Yuma 4×4

Media and Communications

How to Avoid Surveillance…With Your Phone | Christopher Soghoian | TED Talks

How to Avoid Surveillance…With Your Phone | Christopher Soghoian | TED Talks

For more than 100 years, the telephone companies have provided
wiretapping assistance to governments. For much of this time,
this assistance was manual. Surveillance took place manually
and wires were connected by hand. Calls were recorded to tape. But as in so many other industries, computing has changed everything. The telephone companies
built surveillance features into the very core of their networks. I want that to sink in for a second: Our telephones and the networks
that carry our calls were wired for surveillance first. First and foremost. So what that means is that
when you’re talking to your spouse, your children, a colleague
or your doctor on the telephone, someone could be listening. Now, that someone might
be your own government; it could also be another government,
a foreign intelligence service, or a hacker, or a criminal, or a stalker or any other party that breaks into
the surveillance system, that hacks into the surveillance system
of the telephone companies. But while the telephone companies
have built surveillance as a priority, Silicon Valley companies have not. And increasingly,
over the last couple years, Silicon Valley companies have built
strong encryption technology into their communications products that makes surveillance
extremely difficult. For example, many of you
might have an iPhone, and if you use an iPhone
to send a text message to other people who have an iPhone, those text messages
cannot easily be wiretapped. And in fact, according to Apple, they’re not able to even see
the text messages themselves. Likewise, if you use FaceTime
to make an audio call or a video call with one of your
friends or loved ones, that, too, cannot be easily wiretapped. And it’s not just Apple. WhatsApp, which is now owned by Facebook and used by hundreds of millions
of people around the world, also has built strong
encryption technology into its product, which means that people
in the Global South can easily communicate without their governments,
often authoritarian, wiretapping their text messages. So, after 100 years of being able
to listen to any telephone call — anytime, anywhere — you might imagine that government
officials are not very happy. And in fact, that’s what’s happening. Government officials are extremely mad. And they’re not mad because
these encryption tools are now available. What upsets them the most is that the tech companies have built
encryption features into their products and turned them on by default. It’s the default piece that matters. In short, the tech companies
have democratized encryption. And so, government officials
like British Prime Minister David Cameron, they believe that all communications —
emails, texts, voice calls — all of these should be
available to governments, and encryption is making that difficult. Now, look — I’m extremely sympathetic
to their point of view. We live in a dangerous time
in a dangerous world, and there really are bad people out there. There are terrorists and other
serious national security threats that I suspect we all want
the FBI and the NSA to monitor. But those surveillance
features come at a cost. The reason for that is that there is no such thing
as a terrorist laptop, or a drug dealer’s cell phone. We all use the same
communications devices. What that means is that
if the drug dealers’ telephone calls or the terrorists’ telephone calls
can be intercepted, then so can the rest of ours, too. And I think we really need to ask: Should a billion people
around the world be using devices that are wiretap friendly? So the scenario of hacking of surveillance
systems that I’ve described — this is not imaginary. In 2009, the surveillance systems that Google
and Microsoft built into their networks — the systems that they use to respond
to lawful surveillance requests from the police — those systems were compromised
by the Chinese government, because the Chinese government
wanted to figure out which of their own agents
the US government was monitoring. By the same token, in 2004, the surveillance system
built into the network of Vodafone Greece —
Greece’s largest telephone company — was compromised by an unknown entity, and that feature,
the surveillance feature, was used to wiretap
the Greek Prime Minister and members of the Greek cabinet. The foreign government or hackers
who did that were never caught. And really, this gets to the very problem
with these surveillance features, or backdoors. When you build a backdoor
into a communications network or piece of technology, you have no way of controlling
who’s going to go through it. You have no way of controlling whether it’ll be used by your side
or the other side, by good guys, or by bad guys. And so for that reason,
I think that it’s better to build networks
to be as secure as possible. Yes, this means that in the future, encryption is going to make
wiretapping more difficult. It means that the police
are going to have a tougher time catching bad guys. But the alternative would mean
to live in a world where anyone’s calls or anyone’s
text messages could be surveilled by criminals, by stalkers
and by foreign intelligence agencies. And I don’t want to live
in that kind of world. And so right now,
you probably have the tools to thwart many kinds
of government surveillance already on your phones
and already in your pockets, you just might not realize how strong
and how secure those tools are, or how weak the other ways
you’ve used to communicate really are. And so, my message to you is this: We need to use these tools. We need to secure our telephone calls. We need to secure our text messages. I want you to use these tools. I want you to tell your loved ones,
I want you to tell your colleagues: Use these encrypted communications tools. Don’t just use them
because they’re cheap and easy, but use them because they’re secure. Thank you. (Applause)

100 thoughts on “How to Avoid Surveillance…With Your Phone | Christopher Soghoian | TED Talks


  2. I think he is NSA employee Bc NSA can already crack iphone imessages and iphone facetime voice call with video call and whatsapp and facebook messenger and the other mesg apps. We Need to use Tor Network with Express VPN’s Tor network or Nord VPN’s Tor Network and when we buy somethings online market then we should use to pay bitcoin Or cryptocurrencies. Bc all Intelligence agencies can see our banking transactions recording on Banking Systems. So if You want to protect your privacy. Then never use currencies dollar and euro and japan’s currency and chinese currency. Government can track your currency transactions and moving to somebody… So we need to use cyrptocurrencies

  3. I was going to take over other telly industry and the media industry is now being manipulated and controlled by the new world order and the globalist they're using alpha Ribbons to stop people like me from expressing the freedom of speech and denying my human rights to criticize those in power to such an extent I reckon 90% of everything I put is taking off before it's even put on the comment sections like the interpolation of the likes been used to downgrade any video no questions those in authority

  4. We all know that every company around the world who has a licence gives access to those people in power access to your phone anytime night or day we all know that the Internet can be used to monitor and 2A nicolite the views of the millions in favour of certain ideologies the protections of the information of the public it's just fallacy many of these Thai tech companies are based there worth on selling information about you and the Citizens of the world but even worse they have used their power to influence and a nipple 8 the views of millions

  5. if you "think" that apple and the rest didn't hand over the encryption keys to govt, first thing, you're a gd fool. They'd get locked up if the didn't, and they know it. It might be a tax charge, or a made up drug charge, but they'd be in jail. If it's important, use a one time pad, a page out of a book, to convert letters in to numbers. It's slow and a pita, but it's unbreakable.

  6. All smart devices are connected to what???? 5G Wi-Fi???? And you trust your provider? I don't I know for a fact that my provider (Sudden Link) has no morals and no security… wake up.. there is no privacy on your phone… ANY PHONE.

  7. I don’t fucking sure but sameone are fucking control my iphone deleted my photos changing everything they want on my fucking iphone and when i rang my children i always listen to the ecophone .Better is don’t have a phone lol ? You talk bushit . Nothing and no phone is secure 😜

  8. They don’t use the phones anymore Old news. Now they use brain patterns and binary vibes to direct your brain to their new telepathy vibes.

  9. I used to work for Apple and I can attest to the fact that there is a huge emphasis on privacy. Never worked for FB but I wouldn't trust them as far as I can throw them.

  10. apple is the moust surveilled company in the world, wtf are u talking about? idiot…watsapp…owned by facebook, wtf are u talking about idiot!

  11. Dude, Pakistani ISI catched Indian terrorist by tapping his what's app messages and calls, I don't know about apple but you can lookup how "ISI catched Indian terrorist Kalboshan". Just do a search.
    Nothing is secured anymore, just don't do anything bad. Use phone as phone, not like tablet. Bigger screen you got, more media consumption = more time waste.

  12. The speaker must have been paid by Facebook and/or Apple. Does the speaker really think that Facebook, seriously… FACEBOOK, respects its users data? I beg to differ.

  13. Says he's sure that FBI & CIA are working hard to protect us from the terrorists" UHhh… News Flash!! THEY ARE THE TERRORISTS!!!

  14. What do you think about these apples? Hmmm?
    Go to KNOW MORE NEWS with Adam Green…

  15. This is bullshit. They can just screenshare the damn phone screen and see everything. Texts…notes….anything.

  16. I've been using YouTube for close to 6 years and have never disliked a video because I'm just not that guy… This one is the first!

    "We need to use these tools… We need to use these tools"

    Are you serious????????

  17. yeah if the order to decrypt them with their descriptive services in court or by judge they they have to do so by law so they can look at them but most the time they don't even have to because of the phone carrier you using record everything you do every call you make every text you make every thing you ever look up on the internet every game you play we're constantly being watched in the only way out of it it's not to use a cell phone or the internet ever again then they have to do it the old style way spy on you personally oh and one more thing like I said your telephone provider record everything they can look up everything you looked up on the internet and everything fishing have access to that that's Asian of privacy but they do it doesn't matter whether your incognito say don't track me that's just a suggestion that you make to them they can still do it they can look up everything still track you even if you clear out your history there still evidence of whatever you looked up or whatever you done on the Internet it's called metadata

  18. If you believe that telecom companies and ISPs aren't collecting and storing data about you, including text messages and internet history, you're sadly mistaken. Encryption is just a facade, and these commercial enterprises are supplanting government agencies in controlling information.

  19. Alright everyone. Are you being exposed to cyber threat? Webghost { webghost on skype or text +1 414 909 3913 w'app} can help get it restored and track down the person who did it in many cases. Do you want to install spyware on a cellphone, smartphone or computer? Do you know if you have spyware on your computer or mobile devices? Reputation Management? Control your online reputation but removing false information and getting your positive message out. Cyber Stalkers? Don’t be harassed or stalked online. Find the person responsible and put an end to it all. Cheating Spouse? Find out for sure what your spouse is up to with our Digital Investigation services. Perhaps my hacking professionalism has helped in various aspects like; Removing links and posts, eradicate being Cyber Bullied or Cyber Stalked, Locate Missing People, Computer Security Training, Background Checks, Cyber Extortion, Relationships, Nationwide Employment Background Check, Tracking, Online Dating Scams, Cyber Frauds, cyber-espionage, criminal gangs or the pursuit of data. We aim to make all kind online protections for our valuable clients.

  20. I had some defamatory articles posted about me online. After soliciting with the sites without luck, I had to contact this hacker, Very discreet guy. He removed every bad link about me and I’m actually very free from my past now. He charged me a fee and it was worth it. Contact at webghost33 on Skype.

  21. how to avoid surveillance on phone uploaded to an info grabbing site linked directly to google, makes sense @TED

  22. What about google and Facebook acting as big brother.. do you want only google can monitor people’s every move… They are controlling our thoughts, beliefs and actions…

  23. Your calling your insurance or hospital and first they tell you this conversation will be recorded to improve our services jajajajajaja 😂😂😂who invented the internet in the first place wasn't the CIA the lucky one ? 😂😂😂😂

  24. I. Against those programs and we should destroy their programs for good and the bad guys should be track instead of the good ones you pedo government.

  25. Let develop a skill to establish a global network of brain to brain connection. Trust me, there are intruders, who can interrupt this sort of communication.

  26. I know this is like putting out a campfire with a squirt gun, but I put black electrical tape over the front and rear cameras on this Android phone.

  27. Keep an eye on data use.and a andriid has its own way off telling you something ain't right.light comes on and off by its self meaning someone is loggin on to you changein of ringtones that you didn't apply screaches and fuzzy back ground notices.texs that you get with mixed numbers and digits.meaning some installed spywear on you device incirrectly.or the wrong program for your device.and there's other ways to recognise this just know your device and watch out for sudden behaviour changes.as there's not such thing as a scitzo phone yet

  28. i got news for you … Encryptian was broken a long time ago … im amazed to hear people touting that as secure.
    Nothing digital is secure.
    Now you can still circumvent certain actions by most companies like Ppal or whoever by finding a weak signal area the slower the better which will allow you to beat their protocols if …. anyway



  31. Surveillance ? assistance ? sucurity ? What do they monitor ? Sometimes i have the feeling that they are just a group of lesbians who are just there to look after love and sexe questions ! Sometimes there are some guys too. It is not because i am against prostitution that i can not have a boy friend ?! Whenever i talk with a man, they are all getting crazy ! Who are those who look after me ? Chinese ? French ? Russian ? Vietnamese ? What else ?

  32. The only terrorists are the US an UK governments which is why they are against encryption – get real folks!!

  33. Who fucking cares ..!!!! It’s more than just the iPhones that have survaliance if that is even true at all ..!! Smart gadgets and WiFi .,!!!

Leave comment

Your email address will not be published. Required fields are marked with *.