Alex Stamos
👤 PersonAppearances Over Time
Podcast Appearances
One of the things they've done is they've created security protections where if something bad happens, they can try to protect that if you hack one of those subsystems, that hopefully they can contain that hack and keep them from taking over the entire phone.
One of the things they've done is they've created security protections where if something bad happens, they can try to protect that if you hack one of those subsystems, that hopefully they can contain that hack and keep them from taking over the entire phone.
One of the things they've done is they've created security protections where if something bad happens, they can try to protect that if you hack one of those subsystems, that hopefully they can contain that hack and keep them from taking over the entire phone.
So there's a company in Israel called NSO Group that sells these hacks and is very good at it. You know, the Russians do this, the Chinese do this. So the Chinese government's actually quite good at this.
So there's a company in Israel called NSO Group that sells these hacks and is very good at it. You know, the Russians do this, the Chinese do this. So the Chinese government's actually quite good at this.
So there's a company in Israel called NSO Group that sells these hacks and is very good at it. You know, the Russians do this, the Chinese do this. So the Chinese government's actually quite good at this.
So there's what are called interaction and non-interaction hacks. So there have been ones that are so bad that the message is delivered and in the background, your phone parses the message. They take over your phone and then they delete the message. You don't even know you got hacked. And then they plant the malware on your phone.
So there's what are called interaction and non-interaction hacks. So there have been ones that are so bad that the message is delivered and in the background, your phone parses the message. They take over your phone and then they delete the message. You don't even know you got hacked. And then they plant the malware on your phone.
So there's what are called interaction and non-interaction hacks. So there have been ones that are so bad that the message is delivered and in the background, your phone parses the message. They take over your phone and then they delete the message. You don't even know you got hacked. And then they plant the malware on your phone.
And now they can read all your messages, read your email, and even in some cases, turn on the microphone, turn on the camera, track your GPS location and such. And that's been used against democracy activists, it's been used against journalists and such. It's really bad.
And now they can read all your messages, read your email, and even in some cases, turn on the microphone, turn on the camera, track your GPS location and such. And that's been used against democracy activists, it's been used against journalists and such. It's really bad.
And now they can read all your messages, read your email, and even in some cases, turn on the microphone, turn on the camera, track your GPS location and such. And that's been used against democracy activists, it's been used against journalists and such. It's really bad.
I mean, it's possible. It is possible. This is this, that this is, if you pull this thread, you find a big hole in the sweater on the other side. You know, this kind of bug, it's not super likely, but it is possible. I have seen more minor things than this turn out to be a highly exploitable condition. So yeah, it is possible.
I mean, it's possible. It is possible. This is this, that this is, if you pull this thread, you find a big hole in the sweater on the other side. You know, this kind of bug, it's not super likely, but it is possible. I have seen more minor things than this turn out to be a highly exploitable condition. So yeah, it is possible.
I mean, it's possible. It is possible. This is this, that this is, if you pull this thread, you find a big hole in the sweater on the other side. You know, this kind of bug, it's not super likely, but it is possible. I have seen more minor things than this turn out to be a highly exploitable condition. So yeah, it is possible.
This feels like around seven seconds here. But back to Alex's tests. There's a bunch of errors getting thrown around the IAM transcoder agent.
This feels like around seven seconds here. But back to Alex's tests. There's a bunch of errors getting thrown around the IAM transcoder agent.