Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:54
how's it going around ? It's , uh , it's great
0:56
to get you on the podcast . You know , we kind of put this
0:58
together I guess , for my standards
1:00
, right for scheduling a guest . We put it together
1:03
like last minute , even though it was like two months
1:05
ago , yeah , at this point . But
1:07
like at this point in time , like
1:09
with the podcast , it's interesting
1:12
, right , because I always want to get
1:14
people on like as quickly as possible
1:16
. But then I I look at my backlog and I'm like
1:18
, well , shit , like their , their
1:21
episode wouldn't even go live for six months . So
1:23
it's like , okay , we got to push this out . You know a bit
1:25
like make it more reasonable and whatnot . But
1:28
yeah , it's a real , it's a real pleasure and
1:30
honor to have you on the podcast today .
1:32
Thank you . It's very nice to be here , nice
1:42
to , to , to have the opportunity , uh , to present me and the company and be in this
1:44
podcast .
1:44
Thank you , yeah , yeah , absolutely . You know , for , for those
1:47
, for those not very familiar
1:49
with the podcast , right , and how we kind
1:51
of structure it , you know , I , I get guests
1:53
pitched to me every single day , right
1:56
, every single day someone new is pitching me . This
1:58
time , right , I actually pitched you to
2:00
come on the show , and when I do that
2:03
, I don't do it very often , but when I do that
2:05
, you know , it's because you do something really
2:08
interesting . You've created something really interesting
2:10
that I believe in personally
2:12
, right . So I start everyone off
2:14
with kind of giving their background . What made
2:17
you want to get into cybersecurity ? What made you
2:19
get into IT ? Was there a point in time
2:21
where you know , when you're looking back , you're like , oh
2:23
, that experience with my dad
2:25
or my older brother , whatever it might be , with
2:28
this computer kind of opened my eyes to
2:30
the world of technology . You know , what
2:32
would that be for you ?
2:34
So I think
2:36
everything started , you know , in the military service
2:39
. I served in the Israeli military
2:43
, in the IDF . I was in the 8200th
2:47
unit , if you're familiar with it , which is the technology
2:50
intelligence unit . That's
2:52
where everything started for me . Then
2:56
I went to the Technion to have my degree
2:58
, which is equivalent
3:00
to MIT , to do the
3:02
comparison , and so
3:05
that's where everything started for me
3:07
. Wow , yes
3:09
.
3:11
So was there any
3:15
interesting projects
3:18
or things that you could , you
3:21
know , kind of discuss a little bit like in loose
3:23
details , right ? That you did when
3:25
you were , you know , in the IDF
3:27
group . I've had a lot of you guys on
3:29
and it's always interesting to
3:31
just hear the specialties and like
3:34
how broad the specialties are right , Because
3:36
Israel is known for
3:39
having top-tier cybersecurity
3:42
talent within the
3:44
military component and whatnot . It's
3:46
always fascinating to me .
3:47
Yeah , so first , we're talking about
3:50
over 25 years ago , so it's a long time
3:52
ago . But
3:55
in the IDF regardless by
3:57
the way , which guns , by the way which you are you are
3:59
there to be independent . So
4:02
you are starting to getting
4:05
mature much faster than I think anywhere
4:07
else , because you get a
4:09
lot of responsibilities again , whether
4:12
you're in the field with guns or
4:14
whether in the back office with
4:16
the technology . So I
4:18
think that's a great advantage
4:21
for Israeli , even though it's a mandatory
4:23
service for everyone . But
4:25
it also
4:27
gives you life experience very
4:30
early . So I think and
4:32
it's well discussed in many places
4:35
about why Israel is
4:37
a startup nation , so a
4:39
big part of it is the idea . So
4:42
the idea . I cannot really talk about what I did there
4:45
, but you can understand that
4:47
we're talking about cyber
4:49
projects that
4:52
get your experience . Again , we're talking about almost
4:55
25 years ago . It
4:59
only changes all the time , but , uh , um
5:02
, the same thing that you know . Give me a
5:04
really , really big push , uh
5:07
, in this field yeah
5:10
, it's fascinating .
5:12
You know , man , I , I
5:14
was , I was with a friend over this weekend
5:16
, right , and uh , they , they
5:18
had their like seven or eight year old there
5:21
we were watching a football game and
5:23
you know , we we brought
5:25
up like , oh , that was 20 years ago , right
5:27
, and it kind of felt like , kind of felt like yesterday
5:29
. Honestly , like I , I remember I remember
5:31
that time frame like very well , it was
5:33
a lot of fun for me and you
5:36
know , we were talking about it . You
5:38
know it was like in 2005 , right , we were talking
5:40
about like this thing that happened 20
5:42
years ago and their kid was like wait
5:45
a minute , that's 20 years ago
5:47
. And we're like , wait , what
5:49
, what don't
5:51
say that . And then , two , you know
5:53
that that's like crazy , that we're like , you
5:56
know , thinking about this memory , right , that
5:58
we experienced 20 years ago and it's
6:00
still so fresh in our minds and whatnot
6:02
. Yeah , it's
6:04
interesting how that kind of could
6:07
translate , you know , potentially to like technology
6:09
, right , because , like the things 20
6:11
years ago , you typically think that those are , like
6:13
, you know , dead
6:16
pieces of malware , right , or dead pieces
6:18
of technology just overall , but
6:21
some of that stuff , some
6:23
of that stuff , surprisingly , is still
6:25
around , right . I
6:28
mean , is that true ? Maybe
6:30
I'm wrong . Maybe they tweak it so much that it's
6:32
no longer the same thing . What's
6:35
your opinion on that ?
6:36
So that really depends . You know what
6:39
kind of technology I mean . You
6:42
see today that you know technology evolved really
6:44
fast on one end or the other and
6:46
some things are still traditional
6:48
. So that
6:50
really depends . You
6:53
know , talking about maybe traditional areas
6:57
where technology you know improves
6:59
a little bit slower , especially in the
7:01
military , medical stuff
7:03
like that , more
7:05
conservative domains
7:09
, I think they are getting even faster
7:11
today . So everything gets
7:13
really fast .
7:17
Yeah , yeah , that's very true . I mean , like today
7:19
, you know , for instance , we have the Apple
7:21
event , right , and , like you
7:24
know , I'm sure that new chip is going to be
7:26
10 times , 15 times
7:28
faster than the one I have in my
7:30
laptop right now , which was like their first
7:32
gen Apple Silicon . You know , yeah , it's
7:36
fascinating even to see . You
7:38
know , I'm on the technical side of it , right
7:41
, so it's fascinating when
7:43
I see , like these software , you know , manufacturers
7:45
, or even hardware manufacturers , and they
7:47
have , you know , the capability
7:50
to still have that old
7:52
piece of software running on their machine , it
7:54
like intrigues me a little bit . It's
7:56
like , man , like how did they think this
7:59
through to have , like these , you know , these plugins
8:01
by default and these languages and what not
8:03
, like pulled in libraries and whatnot
8:05
. It's , it's fascinating
8:07
, right , but we don't have to go down that
8:09
rabbit hole , right , like we'll , we'll talk about that forever
8:12
. When you were , when
8:15
you were getting out of the IDF , you
8:18
was that like , did
8:21
you have trouble finding your next
8:23
thing ? And I ask that because , in America
8:25
, when I talk to these guys from
8:27
the NSA and from the CIA
8:30
and whatnot , they can't
8:32
talk about what they did for like five to
8:34
seven years right . So they have to like
8:36
fabricate their experience
8:38
, they have to fabricate their history right
8:41
and hopefully find a job and if
8:43
they make it past like that seven year mark
8:45
, you know like they're able to like kind
8:47
of open the door into like oh yeah , I was
8:49
a spy , or oh yeah , I hacked , you
8:52
know , for the NSA and things like that . Is
8:54
that the same kind of , I
8:57
guess , mentality in Israel , or
8:59
is it different ?
9:01
So back these days it was very clear for
9:03
me that you know , after I finished the military
9:05
service , I go
9:07
to the tech union to get my
9:10
degree . I think that it's
9:12
a little bit different today , because it's
9:15
getting really hard to get to
9:17
those units today and
9:20
if you're good at what you are doing , you
9:23
don't need to have any degree . You can just find
9:25
a job and since
9:27
companies in Israel are full of
9:30
employees that went out from
9:32
these units , you can discuss
9:34
a little bit about what you did and
9:37
you can go directly from the military
9:40
service to work without even having
9:42
a rebound . You know , 25 years ago this
9:45
, I'm not having it again . I think that for me
9:47
, gave me a
9:49
more mature academic
9:51
background for what I'm doing today
9:54
. And I
9:56
think you know there's an increasing demand for software
9:58
engineering all over the world , especially
10:01
in Israel . You can see
10:03
, even I know , that big
10:06
companies , even Google , facebook
10:08
, apple that have big offices
10:11
in Israel , they have a
10:13
list of many open
10:16
jobs for a long time . So
10:19
it's not about software engineers today and this is why
10:22
you know employees , many of them are
10:24
jumping directly from the IDF
10:26
. They can't enforce to
10:28
direct employment with those
10:31
giant or other sort of means . So
10:34
that's the difference . It's getting
10:36
a little bit different
10:38
than it used to be huh , yeah
10:41
, that is .
10:43
I mean I'm sure that , like
10:45
all of those big tech companies , would
10:48
you know , market their
10:51
services , their opportunities in Israel
10:53
. Just it being such
10:56
a such
10:58
a plethora , right
11:00
of good experience , right
11:02
, high skill sets and , like you said
11:04
, like the 8200
11:06
group , it's becoming more and more difficult
11:08
to get into it . Right
11:10
, like that is maybe
11:13
the most elusive thing . Right , like
11:15
the same thing in the States here . Right , like with
11:17
the NSAsa , the cia , like if you
11:19
say that you were a hacker for
11:21
the nsa , I mean people will
11:23
, will fire their entire red team
11:25
for you . Like they'll , literally
11:28
, they'll just give you whatever
11:30
you want . It's like , oh yeah , I don't like working
11:32
with this guy . Okay , he's fired by the end of
11:34
the day . What else ?
11:36
Again , the industry in Israel is not only
11:38
subsidiary of Ford . There's
11:42
a big variety of software companies
11:44
, especially software companies , also other companies
11:47
in Israel . It's important , yet not
11:53
the biggest domain in Israel
11:55
.
11:56
So why do you think that that
11:59
is right you kind of touched on it a little bit before
12:01
where , when you're in the military
12:04
or in that group , you get the opportunity to
12:06
kind of decide your own
12:08
work right mentality
12:20
, where you're able to identify a gap right that that you may have with the current tool
12:22
set or whatever that it might be that you're using right , and so then you start creating
12:25
something from scratch . And it's that
12:27
experience that kind of builds upon itself , because
12:29
you have to view things from like
12:31
a very much a reverse engineering mindset
12:34
, right . I'll give you an example . I
12:37
have a good friend of mine that was
12:39
a cyber warfare officer for the Navy
12:41
, right , he doesn't talk about it publicly
12:43
or anything like that . But I
12:45
asked him like , finally it took
12:47
me like weeks to get out of
12:50
him what he actually did , you
12:52
know and
12:54
he said , yeah , like I created
12:56
the proprietary sim
12:58
and edr solution for
13:00
the navy . And
13:02
I said what do you mean by create ? Like there's
13:05
crowd strike out there , like why would you create
13:07
something that's already been created ? Right
13:09
, like it doesn't make sense to me . And
13:11
he , he literally explained it like yeah
13:13
, they give you no budget and they give you a task
13:15
create this thing , and
13:17
if you don't , you're going to be off the team , like that's
13:20
plain and simple , right . And so
13:22
this guy you know we're evaluating
13:24
like a CSPM solution , and he's
13:27
, he's sitting here in the background , he's like
13:29
I could create it for you know this amount
13:31
of money and this , and that , hey
13:33
man , we're not in the military anymore Like
13:44
we're . We're not in the military anymore Like we're . We're . We're buying a solution . We're not creating
13:46
, you know , some like brand new solution that only you know about opens us up to a lot of
13:48
risk . Is it ? Is it that mentality of like reverse engineering that you know , you think like pays
13:50
dividends in other areas of technology and whatnot ?
13:52
So let's say it's 200 units
13:55
so , for example . So if
13:57
you try to compare it to a standard company
13:59
, the way they are working , so
14:01
we have commanders that you can compare
14:04
it to your boss , so
14:06
it's very similar . It's more civilian
14:09
than other units in
14:11
the military . On
14:13
some domains , you need
14:16
to be very creative . On
14:18
some domains , you need to be very creative . On
14:21
the others , you have long-term projects that you're working on . It can be a few years
14:24
, with many people working on them
14:26
, and you have a very clear schedule
14:28
of what you're going to do . So it really depends
14:30
on what you're doing . Again
14:34
, this is the biggest thing with the idea . So
14:37
that really depends on what you
14:40
are expected to do . You can
14:42
be either creative or the project . Either
14:44
way it's very interesting .
14:47
Yeah , yeah , absolutely . So
14:50
when you got out of your school
14:52
right , the MIT of Israel
14:54
and whatnot where'd you go from
14:56
there ? Where'd you find yourself ?
14:58
So I worked for
15:00
the Tech Union . I
15:03
was like one of the professors
15:05
in computer and graphics actually . So
15:08
I think I was one of the
15:10
first professors in
15:13
the world that touched programmable
15:16
GPUs , and we did it for
15:18
research . And then I
15:21
started my first job in this domain . I
15:24
worked here for two years . I
15:27
joined a startup right
15:30
after the founders raised money . My
15:33
first job was an R&D manager of
15:35
a very small startup that
15:37
did very sophisticated
15:40
things with computer graphics on mobile phones
15:42
. Back
15:44
these days it was , I
15:46
think , six
15:51
, seven , something like that no
15:55
iPhones , no Android
15:58
phones . Iphone was not launched yet
16:00
. We worked on similar devices . You
16:03
mentioned it before . Like an ancient history
16:06
. It was only , I mean
16:08
, 16 years ago , something like
16:10
that . 30 years ago we
16:14
didn't have any iPhones or Android devices
16:16
. So
16:18
I worked then and then
16:20
, with a friend
16:22
of mine , we had an idea . Smartphones
16:25
sort of became a thing , and
16:27
if you remember smartphones
16:30
for example , symbian
16:32
, if you remember by Nokia they were very
16:34
complicated for
16:37
users . I mean , if
16:39
you want to set up your email , if
16:46
you were not tech savvy you couldn't do it and smart home
16:48
started to become more and more popular . Again , that's only the beginning
16:50
of iPhones and Android and
16:53
we had an idea that
16:55
those users needed some help from the support
16:57
center . So why wouldn't
17:01
we give them some help or the
17:03
call center help by remote controlling
17:05
those smartphones ? So
17:07
the customer is calling the
17:11
call center and the agent
17:13
is able to remote control his smartphone
17:15
and do the job for
17:18
it . So we did that . We founded
17:20
our own company and
17:23
raised money and
17:26
went to some of the call centers in the world
17:28
in Israel , in India . We
17:31
also had a pilot with AT&T in USA
17:33
and
17:36
I was in this company until
17:39
three years ago . But this company
17:41
did some pivot during that
17:43
time . So
17:45
it started to offer some
17:47
management
17:49
solutions for enterprises like MDMs
17:51
and eventually this
17:54
company completely pivoted
17:57
. What the
17:59
company is doing and did
18:02
a secure operating system for
18:05
enterprises . But
18:07
the focus was
18:09
about , I would say , connecting
18:11
devices and
18:13
equipment that needs secure
18:16
communication . I'll give you an example . So
18:18
let's say you have a pacemaker and
18:21
you get you know in the
18:23
operating room . This pacemaker is coming with
18:25
a smartphone today . So the pacemaker
18:28
is implanted and
18:31
it is connecting via
18:34
the smartphone to
18:37
the manufacturer facilities
18:39
. So
18:41
originally those manufacturers
18:44
they used off-the-shelf
18:46
devices like Samsung . There
18:48
are some that are still using . The
18:51
idea was to curate the devices . That is dedicated
18:53
for this mission . So we need
18:55
to be secure , we need to be managed in a way that you
18:57
know we have a fleet of devices , so we need to be secure . We need to be managed in a way that you know we have a fleet
18:59
of devices and you need to have , like
19:02
, a long-lived supply chain , because you know consumer
19:04
devices , they're manufactured
19:06
and then after a year , you know , no one is manufacturing
19:09
them In the medical industry , thinking
19:11
about pacemakers and insulin injectors
19:13
. They're long-lived and they , you know
19:15
, proceed
19:18
to approve them via the FDA . So
19:21
this is what this company is doing . It's actually still
19:23
doing it today With AT&T
19:25
, by the way , for some of their end
19:27
customers , but for
19:30
me it was , you
19:32
know , after so many years there
19:34
. And then
19:37
we had the idea , you know , we want
19:39
to make a real private
19:41
, secure phone for
19:43
the end users , not for enterprises
19:45
or governments , which is what we did in my
19:47
previous company , and
19:50
I think the focus is not
19:52
only privacy and security but
19:54
also making everything
19:56
convenient , because what
19:59
we discovered , you
20:01
know , in my old company , is that when
20:03
you know , you
20:10
know users were interested in a product
20:12
, but you need to be very have very technical understanding
20:15
of how to operate a device that doesn't have the convenience of
20:17
a normal smartphone . And then
20:21
we decided to found
20:24
Unplugged . So Unplugged
20:26
was like a certain evolution
20:28
of what I did before . I
20:31
gained all my experience with
20:33
both hardware and software from my old
20:35
company and , besides that , I know
20:38
there were a few attempts to do such a smartphone experience with both hardware
20:40
and software from my old company , and we decided to do . You
20:42
know , I know there were a few attempts to do such a smartphone and we tried
20:44
to analyze , you know what , why
20:46
those companies didn't make it . I mean , there's clearly
20:49
a demand for some products , but
20:51
they were not very successful
20:53
. So when we tried to analyze
20:55
and understand you know , do we need to found this
20:57
company ? We understand that
20:59
several things were changed in the last few
21:02
years . The
21:04
first thing is that privacy
21:06
matters for many users much
21:09
more than before , because they are realizing how
21:14
their data is collected
21:16
, shared , monetized , and
21:19
there's a lot of awareness for such
21:21
products . Another
21:25
thing is that , unlike
21:27
five , six , seven
21:29
or ten years ago , for
21:32
a small company it
21:34
was nearly impossible to create
21:37
a good hardware because
21:39
the supply chain was very different
21:41
. All the big manufacturers controlled
21:43
the hardware . They had access
21:45
to the high-end hardware which
21:49
small companies cannot even finance
21:51
. But today
21:53
small companies can
21:55
build their own smartphone from
21:58
scratch . I mean , you still need some funds to
22:00
do it , but it is possible
22:02
. And if you notice today
22:04
you know if you have
22:06
your latest iPhone or
22:08
Samsung device , you
22:10
want to convert to the new version
22:13
of the hardware . There's not much
22:15
of a difference between every year .
22:17
Yeah .
22:18
I mean like almost nothing , yeah , version of Diablo .
22:20
There's not much of a difference between every year .
22:21
Yeah , I mean like almost nothing . Yeah , it's more on paper than simply you can notice . I
22:24
mean the software is almost everything . So
22:26
, yes , you can maybe get a slightly
22:28
better camera or a faster CPU
22:30
that no one will notice , except if you're a hard
22:34
gamer or trying to do something
22:36
that you don't need to do on your smartphone
22:38
from a CPU perspective . So
22:41
that gives the opportunity to do it . But
22:43
the third reason I think that all
22:45
previous attempts were failing is
22:48
because the user experience was not good . And
22:52
basically , creating a privacy phone
22:55
means that you must
22:57
not have Google on your device . It's a difficult
22:59
device and
23:01
that is very inconvenient
23:04
. Yes , so even
23:06
for those users that want to
23:09
understand the importance
23:11
of privacy , having such
23:13
a phone is very inconvenient
23:16
and if you see the pure extent
23:19
, it's not a usable device . So
23:22
we realized that our mission is to
23:24
create not only a privacy in a private
23:27
and secure phone , it's to
23:29
create a convenient somewhere that
23:31
no other user can use . During
23:33
this path we also realized you know
23:35
it was obvious for us that the USA market
23:37
is the biggest market for such
23:40
devices . We're going to launch
23:43
it on international
23:46
territories later . We
23:49
realized that you know we
23:52
need to do something really good
23:54
here . So in USA what
23:57
you see is that you know most users are
23:59
most customer consumers are buying
24:01
their phones from carriers and
24:04
even that transition from buying a device
24:06
from carrier to the open market is a challenge
24:08
in USA . You know everyone in the world not
24:10
everyone else , but most places in the
24:12
world take Europe , for
24:15
example you can see a
24:17
big part of the market is buying from
24:19
the open market . I mean not from the carry
24:22
. We just realized that you know many
24:24
consumers don't even
24:26
know what a SIM card is . So
24:30
realizing that that's
24:32
a big challenge for us and this is what we're trying to
24:34
achieve creating a convenient
24:36
phone , secured phone , private
24:40
phone and
24:47
focusing on the support and doing the transition .
24:49
So let's talk about that a little bit
24:51
. Right , let's dive into this . You know , when I was getting
24:53
my master's in cybersecurity and one of the courses was mobile
24:56
security , right , and we were really comparing , I was getting my master's in cybersecurity and one of the courses was mobile security , right
24:58
, and we were really comparing
25:00
the architecture of Android
25:02
to iPhones and this was back in 2018
25:05
, you know . So I'm sure it has
25:07
changed some at this point
25:09
. Probably , honestly , it's probably more
25:11
on the Android side than the iPhone
25:13
side , right , because iPhone focused
25:16
more specifically on , like , supply chain security
25:18
to some extent , right , having their own chips
25:21
in it and whatnot . But a part
25:23
of this course was to actually , you
25:26
know , find a vulnerability . It
25:28
could be already known , could be whatever
25:30
. It is right , find a vulnerability , exploit
25:32
it on the device of your choosing
25:35
, and so I wanted to make this a little bit
25:37
difficult , right , I want to make it a little bit challenging
25:39
and I wanted to find a vulnerability
25:41
, you know , with Bluetooth on an iPhone
25:44
. Right , found the vulnerability , tried
25:46
to exploit it . I spent 36 hours trying
25:48
to exploit it , something that was never
25:50
going to work because
25:53
, basically , apple did a silent security
25:55
update , literally two weeks before
25:57
I started trying this thing , and it was literally
25:59
for this Bluetooth exploit . I
26:02
go and I attempted on Android
26:04
. Within you know , maybe 15
26:07
, 20 minutes , I have root on the device
26:09
and I'm able to control everything about the device
26:11
, right , like that was . That
26:14
was a huge difference to me . That was a huge eye
26:16
opening . You know , kind of event
26:18
, right , maybe , and I'm a terrible
26:21
hacker , I mean , like , I don't even claim
26:23
to be a hacker , like you
26:25
know , if anyone were to approach me at , like , def
26:27
CON or something like that , right , like I
26:30
am not doing capture the flag events
26:32
or anything like that , like you know , I'll
26:34
go watch , right , but I , I'm not , I'm
26:36
not over here trying to hack stuff . But
26:39
that that experience , though , even
26:41
knowing , you know , having that self-awareness , like
26:43
hey , I'm not good at this , this isn't like
26:45
my forte in security for
26:48
it to be that easy with android
26:50
it kind of swayed me
26:52
more heavily even towards
26:54
iphone . And the reason why I went from
26:56
Android to iPhone , you know , probably
26:58
10 years before that , right , what
27:01
was ? Because of the ease of use
27:03
, right , I had a very bad experience with Android
27:05
. I was downloading things from the Google
27:08
Play Store that had malware on
27:10
it . It had millions of downloads , right
27:12
, like the Facebook app . You know , the Facebook
27:14
app had millions of downloads , or whatever it was when I had an Android . I'm downloading the
27:16
Facebook app . You know , the Facebook app had millions of downloads , or whatever it was , when I had an Android . I'm downloading
27:19
the Facebook app and it has malware in
27:21
it , right , and this malware is like
27:23
impacting my device pretty significantly
27:26
, like the performance is insanely
27:28
decreased . You know everything about
27:30
it , right , and so I , with
27:33
that experience and I even talked
27:35
to like Android support at
27:37
the time and said how the hell is this happening
27:40
? This has happened three times to me
27:42
. I'm literally going to your own Play Store
27:44
and downloading it this
27:46
is even before me getting into cybersecurity
27:48
and they're saying well , you're downloading it . It
27:51
has malware in it , yeah , and there's
27:53
no way to tell , and I'm sitting here , like Google
27:56
, it's your Play Store . You don't
27:58
have a way of telling if it has
28:00
malware in it .
28:03
So you touched so many interesting
28:05
points . I
28:07
try to remember what you were talking about
28:09
, but let's start with that . So you're
28:11
talking about maybe 10 years ago , right ? So
28:15
back these days , apple was very
28:17
close . You could not do
28:19
much on the iPhone as
28:21
a developer . On the other hand , google
28:24
had everything open . I mean
28:27
like almost everything , and that not
28:29
only means from a developer perspective
28:31
what you can do on the phone , all the
28:33
APIs , but
28:35
also in terms
28:37
of the Google Play Store . You can upload
28:40
an application to your store . No one
28:42
will even verify that . No
28:44
one will look at it on the app
28:46
. They're not even automatic
28:50
scanning of the apps . Permission
28:53
usage was if you could
28:55
use it , then you could upload it to the store
28:57
. Both
29:01
Google and Apple did some changes . So
29:03
Apple became a little bit more open
29:06
. They gave the developers more options . On one hand
29:08
, google started becoming more secure
29:10
in their place let's talk about Android
29:13
itself in a second . But
29:16
today it's harder to upload an application
29:18
to Google . There is
29:20
some verification process for
29:23
you as a developer for your
29:25
app . They restricted a lot
29:27
of things that you can do with your
29:29
applications . Permissions
29:31
were downgraded . I mean
29:33
you cannot do anything that you want to
29:35
do as you used to be
29:38
and
29:41
the whole operating system is becoming more
29:43
secure , but again , we'll talk about it
29:45
later . So
29:48
things are changing all the time and
29:51
in the case of Google , they also have the problem
29:55
of the large device
29:57
variety . So
29:59
you have so many devices out there , so
30:02
many versions of the operating system , and
30:06
they had to do some work in
30:08
order to make sure that those that are
30:10
out there can maintain
30:12
all the security updates . And
30:15
they did a good job there to be better and
30:19
give the manufacturers better
30:22
support in upgrading the operating
30:24
system , making the
30:27
upgrade easier for them . We
30:30
see it's not by ourselves . So we
30:32
launched our operating system based
30:34
on Android 13 . We
30:36
are updating to Android
30:38
14 this year
30:40
. The process is not
30:43
very hard for us , even though we
30:45
did many changes in the operating
30:47
system based on Android system for
30:49
more security and for our needs , and
30:52
it looks much better Now
30:55
, if we're talking about the Android operating
30:57
system , android used to be very
31:00
light back these days . You
31:03
know we are device manufacturers
31:06
, so we are in charge of
31:08
the operating system . I
31:10
see the Android source . Actually
31:13
, anyone can see the AOSP tree . We
31:16
see the old BSP tree , including the drivers
31:19
and everything and
31:21
that is becoming
31:23
a huge piece of code
31:25
, and most of the changes
31:27
are related to security , and
31:32
more and more layers are
31:34
added to prevent
31:36
, to make the operating system more secure , what
31:39
is exposed to other apps , for
31:42
example , something that used to be very
31:44
open , even a few years ago , now
31:46
much more close Stuff
31:53
like that . That permission mechanism was evolved . What person is giving to built-in
31:57
applications on the phone ? So
31:59
Android has become like a huge monster and
32:07
many code changes
32:09
are made in the Android operating system to support this agenda . Having said
32:11
that , the more code you add , the more vulnerabilities that you can potentially
32:14
enter the operating system . That actually
32:16
brings a different topic
32:18
, because we discussed about
32:20
iOS versus Android . So
32:22
iOS is a closed source and Android is not
32:24
, and many vulnerabilities are discovered
32:27
because it's an open source on
32:29
one hand . On the other hand , apple
32:32
closed source policy prevents
32:34
someone from you know , take a look in
32:36
the source code and find vulnerabilities . So
32:38
I assume that potentially
32:40
more vulnerabilities exist on Apple
32:42
, even though probably they
32:44
are much harder to be found
32:47
.
32:48
That's interesting . Yeah
32:52
, that is fascinating . You know , the
32:54
last time I looked at
32:56
like the device architecture
32:58
of iPhone versus Android , right , just kind
33:00
of an overarching architecture , you
33:03
know , it seemed like the
33:05
iPhone kind of protects the user from
33:08
the user , right , like they
33:10
have sandboxes for their apps
33:12
, they have sandbox for their user space
33:14
, they have it separated from
33:17
the operating system , even , right
33:19
, and there's very specific like keys that
33:21
you have to use to unlock each of those components
33:24
and whatnot . And you know , even
33:26
, like if you were going to , you
33:28
know , take it , take your iPhone right to an
33:30
Apple dev and say , you know
33:33
, open a terminal and troubleshoot this thing
33:35
, like they would have to have a very specific
33:37
key with a very specific you
33:39
know cable that's plugged into
33:41
it , probably within the geofence
33:43
of you know Apple campus
33:45
and whatnot , right , all
33:49
of those things have to line up for them to be able to do
33:51
that , which I mean , at least from my opinion , right , like
33:53
I haven't seen it from your side , where potentially
33:55
you're actually actively thinking of new ways
33:58
to exploit devices . Right
34:00
, because I mean , that's probably how you , you
34:02
know , built unplugged to some extent , right
34:05
, like it's like , well , what's what's available
34:07
right now to exploit devices and what's coming
34:09
in the future to exploit devices . I
34:12
don't know it from that angle , but at least
34:14
from my angle , it seems like , okay
34:16
, iphone gets me , you know , 85
34:18
, 90% of the way there in terms of security
34:21
. So I'm going to go with that right . And
34:23
then I heard about the unplugged device , which
34:25
was very tempting to me
34:27
. Right , because I
34:29
don't know if you've listened to the podcast very much , but
34:31
right
34:34
before Russia invaded Ukraine , right
34:37
On the podcast I was calling
34:39
out Russia , right when everyone
34:41
else was saying , oh , it's a war exercise
34:44
or whatever it is . You know
34:46
, it's like , hey , they have tanks on the border
34:48
for a reason , like they're not just amassing
34:50
to amass and they're not doing this war exercise
34:53
directly on the border
34:55
for no reason . You know , I was actively
34:57
calling them out and I do the same thing with China
35:00
and whatnot . And it was interesting
35:02
, literally the day that Russia
35:05
invaded Ukraine , my podcast
35:07
got blackholed or blacklisted
35:09
in all of Russia , china , Iran
35:11
, basically all enemies of America and
35:14
Israel , they all just blacklisted
35:16
my podcast immediately . Oh , it wasn't a substantial
35:19
portion of my traffic , but it was enough for me to be
35:21
like I used to get 15%
35:23
from Russia and now I get nothing
35:25
, you know . So it's like okay , you know so it's like okay , you know
35:27
, that's . That's a substantial
35:29
difference . And very
35:31
, I guess , very interestingly
35:35
, right at the same time I started getting
35:37
very , very odd attacks
35:39
, you know , on my , on my PCs
35:42
, on basically any PC that was at home
35:44
, which was very interesting to me because
35:46
I host a podcast . Right
35:48
, like , what the hell am I going to do ? How
35:50
am I even , like seen
35:52
as like a threat to the state of Russia or China
35:55
or anything like that , like you're literally wasting
35:57
resources , even if it's an automated
35:59
script that you're running , you're wasting
36:02
resources trying to like get
36:04
at me , right . And so that's when
36:06
I started to kind of go down this whole rabbit hole
36:08
of how do I secure my devices ? Right
36:11
, like , how do I ? I need to have a secure
36:13
device that I can , that I can use
36:15
if I need to , that I can ensure is
36:18
forever secured and in my benefit
36:20
. And so that's how I kind of stumbled
36:23
on the unplugged device . So
36:25
I say all of that right to
36:27
kind of pivot , almost right , and build a little bit of context around device . So I say all of that right to kind of pivot , almost
36:29
right , and build a little bit of context around it
36:31
. So , the devices that we're currently using iPhones
36:34
and Androids do
36:37
you think that their price would be
36:39
even more significant than they
36:41
are today if they were not selling our
36:43
data ? Yeah , which
36:45
is yeah . You think it would be ? How
36:47
much more expensive do you think it would be ? Like
36:50
, what's the difference ?
36:51
So I think we did some math and
36:54
I think the rough number that Google's
36:57
making on let's
36:59
say , I don't know the Apple's number exactly
37:01
, but I guess they're similar , maybe
37:04
even more so
37:06
we approximate I think you find
37:08
some , some proof or
37:11
evidence for it that they
37:13
make about 150 to 200
37:16
every year from you just
37:18
for holding a smartphone that you know manufactured
37:21
by apple or google so they're making 150
37:24
just from me having
37:26
the phone .
37:27
Yeah Right , that's kind of like the default , that's
37:30
like the default usage
37:32
of the phone , without really even like clicking
37:35
on different ads and stuff . So this
37:38
is not oh so are they building
37:40
enough , yeah , okay . So
37:42
are they building in a fee when
37:44
I Google a product , right , like
37:46
well , let's say , like over the weekend I bought like
37:49
a torque wrench for my car , right , when
37:51
I Google torque wrenches , is Google
37:54
getting a fee from Apple or Apple's
37:56
getting a fee from Google ? And then
37:58
when I go to Amazon from that link
38:00
in Google is like
38:02
Apple getting another fee from Amazon
38:05
Because I went to their link on
38:07
their phone . Is that how convoluted
38:11
it is .
38:12
First , I think Google is paying Apple for being
38:14
a default search in their device . It's
38:16
one thing , but you
38:19
should think about private data , not
38:21
only about your searches , because the search
38:23
can be done on a private phone
38:25
, but let's think
38:27
you know your location date . So
38:31
location even not talking about your specific
38:33
location , I mean your location as
38:36
a collective data of
38:38
locations that can be sold
38:40
to data brokers for different purposes
38:42
, so they can make money from it or
38:44
use it for their own product , to build new products
38:47
. So this is one
38:49
thing . Let's see one of the challenges that we
38:51
have . For example
38:53
, we are the Google show , so
38:55
we don't have the luxury
38:58
of using Google network
39:01
location services , which is a
39:03
location
39:05
service that is built
39:08
from user data , from their Wi-Fi
39:10
hotspots locations , for example
39:12
. Think about anything
39:15
that you're doing on the phone that is not related
39:17
directly to what you're using , that
39:20
everything can be used for Google
39:22
or Apple products and that
39:24
can leverage other skills
39:28
. So , um , I
39:30
mean the number of opportunities
39:33
just being on your phone as
39:35
a infrastructure software
39:37
is , you know , infinite
39:40
. That's it so
39:42
okay .
39:43
So that is really
39:45
fascinating and I think I have like two
39:47
major questions from it right
39:49
, hopefully I don't forget one
39:51
of them From the perspective of
39:54
Google getting device
39:56
location right . So when I upgraded
39:58
my iPhone , I upgraded a couple of years ago
40:00
iPhone 14
40:02
, I typically like upgrade every four to
40:04
six years , you know , because kind of like what
40:06
you said right , like there's not like a giant
40:08
performance difference . I'm not
40:11
going to notice it , I'm not going to feel it . It's
40:13
kind of timed with when they stopped supporting
40:15
the phone . It's like , okay , I guess I have to
40:17
upgrade Right , cause I'm not that big
40:19
of an idiot . You know to where I'm going to have
40:21
like a super old phone and can't
40:24
patch it . But
40:26
when you upgraded to the recent probably
40:28
you know ios right , it
40:30
gave you the ability to it . It
40:32
at least gives you the feel that
40:34
you're limiting . How much these apps can
40:37
you know , gather on you right
40:40
, google being a great example
40:42
? I mean , I'm sure someone at google is going to be
40:44
pissed off at me if they hear this right , right , but you
40:46
know like when I got , I just remember
40:48
, right in the search app
40:51
, it like asked for my location information
40:53
. Denied , it went into the Nest app
40:56
Nest owned by Google and
40:58
sorry about that . Nest requested
41:00
my , my location
41:02
information . Right , so I said
41:04
yes to that because because obviously I want
41:07
to run a more efficient home , you
41:09
know I don't want a giant electricity bill . Nest
41:11
does that thing . You know that deals
41:13
directly with that . I wonder
41:15
if they're then leveraging that permission
41:18
of saying he allowed
41:20
us for Nest so we're going to do the same thing
41:22
for , you know , google
41:24
search locations and whatnot , which would
41:27
actually kind of make sense for what I experienced
41:30
recently when I went to a . So
41:32
I live in a blue state here in America
41:34
and I mean , like typically that's
41:36
not even something that you like have to say or like
41:39
mention or anything , but it's so divisive
41:41
or divisive , you know , like now
41:43
in the world it's like you
41:45
have to build that context in . So I live in a
41:47
blue state and when I went
41:50
to a red state , I was bombarded
41:53
with like left
41:55
material , right , left
41:57
, centered , left , focused material . I'm
42:00
completely bombarded with it to the
42:02
point where , like I thought something
42:04
was wrong with my phone , right
42:06
, I thought something was wrong with my devices
42:08
because it was so off the wall
42:10
from what I'd normally search . It
42:14
makes me like recalibrate , like well , how are they
42:16
actually getting that info right ? Like , are they
42:18
just getting it from GPS information ? Because
42:21
, like that's such a loaded topic
42:24
, it's such a loaded you know loaded
42:27
thing to dive into In
42:30
your opinion , in your own research
42:32
, because you're basically the expert in the field . Is
42:35
that what they're doing ? Are they kind of leveraging
42:37
that access in one area
42:39
to be like , well , it's a Google company , we're
42:42
going to do it over here too .
42:44
First , specifically for
42:46
the Nest , I'm not
42:48
sure I need to read their . You know terms
42:51
and conditions , but you know , think
42:53
about , let's say , you don't want to share your information
42:56
, your location data , your
42:59
inaccurate location
43:01
, can still be accessed through several
43:03
methods . For example , you know , if you know the
43:05
Wi-Fi MAC
43:08
address that you're connecting to , they
43:10
can get to your almost exact location
43:12
, I mean as an app
43:14
developer , for example . So
43:16
that may be or may not be blocked in a
43:18
specific app , but certain apps
43:20
can access it . But I
43:23
think I have a good example and about
43:27
maybe that you know , I think I have
43:29
a good example about maybe that will give you some evidence
43:31
about what those companies
43:34
are trying to do and
43:36
how apps developers or , let's
43:38
say , those data brokers , are
43:40
bypassing . So I
43:43
want to talk about the Advertising
43:46
ID . You know it was a few years
43:48
ago . Everyone had it . It
43:53
was Apple , google . Apple blocked it . You know , blocked
43:56
the data from Facebook . Google
43:59
even , you know , decided that . You know it
44:01
would not be mandatory . You can even
44:03
disable it . That should be
44:05
enough to
44:08
cut or to stop
44:11
the efficiency of
44:13
the add-in industry . So , add-in
44:15
industry are you familiar with the add-in industry
44:17
? Maybe I'll explain . So
44:20
the add-in industry is
44:23
a cybersecurity
44:25
hacking domain that
44:28
allows a very effective
44:30
, cost-effective , actually
44:32
targeting , profiling
44:35
and getting information
44:37
about people . So the idea is that
44:39
, let's say , I want to know your location
44:41
. All I need to
44:43
do is to do some advertisement
44:47
campaign that targets your profile
44:49
. I know your age or , I
44:51
would say , approximate location I mean which
44:53
city you are , what is your
44:55
interest and
44:58
then I send some advertisement data
45:00
to contain your
45:03
location and
45:05
then I use this information that
45:07
I gathered from this campaign to
45:10
know your specific location , for example
45:12
. Let's say , for example , I get like 1,000
45:15
hits that
45:18
you know this campaign was . You know
45:21
1,000 people that this campaign
45:23
hits in your city
45:25
. I know where you're living . I know
45:27
where you're working . I see only one person with those two locations . I know where you're living . I know where you're working . I see only
45:29
one person with those two locations
45:31
. I know it was you . They can trace
45:34
back all your locations . So
45:36
, given that you
45:38
don't have this head ID , this
45:42
industry should now be blocked . But
45:45
that's not the case because I can
45:47
still profile you from other data
45:49
on your device . So if
45:51
I know , you're
45:54
not even need to know . I need
45:56
to get your device model , some other characteristics
45:59
of your phone , a
46:01
few that those ads can get , like mobile
46:03
carrier and some
46:05
other parameters . I can narrow
46:08
down those
46:10
parameters like 9 , 10 , 11
46:13
parameters and gather
46:16
all of them together to give an ID
46:18
, like
46:21
a fake ID , to your device
46:23
. So , even
46:25
though Google
46:28
and Apple are trying to blow up and
46:30
give more secure products in
46:32
, essentially you know there
46:35
is some okay
46:38
, because you know eventually it will not
46:41
allow all the apps to the way they should
46:43
. So the into the apps have access to the system
46:46
, to the data on your phone . You're onto
46:48
the application tool . So
46:51
, yes , they're doing a lot in
46:53
this area , but that is not enough , especially
46:56
for those attackers that you know will
46:59
find any way again , even without
47:01
hacking your phone , to get
47:03
information about .
47:05
That's really . It's interesting
47:07
. You know , I feel like
47:09
people always had the mentality
47:11
it's maybe a legacy mentality , right when
47:17
they have to , like , hack your actual device in order to , you know , gain
47:19
information or track you or whatnot . It
47:21
seems like they don't even have to hack your
47:23
device anymore . They just have to pay a
47:25
data broker to get
47:28
whatever they want . Right , I mean like , and
47:31
with I mean I I
47:33
guess with , from what you were saying . With
47:35
iphones , with androids
47:37
, you know , it's basically
47:39
impossible to to
47:41
block that stuff . Right , because
47:44
it's almost like apple gives you the
47:46
illusion of privacy and I I
47:48
mean please correct me if I'm wrong Right , but
47:51
it seems like they do a bit of a better job
47:53
than Google overall , right , if
47:55
we're not , if we're not thinking of this , you
47:57
know , data broker side of it , right , it
48:00
seems like they do a good job overall
48:02
of protecting their users from
48:04
themselves , protecting their devices
48:06
. You know , ensuring privacy , to some extent
48:08
, it seems like they do a good job of it
48:10
, but you know , it's
48:13
like it's difficult
48:15
because it turns into a situation
48:18
where one you
48:20
know , I'm I'm a security person , I'm more
48:22
aware of it than you know 98 , 99%
48:24
of the population . How
48:26
in the world is you know someone of the population ? How in the world is you
48:28
know someone like my parents
48:30
, you know , in their , in their 50s , 60s
48:33
, right , they're never going
48:35
to know the difference , they're never going to think about that
48:37
or anything like that , and so you need a device
48:39
that's doing it , you know , automatically
48:41
. Because if , like you said , if apple
48:44
were to actually make that change on their
48:46
device , like 95
48:48
, 99 of the apps on their device
48:50
wouldn't even work , apple would have
48:52
to go into the business of recreating all these apps
48:54
you know themselves to make
48:56
it work on their device yeah , actually
48:59
it's .
49:00
it's opposed to their business model
49:02
. It's just opposed
49:04
to the business model and you , you know , we created
49:06
in the app phone . One
49:09
of the biggest things that we put
49:11
on the phone is a firewall that
49:13
blocks trackers and
49:16
ads , not
49:18
only in the web browser , also in the apps . So
49:21
, you know , trackers most
49:24
of the apps have trackers
49:26
. Some of them are
49:28
, you know , legit , like from
49:30
the developers to collect some data
49:32
about the usage of the app . Some
49:35
are for just selling the data and
49:38
, by the way , our new antivirus version
49:40
that we're going to release later
49:43
this month will show this
49:46
information for use . You
49:48
can install it also on regular inverse phones . This
49:52
information , by the way , is
49:54
public . I mean , most of the users do not know
49:56
how to access it . They do not know that they
49:58
should , you know , track those trackers
50:00
or even have trackers , and antivirus
50:03
is not even showing this data because they
50:05
are failing in this area too . They
50:07
have some trackers by themselves . So this is
50:09
one thing . Another thing
50:11
is that , you know , regarding
50:13
Apple versus Google in
50:15
terms of software . So , when
50:19
you spoke about hackers , I
50:22
think so , if you know Cetabright
50:25
, cetabright , they are providing
50:28
for government
50:30
agencies the ability to hack to
50:32
your device . So if they
50:34
have a criminal's device , they can hack into
50:37
the device and collect data
50:39
. So there's a leaked
50:41
document from Cellebrite of the brightest
50:43
about maybe five , six months
50:45
ago they divided the
50:47
, the categories for android
50:50
, iphones and uh , generally
50:53
speaking , I think . I mean they
50:56
don't have the solution for the latest iphone
50:58
, but you just risk three days for that . From
51:02
my experience , they are always have
51:04
the ability to hack
51:07
into the and
51:09
also to most Androids , and
51:12
they had a very nice
51:15
section separated
51:17
just for Graphene OS
51:19
on Pixel devices
51:21
and it's
51:24
a separated section and it's clear
51:26
that Graphene OS
51:28
on a Pixel device is
51:30
more secure than any iPhone
51:33
or Android device . So
51:35
that's very interesting
51:37
for us . Of course , our
51:40
understanding is that Graphene OS is
51:42
not accessible for most
51:44
of the users . They cannot just do
51:46
a Pixel phone and flash the device . But
51:50
there are ways in software
51:52
, similar things that we are doing , to
51:54
protect you and an end user .
51:57
So what's the OS that the unplugged
51:59
device is running ? You
52:01
said that it was essentially Android
52:03
14 on the back end . What
52:06
are you calling your branch of Android
52:08
14 ?
52:09
So it's LibertOS or
52:12
Libertos , so it's
52:14
a variant of Android . It's based on a very
52:16
clean version of Android . We
52:19
don't have any Google services . We strip everything
52:21
off from the operating system and then build
52:24
on top of the operating system . You know
52:26
our security and privacy , so
52:29
it's a standard base .
52:30
That's really fascinating . You know
52:32
, I wish we had more time , but I
52:34
always try to , you know , stick to
52:36
the time limit that I give everyone , so you
52:38
know before I let you go . How about you tell people
52:40
where they can find you if they wanted to reach out and
52:43
learn ? You know , maybe connect
52:45
with you right , and where they can find
52:47
your unplugged device ?
52:49
Yeah , so unplugged
52:51
is available at wwwunpluggedcom . Just
52:57
search for unplugged on any search
53:00
engine . You can buy the phone
53:02
today in USA , canada . The phone
53:05
, by the way , is compatible
53:07
to most networks around
53:09
the world . We're just now
53:11
selling it in USA and Canada
53:13
only because of
53:16
certification and logistics . We
53:20
want to expand . Actually , we're starting our European
53:22
certificate right now , so our next
53:24
big market will be Europe and you can
53:26
actually reach us also in
53:28
the app messenger . So the app messenger is
53:30
our secure messenger . You can download
53:33
for any android or iphone
53:36
device . Now we have some . We
53:38
have a group there , like we call the early adopters
53:40
group , and some
53:42
of us , including me , are in this group
53:44
. So you can reach us there . And
53:47
we have live agent support
53:50
. That you know from our apps
53:52
and also from the phone . You can
53:54
reach our support and , you know , ask questions
53:56
. We have a lot of information
53:58
on our website . We'll try
54:01
to bring more and more information there . The more
54:03
we ask , the more we put . But
54:05
again , the FAQs section
54:08
is quite big already
54:10
, so you
54:12
can find .
54:15
Yeah , perfect . You know , ron
54:17
, like I really appreciate you
54:19
know you coming on the podcast . This is a really fascinating
54:22
conversation . I definitely want to have
54:24
you back on in the future to kind of continue
54:26
our conversation even and do a part
54:28
two it was great . Yeah , yeah , it
54:31
was fantastic . I really appreciate
54:33
it . So you know , thanks for coming
54:35
on , of course , and I hope everyone listening
54:37
or watching enjoyed this episode . Bye
54:39
, everyone , bye . Thank you very much , thanks
54:42
.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More