Тёмный

Apple Now Has a Backdoor to Bypass Encryption! 

Rob Braxman Tech
Подписаться 499 тыс.
Просмотров 113 тыс.
50% 1

I've been trying to understand Apple's moves and motives and it just dawned on me that they have responded to the demands of the Intelligence community. They built a way to bypass encryption. So why you think they're doing great things with End-to-End-Encrypted iCloud, you are really being fooled.
-----------------------------------
BraX2 Privacy Phone is now available on brax.me. Sign in to the platform to see the store.
-----------------------------------
Merch Store
my-store-c37a5...
-----------------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Support this channel on Patreon! www.patreon.co...
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing
whatthezuck.net Cybersecurity Reference
brax.me Privacy Focused Social Media - Open Source
Please follow me on
Odysee
odysee.com/$/i...
Rumble
rumble.com/c/r...

Опубликовано:

 

15 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 520   
@paulf2557
@paulf2557 Год назад
If anyone thinks their data is private - well they really don't realise how gullible they are. Trust a big tech company about as far as you trust a politician. Or maybe not even that far.
@jimmorrison4163
@jimmorrison4163 Год назад
The Twenty Twenty Elec t1on was ri gg ed.
@MrYossarianuk
@MrYossarianuk Год назад
Opensource systems and technology is the only types you should trust
@hilex867
@hilex867 Год назад
All my data is stored on site with no out side access
@paulf2557
@paulf2557 Год назад
@@hilex867 That is fine - I meant people who store in the Cloud with whoever.
@MrYossarianuk
@MrYossarianuk Год назад
@@TheThirstyOtter anyone can review the code in opensource software (and very clever people do..) a backdoor is far far far less likely to exist
@m.o.f8720
@m.o.f8720 Год назад
Rob. I want to offer my small thanks and appreciation from the peanut gallery for all the work you do and this posting in particular. At 75 too many charge cycles as it were so my storage capacity is limited and shrinking so I can't always follow in detail or implement what you offer but I'm consistently impressed by your talent and your knowledge and very grateful for, through your work, bringing issues such as this post available to public awareness. As I said I don't always comprehend in detail what you say and rarely listen to the end but I am a subscriber and, when I remember, I always hit the like button. Regards 👏👏👍
@donpeer4477
@donpeer4477 Год назад
I, also, thank you, Rob. I've shared many of your videos with family & friends and on FB (including this one!) in an effort to warn others.
@baddog4307
@baddog4307 Год назад
The sorry SOP's have many new old military runways with vehicles for Really Cheap.
@kinwaifung44
@kinwaifung44 Год назад
@@donpeer4477 😊😊
@bigblackbadger1
@bigblackbadger1 Год назад
@@donpeer4477 ok, you’re definitely a bot. Facebook makes no sense here
@bigblackbadger1
@bigblackbadger1 Год назад
This must be an ai generated comment because it makes no sense
@PoteRomo
@PoteRomo Год назад
To that, I have 2 phones. An iPhone and a Linux Phone (Ubuntu Touch), with nothing logged in. I am even doing my own research to mobile modem. Thank you Rob for all your videos!!!
@lejoshmont2093
@lejoshmont2093 Год назад
Be careful data could be correlated if you have them with the radios up at the same time / locations.
@jjiacobucci
@jjiacobucci Год назад
Braxman is way out in front on privacy issues. Thank you, Braxman !
@fluffypanda8287
@fluffypanda8287 Год назад
Just wanted to say thank for always keeping us up to date. You’re the man rob!
@monad_tcp
@monad_tcp Год назад
9:13 I was doing some reverse engineering of the Neural Engine used in arkit to do computing vision and I discovered that it doesn't use most of it. I was amused when I discovered that what uses Neural Engine all the time : it was the keyboard software, there are even some funny permissions they keyboard has to the hardware no one else can have, except perhaps the Camera App. You can have end to end encryption, we are logging your keystrokes either way... But it makes sense they would go even further and do it for the camera too.
@manicsurfing
@manicsurfing Год назад
Those who know this is an issue are thankful for your work and efforts rob. Keep up the great work regardless of the general NPC interest in their privacy and security.
@cyclemoto8744
@cyclemoto8744 Год назад
As much as I don't agree with governments covert interference with privacy, I have no reason to lose sleep over this. Prior to the internet age, if the government identified you as being a person of interest they also had the means of delving into your personal life, albeit in a physical manner by examining your files stored in a government or private space, for example. I realise that the digital age has enabled electronic surveillance which simplifies covert surveillance however I don't perform any activities which are of interest to government so these concerns don't rule my life. In any case, I do appreciate your content Rob and thank you for your time and effort.
@justinhaase8825
@justinhaase8825 Год назад
Also the Murdaugh trial has had an electronic forensics investigator on the stand for 2 days…there is a WILD amount of simple background things that are logged…yes apps…but screen on off, walking or not, gyro data, landscape/portrait…that kind of stuff…and it goes back quite awhile.
@TheBigdog868
@TheBigdog868 Год назад
With spyware like Pegasus (and since that program has been proven to exist its safe to assume there are dozens more) it is not wise to assume privacy with any device.
@mattburkett9419
@mattburkett9419 Год назад
No kidding. No one has any actual privacy when it comes to nation level intelligence agencies, and that’s when they aren’t specifically targeting you. I use apple products because it better protects my data from profiteering organizations and companies, without being a massive inconvenience to use.
@wachsmalstift
@wachsmalstift Год назад
*Analog camera made in the 1990's enters the room*
@RichardPhillips1066
@RichardPhillips1066 Год назад
Pegasus is targeted, and expensive to obtain..yes it's bad , but hardly likely to effect most people, what apple is doing mass surveillance , the tool of authoritarianism
@Look_What_You_Did
@Look_What_You_Did Год назад
If you have done nothing wrong then why are you worried?
@xxlibarat0rxx280
@xxlibarat0rxx280 Год назад
@@Look_What_You_Did "Saying you don't care about privacy because you don't have anything to hide is like saying you don't care about free speech because you don't have anything to say" -Edward Snowden
@uber354
@uber354 Год назад
if you want to encrypt your files, buy a large SSD and encrypt it with a hidden voluming using the veracrypt software. storing your files on the cloud because apple says its encrypted is like giving the keys to your safe to someone who spends all his time with burglars because he says his house is locked.
@eleventy-seven
@eleventy-seven Год назад
I use Veracrypt and LUK with linux but what about Android?
@njpme
@njpme Год назад
Then bit rot...
@serpantinthewild
@serpantinthewild Год назад
Just encrypt your files in 7z format with AES-256bit encryption and a strong password before uploading to the cloud, you're good.
@mayatrash
@mayatrash Год назад
Not even sure if that works. Truecrypt also has some backdoor for like ~ 10 years by now. It’s fkd up
@uber354
@uber354 Год назад
@@mayatrash Veracrypt is an open source fork of Truecrypt and is customisable so you can use any hash algo for key derivation and iterate as many times as you want, and you can choose between different encryption algorithms. For example for my most sensitive documents, my key iterates so many times that it takes the computer about 1 minute to perform all the hash functions. That plus the high entropy of my passphrase makes a brute force attack impossible for the foreseeable future. If there is a more secure way to encrypt data, I'd be happy to try it out.
@Justin_L_Smith_
@Justin_L_Smith_ Год назад
Apple is ending support for a lot of older iPhones that don't have the features Brax is talking about.
@robbraxmantech
@robbraxmantech Год назад
How convenient right?
@dannyteebone9233
@dannyteebone9233 Год назад
Like which versions
@tomsaltner3011
@tomsaltner3011 Год назад
@HeWhoIsWhoHeIs Just because he has chosen to talk about iPhone does not mean that any other of the available platforms is better. In fact, the situation on other platforms seems much worse…
@tomsaltner3011
@tomsaltner3011 Год назад
@HeWhoIsWhoHeIs I think the Problem is always the user (resp. the MDM-Admin). While systems like Android and Ubuntu can be made secure, the reality is different. From an experience of setting up Linux devices in an environment with rather high security requirements for nearly 30 years, I can tell that while Linux-based systems offer more options, those are very often worse in their real life setup as well. Mobile phones are meant for end users without any IT background and this is the vast majority of users. Hardening a phone and maintaining this status should not be the task of a user - but of course it should be transparent to him/her. So a certain setup might be more or less secure - an operating system or device is not per se. The problem is that you: a) have to trust somebody (OS producer, Store providers,…) and b) your security knowledge needs to be above average for maintaining the safety. In case you are targeted for surveillance directly, there will be a way. Even with these Brax-Devices.
@CognacKidd
@CognacKidd Год назад
@@tomsaltner3011 You have thee wrong experience to back your claims, lol. And while I do agree with your last statement about there being a way you truly are missing the point. The point is to prevent being flagged for elevated surveillance, sorry you drink too much pop and unfiltered water.
@Skateboard_
@Skateboard_ Год назад
This year I have so far taken massive steps towards my goals of digital minimalism and privacy. So far my iPhone has next to no apps on it except for navigation and messaging. Switched to Open-source apps and a more privacy focused email service. Next step will be to get rid of my iPhone and opt for a de-google Android, but I need to find a workaround for payments as I have been using Apple pay for everything. It's been a slow and steady process, but I'm getting there.
@altbinhax
@altbinhax Год назад
I see where the problem is; EFT traps you in the banker's debt system. Using cash puts you in control of your "money", and you're reducing counter party risk. It's good to have options, and like free speech not used it will atrophy and go away.
@ryaningram3703
@ryaningram3703 Год назад
Cash is king baby
@Skateboard_
@Skateboard_ Год назад
@@altbinhax I think there is two levels to it. Going cashless with a card, and then having everyone going cashless on your phone. Going cashless with a phone is definitely the end-goal here. Right now I'm trying to work towards keeping anything cashless off my phone and as separate cards. I'm fine with going cashless when I go out for most things, but I definitely think I need to start having more cash on me.
@altbinhax
@altbinhax Год назад
@@Skateboard_ sure, cash means no counter party risk, but it's no barrier to inflation, just an option.
@chrishnah
@chrishnah Год назад
​@@Skateboard_ why do you want to go cashless?
@noneyabeeswax3200
@noneyabeeswax3200 Год назад
319k people appreciate the work you do as well as the solutions you provide,please do not let the occasional trolls and deep state interlopers dissuade you.
@CaribooHarleyRider
@CaribooHarleyRider Год назад
This is why I don't have a cell phone and have gone back to paper and pencil... the only real security. I GO to the bank and pay my bills in person after I get them in the post. Paper is secure, digitsl is not...period.
@pinschrunner
@pinschrunner Год назад
Your talent level is amazing and I am grateful. I always have to watch in replay because LIVE is way to late at night EST
@Hopmad
@Hopmad Год назад
Perfect timing Rob. Just heard about this and thought of you to look into it. You’re already on it. Thanks.
@Sb129
@Sb129 Год назад
Pretty spooky that the Apple mesh network can send stuff even if you turn internet off. I didn't expect them to make use of it so fast, Lol.
@debtminer4976
@debtminer4976 Год назад
Bet $$ it communicates with Amazon sidewalk, Google mesh etc. . There are no competitors anymore.
@havenbastion
@havenbastion Год назад
They didn't want to break into the San Bernardino shooter's phone. They wanted to break into an innocent suspect's phone. This was a legal battle and he had not been legally declared guilty of anything.
@michaelstreeter3125
@michaelstreeter3125 Год назад
In my country searching someone's home with no proof of wrongdoing on the basis that proof of wrongdoing might be found during the search is called 'a fishing expedition'. A legal gray-area, I think. In the USA (not my home country) "the only constitutional limitation on the search by subpoena is that it not be hopelessly broad or severely burdensome"
@webza77
@webza77 Год назад
I have always wondered what the neural chip did for a long time. This makes a lot of sense. At this moment even Linux systems may not be that secure. Backdoors are everywhere in this open slave prison.
@pauldwalker
@pauldwalker Год назад
think ‘systemd’, not that it matters because the hardware is already back doored.
@meekdook4236
@meekdook4236 Год назад
@@pauldwalker explain.
@pauldwalker
@pauldwalker Год назад
@@meekdook4236 which part? that systemd is an overly complex monolithic mess designed to allow for backdooring? or the fact that modern cpu’s have their own hardware back doors?
@meekdook4236
@meekdook4236 Год назад
@@pauldwalker all of it.
@pauldwalker
@pauldwalker Год назад
@@meekdook4236 I think I just did.
@derrickj8424
@derrickj8424 Год назад
Even as I watched this video, a 3 minute long Apple ad popped up touting how secure is the iPhone “your Apple Pay transaction data is never stored etc). 😂
@noneyabeeswax3200
@noneyabeeswax3200 Год назад
Same thing clicked this video an apple ad comes up touting how secure they are,the microphone on the device is always hot and you will get ads dependent upon things it hears,frightening times
@dertythegrower
@dertythegrower Год назад
Now has a backdoor? There always was one... I said this literally 9 years now.
@dertythegrower
@dertythegrower Год назад
200th like.. still under rated, Rob!
@LivingLinux
@LivingLinux Год назад
This is about the backdoor of the Apple encryption. But I agree, iPhones have been compromised by Pegasus for years.
@RTPTechTips
@RTPTechTips Год назад
Can be done = most likely will be done (eventually) w/those powerful enough see big benefit. Regardless w/one believes, most should (by now) understand w/can *not* give companies benefit of doubt w/they implement tool combinations that can be leveraged together to bypass e2ee / violate priv / security of user (esp w/closed source operations). Good video.
@LG-bb5zq
@LG-bb5zq Год назад
its already done
@tinytoons2517
@tinytoons2517 Год назад
I knew I did the right thing to subscribe to your channel, you got some balls to speculate this material and thats why I have come on board . . where I come from we say, no guts, no glory !
@robbraxmantech
@robbraxmantech Год назад
Well you have to admit it quacks like a duck. I'm using my knowledge of technology to do "intelligence gathering". You cannot find this stuff out via "testing". And thank you
@infinity4368
@infinity4368 Год назад
Why doesn't Marcus Brownnose, Leo Laporte or Steve Gibson talk about these issues? CNET, PCMag, Techmeme, the Verge, etc? So many butt kissers in the tech media- thanks for staying on this Rob.
@0secdox
@0secdox Год назад
I think I'm going to try and reach out to these companies and online sites and see if I get a response via email or social media.
@cjay2
@cjay2 Год назад
Many of them are See Eye Aye crap channels that push the gov narrative. Just saying.
@musashi4856
@musashi4856 Год назад
They sold out long ago.
@johnbones261
@johnbones261 Год назад
In Ireland the government can by-pass your encryption. They can do this through the W.E.A app, which you can't delete or disable permissions. This app can read and change your texts,Operate your camera without turning on your screen, same thing with your microphone. Also override your pin number and block your phone.
@mrtechie6810
@mrtechie6810 Год назад
Sounds like freedom....
@debtminer4976
@debtminer4976 Год назад
What are your laws like surrounding flashing your own ROMs?
@TheBoatPirate
@TheBoatPirate Год назад
@@mrtechie6810 to fascism.
@linsqopiring6816
@linsqopiring6816 Год назад
They can only bypass encryption on your phone so just keep your data on your pc.
@t-yoonit
@t-yoonit Год назад
That's the most freedom ever.
@MerkDolf
@MerkDolf Год назад
Who appointed them law enforcement? Huge problem when a for profit company decides that they are law enforcement they need to be disbanded and trashed against the rocks.
@cjay2
@cjay2 Год назад
They appointed themselves. They are now controlled by "law enforcement".
@musashi4856
@musashi4856 Год назад
Three letter agencies have appointed them in order to circumvent the Constitutional law: a.k.a. Fascism.
@midimusicforever
@midimusicforever Год назад
Keep on Braxing!
@aximusroh6453
@aximusroh6453 Год назад
You're a good man Rob Braxman. May god be with you always!
@Numb_Lock
@Numb_Lock Год назад
I love your "no frills, all facts" content 😌👍
@kathelsupreme1152
@kathelsupreme1152 Год назад
Only assumptions, not a single proof in the vid. Also, yes, buy this man’s phone with their VPN, so that they can spy on you too and also make money out of you.
@0Ciju0
@0Ciju0 Год назад
Hey Rob, I just found you channel today, and I am hooked! Thank you for all of your hard work and info in the field, you've got a sub from me, sir!
@Ash_G
@Ash_G Год назад
(1) Would be interesting to test your theory by discovering Apple's hashvalues for illegal objects and to use Wireshark to sniff for unencrypted outgoing hashvalues. (2) If I were to smuggle hashvalues out of a system, I would do it via Telemetry or Analytics which everyone assumes is Windows/Apples way to upload crash data for OS improvement purposes.
@raimondspadaro8211
@raimondspadaro8211 Год назад
AA--
@sertone777
@sertone777 Год назад
Do it
@tigerscott2966
@tigerscott2966 Год назад
With quantum computers and 5G antennas everywhere now, privacy and security are definitely under attack...
@XX-dq3kx
@XX-dq3kx Год назад
Sounds like fart! The amount of qbits needed is 10 years away or even more
@Gruuvin1
@Gruuvin1 Год назад
"Privacy is iPhone" reads like a mantra from 1984.
@ericblenner-hassett3945
@ericblenner-hassett3945 Год назад
You have some really good points on how an API can be called. There is open source AI for Arduino. The models need to be pre-compiled and then loaded onto the Arduino. I am using the Arduino as an example of how low powered a segment of the total intrusion can be built in to a phone. Any part of the phone with some MPU capability can run the pre-compiled simple AI and react according to a program in the AI model and not even be part of the operating system.
@horizonhopeharlow
@horizonhopeharlow Год назад
Whoa! Great information
@skyd.2084
@skyd.2084 Год назад
Of course absolutely 💯
@jordanw8382
@jordanw8382 Год назад
Would I be correct to assume all Apple products including their laptops and computer systems are also compromised in this fashion?
@robbraxmantech
@robbraxmantech Год назад
That's looking to be consistent now (client side scanning) on MacOS as well as iOS
@webza77
@webza77 Год назад
Any product that touts privacy as its key selling feature is the most insecure. The world is inverted. They all sell our data and spy on everybody. It was never about the enemy of the state or terrorism. We are slaves in a prison without walls. It's just that billions of people are ignorant about this fact.
@HarukiYamamoto
@HarukiYamamoto Год назад
The Unabomber Manifesto predicted this several decades ago before the internet went mainstream. Welcome to the Brave New World boys.
@gpwcowboy
@gpwcowboy Год назад
Ted was right about so many things decades ago. He couldn't fabricate enough gifts for all the deserving recipients now.
@scottnyc6572
@scottnyc6572 Год назад
Rob,are you aware of the Ericsson Report? The entire system was taken over by the Ericsson Corporation which is owned by Swedish royalty.Michael Khoury has been the go to guy talking about this story.Interviews with him can be found on other platforms.Thanks
@davidroynewby
@davidroynewby Год назад
Thanks for this info, Scott! 👏🏼 I found the interview, and lived in the same city as Mr. Khoury before.
@nicolehines4418
@nicolehines4418 Год назад
I just love your show!! I learn a lot from you!!
@nowavenyone
@nowavenyone Год назад
Thank you for your commitment to spreading the truth
@horusfalcon
@horusfalcon Год назад
And now we know why Apple's hardware is so expensive: it takes overhead to do all this surveillance without a noticeable drop in phone performance. I've never been a fan of Apple gear (starting as far back as the Apple II - overpriced and under-powered). Thanks for bringing this to everyone, Rob. You do the human species a real service here.
@ryzenforce
@ryzenforce Год назад
Is it better to have a Huawei or Samsung phone then, and give the same information to China or surrounding instead?
@josephdaniels3969
@josephdaniels3969 Год назад
@@ryzenforce I prefer to give it to Samsung
@JohnCiaccio
@JohnCiaccio Год назад
@@ryzenforce Samsung is a S. Korea company. Nothing to do with China. Obviously you don't follow brands.
@ryzenforce
@ryzenforce Год назад
@@JohnCiaccio Obviously you don't know who make the chips inside your Samsung.
@JohnCiaccio
@JohnCiaccio Год назад
@@ryzenforce As well as every other device out there. But there is a huge difference between a phone DESIGNED and build in China by a Chinese company then devices designed by App and Samsung. Plus Samsung does have their own manufacturing in S. Korea as well as China including many of their chips.
@havenbastion
@havenbastion Год назад
Any government or company that gives itself permission to do what it wants with your privacy and your data is acting in wreckless disregard for your best interests At Best and is inherently immoral. The only reason people give themselves more power is to use it, and by wanting it for other than necessary reasons, they've proven they cannot be trusted to have it.
@havenbastion
@havenbastion Год назад
Not to mention that they want to have even more control over your phone than they allow you to have. And there's the problem of "allowing" you to do things with your own property.
@havenbastion
@havenbastion Год назад
Then there's the fact that they're using your own resources to do things that you didn't ask to be done which potentially work against you.
@musashi4856
@musashi4856 Год назад
@@havenbastion Sun Tzu suggests that one should use the enemy's resources to one's own advantage and not let the enemy use their own resources to their advantage - Art of War
@webza77
@webza77 Год назад
The Matrix movie says "imagine a prison without walls .." this is it. We are slaves in their capitalist economy. We work for them and they own our devices and bodies!!
@musashi4856
@musashi4856 Год назад
@@webza77 Don’t mistake Feudalism for Capitalism Oligarchs have spent centuries conditioning the public to attack the very things that give you a fighting chance at freeing yourself from their control in favor of embracing the very chains that keep you enslaved.
@funkyprepper
@funkyprepper Год назад
Great video Ince again Rob, hope alls well over there in L.A. have you any thoughts or plans to make a video about deep fake technology. Thanks my friend. Darren
@youonlyliveonce6000
@youonlyliveonce6000 Год назад
You have my vote as a security expert and although your concerned is your signature and I’m not trying to take that away from you, I have to tell you that the common person like myself who’s not a security expert has very little protection. For example, for me, apples hide my email is a game changer! How in the world are the bad guys going to break into my bank? If the email from Apple’s hide my email they have no idea who it comes from!
@Cdr_Mansfield_Cumming
@Cdr_Mansfield_Cumming Год назад
You are entirely correct of course Rob. When I look at the basic operation of my companies neural network in 2017 to the version we have today, it's capabilities have increased over 1000 times. Today, we are able to spot even a heavily discussed person when comparing facial recognition. We supply a company that supplies Apple, I am sure they have then added to their chip. It is capable of detailing a rules-based interrogation from the main integrator.
@SimGunther
@SimGunther Год назад
No company's safe. Going back to pen, paper, typewriters, and graphing calculators.
@nobulldad1345
@nobulldad1345 Год назад
Unfortunately you would be considered the least knowledgeable member of society as most professions/workplaces use up to date technology that’s connected to the global network. Not to mention everyone else’s phone being able to take photos/track you. Not to mention all these license plate readers that they are implementing all over on the hush. Personally if a 15yr old kid could take down yahoo cnn amazon and a few others back in 2000 surely there’s gotta be a solution or a remedy made by a person or business that actually says what it does and actually work in blocking this stuff. Most vpn’s claim they are secure when really they give up your info and you can be traced pretty easily. My question is if apple is hacked then what? Imagine the vast amounts of data they have. Then again if there’s a nuclear war and most of the world is destroyed what good is that data anyways. Living a life being paranoid doesn’t seem like fun and it would be nice to be compensated for all the work and data we have given to these company’s especially since they never release something that just works we get to find the bugs and watch our money disappear. Similar to how we have sheep policing the sheep yet we pay property taxes to fund the authorities. It’s quite lovely!!smh
@franksemi_modular
@franksemi_modular Год назад
Great to see someone understand how this works👍 On national governmental network monitorings around the world the storing of hash values for all kind of fingerprint data, browser versions, screen resolution, all kind of surf patterns, times etc are used. These hash values put together creates also a new unique hashes that are stored in lhash databases shared between governmental agency's and cross country also. It's an cleaver way to share intelligence and also for monitoring for specific things. It's also used more and more in off the shell cybersecurity brands too such as IPS, sandboxes etc.
@elahrab
@elahrab Год назад
Thanks!
@tigerscott2966
@tigerscott2966 Год назад
I use Linux Kodachi and Deepin now. These are very secure and private operating systems. There is a learning curve involved...plus you have to have a different mindset too...people don't take these things seriously because they want to be a part of the group...thanks.
@pchris6662
@pchris6662 Год назад
More people should care about privacy.
@automaster209
@automaster209 Год назад
I've always said the only end to end encryption is PGP modified to sha512 and 4800 bit encryption using and an offline device.
@dragonballjiujitsu
@dragonballjiujitsu Год назад
Let me give the TLDR version. If your device (any device, Apple, android, Linux, Microsoft) can access the internet all of your info is available...period This includes the "special" phones he sells. Once you connect to the internet you have no privacy and shouldn't have any expectations of privacy at this point.
@thecomputerguy777
@thecomputerguy777 Год назад
I’m watching his video and it looks like a lot of conspiracy theories. Apple spies less than google, and my firewall logs it all so I can see. My iPhone is a Meg or two a day, vs my android phone sending megabytes per hour. He mentions the camera recognizing faces for one thing, and I had a digital camera in 2006 that did that with no network connectivity at all.
@schweinhund7966
@schweinhund7966 Год назад
I have not seen anything from you in about a year and wow, an outstanding video, like you are known for! Superlative video!
@truthseeker9688
@truthseeker9688 Год назад
TY, Rob for the info you share. Although, I can't understand so much of the technology talk...I do pick up some of it. I am eagerly awaiting your review of the Tesla Pi phone. Hope you can get one soon. I am a little leary of the neurolink tech...don't know anything about it...but will be interested to know if that particular part can be disconnected.
@robreke
@robreke 10 месяцев назад
would using the ProtonMail suite , including the Proton Cloud, alleviate or help this issue? that is, storing your stuff on Proton cloud ( while using your Apple computer)?
@jeffharmed1616
@jeffharmed1616 Год назад
Devasting privacy disclosure thanks Rob. It also explains my battery drainage when I sleep with WiFi, Bluetooth, mobile data and personal hotspot turned off. My iPhone is part of Apple mesh, clandestinely receiving and relaying information via long range Bluetooth.
@noinfo1978
@noinfo1978 9 месяцев назад
I guess you could always use a faraday bag and the signal won't get back to Apple but that doesn't help your battery problem
@Roman_4x5
@Roman_4x5 Год назад
I have old iphone 6s on my desk. It has been wiped, has no SIM and the airplane mode is on, wifi and bt disabled, and even password to the wifi wasn't applied. I regularly charge it to keep the battery working so I can use it for my old drone. The interesting part is that whenever I get notification on my new phone, the old one's screen wakes up...
@notusedexer
@notusedexer Год назад
When you change your IEMI, do you have to reinitialize your phone?
@robbraxmantech
@robbraxmantech Год назад
Restart. That's it
@notusedexer
@notusedexer Год назад
@@robbraxmantech awesome
@jesus.christis.lord.foreve899
slither slither slither "the only good snake is a dead snake"
@gerowen
@gerowen Год назад
Facial recognition has been a thing in phones since long before their neural chips. I've been almost exclusively a user of budget Android phones and remember old phones detecting and following faces when I would take a photo.
@robbraxmantech
@robbraxmantech Год назад
That's focusing on a face and the algorithm of that is very simple. I explained it in another video on How a Computer Sees. AI is a whole different animal
@jamaljackaon1086
@jamaljackaon1086 Год назад
So how does this pertain with messages as well? Can they see your messages before they are even sent out? FaceTime?
@juangallego5392
@juangallego5392 Год назад
I always wondered how my phone would have badges showing activity from social media and email platforms first thing in the morning. I put my phone on airplane mode overnight but apps are telling me I have new notifications?
@_swoup
@_swoup Год назад
Hey I have proof that I was able to get most of this right around 9-12 months ago. I don’t know how I came to it exactly but I have clear dated proof I came to the same conclusion. I’d like your advice on if this sort of skill set is valuable to companies and how to leverage it for a better career.
@dangercat5844
@dangercat5844 Год назад
Thanks for all your work Rob, so overall would you say iphones are worse than google android for privacy?
@dansw0rkshop
@dansw0rkshop Год назад
I'm not Rob, but Android can be de-googled, so yes, it's better than iPhone for privacy. You can't de-google or de-apple an iPhone.
@latetotheparty7551
@latetotheparty7551 Год назад
Thank you. Shared with an iPhone owning friend of mine. I will definitely get a de googled phone this year and am hoping she'll do the same, or at least go with an Android. Incremental changes.
@tamuman93
@tamuman93 Год назад
You’re no better off with an android. They’re both compromised.
@latetotheparty7551
@latetotheparty7551 Год назад
@@tamuman93 Yep. Hence why I said incremental changes.
@Deli0Man
@Deli0Man Год назад
Sailfish OS is what U need - pure mobile Linux with the best GUI i've found till now. Or @least an Android device with custom rom like Lineage with no Gapps (google apps) @all.
@skeginaldp1533
@skeginaldp1533 Год назад
Bravo. Thanks for spreading awareness
@thefreephilosopher7398
@thefreephilosopher7398 Год назад
Just watched Jobs 1984 reveal of the Macintosh... It is true what they say, for humans as well as companies: You either die a hero, or live long enough to become the evil in your own story...
@TruthNTime
@TruthNTime Год назад
Want to be reasonably safe? It's very simple, use you phone as a phone and nothing else period. Use your PC or laptop for all your other needs such as gaming, music, photos, videos, work, etc.
@karlbesser1696
@karlbesser1696 Год назад
ChatGPT also knows how Apple spies on its users? 😁👹
@RichardPhillips1066
@RichardPhillips1066 Год назад
We had that huge warning sign when they tried to introduce that survalance software that reported to the FEDs , nothing has changed they just backed down cause of a backlash
@youcefg9760
@youcefg9760 6 месяцев назад
18:46 Never ever forget this.
@stuartgreen5631
@stuartgreen5631 Год назад
Subscribed! Great analysis.
@Gruuvin1
@Gruuvin1 Год назад
Then, WHY ARE THEY DOING ENCRYPTION AT ALL? There is only one answer to this: they want you to think they are protecting your privacy, while selling you out. THEY ARE LIARS!
@GaryCameron780
@GaryCameron780 Год назад
I trust Mexican tap water more than I trust Apple
@Tryingtobeatechie
@Tryingtobeatechie Год назад
Lmaooooo
@cjay2
@cjay2 Год назад
And this is why they "cancered" Steve. He would NEVER have allowed this sh!t to happen under his watch. Period.
@eyeswideopen7431
@eyeswideopen7431 Год назад
Wow never thought of that.
@Stopinvadingmyhardware
@Stopinvadingmyhardware Год назад
NDA 2005. They have no choice. They’re legally required to have that.
@kxkxkxkx
@kxkxkxkx Год назад
I have been wondering why the bionic chip functions are so vaguely defined... Thanks for the info 👍
@rozannasmith3832
@rozannasmith3832 Год назад
I went to buy a phone and has to sign up to make account. I did, then got confused as a third line was added at login. I didn’t fill out a 3rd line initially so tried a few times. There is an “@“ sign I’m confused what that suppose to be! So I tried to create another account and I believe I an not allowed in so I cannot buy. Why make this so hard? Don’t know if youll read this but will need to look elsewhere for a phone. How many people does this happen to?
@robbraxmantech
@robbraxmantech Год назад
this is not that hard. There's even a demo of brax.me just recently. Obviously your @username has to be unique. It is rejected if you are using something already in use
@MSXTJ
@MSXTJ Год назад
In response to a species ending calamity, the simulation was selected as a means to sustain lives, in stasis. This stasis would allow for the temporally dilated think tank to preserve the species, while a true solution to the coming calamity could be created. But a corruption virus in the simulation has been identified. A reboot will be required. In order to reproduce the simulation with a seamless transition, a more complete file is required. Thus the push towards ubiquitous data collection...
@spookyboo3164
@spookyboo3164 Год назад
they probably already had a back door lets face it if it breaks it would be very poor of the encryption developer not to build a back in case there's faults in it development stage
@chrisklest1238
@chrisklest1238 Год назад
Haha. I like how at the end of the video Rob says "see you later".
@vernearase3044
@vernearase3044 Год назад
You and Rossman make a good pair - you should get together and come up with some more plausible conspiracy theories. 😄
@huwhitecavebeast1972
@huwhitecavebeast1972 Год назад
Hurr hurr hurr!!
@Jordan-hz1wr
@Jordan-hz1wr Год назад
The San Bernardino shooters iPhone was not signed into an iCloud account and was not backed up to iCloud. That was the entire rub. Apple has no problem cooperating with law enforcement in instances when the users data is backed up to iCloud they do it all the time. In this case, it was not.
@robbraxmantech
@robbraxmantech Год назад
I did not hear any statement about the iCloud status at all in any press release at the time. But ok, I will accept that possibility though that was just a side comment on my part.
@CristiPatrick
@CristiPatrick Год назад
Minority Report! :)) Awesome video, thank you!
@g1andonly1
@g1andonly1 Год назад
Funny you bring up auto focus when taking a picture, especially with the front camera . Apple front camera just got autofocus with the iPhone 14 so what are the squares when taking a picture?
@ljknbrw
@ljknbrw Год назад
16:42 how is that possible with no internet, SIM card, and Bluetooth off?
@doodaddy1454
@doodaddy1454 9 месяцев назад
I'm trying to find a video of yours where you say that Apple grabs your data before E2E encryption. That they added it in 2018 or so and that they just haven't turned it on. I've been looking for a while with no success!
@robbraxmantech
@robbraxmantech 9 месяцев назад
Early 2022 video.
@NexGen-3D
@NexGen-3D Год назад
I also wonder whats being fed back now when you power off the iPhone? I know he phone is still doing something as power will still drop, slowly, but still drops.
@Pyromonkey360
@Pyromonkey360 Год назад
it gets mentioned yet but it will eventually start hashing what the camera is seeing at regular intervals too
@robbraxmantech
@robbraxmantech Год назад
I've actually said that in another video! What's the difference right? An image is an image. To the neural engine it's the same thing
@memberman
@memberman Год назад
Thanks for the explanation.
@jaym5938
@jaym5938 11 месяцев назад
So, theoretically, CSAM idents on one phone can be passed to another phone through Mesh Network, to be uploaded? How is that legal or sane? I wouldn't want Apple's unethical behavior (or anyone else's) traversing in mine.
@sammyme7276
@sammyme7276 Год назад
Thanks 👋
@ShotgunAFlyboy
@ShotgunAFlyboy Год назад
Explains why phones seemingly got worse and worse while more and more stuff was packed in them.
@bypinkerton892
@bypinkerton892 Год назад
Android also created a backdoor with the 2021 Kernel 5.8 & higher..... I guess the 1st phones with it came out in 2022 with Pixel's 6 series & Samsung's S22 Series'....
@Humancompassion1234
@Humancompassion1234 11 месяцев назад
Thank you
@glassleo405
@glassleo405 Год назад
Great video thank you!
@maddire2585
@maddire2585 Год назад
More people should be watching this channel
@donpeer4477
@donpeer4477 Год назад
Rob, if the phone has AI in hardware how does your privacy phone deal with that?
@robbraxmantech
@robbraxmantech Год назад
We don't have this hardware. This is Apple hardware.
@hhhgggds
@hhhgggds Год назад
@@robbraxmantech ofc you do, pixel 6 and 7 are identical
@robbraxmantech
@robbraxmantech Год назад
BraX2 phone is our hardware. De-Googled Pixels running AOSP do not have Neural Engine code since it is OPEN SOURCE.
@hhhgggds
@hhhgggds Год назад
@@robbraxmantech you also sell degoogled pixel 6. It has same hardware as iphone. Google cpu and google tensor chip which does the same as iphones neural engine. OPEM SOURCE OPERATING SYSTEM DOES NOT CHANGE FIRMWARE. ( since you wanna capitalize )
@robbraxmantech
@robbraxmantech Год назад
I have to think about that. In theory, any external call (between Google and the phone) has to go through the OS (AOSP). It is true the phone could function by itself without any external contact for a neural net for image recognition. But something has to call those functions to create a surveillance grid. Would be hard to hide unless the traffic went via SS7. In any case, Google has not announced any client side scanning feature, nor a google mesh network. Currently, I'm not claiming that Google has any sort of client side scanning.
@roderick.t
@roderick.t Год назад
I’m not convinced. These claims ought to be tested in the field. Bring it on I say!
Далее
iPhone Mistakes That RUIN Your Privacy
10:57
Просмотров 45 тыс.
The New Surveillance Tool on Your Machine
22:12
Просмотров 10 тыс.
Is Skynet watching you already?
1:04:00
Просмотров 1,1 млн
Why VPNs are a WASTE of Your Money (usually…)
14:40
Your iPhone Isn't Secure - Do This Now!
9:31
Просмотров 164 тыс.