This Israeli Company Is Spying On Everyone...

SomeOrdinaryGamers
11 Apr 202423:10

Summary

TLDRThe video discusses Apple's response to antitrust lawsuits and their efforts to ease repair restrictions. It also covers Apple's warning about state-sponsored cyber attacks, specifically mentioning the NSO group and their Pegasus spyware. The video highlights Apple's introduction of 'Lockdown Mode' to protect users from such threats and their legal actions against the NSO group. The discussion emphasizes the importance of privacy and security in the digital age and the ongoing battle between tech companies and surveillance agencies.

Takeaways

  • 📚 Learning can be made enjoyable and accessible through platforms like Brilliant, which offers hundreds of lessons on various topics.
  • 🚀 Brilliant's lessons are designed to be six times more effective than average online videos, and can be learned at one's own pace.
  • 💻 Apple is facing significant antitrust lawsuits and is being pushed to change its policies, including those related to right to repair.
  • 🛠️ Apple has made some adjustments to ease the repair process, such as simplifying the process of confirming genuine repair parts and not requiring a device's serial number for certain parts.
  • 🌍 Apple may be forced to allow multiple app stores in Europe and other regions due to legal requirements, not voluntary compliance.
  • 🎮 There are indications that Apple might allow emulators on its platform, but the details are vague and it may pertain to big companies releasing emulator applications.
  • 📱 Apple is warning users about state-sponsored attacks and has implemented a 'lockdown mode' to protect against sophisticated spyware like Pegasus.
  • 🛡️ Lockdown mode on iPhones is an extreme protective measure that limits device functionality to prevent spyware attacks.
  • 🤝 Apple is not only taking legal action against the NSO group, creators of Pegasus, but also supporting cyber surveillance research and advocacy groups.
  • 🌐 The NSO group operates globally, using their spyware to target individuals across various countries, including high-profile figures and journalists.
  • 🔒 The fight against invasive surveillance software is a complex issue, balancing national security and individual privacy rights.

Q & A

  • What is the main topic discussed in the video?

    -The main topic discussed in the video is the various challenges and issues Apple is facing, including antitrust lawsuits, right to repair, app store policies, and security threats from mercenary spyware attacks.

  • How does the video describe the learning experience with Brilliant?

    -The video describes the learning experience with Brilliant as not boring, with hundreds of lessons available for self-paced learning, catering to various levels of expertise and providing effective lessons through collaboration with professionals and award-winning teachers.

  • What is Apple's response to the right to repair movement?

    -Apple has made it easier to repair iPhones by simplifying the process of confirming whether a repair part is genuine and gathering information about the part. They have also made changes so that customers and service providers no longer need to provide a device's serial number when ordering parts for non-logic board repairs.

  • What is the significance of Apple's policy change regarding emulators on the App Store?

    -The policy change is significant because it suggests that Apple may allow the installation of multiple app stores and support for used biometric sensors in future iPhone releases. This is a departure from their traditionally strict app store policies.

  • What is the NSO group and why is it a concern for Apple and its users?

    -The NSO group is an Israeli cyber intelligence firm that creates sophisticated spyware called Pegasus. It is a concern for Apple and its users because this spyware can be used to conduct surveillance on individuals, compromising their privacy and security.

  • What is Apple's lockdown mode and how does it protect users?

    -Lockdown mode is an extreme protective mode on iPhones that locks down the device, blocking most complex technologies, FaceTime calls, messages with attachments, and other features to protect against sophisticated attacks, particularly from mercenary spyware like Pegasus.

  • How is Apple fighting back against the NSO group?

    -Apple is fighting back by suing the NSO group, contributing to cyber surveillance researchers and advocacy groups, and implementing security measures such as lockdown mode to protect its users from spyware attacks.

  • What is the potential impact of the NSO group's spyware on individuals and organizations?

    -The spyware can compromise the privacy and security of individuals, particularly high-profile targets like journalists, activists, politicians, and diplomats. The information gathered can cause significant damage, both financially and in terms of personal safety.

  • How does the video suggest users protect themselves from cyber threats?

    -The video suggests that iPhone users should enable lockdown mode if they feel their device has been hacked. For Android users, it advises against downloading apps from untrusted sources to avoid malware infections.

  • What is the broader implication of the conflict between tech companies and surveillance agencies?

    -The conflict highlights the ongoing struggle between privacy rights and government surveillance. It raises questions about the extent to which companies should cooperate with government requests for surveillance and the potential erosion of individual privacy in the name of national security.

Outlines

00:00

📚 The Evolution of Learning with Brilliant

This paragraph discusses the concept of learning and how Brilliant, an online platform, is revolutionizing the traditional methods. It highlights the benefits of learning through interactive lessons at one's own pace, and the platform's collaboration with professionals and educators from prestigious institutions. The speaker encourages viewers to try Brilliant for 30 days, with a discount on the annual premium subscription, emphasizing the importance of continuous learning and growth, regardless of one's current knowledge level.

05:03

📱 Apple's Legal Challenges and Repair Accessibility

The paragraph delves into Apple's legal issues, particularly the antitrust lawsuit it faces due to its product policies. The speaker discusses Apple's recent efforts to make it easier for consumers to repair their devices, a move that aligns with the right to repair movement. Despite these changes, the speaker argues that Apple is merely doing the bare minimum and is reluctant to provide users with too many options or value, as it prefers to keep them within its ecosystem.

10:05

🕹️ The Future of Emulators and App Stores

This section addresses the changes in Apple's App Store policies, particularly regarding the allowance of emulators and other software. The speaker explains that Apple is legally compelled to permit multiple app stores in certain regions, and that it has made some adjustments to accommodate this. The discussion includes the possibility of game emulators being available on the App Store, but clarifies that this is likely to be limited to offerings from major companies rather than independent developers.

15:05

🛡️ Apple's Security Measures Against State-Sponsored Attacks

The speaker discusses Apple's efforts to protect its users from state-sponsored and mercenary spyware attacks. It details the features and notifications implemented by Apple to warn users of potential threats. The paragraph highlights the NSO Group and its use of Pegasus malware, which targets journalists, activists, and influential individuals. Apple's response includes a lawsuit against the NSO Group and contributions to cyber surveillance research and advocacy groups.

20:06

🌐 The Global Impact of Cyber Warfare and Spyware

The final paragraph explores the broader implications of cyber warfare and spyware, focusing on the NSO Group's operations and the international targets of its Pegasus spyware. The speaker expresses concern about the erosion of privacy and the potential for government overreach in the name of security. It emphasizes the importance of individual vigilance and the need for tech companies to collaborate on security measures to protect users from such threats.

Mindmap

Keywords

💡Brilliant.org

Brilliant.org is an online learning platform mentioned in the video that offers hundreds of lessons on various complex subjects. It is designed for learners of all levels, from beginners to experts, and allows for self-paced learning. The platform collaborates with professionals and educators from prestigious institutions like MIT, Caltech, and Duke, as well as industry giants like Google, to create effective and engaging lessons. The video encourages viewers to try Brilliant.org for free for 30 days and offers a discount on an annual premium subscription.

💡Antitrust lawsuit

An antitrust lawsuit refers to legal action taken against a company or individual for practices that are considered to be anti-competitive or to have the potential to create a monopoly. In the context of the video, Apple is facing one of the biggest antitrust lawsuits of the current generation due to their product policies, particularly related to the iPhone's locked-down nature and restrictions on third-party repairs and app installations.

💡Right to Repair

The 'Right to Repair' is a consumer rights movement advocating for the ability of individuals to repair, modify, and maintain their own electronic devices, such as smartphones and computers, without restrictions from manufacturers. This movement opposes manufacturers' practices that limit repairs to authorized service centers or make self-repair difficult through design or legal means. In the video, the speaker supports the right to repair and criticizes Apple for making it easier to repair iPhones only recently and under pressure, which they view as insufficient.

💡Pegasus

Pegasus is a type of sophisticated spyware developed by the Israeli cyber-intelligence firm NSO Group. It is designed for surveillance purposes and is capable of infiltrating devices, such as smartphones, to access messages, calls, emails, and other sensitive data without the user's knowledge. The video discusses Apple's efforts to protect its users from Pegasus and the broader issue of state-sponsored cyber attacks.

💡Mercenary spyware attacks

Mercenary spyware attacks refer to cyber attacks carried out by private companies or groups, often for hire, to infiltrate and compromise electronic devices for surveillance purposes. These attacks are typically highly sophisticated and can target high-profile individuals, such as journalists, activists, politicians, and business owners. In the video, the speaker highlights Apple's warning about such attacks and the company's efforts to protect its users from them.

💡Lockdown mode

Lockdown mode is an extreme security feature implemented by Apple in its iOS devices as a response to advanced cyber threats like the Pegasus spyware. This mode significantly restricts the device's functionality, blocking many types of messages, FaceTime calls, and web browsing, to protect the user's data and privacy from potential surveillance and hacking attempts.

💡NSO Group

The NSO Group is an Israeli cyber-intelligence firm known for developing sophisticated spyware, such as Pegasus. The company's software is marketed to government agencies for surveillance purposes, particularly to prevent and investigate terrorism and crime. However, the NSO Group has been criticized for its alleged involvement in human rights abuses, as its spyware has been used to target journalists, activists, and political figures worldwide.

💡Cyber warfare

Cyber warfare involves the use of technology and the internet to conduct offensive or defensive operations against a nation, group, or individual. It encompasses a wide range of activities, from hacking and espionage to the deployment of malware and other disruptive technologies. In the context of the video, cyber warfare is discussed in relation to the NSO Group's spyware and its impact on global tech companies and their users.

💡Privacy and security

Privacy and security are critical aspects of modern technology, focusing on protecting personal information and preventing unauthorized access. In the video, these concepts are central to the discussion of Apple's response to cyber threats and the broader debate about user rights in the digital age. Privacy refers to the ability of individuals to control their personal information and maintain a level of secrecy in their digital lives, while security measures are put in place to safeguard against cyber attacks and data breaches.

💡Tech companies and government relations

The relationship between tech companies and government entities is complex and often involves a balance of power, influence, and regulation. Tech companies rely on government policies and legal frameworks to operate, while governments may seek the assistance of these companies in areas such as surveillance and national security. In the video, this relationship is explored through the lens of Apple's lawsuit against the NSO Group and the broader implications of government surveillance on consumer privacy.

Highlights

Brilliant.org offers hundreds of lessons for self-paced learning.

Learning with Brilliant.org is efficient, with lessons proven to be six times more effective than average online videos.

Apple is facing a major antitrust lawsuit due to their product restrictions.

Apple has made some changes to ease the repair process for their products, acknowledging right to repair.

Apple's new updates aim to simplify repair processes by removing the need for a device's serial number when ordering parts.

Apple may allow emulators on their platform due to legal pressures in certain regions.

The Delta game emulator was accepted by Apple for sideloading through the 'alt store', not the main App Store.

Apple is warning users about State-sponsored attacks through threat notifications.

The NSO group is behind these attacks, using malware named Pegasus to target journalists, activists, and high-profile individuals.

Apple has a Lockdown Mode to protect devices from advanced cyber threats.

Apple is taking legal action against the NSO group, suing them and contributing to cyber surveillance research and advocacy.

The NSO group claims to help government agencies prevent terrorism and crime, but their spyware is used to invade privacy and target specific individuals globally.

Pegasus spyware exploits vulnerabilities in web browsers and devices, allowing for stealthy surveillance.

The spyware can access a wide range of personal data, from messages and calls to emails and social media accounts.

Apple and other tech companies are in a constant cyberwar with surveillance agencies like the NSO group.

The NSO group operates with the backing of the Israeli government, making their actions a point of international concern.

The sale of Pegasus spyware is controlled by the Israeli government, classifying it as a military export.

The situation calls into question the true extent of privacy and the trustworthiness of both big tech companies and governments.

Users are advised to be cautious with app installations and to use lockdown mode if they suspect their device has been compromised.

Transcripts

00:00

today's video is brought to you by our

00:01

friends over at brilliant ladies and

00:03

gentlemen learning doesn't have to be

00:04

boring opening up a book and smashing

00:06

your head against a wall sometimes it

00:08

could be as simple as opening up the

00:09

hundreds of lessons that brilliant

00:11

provides and going through things at

00:13

your own pace so you can learn complex

00:15

things by breaking them down and

00:17

figuring them out whatever your learning

00:19

level is whether you're absolutely new

00:21

to a topic or you actually have some

00:23

serious masterful knowledge there's

00:25

always room to grow and room to learn

00:27

and they work with tons of intelligent

00:29

people from around the world

00:30

professionals from organizations such as

00:32

the MIT Caltech Duke Microsoft Google

00:36

and plenty of other award-winning

00:37

teachers researchers and professionals

00:40

have all gathered together to come up

00:41

with crazy good lessons that have proven

00:43

to be at least six times more effective

00:45

than just watching videos on the

00:46

internet anyways and if you do it day by

00:49

day like a habit then you'll learn

00:50

quicker than you can actually expect

00:52

ladies and gentlemen but that being said

00:54

if you want to learn just like me and

00:56

like plenty of other people that have

00:58

taken brilliant then please go and try

01:00

it free for a full 30 Days by going to

01:02

brilliant.org

01:04

ssog or clicking the link in the

01:06

description below you'll also get 20%

01:08

off an annual premium subscription

01:09

ladies and gentlemen if you want to give

01:11

brilliant a try make sure to check out

01:13

brilliant.org ssog that said let's get

01:16

to the video hello guys and gals me

01:19

mudahar and how's it going my fellow

01:21

friends it just keeps getting worse for

01:23

our friends over at Apple now of course

01:26

as you all know apple is getting pretty

01:27

much sued they're pretty much in the

01:29

biggest antitrust lawsuit of our time

01:31

right now of your generation uh actually

01:34

because of their Apple products their

01:36

iPhone being is locked down as it ever

01:38

was now obviously Apple's kind of

01:41

responded a little bit and they've been

01:42

kind of having to take some L's but only

01:45

as much as they've been legally required

01:47

to so just a little quick update on what

01:50

kind of uh L's that they've been taking

01:52

and actually massive W's for you and I

01:55

one of them you may have heard of is

01:56

that they've actually made it somehow

01:58

easier to start repairing the actual

02:00

phones that you buy okay now I believe

02:03

in things like right to repair you know

02:05

if I buy a product I should be able to

02:07

you know fix it to repair it to own it

02:10

you know it shouldn't be a thing where I

02:11

buy something with planned obsolescence

02:13

like it's the 50s and uh we just somehow

02:16

are okay with buying a product for a

02:18

crap ton of money and then having it

02:20

break down slow down on us and not being

02:22

able to fix things especially when

02:24

fixing a lot of stuff in a phone is a

02:26

lot easier than people give it credit

02:28

for okay so according to Apple over here

02:30

they basically uh you know taken away

02:32

some of the issues with pairing so what

02:35

they talked about was the process of

02:36

confirming whether or not a repair part

02:38

is genuine or gathering information

02:39

about the part often referred to as

02:41

pairing is critical to preserving the

02:43

Privacy security and safety of the

02:45

iPhone Apple teams have been hard at

02:47

work over the last two years to ensure

02:48

the ReUse of Parts such as biometric

02:50

sensors you know the things you use to

02:52

unlock your devices with your

02:53

fingerprint sensors you know facial uh

02:55

recognition apparatus all of that

02:57

calibration for genuine parts you were

02:59

used will happen on device after the

03:01

part is installed in addition future

03:03

iPhone releases will have support for

03:05

used biometric sensors and in order to

03:07

simplify the repair process customers

03:10

and service providers will no longer

03:12

need to provide a devic's serial number

03:14

when ordering parts from the

03:16

self-service repair store for repairs

03:18

not involving replacement of the logic

03:20

board and while you know you can read

03:22

Apple's statement and probably be like

03:23

wow that's really impressive of them the

03:25

reality is stuff like this should never

03:27

be confusing or stuff like this should

03:28

never be this complicated to repair so

03:31

again Apple doing the bare minimum is

03:33

still not good enough and the thing is

03:34

they're going to stay at the bare

03:35

minimum because the last thing this

03:37

company ever wants to do is provide you

03:39

with as much option and as much value as

03:41

you could as you could get into as long

03:43

as you're in that ecosystem as long as

03:45

you're stuck that's all that matters to

03:46

them now ladies and gentlemen you might

03:48

have also heard oh crap is Apple letting

03:51

emulators come into my G to my phone now

03:54

if you all don't know uh Apple has to

03:56

basically open up the ability for you to

03:58

install multiple different app stores in

04:00

Europe other parts of the world where

04:02

they're legally being forced to by the

04:04

way it's not because they want to

04:06

they're legally forced to do so they're

04:08

forced to comply so Apple has basically

04:11

I guess loosened up their App Store a

04:12

little bit and there was one actual

04:14

thing from their developer page which

04:16

talked about 4.7 mini apps mini games

04:18

streaming games chat Bots and game

04:21

emulators Apple may offer certain

04:23

software that is not embedded in the

04:24

binary specifically HTML 5 mini apps

04:28

mini games streaming games chat Bots and

04:30

plugins additionally retro game console

04:33

emulator apps can offer to download

04:35

games so immediately when people saw

04:37

this they were like wait a minute are we

04:38

able to download GBA emulators PS1

04:40

emulators I think this has more to do

04:43

with like big companies like Nintendo

04:46

like Sega like Sony releasing emulator

04:49

applications underneath the iOS and

04:51

letting you purchase emulated games from

04:54

within those tools I don't think this is

04:56

necessarily apple is allowing Game Boy

04:58

Advance emulator DS emulators GameCube

05:02

Playstation Xbox emulators on the store

05:05

that would be a wild thing and obviously

05:07

they also mentioned retro game apps so

05:09

it's a little vague what is retro and

05:12

what isn't is there a certain year cut

05:13

off what are we talking about over here

05:16

now obviously uh when it came to Apple

05:18

one of the things that got showcased and

05:20

shared around was the fact that somebody

05:22

submitted an actual emulator the Delta

05:24

game emulator and apparently Apple

05:27

accepted it but they didn't accept it

05:29

for the app store they actually accepted

05:31

it for something known as the alt store

05:33

for those of you who don't know what the

05:34

alt store is it's basically a thing that

05:36

allows Apple users to sideload

05:38

applications to their iPhone iPad

05:40

devices so if you want to run emulators

05:43

and you want to just you know have

05:44

access to them you can make an apple

05:46

developer account you can install this

05:48

to a Macbook and effectively just

05:51

install for a period of 7 days at a time

05:54

emulator access now obviously this is

05:57

not ideal and if you want access to

05:59

installing third party applications and

06:01

actually having control over your phone

06:03

then maybe it's time you just switch to

06:05

Android it's just better in that regard

06:08

apple is doing the bare minimum it can

06:10

to provide any support possible but of

06:13

course why I really want to make this

06:14

video is I woke up to something a little

06:17

bit scary ladies and gentlemen you might

06:19

have heard of this crazy headline or

06:22

maybe you even got an email sent to you

06:24

where Apple talked about threat

06:26

notifications protecting against State

06:28

sponsor attacks now I'm using the

06:31

Wayback machine to show it because they

06:33

actually changed the state sponsored

06:35

attacks to something I you not

06:38

known as mercenary spyware attacks this

06:41

is insane stuff to witness but Apple's

06:43

actually warning people that right now

06:45

there are some really scary people

06:47

trying to get access to your Apple

06:48

device and uh I'm here to talk about

06:51

exactly why and how so according to

06:53

Apple they're threat notifications and

06:55

they're basically protecting against

06:56

mercenary spyware so to give you an idea

06:59

what they talked about this is a little

07:01

scary so on the actual Apple ID homepage

07:04

some of you and make sure to check this

07:05

if you're an Apple user you may have got

07:07

a threat notification somewhere around

07:10

November 23rd 2021 or maybe even

07:12

recently about these mercenary spyware

07:15

attacks so according to Apple right here

07:17

what they said was because of who

07:20

certain people are and again the amount

07:22

of people that they're targeting these

07:23

mercenary groups are people like

07:25

journalists high ranking individuals

07:27

business owners people that have power

07:30

right and they own iPhones and the thing

07:31

is if you get access to their personal

07:33

devices the amount of damage and

07:35

information you can gather is very very

07:37

scary so what they've effectively said

07:40

here is according to public reports and

07:42

research by Tech firms journalists Civil

07:45

Society organizations they're basically

07:47

saying that the mercenary group behind

07:49

this is the NSO group and they're using

07:52

malware known as Pegasus and while

07:55

they're attacking very small amounts of

07:57

individuals people who are journalists

07:59

activists politicians diplomats the

08:02

damage can be in the millions of dollars

08:04

there is an extreme cost and there is an

08:07

extreme scare for everyone when people

08:09

like this get attacked now obviously

08:11

Apple provided because of these groups

08:13

actual lockdown tools so if you have an

08:15

iPhone for instance you may have heard

08:16

of something known as lockdown mode

08:18

which is an incredibly extreme

08:20

protective mode under the iPhone system

08:23

that basically locks down the device and

08:25

turns it into almost a dumb phone in

08:27

regards to certain Fields so for in if

08:29

you're messaging people attachment types

08:32

they're mostly blocked if you're

08:34

browsing most complex technologies that

08:36

make websites run better and operate

08:39

more efficiently are basically blocked

08:41

FaceTime calls are blocked unless you

08:43

previously called that specific person

08:46

and of course Apple Services some of

08:48

them are also blocked photos they also

08:50

have blocks as well device connections

08:53

Wireless connectivity and configuration

08:55

profile so a lot of stuff is

08:57

automatically locked off just to protect

08:59

individuals and this isn't just for

09:01

politicians or like rich people that are

09:03

targeted if you ever feel that your

09:05

phone is hacked and you run an iPhone

09:08

just enable lockdown mode I actually had

09:10

to walk another YouTuber through this

09:11

because their phone was hacked they were

09:14

actually getting and just putting

09:16

them through this mode allowed them to

09:18

at least circumvent actual attacks that

09:20

were headed towards their device it's

09:21

crazy the world we live in and this is

09:24

where I'm going to give Apple some

09:25

credit here they actually do provide a

09:27

lot of tools to help keep your is safe

09:30

and I think more companies should do

09:32

this and Apple's not doing this out of

09:34

the kindness of their heart believe it

09:36

or not they are taking these people to

09:38

Court So for anybody that

09:39

doesn't know even back in 2021 Apple

09:42

Sued this NSO group because of these

09:44

state sponsored spyware attacks they

09:46

filed a lawsuit against them and they

09:48

are actually contributing up to $10

09:50

million to cyber surveillance

09:52

researchers and advocacy groups just to

09:55

keep fighting against these goddamn

09:56

scumbags now obviously Apple's l suit

09:59

where I swear they use terms like amoral

10:02

21st century mercenaries who've created

10:04

highly sophisticated cyber surveillance

10:07

the thing is for apple you know suing

10:08

these people it's not necessarily just

10:10

to you know be benevolent for you

10:12

obviously any company wants to protect

10:14

its user base because having your name

10:17

and Cyber attack and leakage inside you

10:20

know major mainstream news sources does

10:23

not look good and does not Inspire

10:24

confidence if you watched Apple's recent

10:27

advertising you'll notice that they've

10:28

really pushed toward privacy and

10:30

security and if you buy an iPhone

10:33

utilizing their security parameters your

10:35

phone should be more safe and secure and

10:37

in ways I would say Apple's IOS to an

10:40

extent is so if you have a big company

10:42

like NSO group and a country going up

10:44

against them and making a mockery of

10:47

their security it's ultimately bad for

10:49

their brand and obviously that's why

10:51

Apple wants to stand up and I think most

10:53

companies should the more these

10:54

companies try to detach themselves from

10:56

these corporate entities or these I

10:58

guess quote unquote aoral mercenaries so

11:00

at this point it's time to ask who the

11:02

is the NSO group what kind of

11:05

dangerous group is this that exists so

11:07

the NSA group also stands for NE shalev

11:10

and omry is actually an Israeli cyber

11:12

intelligence firm that creates the

11:14

Pegasus group so if you looked at this

11:16

website and you might have recognized it

11:18

before this is the NSO group it's

11:20

basically a group that helps government

11:22

agencies prevent and investigate

11:24

terrorism and crime to save thousands of

11:27

lives across the globe now here's the

11:29

thing about these organizations they

11:31

will always throw things like National

11:33

Security the fear of terrorism and all

11:35

this stuff in order to make it so that

11:37

they can justify their really invasive

11:40

militant spy wear to be spread around

11:42

the world and again when you always

11:44

bring this kind of in this level of

11:46

propaganda it's not always that cut and

11:48

dry now while they say the world's most

11:51

dangerous offenders communicate using

11:52

technology designed to Shield their

11:54

Communications while government

11:56

intelligence and agencies struggle to

11:58

collect evidence on their actions we're

12:00

here to Bri bridge that field and they

12:03

basically say they help maintain things

12:05

like Public Safety and there's no doubt

12:07

there's obviously like a fine line

12:09

clearly there are bad people using

12:11

iPhones Androids web services with

12:14

highly encrypted formats for nefarious

12:16

purposes but usually when you get the

12:18

government involved for Public Safety

12:20

often times the Liberties they take are

12:23

way in excess of what they should be now

12:25

obviously we know that bad people exist

12:28

in the world right but just you know if

12:30

you ever looked into the history of

12:32

government surveillance you'd find that

12:33

anytime acts like specifically we'll get

12:36

into one example the USA Patriot Act or

12:39

act similar to you'll find that honestly

12:42

to protect the human po the the uh the

12:45

civilian population from you know acts

12:47

of terrorism or dangerous you know uh

12:49

you know people right because evil

12:51

people exist they use the same uh

12:54

technology we do right they use the same

12:56

encrypted formats we do to protect our

12:58

priv Acy as they do you know with any

13:02

device even iPhones or Androids or any

13:04

modern device and obviously to expand

13:07

the level of surveillance and using

13:09

software that violates a lot of those

13:12

laws or a lot of those you know search

13:13

and seizure laws that we have that

13:15

prevent the government from

13:16

unnecessarily jumping into our devices

13:18

it's a very thin line you have to get

13:20

you know uh you know comfortable with

13:22

and the thing is it's never okay to

13:25

overextend the ability to search your uh

13:28

devices and violate your privacy even if

13:31

it is to protect you from bad people

13:33

because anytime you give the government

13:34

an inch they will often take 100 miles

13:37

it's not even a mile it is a 100 miles

13:40

all right the amount of privacy that we

13:42

have lost in the last 10 20 years

13:46

because of serious acts in the world is

13:48

absolutely jaw-dropping and again this

13:51

is sort of a Line in the Sand we all

13:54

have to draw to keep ourselves safe and

13:56

this is one thing where I can give apple

13:58

and I can give any company fighting

14:00

against this stuff uh you know my

14:02

unanimous you know support and

14:03

endorsement and they're not just being

14:05

sued by Apple they're also being sued

14:07

even very recently by Facebook or meta

14:10

simply because they are accused for

14:13

spying on WhatsApp users okay it's

14:15

insane the amount of people they go

14:17

after and it's not just one or two it's

14:19

alleged to be 1,400 people that this one

14:22

company is spying on with their malware

14:24

so what they use is something known as

14:26

Pegasus right and Pegasus is without a

14:28

doubt one of the most like it's their

14:29

secret sauce the gold in this entire

14:32

operation and the reason why it's so

14:34

sought after is because it's basically

14:36

one of Israel's biggest bargaining chips

14:38

in the world it's one of Israel's

14:40

biggest pieces of cyber warfare tools

14:43

out there so again when you looked into

14:45

it when it was first caught and was

14:46

first being looked into by uh Lookout

14:49

they were actually talking about what it

14:51

basically took advantage of so they said

14:53

this spyware this like mercenary spyware

14:56

is apparently so sophisticated and so

14:58

modular it uses strong encryption to

15:00

protect itself from traditional tools

15:02

and a vigorous monitoring and of course

15:05

a self-destruct mechanism if detected so

15:07

they take advantage of three actual like

15:09

cves one of them is a memory corruption

15:12

in webkit so if you own an iPhone no

15:14

matter what browser you download right

15:16

now you are on using a webkit browser so

15:19

using a vulnerability it allows an

15:21

attacker to compromise a device when a

15:23

user clicks on a link so if they get

15:25

sent a message a link to a website and

15:27

they click on that with their messages

15:28

they open up a webkit you know page and

15:31

that immediately is where the strike

15:32

occurs so then they take advantage of a

15:34

kernel information leak a kernel base

15:37

mapping vulnerability that leaks info to

15:39

the attacker and allows him to calculate

15:40

the Colonel's location in memory and

15:43

then of course once they get access

15:45

there they then jailbreak the device and

15:47

once they jailbreak your iPhone device

15:49

they install a whole bunch of tools and

15:51

persistence to keep spying on you for

15:53

the foreseeable future in a way that is

15:55

so stealthy that it takes a lot to catch

15:59

up to it and this is where Apple

16:00

thankfully has actually prevailed with

16:03

their lockdown mode like I mentioned

16:04

earlier against this actual organization

16:07

because recently it was even found that

16:09

they had a blastp pass exploit that was

16:11

actually circumvented thanks to what

16:13

lockdown mode and the restrictions that

16:16

it placed on the device it's crazy that

16:18

we have to look at actual private

16:20

company selling our products literally

16:23

in live cyber warfare with an actual

16:25

like full state sponsored surveillance

16:27

agency so they they even talk about it

16:29

right over here the exact chain so right

16:31

over here if you're a visual learner for

16:33

instance the spyware can access your

16:35

messages calls emails logs and

16:37

everything from like Gmail FaceTime

16:40

Facebook line mail. calendar we chat

16:43

shpot Tango WhatsApp whatever see this

16:47

group this Israeli company is attacking

16:48

not just the US they attack Russia India

16:51

China every country imaginable so right

16:54

here what happens is when you're a user

16:56

and you get sent a message you get sent

16:57

a link you click that link they exploit

17:00

against the browser they hijack the

17:02

device they jailbreak and then they

17:04

install all of their stealthy persistent

17:06

software and just start grabbing all of

17:08

your communication data and start

17:10

stealing it for them to use it's truly a

17:13

disgusting situation and the

17:15

thing about it is it's it's something

17:16

that has even been detected as far back

17:18

as 2017 as well this isn't new stuff

17:22

this is something that Apple Android

17:24

Google basically Facebook every company

17:27

has to goddamn deal with this one

17:28

cancerous organization this mercenary

17:31

group that basically has to hide behind

17:33

protection by the Israeli government so

17:35

for instance back in 2017 Google

17:38

detected something known as chore which

17:40

is believed to be created by that NSO

17:42

group and of course it's related to that

17:45

Pegasus spyware believed to be by Google

17:48

so what they had effectively said was

17:50

late last year after receiving a list of

17:52

suspicious packages from their friendly

17:54

groups they discovered a few dozen

17:56

Android devices could have installed

17:58

applications

17:59

related to that Pegasus malware now the

18:02

beneficial part about this is it wasn't

18:04

actually that widespread it was actually

18:06

according to Google only available on a

18:08

very low volume of installations amongst

18:11

1.4 billion devices they actually saw

18:14

around three dozen installs on actual

18:17

victim devices and a grand majority of

18:18

them were in Israel Georgia and then

18:21

Mexico and then it starts tapering off

18:23

but again the idea that this exists and

18:27

every company is constantly ad cyber war

18:29

with a lot of these surveillance

18:31

agencies NSO group in specific is a bit

18:34

concerning because here's the thing even

18:36

if the targets that they are attacking

18:37

are big politicians or big individuals

18:40

it's by attacking them that they

18:42

potentially could chain their attack

18:43

into something more serious and possibly

18:46

Target a repository of information that

18:48

may end up affecting you and I down the

18:50

road look at the end of the day

18:51

attacking the CEO of like Facebook or

18:54

Google or Apple or you know anybody with

18:56

government access to repositories

18:58

ultimately puts a lot of that stuff at

19:01

risk so the way that it works is what it

19:03

effectively happened is an attacker Co

19:05

specifically targeted individuals so

19:07

those you know journalists those BigTime

19:09

diplomats to download a piece of

19:11

software to their device and once it's

19:13

installed a remote operator is able to

19:15

surveil the victim's activities on the

19:17

device and within the vicinity

19:19

leveraging microphone camera data

19:21

collection and all the extra stuff they

19:23

need so again how they did it here was

19:26

they actually convinced somebody to

19:27

install or load an application to their

19:30

device and this is where again you have

19:32

to remind people if you don't trust

19:35

somebody 100% don't installed a

19:37

app okay simple as that I don't install

19:39

apps to any Android device unless I 100%

19:42

trust that specific package just

19:45

downloading it off the internet and

19:46

installing it is a goddamn recipe for

19:48

getting your information stolen and

19:50

blown wide open now Apple has basically

19:53

alerted around 92 different countries

19:56

people in there in 92 different nations

19:58

right now basic Bally the entire

19:59

world that uh currently the amount of

20:01

attacks that are coming from this

20:03

mercenary group the NSO group is

20:05

actually insane and they should be

20:07

pretty much watching out for it so we're

20:09

sitting in a situation where it gets you

20:12

know pretty pretty bad for apple as the

20:14

weeks go on you know they already got to

20:16

abide and change a million chunks of

20:18

their like wal Garden ecosystem they

20:20

have to start offering proper right to

20:22

repair or at least get on that track

20:24

even if they probably don't want to

20:26

because every government agency is on

20:27

them but even if the government agencies

20:29

aren't on them there are government

20:30

agencies like the Israeli government

20:32

that have a wing of their operation

20:34

believed to be the NSO group effectively

20:37

constantly pressuring apple and making

20:39

their devices look unsafe now this is

20:41

where again I'm going to give credit to

20:43

Apple right now I think it's totally

20:44

awesome that they're going out of their

20:46

way to provide protections for their

20:48

devices and I really think going forward

20:51

most of these big companies Facebook

20:53

Google Apple probably should come

20:54

together and try to provide extra

20:56

security or at least work together in

20:58

some Consortium to provide even more

21:00

security against this one scary Israeli

21:03

operation because the NSO group they are

21:05

some really scary dudes now even

21:07

according to situations like this all

21:09

right the NSO group while they're

21:11

designing to protect the world with

21:13

their software the problem is according

21:15

to certain agencies out there The

21:17

Washington Post for instance the spyware

21:19

is classified as a military export by

21:22

Israel and its sale is controlled by the

21:24

government which is scary and the New

21:26

York Times outright says is Israel's

21:29

government has long seen that Pegasus as

21:31

a critical tool for its foreign policy

21:33

this is literally a actual coded weapon

21:36

to be used against other people it seems

21:38

and it also doesn't help too that the

21:40

United States apparently according to

21:42

heret actually had used a literal like

21:45

front organization to purchase a

21:47

software known as Landmark a geolocation

21:49

system that reveals the exact location

21:51

of a person by inputting their phone

21:53

number directly from this NSO group so

21:55

we're at a point where these big

21:57

companies have to fight basically the

21:58

government and in order to be you know

22:01

the Monopoly holders that they are they

22:02

also have to collude with the government

22:04

too so it kind of puts me in a situation

22:06

where I wonder what our privacy truly is

22:08

you can't trust the big companies you

22:10

can't trust the government honestly at

22:12

this point you might as well just start

22:13

building your security apparatus

22:15

yourself as long as it's self-contained

22:17

and as long as it's owned by you you can

22:19

at least sleep peacefully knowing that

22:20

you're not at the mercy of a lot

22:23

of these big organizations so yeah it's

22:25

a wild wild wild few weeks for Apple but

22:28

I want want to come into it because

22:29

honestly I've been watching their

22:30

lawsuit go on and so forth and to see

22:33

that we are now calling things mercenary

22:35

attack operations I think I live in a

22:37

wild world I think I live in a scary

22:39

situation but it's good to talk about

22:41

this stuff and to relay it and to

22:43

educate people so if you feel you've

22:45

ever been hacked and you're on an iPhone

22:47

start bringing up that lockdown mode if

22:48

you're on Android please stop

22:50

downloading packages willy-nilly because

22:52

you know what you may end up being

22:55

infected maybe not by this but by

22:57

another piece of malware that maybe

22:58

carries a similar type of infestation

23:01

but that said ladies and gentlemen this

23:02

is me mudahar and yeah wild stuff if you

23:05

like what you saw please like comment

23:06

and subscribe dislike if dislike it I am

23:09

out

Rate This

5.0 / 5 (0 votes)

Связанные теги
Apple LawsuitsRight to RepairCybersecurityPegasus SpywareNSO GroupPrivacy ConcernsTech IndustryUser SafetyAntitrust LawsuitsEmulator Support
Вам нужно реферат на русском языке?