11

random noises it would be bad it would

play01:13

just be oh that's fun yeah

play01:16

cool well uh we have an exciting show

play01:19

for everyone this week um we are

play01:22

maybe gonna touch a little bit on the

play01:24

news with our aware much segment which

play01:27

is actually going to come up first this

play01:28

this time um but our main topic today is

play01:31

uh android versus apple ios

play01:34

and which is better for privacy in cyber

play01:37

security

play01:39

yeah so the big battle rights between

play01:41

the two tech giants

play01:43

um and which one is better for you uh

play01:46

and your privacy so

play01:48

i'm just gonna put out there right now

play01:49

before we get started the blackberry has

play01:52

the best current privacy out there um

play01:55

and that's because nobody uses them

play01:57

[Music]

play02:00

nothing's getting hacked in their block

play02:02

at that point that's right but you know

play02:04

i'm gonna admit blackberry was my

play02:06

favorite you know and i'm very sad that

play02:08

even though it was a canadian company

play02:10

but

play02:11

not biased that's why that's not my

play02:14

favorite it's just i haven't said

play02:16

i've said long and hard that microsoft's

play02:18

biggest mistake in the mobile space was

play02:20

not buying black people yeah yeah

play02:22

because if yeah they can yeah blackberry

play02:25

uh what was it bb enterprise manager nxt

play02:29

offered them to organizations as one

play02:31

best you were to lock down this market

play02:33

and everything else yep yep

play02:35

there's actually a really interesting

play02:36

story if you guys want to uh look up at

play02:38

some point there's a book called losing

play02:40

the signal

play02:41

it was written by a couple of

play02:43

journalists that followed blackberry

play02:44

through the whole life cycle like

play02:46

some

play02:47

internal

play02:48

interviews and stuff really interesting

play02:50

to see how they grew and how they

play02:52

collapsed

play02:54

right now they're a cyber security

play02:55

company so yeah

play02:57

look how that turned out yeah

play03:00

so uh so why don't we jump right into

play03:02

our aware much segment with mr scott

play03:04

wright

play03:07

thanks tom and uh welcome to this

play03:09

installment of aware much

play03:11

brought to you by click armor the first

play03:13

fully gamified security awareness

play03:15

training and engagement platform

play03:18

so it might be hard to believe but even

play03:20

big guys can be tripped into giving

play03:23

access to sensitive information through

play03:25

social engineering

play03:26

uh in mid-2021 like a year ago almost

play03:29

now uh apple and facebook both became

play03:32

victims of a pretty effective social

play03:34

engineering attack that impersonated law

play03:36

enforcement um and it could have

play03:38

resulted in you know fraud or harassment

play03:42

of the victims whose information was

play03:44

compromised

play03:45

but access to subscriber data for those

play03:48

services was

play03:49

granted based on forged

play03:52

emergency data requests which is

play03:54

interesting because

play03:55

we i don't know if

play03:57

everybody knows this but there's a

play03:58

process called i think it's called

play04:00

lawful access where

play04:02

a law enforcement can make formal

play04:03

requests to get access to

play04:05

data belonging to companies like social

play04:08

media companies and there's a normal

play04:10

process where there would be a subpoena

play04:12

or a warrant required to to make that

play04:14

happen but there apparently are

play04:16

emergency processes

play04:18

and i guess you know i'm not sure but we

play04:21

can guess it might be when somebody

play04:23

may be in danger um and they need to

play04:25

figure out what's going on so there's

play04:28

there's suspicion of suicide uh

play04:30

possibilities yeah or counseling

play04:33

or stuff like that right yeah so

play04:34

um so there you know there's a reason

play04:36

why they have this emergency process in

play04:38

place which

play04:40

theoretically i guess would be a bit of

play04:42

a shortcut for how you get through that

play04:44

process um yeah but interestingly

play04:47

these people seem to have figured out a

play04:50

way they're somehow

play04:52

knowledgeable enough

play04:53

about the process to figure out how to

play04:56

exploit that emergency

play04:59

uh situation

play05:00

that the service provider is supposed to

play05:02

handle in a different way and so it's

play05:05

interesting that they managed to get

play05:08

access to that you guys have any

play05:09

thoughts on that

play05:11

i i i think i mean

play05:14

this

play05:16

the stories i've read there are there's

play05:19

one point that is brought up in a story

play05:22

and then later on in the story they kind

play05:24

of contradict it

play05:26

at one point they talk about that the

play05:28

request came from the law enforcement

play05:30

domains

play05:31

yes as in the implication there is

play05:34

the

play05:35

social engineer the attacker actually

play05:37

got

play05:38

into like a law enforcement email

play05:41

address or or system and send it there

play05:44

if that's true

play05:46

this is a different type of attack right

play05:48

we've got a bigger problem yeah right

play05:51

but here's the thing that throws my mind

play05:53

and i want to be very clear uh allison

play05:55

nixon uh

play05:56

wonderful person love her to death i i

play05:59

find that all right she's with um

play06:02

unit221b isn't that yeah they were

play06:04

quoted in this yeah yeah yeah allison's

play06:06

a great person and what i've always

play06:08

found um

play06:09

even when i don't agree with what she

play06:11

says which which happens sometimes i

play06:14

find that her her she always has a good

play06:18

reasonable

play06:20

to what she is saying that everybody

play06:23

should listen to right because she she's

play06:25

thought it through she's really

play06:26

considered stuff um because she points

play06:29

out correctly so

play06:30

that yes this is bad that this happened

play06:33

but the sheer number of lives saved

play06:37

because of these processes are critical

play06:40

so i want people to remember that

play06:42

because

play06:43

it is very easy for us all to say

play06:46

well there you go this shouldn't be

play06:48

allowed you shouldn't do this you should

play06:49

stop this and cut the corners yeah right

play06:52

throwing the baby out with the bathwater

play06:54

i think what this highlights to me

play06:57

is that there is not a good validation

play07:00

effort they say

play07:02

that sometimes i think it was apple said

play07:05

or face or meta i'm sorry meta said

play07:08

you know we got 218 000 of these a year

play07:11

or something like that or in six months

play07:13

and we validated some of them okay that

play07:17

there's your gap not the social

play07:19

engineering aspect because the social

play07:20

engineering aspect yes it's bad but in a

play07:23

case like this

play07:25

you're not going to change right you

play07:27

know from click armor that urgency the

play07:31

right the aspects of a phishing attack a

play07:33

social engineering attack

play07:35

those are used to get somebody to do

play07:37

something they're not supposed to in

play07:39

this process

play07:41

those are part of the process

play07:42

it's an emergency situation so it has

play07:45

urgency right like all that kind of

play07:47

stuff so this is the perfect example

play07:49

where the training has to tell these

play07:51

people yes

play07:53

go verify go validate exactly

play07:56

all of the other stuff we tell you to

play07:58

watch for all of the other stuff that we

play07:59

tell you not to fall for

play08:02

are here correctly there there is

play08:04

absolutely an urgency there is

play08:06

absolutely a time like you have to do it

play08:09

now somebody's gonna die

play08:11

right like not to yeah play that lightly

play08:14

so i think that

play08:17

i want us to us right us the world um

play08:21

but i want us to keep in mind that

play08:25

this is the perfect example of social

play08:27

engineering

play08:29

that is abusing a system

play08:31

that is easily abused

play08:34

because the way it's used

play08:37

is abusable i think is i'm not sure i'm

play08:39

saying that right

play08:40

in there exactly how i would put it yeah

play08:43

i bet i think there could potentially i

play08:45

mean we don't know the process that well

play08:47

but there could be

play08:48

extra you know what they what we call

play08:49

compensating controls right when you

play08:51

have to bypass

play08:52

you know break glass procedure they call

play08:54

it right where you can actually

play08:56

compensate later on or or do something

play08:59

to

play08:59

make sure that if there was any risk

play09:02

you've tried to mitigate that so in in

play09:04

this case what i got out of this perhaps

play09:06

is

play09:07

the part of the emergency request

play09:09

procedure i think is that the recipient

play09:11

like apple or facebook is supposed to

play09:13

call back

play09:14

to somebody in the other organization

play09:17

now

play09:19

they may be just relying on an email and

play09:21

if that email spoofed like a business

play09:23

email compromise um then they may be

play09:26

wrongfully trusting that email and and

play09:28

not

play09:29

doing as much of the authentication or

play09:32

verification as they could so maybe the

play09:34

process needs to be fixed or whatever

play09:36

but this is a perfect you know case

play09:38

study i'm sure it's been fixed

play09:41

since it happened right

play09:42

to some extent

play09:45

i don't i don't think you yeah unknown

play09:48

but you're right kevin i mean

play09:49

it was interesting the stats that came

play09:51

out from this which was i think apple

play09:52

reported a thousand emergency requests

play09:55

in a six month period and they granted

play09:57

that 93 of them and facebook received 20

play10:00

000 20 times that in a six month period

play10:03

in 2021 and they granted 73 of them so

play10:07

that's a lot of requests and uh yeah a

play10:10

few are probably gonna fall through the

play10:12

cracks and like we said you know if it's

play10:13

a situation where the person you're

play10:15

supposed to reach out to isn't there and

play10:17

it's an emergency yeah you're going to

play10:18

end up with some

play10:20

bad calls on the risk side

play10:23

and and

play10:24

if i may say so

play10:27

if my data is going to be stolen i'd

play10:29

rather it be stolen because they were

play10:31

trying to save somebody's life

play10:33

yeah and i think that's okay i'm not

play10:35

saying i'm fine with it happening but

play10:36

yeah i mean i'd rather this then well we

play10:39

put it on an ftp server and forgot to

play10:41

set a password yeah it's kind of a

play10:43

fascinating view into this process that

play10:46

we kind of really never thought about

play10:47

before right you know that there is an

play10:49

emergency

play10:50

process for getting

play10:52

help to people uh

play10:54

through that process through the

play10:55

platforms anyway really interesting so

play10:57

the lesson here really is that

play10:59

businesses in general need to be really

play11:01

careful about processing where you are

play11:03

releasing sensitive information

play11:05

and those extra steps that you can take

play11:07

i teach courses sometimes to

play11:10

business small businesses on cyber

play11:12

security and when we get to the part

play11:15

about you know uh fake invoices being

play11:17

paid and stuff like that you know try to

play11:20

stress there should be some

play11:21

threshold that you set to say i'll

play11:24

accept an email authorization for making

play11:26

a payment up to a certain level and

play11:28

beyond that it needs a voice or text or

play11:31

something to to verify

play11:33

so those are the things we like to say

play11:36

so you've got to have somebody in the

play11:38

process that can verify those things and

play11:42

um so this installment of uh aware much

play11:44

has been brought to you by click armor

play11:46

the first fully gamified security

play11:47

awareness training and engagement

play11:49

platform and click armor does have a

play11:51

course called fakes and frauds that

play11:53

helps people learn about different types

play11:54

of attacks that can occur by phone or

play11:56

email or even text message

play11:58

and you can

play11:59

sort of choose your own adventure

play12:02

choose your own adventure on rails i

play12:04

call it where you can practice facing

play12:05

scenarios with different potential

play12:07

outcomes without wasting too much time

play12:09

going into some open world

play12:11

so go to clickarmour.ca trial and sign

play12:14

up for a free seven-day trial for up to

play12:16

five members of your organization

play12:18

and that's it for this segment of

play12:20

aware much

play12:24

all right thank you scott

play12:26

very topical because that's just that

play12:28

our that is actual news because that

play12:30

didn't come out uh just this week so

play12:32

um and it's about apple

play12:34

so

play12:35

and we're trying to talk about that

play12:37

and we're going to talk about apple uh

play12:39

and google and google uh in this next

play12:41

segment which is

play12:43

android versus apple ios which is better

play12:45

for privacy and cyber security

play12:48

so

play12:48

there obviously this is a larger topic

play12:51

that we could probably have several

play12:53

episodes on

play12:54

but i i did want to cover three areas

play12:58

and i think they're probably the biggest

play12:59

three areas when we talk about you know

play13:02

which is better um from a privacy and

play13:04

cyber security perspective

play13:06

and that is essentially the app stores

play13:08

themselves and operating system updates

play13:12

which we all know and love right

play13:14

and we always say patch your devices

play13:17

make sure they're updated so we'll talk

play13:18

about that then we'll talk about device

play13:21

tracking and privacy so specifically

play13:23

around ad tracking which has been all

play13:26

over the news over the last couple weeks

play13:28

and we've even talked about that on the

play13:30

show

play13:31

and then the last one is around text

play13:33

messaging privacy and security because i

play13:35

think most people if they're not using

play13:37

an app on their phone they're probably

play13:39

using it for texting

play13:41

right so we want to talk about some of

play13:43

the differences there between the

play13:44

built-in features and functionality um

play13:48

with text messaging so we're not

play13:50

necessarily talking about

play13:51

messaging apps that you can download but

play13:54

what comes with a

play13:56

default you know google pixel or an

play13:59

apple iphone right

play14:01

so so let's get into it and let's talk

play14:04

about um apple and google in terms of uh

play14:07

operating system updates and the app

play14:09

stores so we all know about the apple

play14:12

walled garden right

play14:14

um where it's proprietary closed source

play14:18

right you have to have an apple id to

play14:20

download apps

play14:22

um and you know apple's been known to

play14:24

have a pretty strict uh developer policy

play14:28

right so if you want to develop an app

play14:29

for

play14:30

uh for the apple ecosystem you have to

play14:33

go through some things that you know

play14:35

uh from you know not quite sure the

play14:37

developer verification process but from

play14:40

what i've read

play14:41

um it's definitely a little more

play14:44

invasive especially around what

play14:45

they ask you about

play14:47

how do you

play14:48

handle data from the app yeah i've gone

play14:51

through it for some some projects i've

play14:53

worked on yeah and it changes i want to

play14:55

be very clear like when i went through

play14:57

it was a

play14:59

couple years ago and it's it's gotten

play15:00

stricter

play15:02

in many ways but they do a series of

play15:05

verifications i will argue that all of

play15:08

the verifications they do are bypassable

play15:11

um the verifications of who you are to

play15:14

validate that you're a rural real

play15:15

developer whatever right um and then

play15:18

after that you're able to

play15:20

to submit apps for consideration and

play15:23

they go through another set of

play15:24

verifications at that point um which

play15:27

which i think is good right um i will

play15:30

also say though

play15:31

that

play15:33

that set of verifications up front apple

play15:36

themselves will tell you as does google

play15:39

i we're not i'm not picking on apple

play15:41

here

play15:41

both of them will tell you that in no

play15:43

way does that verification tell you that

play15:46

this app is secure

play15:47

that's correct um yeah so if we if we

play15:50

could jump back a little bit to the os i

play15:52

think that's an easy

play15:54

an easy conversation

play15:57

apple wins and the reason apple wins is

play15:59

because apple

play16:00

is apple

play16:01

um

play16:03

they produce the hardware they produce

play16:05

the devices they ship it out

play16:08

they handle the updates they do all this

play16:10

kind of stuff and they're the ones who

play16:12

decide yep done that device isn't

play16:15

supported anymore it's over

play16:17

whereas google

play16:20

and we can argue whether this is good or

play16:21

bad or whatever in either side

play16:24

google has instead taken the model of

play16:27

other than our devices that we do

play16:30

we're going to work with the

play16:31

manufacturers and let the manufacturers

play16:33

control it right so i have a samsung

play16:36

device

play16:38

you have a pixel device i don't know

play16:40

right right but um

play16:42

you have a different version of the

play16:44

operating system even available to you

play16:47

than i do yeah right and back when i

play16:50

first switched over to android

play16:52

i was using att uh they were my provider

play16:57

i couldn't get

play16:59

the latest versions of google android os

play17:02

yeah because att didn't even make them

play17:04

available

play17:05

it was just not possible you you wanted

play17:08

to buy a phone you got a phone that had

play17:10

a version of android on it that was two

play17:12

or three revs back and that's what atmc

play17:14

supported and

play17:16

i understand

play17:18

the benefits there for google

play17:21

but but that makes it a very simple

play17:23

answer of

play17:24

apple is better for security and privacy

play17:27

around os updates yeah that's a long

play17:30

answer to say simple no it's totally

play17:32

right and and device fragmentation in

play17:34

the android world is is a huge problem

play17:37

because there are so many

play17:39

types of android devices that are out

play17:41

there and that may never get updates

play17:44

because they just you know for whatever

play17:46

reason

play17:47

um are no longer supported by the

play17:50

manufacturer or they're just so out of

play17:52

dates

play17:53

so you know unless you're getting a

play17:55

brand new android phone

play17:57

every year

play17:58

i mean you risk you know just eventually

play18:02

you'll fall into that fragmentation and

play18:04

even if you get a new android phone

play18:07

you're still falling into the

play18:08

fragmentation because i have a samsung

play18:10

device so the version of sam the os that

play18:14

i'm running

play18:15

is different because samsung added stuff

play18:18

to it

play18:20

i got an unlocked one directly from

play18:22

samsung but if i had bought it from

play18:24

horizon or whatever when i bought my

play18:27

phones from verizon

play18:29

and verizon's crud on top of the samsung

play18:33

crud on top of the android system right

play18:37

i think there's a there's a really

play18:39

important fundamental issue here too

play18:41

it's not just interoperability it's

play18:43

every time you've got different versions

play18:45

of things working together there's more

play18:47

potential vulnerabilities that you've

play18:48

got to keep track of right yep right the

play18:50

more complex you make it the easier it

play18:52

is for me

play18:54

yep to be professionally evil

play18:57

yep that's right that's right

play18:59

so

play19:00

so the other thing i want to mention too

play19:02

is on the android side i've been seeing

play19:04

more of a movement

play19:06

um to d google

play19:08

um an android device and um there are

play19:12

actual mobile operating systems that are

play19:15

out there uh graphene is one uh calyx uh

play19:19

lineage os

play19:21

um and you can we'll have some links in

play19:23

the show notes or if you're interested

play19:24

you can explore this where you can you

play19:26

know load your own operating system on

play19:28

your android phone and that doesn't have

play19:30

any google

play19:31

google anything right it's an

play19:34

interesting idea too because that's

play19:36

essentially i think what you're talking

play19:37

about is jailbreaking right

play19:39

and that would be the equivalence yeah

play19:41

kind of right on the apple side is like

play19:43

if you want to download apps from

play19:46

a third-party app store in the apple

play19:47

world you have to jailbreak your device

play19:50

to do that and that's harder to do as i

play19:51

understand on an apple right

play19:53

it varies but it's also not recommended

play19:56

because you then are you know you're

play19:59

essentially hacking your own device and

play20:00

you're then you're making it more

play20:02

vulnerable to you and actually

play20:05

yeah that's right i will also say that

play20:07

on the android side if you replace

play20:10

android with a d google flight one

play20:12

lineage whatever

play20:14

um

play20:15

you can run into problems i'm not

play20:16

talking secure i'm not saying it's

play20:18

insecure or whatever

play20:19

but one you got to make sure that what

play20:21

you're replacing with is what you think

play20:22

you're replacing it with but but

play20:24

ignoring that drugs or bad type of

play20:27

message because that's what that is

play20:29

right like oh my god if you jailbreak it

play20:31

you'll be hacked well yeah but you'll

play20:33

probably be hacked if you don't

play20:34

jailbreak well but um there's also where

play20:36

are those are those uh os alternative

play20:39

os's are they free or do you buy them

play20:41

yeah that's right they're open source so

play20:42

you just do it you just search do google

play20:44

search and download it and you're good

play20:46

does google tell you exactly where those

play20:47

are so there's no security issues there

play20:50

but but here is here's the issue that

play20:53

almost definitely will happen

play20:56

you will lose access to certain things

play20:59

because they're not supported there

play21:01

right right

play21:02

my phone

play21:04

is managed by my company right we have

play21:06

an mdm that mdm

play21:09

may not let me in i haven't even looked

play21:11

because i haven't considered replacing

play21:13

the phone uh but

play21:15

the mdm may block me from accessing

play21:17

equipment yeah they block me from

play21:19

accessing the corporate view

play21:21

don't try to jailbreak your employer's

play21:22

phone

play21:24

but unless you have permission right and

play21:26

with me i would have permission to do it

play21:28

because i'm who authorizes that kind of

play21:29

stuff right like my twitter account says

play21:32

my opinions are my employers but um

play21:36

you'll lose access to things like that

play21:37

you may also lose access to apps yeah

play21:40

there are applications

play21:42

that when they install they verify that

play21:44

the they're installed on a os they

play21:47

expect to be yeah yeah and then they

play21:49

don't run

play21:50

is that a deal breaker for you i don't

play21:52

know it's a point great

play21:54

different question yeah right

play21:56

check your threat model as we always say

play21:59

right yeah so

play22:01

so the next uh next topic is around

play22:03

device tracking and privacy and

play22:06

specifically more around ad tracking and

play22:08

that's been a big thing that we've

play22:10

talked about on the show before

play22:12

you know just recently apple has uh

play22:15

released their app tracking transparency

play22:18

which is a new setting starting with ios

play22:22

14.5

play22:24

which was in the news because it

play22:25

essentially killed um facebook and

play22:28

instagram and the meta apps um and a lot

play22:30

of their tracking capabilities within

play22:32

ios and i think it was there was some

play22:35

quote about you know meta losing you

play22:37

know potentially

play22:38

millions and millions of dollars and

play22:40

this year alone dozens of other

play22:41

marketing apps right that rely on

play22:44

similar technologies for traffic yeah

play22:46

that's correct so

play22:47

now now on the google side they've kind

play22:50

of been slow rolling some opt out

play22:52

features in some similar ways to what

play22:56

apple did

play22:57

um you can right now i know with i think

play23:00

the last couple versions of android and

play23:02

parkman wrong uh

play23:04

kevin but you can reset your ad id

play23:07

essentially yes but that's not a

play23:09

permanent type of fix of what what apple

play23:12

has put in um and of course you can opt

play23:14

out of those personalized ads

play23:16

um and then google's working on this

play23:19

thing called privacy sandbox which is a

play23:22

a a larger type of solution for privacy

play23:25

on android but that's going to take

play23:27

several years to implement from from

play23:29

what i've researched so yeah um i think

play23:31

the primary differences and this is

play23:33

really important to understand is that

play23:36

google

play23:37

their business is essentially most their

play23:39

business is around advertising

play23:42

um

play23:42

it's just the reality that is how if you

play23:45

look at how google started in google

play23:47

search and google ads i mean they are

play23:50

primarily an advertising company

play23:53

and apple um is very different in the

play23:56

way that they make money

play23:58

um they make money from hardware sales

play24:01

essentially

play24:02

and then they actually offer you know

play24:04

like apple music which is subscription

play24:07

yes free

play24:08

subscription-based services so

play24:11

right i think it's important to kind of

play24:12

call that out as the incentives right

play24:14

for both and when you hear statements

play24:16

like google is working on a privacy

play24:18

initiative

play24:19

like a sandbox okay what does that mean

play24:21

for a business that whose business

play24:22

relies on

play24:24

not necessarily having complete privacy

play24:27

i think it's a life preserver i think uh

play24:29

if you look at

play24:32

regulation if you look at

play24:34

gdpr the eu canada the u.s right more

play24:38

and more organizations more and more

play24:40

countries more and more

play24:42

areas are pushing

play24:44

privacy i find it hilarious that the

play24:46

same politicians that are pushing

play24:48

privacies are also pushing back during

play24:50

encryption hypocrisy march yeah that's a

play24:53

whole lot yeah yeah we need privacy but

play24:55

let us listen in um

play25:01

but

play25:02

the

play25:03

the the regulatory

play25:06

bodies are pushing this and so while yes

play25:10

google absolutely has made their money

play25:11

made their business been an advertising

play25:14

behemoth

play25:16

they have to adjust right they have to

play25:19

not become blockbuster

play25:22

right

play25:23

blockbuster's whole business was renting

play25:25

movies

play25:26

and they failed the shift in time yes

play25:29

google knows their entire business or

play25:31

the majority of their business is

play25:34

advertising yeah so they have to figure

play25:36

out a way to advertise in a privacy

play25:39

aware no and no time like now they've

play25:42

got all the money in the world to

play25:44

invest in it they got to do it if they

play25:46

don't do it if if google doesn't

play25:48

transition well

play25:51

they will go the route of and it won't

play25:53

and it won't be as slow as blockbusters

play25:55

no what will happen is

play25:57

the regulatory bodies are going to go

play26:00

after them right

play26:01

and they've already been doing it at a

play26:04

certain point it's going to be like look

play26:06

this is the death note and that's why i

play26:08

think when i look at things like the

play26:09

google privacy sandbox

play26:11

i'm not saying they're going to be

play26:13

perfect i'm not saying they're going to

play26:15

be well done

play26:16

but they are absolutely going to be a

play26:18

seismic shift in what google does

play26:21

or they will be huge interesting yeah

play26:23

good to know you heard it here folks

play26:26

that's right that's right

play26:28

i didn't create that from the rockstar

play26:30

himself

play26:32

that's right so imagine this scenario

play26:34

you're out of the office unexpectedly

play26:37

and a colleague pings you because they

play26:39

need access to some system you have

play26:42

credentials for now our listeners would

play26:45

never send passwords over email or slack

play26:47

right but what about your co-workers how

play26:50

many organizations out there are sending

play26:52

logins back and forth in plain text

play26:56

worse yet how many just store all of

play26:58

their logins on a shared spreadsheet we

play27:01

all know that human errors are the

play27:03

biggest threat to your organization's

play27:05

security but did you know that weak or

play27:08

stolen passwords account for over 80

play27:10

percent of all data breaches now there

play27:13

are tools out there that can allow you

play27:15

to share credentials set access

play27:17

permissions and monitor the dark web for

play27:19

stolen logins

play27:21

and keeper security's enterprise

play27:23

password management platform does just

play27:26

that keeper locks down logins payment

play27:28

cards confidential documents api keys

play27:32

and database passwords in a patented

play27:35

zero knowledge encrypted vault

play27:37

and it takes less than an hour to deploy

play27:40

across your organization

play27:42

sign up for a keeper free trial for your

play27:44

organization today and get a free 3-year

play27:47

personal plan stop sharing emails and

play27:50

spreadsheets with the keys to the

play27:52

kingdom get started by visiting

play27:54

keepersecurity.com

play27:57

shared security so the last topic on

play28:00

android versus ios we want to talk about

play28:02

text messaging

play28:04

um and you know because obviously text

play28:07

message just call yeah yeah well no one

play28:09

makes phone calls can you can you

play28:10

actually do that on a mobile phone oh

play28:12

yeah you can

play28:14

yeah we call it a phone

play28:16

and a telephone meant

play28:19

calling somebody

play28:20

um

play28:21

so let's forget calling it a phone but

play28:24

anyway

play28:25

uh text messaging so i think apple

play28:28

everybody knows we have imessage

play28:30

which is the blue texts and then android

play28:34

is the green

play28:35

[Laughter]

play28:37

so for those of you in the apple

play28:39

ecosystem

play28:40

it is a source of large controversy that

play28:44

that's my android friends show up as

play28:46

green and my apple friend shop is i kind

play28:49

of like knowing who's who's green and

play28:51

who's do you yeah here's here's my

play28:53

question

play28:55

did apple pick green to imply that us

play28:58

android users are jealous of you i i

play29:01

want to know if that was the thought

play29:03

process right because if i was doing it

play29:04

i would totally do it that way

play29:06

it's because all apple users are just

play29:08

blue you know we're all down in the

play29:09

dumps

play29:10

yeah well you know there is i did a

play29:13

little bit of research on that and it's

play29:15

because there is no interoperability

play29:17

between

play29:18

the messaging systems um which

play29:21

either company could have set some

play29:23

standards

play29:24

and

play29:28

right there is one but and they ruined

play29:30

it

play29:31

yeah sorry that i'm jumping ahead yeah

play29:34

but

play29:35

not really a security or privacy related

play29:38

topic but it's very interesting and

play29:40

we'll have a link to in the show notes

play29:41

where you can kind of go down that

play29:42

rabbit hole but let's just say that

play29:44

there is

play29:46

there's just some various reasons for

play29:48

not coming together on a standard but um

play29:51

regardless from a security perspective

play29:54

so imessage um is and encrypted unless

play29:59

you back up to icloud

play30:02

and only send messages to other

play30:04

iphone users because if you don't send

play30:07

it yeah that's correct yeah

play30:10

it'll default to sms for

play30:12

others like android so and to be very

play30:15

clear for the people who don't know

play30:17

none of the s's in sms stand for

play30:19

security

play30:21

that is correct that's the message

play30:23

there's nothing secure about it no at

play30:25

all

play30:27

now google um so there is the google

play30:29

messages app um which you can enable

play30:33

end-to-end encryption

play30:35

but it has the same problem right when

play30:37

sending messages to those people not

play30:40

using the google messages app or an

play30:43

iphone user so

play30:45

similar in some ways sounds to me like

play30:48

there should be an xkcd cartoon for this

play30:50

yeah

play30:51

yeah now kevin you're an

play30:52

android user i was going to ask you if

play30:54

you use google messages um

play30:57

on your phone yeah

play30:58

so i use signal

play31:01

which we'll talk about um i believe

play31:06

i enabled google messages as one of the

play31:08

options if i remember correctly um i i'm

play31:11

i say that because i was trying out some

play31:13

different messaging

play31:15

yeah uh systems right when i had a

play31:18

verizon phone

play31:19

there was a verizon messages app that

play31:21

was pushed down by default um i no

play31:24

longer have a verizon phone yeah um but

play31:26

yeah i'm 99 now i'm looking at my phone

play31:29

like i want to check

play31:31

um but i use signal for for lots of

play31:33

things um

play31:35

as people should in my opinion but um

play31:38

i

play31:40

i'm the oddball though

play31:41

i'm a very firm believer that people are

play31:43

going to read my messages anyways so i

play31:46

don't use sms for anything that i'd be

play31:49

worried about somebody reading over the

play31:51

internet right um

play31:53

but that's but that's me right like i i

play31:55

don't i'm not saying that makes it okay

play31:58

i'm just saying

play32:00

i use sms as a

play32:03

when i s mess somebody it's

play32:05

it is not secure it's nonsense yeah

play32:07

right yeah yeah you get a little name

play32:09

from me or something yeah and that's

play32:11

kind of my take too is like i mean

play32:13

obviously with all all my friends that

play32:15

you know we're chatting in a group text

play32:16

or something like that you know there

play32:18

are going to be a few android users and

play32:20

like i'm not sending anything that you

play32:22

know is considered sensitive and if it

play32:24

gets intercepted like okay well big deal

play32:28

but there are conversations and

play32:30

obviously things related to maybe

play32:31

business or other stuff that i'm going

play32:33

to use signal for

play32:35

um

play32:36

because you know i just want that extra

play32:37

layer of security and to be frank i

play32:40

actually like a lot of the features

play32:42

within signal

play32:43

um a little bit better than what's

play32:46

available in imessage

play32:47

so

play32:48

but again the problem is

play32:51

i have friends that probably will never

play32:52

use signal

play32:54

nor will i'll be able to convince them

play32:55

to use here's yet another app you need

play32:57

to use for your messaging

play33:00

unless they're in this security

play33:01

community yeah

play33:02

then everybody's using it right but but

play33:05

i have friends outside of security that

play33:06

i need to talk to what i would love to

play33:08

see is i would love to see apple and

play33:11

google

play33:12

push signal down yeah adopt it into the

play33:14

os yeah

play33:15

right like not not embedded in the os

play33:18

the underlying technology yeah yeah yes

play33:20

push down the app as a default like hey

play33:23

you buy a new iphone it has signal on

play33:26

um they would overnight increase the

play33:29

number of people using good stuff of

play33:31

course i will tell you that i cringe

play33:33

every time i see the ad from

play33:36

meta about the whatsapp where they're

play33:38

have you seen the new ads they're

play33:39

playing where like the

play33:41

post office guy comes to the door and he

play33:43

hands them

play33:44

like why is my mail open and they're

play33:46

like i don't know maybe somebody read it

play33:48

use whatsapp

play33:50

oh

play33:58

yeah

play33:59

and and we've we've talked about

play34:00

messaging secure messaging apps on the

play34:02

show before and we've always come back

play34:03

to our recommendation as signal um

play34:06

you know i know there's telegram

play34:08

whatsapp there's wire there's a bunch of

play34:10

apps out there um

play34:12

you know but just in terms of like

play34:15

what's been tested by multiple people

play34:18

um plus you know i think the company

play34:22

behind moxie marlin spike's company

play34:24

behind uh signal

play34:26

um

play34:27

you know the guy is

play34:29

super smart and he talks a lot about

play34:33

how he

play34:34

develops his apps and so i have one

play34:36

question for you on this and that is you

play34:38

know is it likely or do you think it's

play34:40

likely that uh signal will ever somehow

play34:42

be outlawed

play34:44

right there's always oh there's

play34:45

absolutely places that will outlaw of

play34:47

course yeah well let's be very clear

play34:49

both in the u.s and in the uk and i

play34:53

believe canada as well there are

play34:55

serious efforts to back door encryption

play34:58

at that point signal will be outlawed

play35:01

well not to mention here in the united

play35:03

states there are actually active

play35:06

discussions going on in u.s congress

play35:08

about

play35:09

banning end-to-end encryption yeah

play35:11

the us i thought i did yeah

play35:17

yeah you know what i said was the us and

play35:19

the uk and i believe canada is also

play35:21

doing it that's uh yeah i'm trying to

play35:23

remember

play35:24

but yeah no the us is doing i absolutely

play35:26

believe that

play35:29

i would never support

play35:31

insurrection but if you were going to be

play35:35

an insurrectionist

play35:37

this would be a reason to do it not

play35:39

electoral college yeah what

play35:42

i'm like sure i don't put this one in

play35:44

the uh the uh the show preview

play35:47

yeah yeah yeah

play35:50

today

play35:51

i would not be a nazi i should watch it

play35:54

kevin did i hear kevin saying you want

play35:56

some interaction

play35:58

i just i don't understand i honestly

play36:00

don't understand i i wish you never i

play36:03

don't know about recently but when i was

play36:05

younger when i was a teenager when i was

play36:07

a kid

play36:08

one of the popular tropes in movies and

play36:10

tv shows was

play36:12

the parent and the kids swapped bodies

play36:15

for the day freaky friday yes yeah yeah

play36:18

friday whatever like all of those types

play36:19

of shows

play36:20

i i would like one day

play36:24

just to know

play36:26

what

play36:27

ignorant

play36:28

thoughts

play36:30

are going through a politician's mind

play36:32

and i want to regret any of the

play36:33

politicians practically i i want to know

play36:36

how they

play36:38

delude themselves into believing

play36:42

that they are supporting privacy

play36:45

supporting the population supporting

play36:48

good

play36:49

and supporting breaking encryption yeah

play36:52

i like those two i just yeah how do you

play36:55

make both of those statements come out

play36:57

of the same faithful

play36:59

and believe that that is

play37:01

yep you know would be fun kevin

play37:03

we should get a politician on the show

play37:06

so we could have that conversation i'm

play37:08

being totally serious yeah yeah i would

play37:11

love it if we could find you know

play37:13

that's a great idea

play37:15

and kevin couldn't actually punch him in

play37:16

the throat

play37:18

i know because they won't be in the same

play37:19

room so there could be no

play37:21

there'd be no violence but i want to be

play37:22

very clear like i would want to have

play37:24

that conversation

play37:26

because i don't believe

play37:28

that's a political or bipartisan like a

play37:32

you're bipartisan i believe that no

play37:34

matter what your politics are whether

play37:36

you're a republican a democrat a

play37:38

communist a libertarian a

play37:42

fruitarian i don't know if that's a real

play37:43

thing

play37:44

doomsday

play37:46

right uh a fruitarian is somebody who

play37:48

believes that strawberries should be

play37:50

illegal um is what i've decided

play37:54

i don't know

play37:55

but i don't know what your politics are

play37:57

i believe that that should be an easily

play37:59

answered question

play38:01

how do you support privacy and back

play38:03

dooring encryption all right

play38:06

that's like a call for for politicians

play38:08

to reach out yeah yeah i'm i'm going to

play38:10

research that one and see who we can get

play38:13

i'd love to have like a u.s senator on

play38:16

the show wouldn't that be amazing yeah

play38:19

i'm in

play38:20

okay all right all right well you heard

play38:21

it here first folks uh and if you have

play38:24

any leads to any uh uh politicians

play38:27

ex-presidents anything like that we'd be

play38:31

greatly interested in speaking doesn't

play38:32

mean we need you to hide wait wait wait

play38:34

wait no no no don't hack them you said

play38:37

ex-presidents and i want to be very

play38:39

clear

play38:40

there's one we got no interest in

play38:42

talking to you

play38:43

no

play38:44

not true

play38:59

well uh with that um hopefully everybody

play39:02

uh got some good uh advice just

play39:05

to summarize it goes back to your you

play39:08

know personal

play39:10

uh threat level your you know risk level

play39:13

risk tolerance those types of things um

play39:16

there's pros and cons to both obviously

play39:19

um kevin even has said you know he likes

play39:22

ads personalized ads right yeah um

play39:26

and some people do and they're okay with

play39:27

that so you just got to make your own uh

play39:29

judgment call from a privacy in in cyber

play39:32

security perspective but i think the big

play39:34

important thing to remember is

play39:36

be aware of what you're deciding that's

play39:37

it that's right exactly too many people

play39:40

make the decision understand the risks

play39:42

making the decisions yes right like that

play39:44

they just default i that's where i think

play39:46

it's the problem is that they're i can

play39:48

accept the problem to the personalize

play39:50

that so i like them because i'm aware

play39:52

i'm accepting it

play39:54

and i'll just say if you want to

play39:55

continue this conversation check out our

play39:57

reddit community um yeah and the shared

play39:59

security show subreddit and uh we'd love

play40:02

to chat more about this uh i think

play40:04

really important topic yes so

play40:07

all right everyone well folks

play40:09

thanks for listening and we will catch

play40:11

everyone next week

play40:13

thanks for watching if you enjoyed this

play40:15

episode and you'd like to help support

play40:17

the podcast hit that like and subscribe

play40:20

button to catch all the latest from the

play40:22

show visit our website

play40:24

sharedsecurity.net

play40:25

follow us on twitter at sharedsec and

play40:28

join our reddit community on the shared

play40:30

security show subreddit

Rate This

5.0 / 5 (0 votes)

Связанные теги
CybersecurityPrivacyAndroidAppleApp StoresOS UpdatesDevice TrackingAd TrackingText MessagingSignal AppEnd-to-End Encryption
Вам нужно краткое изложение на английском?