1
00:00:00,000 --> 00:00:02,399
Think about all of the freedom

2
00:00:03,060 --> 00:00:05,579
technologies that would not

3
00:00:05,579 --> 00:00:08,339
be possible if every developer

4
00:00:08,339 --> 00:00:10,709
had to fully KYC themselves.

5
00:00:11,129 --> 00:00:13,811
I mean, just imagine, Bitcoin's

6
00:00:13,811 --> 00:00:16,421
creator, Satoshi Nakamoto having

7
00:00:16,421 --> 00:00:19,451
to KYC himself to Google in order

8
00:00:19,451 --> 00:00:21,461
to distribute Bitcoin to the world.

9
00:00:21,461 --> 00:00:21,761
Right?

10
00:00:22,241 --> 00:00:23,771
It's, it's laughable.

11
00:00:24,041 --> 00:00:27,043
It's the antithesis of freedom

12
00:00:27,043 --> 00:00:30,133
technology and the cypher punk ethos

13
00:00:30,133 --> 00:00:33,313
of write code, let people download

14
00:00:33,313 --> 00:00:35,579
it, let them run it, and, you know,

15
00:00:35,579 --> 00:00:38,039
run it outside or parallel to the

16
00:00:38,039 --> 00:00:40,469
existing centrally controlled system.

17
00:00:41,889 --> 00:00:43,259
Welcome to the Sovereign Computing

18
00:00:43,259 --> 00:00:45,679
Show, presented by ATL BitLab.

19
00:00:46,199 --> 00:00:48,139
I'm Jordan Bravo, and this is a

20
00:00:48,149 --> 00:00:49,869
podcast where we teach you how to

21
00:00:49,869 --> 00:00:51,879
take back control of your devices.

22
00:00:52,319 --> 00:00:54,309
Sovereign Computing means you own your

23
00:00:54,309 --> 00:00:56,499
technology, not the other way around.

24
00:01:00,199 --> 00:01:02,909
This episode is sponsored by ATL BitLab.

25
00:01:02,909 --> 00:01:04,719
ATL BitLab is Atlanta's

26
00:01:04,729 --> 00:01:06,049
freedom tech hacker space.

27
00:01:06,329 --> 00:01:07,449
We have co working desks,

28
00:01:07,469 --> 00:01:09,029
conference rooms, event space,

29
00:01:09,069 --> 00:01:10,689
maker tools, and tons of coffee.

30
00:01:11,439 --> 00:01:12,509
There is a very active

31
00:01:12,509 --> 00:01:13,529
community here in the lab.

32
00:01:13,579 --> 00:01:14,699
Every Wednesday night is

33
00:01:14,699 --> 00:01:16,249
Bitcoin night here in Atlanta.

34
00:01:16,559 --> 00:01:18,379
We also have meetups for cyber security,

35
00:01:18,389 --> 00:01:20,249
artificial intelligence, decentralized

36
00:01:20,249 --> 00:01:21,869
identity, product design, and more.

37
00:01:22,659 --> 00:01:24,609
We offer day passes and nomad passes

38
00:01:24,669 --> 00:01:26,359
for people who need to use the lab only

39
00:01:26,359 --> 00:01:28,169
occasionally, as well as memberships

40
00:01:28,169 --> 00:01:29,479
for people who plan to use the lab

41
00:01:29,479 --> 00:01:30,899
more regularly, such as myself.

42
00:01:32,339 --> 00:01:33,409
One of the best things about

43
00:01:33,419 --> 00:01:35,039
having a BitLab membership isn't

44
00:01:35,049 --> 00:01:37,089
the amenities, it's the people.

45
00:01:37,609 --> 00:01:38,669
Surrounding yourself with a

46
00:01:38,669 --> 00:01:40,249
community helps you learn faster

47
00:01:40,249 --> 00:01:41,439
and helps you build better.

48
00:01:41,679 --> 00:01:43,249
Your creativity becomes  amplified

49
00:01:43,249 --> 00:01:44,329
when you work in this space,

50
00:01:44,369 --> 00:01:45,649
that's what I think at least.

51
00:01:46,589 --> 00:01:47,649
If you're interested in becoming

52
00:01:47,649 --> 00:01:49,099
a member or supporting this space,

53
00:01:49,219 --> 00:01:51,279
please visit us at atlbitlab.

54
00:01:51,650 --> 00:01:52,050
com.

55
00:01:52,349 --> 00:01:55,589
That's A T L B I T L A B dot com.

56
00:01:56,939 --> 00:01:58,229
Alright, on to our show.

57
00:02:01,292 --> 00:02:03,332
Welcome to the Sovereign Computing Show.

58
00:02:03,332 --> 00:02:05,732
I'm Jordan Bravo, and today we have a

59
00:02:05,732 --> 00:02:07,622
little bit of a different show for you.

60
00:02:07,984 --> 00:02:11,569
first of all, I am solo, so Steven

61
00:02:11,569 --> 00:02:13,099
will not be joining us for this

62
00:02:13,189 --> 00:02:15,829
episode, and this is gonna be a

63
00:02:15,829 --> 00:02:17,869
little bit of a shorter episode.

64
00:02:18,189 --> 00:02:20,145
today was, or this week was a holiday

65
00:02:20,145 --> 00:02:21,902
week, and, I wanted to make sure we

66
00:02:21,902 --> 00:02:23,462
got something out rather than nothing.

67
00:02:23,462 --> 00:02:23,942
So.

68
00:02:24,139 --> 00:02:26,197
this will not be the typical

69
00:02:26,227 --> 00:02:28,897
length episode, but I do have some

70
00:02:28,897 --> 00:02:30,397
interesting stuff to talk about.

71
00:02:31,297 --> 00:02:33,487
We're gonna take a look at a article

72
00:02:33,487 --> 00:02:37,147
that came out, and for those of

73
00:02:37,147 --> 00:02:38,887
you watching the video, I'm gonna

74
00:02:38,887 --> 00:02:40,207
put it up on the screen here.

75
00:02:41,047 --> 00:02:42,847
But of course, all the links

76
00:02:42,847 --> 00:02:44,077
will be in the show notes as

77
00:02:44,077 --> 00:02:45,227
well, so you can check those out.

78
00:02:47,647 --> 00:02:48,037
Okay.

79
00:02:48,037 --> 00:02:50,617
The headline of this article is Google

80
00:02:50,617 --> 00:02:53,467
Will Block Side Loading of Unverified

81
00:02:53,677 --> 00:02:55,447
Android apps starting next year.

82
00:02:56,437 --> 00:02:58,027
Let's talk about this word

83
00:02:58,027 --> 00:02:59,377
side loading for a second.

84
00:02:59,437 --> 00:03:03,907
This word is a psyop by, I wanna say

85
00:03:03,907 --> 00:03:07,447
apple, but just anybody who wants to

86
00:03:07,687 --> 00:03:10,087
control you and your apps and psyop

87
00:03:10,087 --> 00:03:12,577
you into thinking that it's somehow.

88
00:03:12,982 --> 00:03:16,822
Abnormal to download an app from anywhere

89
00:03:16,822 --> 00:03:18,892
on the internet and install it yourself.

90
00:03:19,342 --> 00:03:22,315
So I think this goes back to Apple when

91
00:03:22,315 --> 00:03:23,995
they have the iPhone, they have the

92
00:03:24,205 --> 00:03:26,882
centrally controlled software distribution

93
00:03:27,062 --> 00:03:28,832
channel, which is the app store.

94
00:03:29,222 --> 00:03:30,932
So if you notice that you, you're on

95
00:03:30,932 --> 00:03:33,962
an iPhone, it's, you can't really,

96
00:03:33,962 --> 00:03:35,342
unless you jailbreak the phone and

97
00:03:35,342 --> 00:03:36,602
do stuff that kind of voids your

98
00:03:36,602 --> 00:03:38,192
warranty is not well supported.

99
00:03:39,302 --> 00:03:42,392
You can't put applications on there that

100
00:03:42,392 --> 00:03:45,392
you didn't download from the app store.

101
00:03:46,382 --> 00:03:50,012
Now, if you do, if you, if you jailbreak

102
00:03:50,012 --> 00:03:51,842
your phone and you route it or whatever.

103
00:03:52,787 --> 00:03:55,817
And you just drag and drop or load

104
00:03:55,817 --> 00:03:57,467
something on there that is, that

105
00:03:57,467 --> 00:03:59,357
you downloaded from somewhere else.

106
00:03:59,837 --> 00:04:00,557
That is called, they

107
00:04:00,557 --> 00:04:01,997
call that side loading.

108
00:04:02,477 --> 00:04:06,167
And I think this term is confusing because

109
00:04:06,437 --> 00:04:07,857
really what you're just doing is you are.

110
00:04:08,527 --> 00:04:10,387
Downloading it from a different source,

111
00:04:10,387 --> 00:04:12,067
but they wanted to give it this special

112
00:04:12,067 --> 00:04:14,587
term because it, it makes you think

113
00:04:14,587 --> 00:04:16,057
you're doing something different or

114
00:04:16,057 --> 00:04:18,007
wrong, like you're breaking the rules.

115
00:04:18,427 --> 00:04:21,967
And they, apple goes with the

116
00:04:21,967 --> 00:04:24,157
security over freedom model.

117
00:04:24,457 --> 00:04:27,410
Like if you have a spectrum of, security

118
00:04:27,410 --> 00:04:29,210
on one end and freedom on the other.

119
00:04:30,195 --> 00:04:31,455
Apple's all the way on the security

120
00:04:31,455 --> 00:04:33,675
side and with minimal freedom.

121
00:04:34,245 --> 00:04:35,505
Now, I would argue that they don't

122
00:04:35,505 --> 00:04:37,395
always have to be diametrically opposed.

123
00:04:37,395 --> 00:04:39,825
You can have some freedom

124
00:04:39,825 --> 00:04:41,235
and security as well.

125
00:04:41,255 --> 00:04:43,805
but let's just keep it simple for now.

126
00:04:44,345 --> 00:04:49,295
So Google is gonna be shifting to be more

127
00:04:49,295 --> 00:04:52,625
like iOS on the iPhone and starting next

128
00:04:52,625 --> 00:04:56,135
year, they're not going to allow stock.

129
00:04:56,540 --> 00:05:02,150
Google Android users to just si to

130
00:05:02,150 --> 00:05:04,400
quote unquote side load apps by, for

131
00:05:04,400 --> 00:05:05,630
example, if you were to download an

132
00:05:05,630 --> 00:05:08,424
a PK from a website, from GitHub or

133
00:05:08,694 --> 00:05:10,434
Foid or any of these alternative app

134
00:05:10,434 --> 00:05:11,904
stores that we talked about in previous

135
00:05:11,904 --> 00:05:14,964
episodes, they are going to make that.

136
00:05:15,579 --> 00:05:17,575
More difficult, starting next

137
00:05:17,575 --> 00:05:20,845
year for stock Google, Android.

138
00:05:21,175 --> 00:05:22,255
And the way that they're gonna do

139
00:05:22,255 --> 00:05:26,455
that is they will start requiring any

140
00:05:26,455 --> 00:05:31,555
developer, uh, let me back up right

141
00:05:31,555 --> 00:05:33,805
now, if you wanna load an A PK on your

142
00:05:33,805 --> 00:05:36,895
Google Android phone, you can do that.

143
00:05:37,105 --> 00:05:38,785
You might get a warning about it,

144
00:05:38,785 --> 00:05:40,855
but it will allow you to do that.

145
00:05:41,425 --> 00:05:42,270
Uh, and by that I mean.

146
00:05:44,125 --> 00:05:45,715
Putting an app on there, that's

147
00:05:45,715 --> 00:05:47,455
an A PK package, that's an Android

148
00:05:47,455 --> 00:05:48,835
package that you're not getting

149
00:05:48,835 --> 00:05:50,065
from the Google Play Store.

150
00:05:50,065 --> 00:05:51,475
So you might be getting it from another

151
00:05:51,475 --> 00:05:55,435
source such as Foid or Tanium, which

152
00:05:55,435 --> 00:05:57,595
you can pull directly from places

153
00:05:57,595 --> 00:05:59,785
like GitHub and GitLab to get it

154
00:05:59,785 --> 00:06:02,305
directly from developers or code bases.

155
00:06:03,595 --> 00:06:04,285
So.

156
00:06:04,690 --> 00:06:06,557
Right now you can do that with Google

157
00:06:06,557 --> 00:06:08,207
Android, but starting next year, you

158
00:06:08,207 --> 00:06:11,897
won't be able to, unless the developer

159
00:06:12,587 --> 00:06:16,457
Ky Cs themself and creates a, they have

160
00:06:16,457 --> 00:06:19,007
to create a Google account and basically

161
00:06:19,007 --> 00:06:22,130
they're developing it, to be the developer

162
00:06:22,130 --> 00:06:25,040
portal for Android will be through

163
00:06:25,070 --> 00:06:27,967
Google and all developers will have to.

164
00:06:28,762 --> 00:06:31,492
Register with them and submit their

165
00:06:31,492 --> 00:06:33,622
identity verification, and then they'll

166
00:06:33,622 --> 00:06:36,862
have their signing keys so that even

167
00:06:36,862 --> 00:06:39,112
if you want to, if a developer wants

168
00:06:39,112 --> 00:06:41,062
to distribute an app outside of the

169
00:06:41,062 --> 00:06:43,582
app store, they will still have to

170
00:06:43,732 --> 00:06:45,352
sign themselves up for this Google

171
00:06:45,352 --> 00:06:47,969
program and, identify themselves.

172
00:06:49,559 --> 00:06:51,832
So this means that, You won't be

173
00:06:51,832 --> 00:06:53,392
able to install an app unless it

174
00:06:53,392 --> 00:06:55,162
has gone through the Google, Google

175
00:06:55,162 --> 00:06:57,082
controlled process, which involves

176
00:06:57,082 --> 00:06:58,972
the developers KYC themselves.

177
00:06:59,452 --> 00:07:00,742
So again, this, this is gonna be

178
00:07:00,742 --> 00:07:03,952
more like Apple, but think about

179
00:07:03,952 --> 00:07:07,312
all of the freedom technologies

180
00:07:07,312 --> 00:07:11,182
that would not be possible if every

181
00:07:11,182 --> 00:07:14,062
developer had to fully KYC themselves.

182
00:07:14,482 --> 00:07:15,652
I mean, just imagine.

183
00:07:16,687 --> 00:07:19,330
Sat, Bitcoin's creator, Satoshi Nakamoto

184
00:07:19,660 --> 00:07:23,080
having to KYC himself to Google in order

185
00:07:23,080 --> 00:07:25,090
to distribute Bitcoin to the world.

186
00:07:25,090 --> 00:07:25,390
Right?

187
00:07:25,870 --> 00:07:27,400
It's, it's laughable.

188
00:07:27,670 --> 00:07:31,542
It's The antithesis of freedom technology

189
00:07:31,542 --> 00:07:35,382
and the cypher punk ethos of write code.

190
00:07:35,682 --> 00:07:37,722
Let people download it, let them

191
00:07:37,722 --> 00:07:39,629
run it, and, you know, run it

192
00:07:39,719 --> 00:07:42,479
outside or parallel to the existing

193
00:07:42,599 --> 00:07:44,099
centrally controlled system.

194
00:07:47,339 --> 00:07:50,909
So what's the good news of this?

195
00:07:50,909 --> 00:07:53,519
The good news is that this will not affect

196
00:07:53,579 --> 00:07:56,819
Degod versions of Android such as Graphos.

197
00:07:57,345 --> 00:08:00,075
calx Os is another one we've talked about

198
00:08:00,075 --> 00:08:02,205
that will not be affected Lineage os.

199
00:08:02,955 --> 00:08:05,835
However, it is likely that Google will

200
00:08:05,835 --> 00:08:07,725
continue tightening the screws until it's

201
00:08:07,725 --> 00:08:09,735
impossible for developers to create and

202
00:08:09,735 --> 00:08:12,675
maintain these nongo versions of Android.

203
00:08:13,545 --> 00:08:17,145
And I foresee that in time, Android will

204
00:08:17,145 --> 00:08:19,665
be closed, closed source in all, but

205
00:08:19,665 --> 00:08:22,785
name we saw earlier, a few months ago.

206
00:08:23,082 --> 00:08:27,582
earlier in 2025, we saw that Google

207
00:08:27,582 --> 00:08:30,282
started closing the source code

208
00:08:30,312 --> 00:08:32,352
of their releases on Android.

209
00:08:32,352 --> 00:08:35,352
So you can still get the, the, um,

210
00:08:35,382 --> 00:08:38,802
base source code is open, but we can

211
00:08:38,802 --> 00:08:41,082
no longer see the development process

212
00:08:41,082 --> 00:08:43,662
and getting those final binaries.

213
00:08:43,752 --> 00:08:45,567
It has become opaque and so,

214
00:08:46,152 --> 00:08:47,652
uh, we've seen on Twitter.

215
00:08:49,002 --> 00:08:51,132
Developers of Graphos and other

216
00:08:51,132 --> 00:08:54,042
projects that create other versions

217
00:08:54,042 --> 00:08:56,712
of Android, they, they have stated

218
00:08:56,712 --> 00:08:58,302
that this has made it harder for them

219
00:08:58,302 --> 00:08:59,832
to develop because they're unable

220
00:08:59,832 --> 00:09:03,402
to see the exact process by which

221
00:09:03,402 --> 00:09:05,232
Android is being developed at Google.

222
00:09:05,982 --> 00:09:07,992
So while each of these

223
00:09:07,992 --> 00:09:09,492
steps that Google's taking.

224
00:09:10,182 --> 00:09:12,295
Is not, a hundred percent

225
00:09:12,505 --> 00:09:14,605
locking it down immediately.

226
00:09:15,025 --> 00:09:18,535
It is this slow, gradual boiling of

227
00:09:18,535 --> 00:09:22,345
the frog that is continuing to make

228
00:09:22,345 --> 00:09:25,255
Android more like iOS in terms of being

229
00:09:25,585 --> 00:09:28,555
completely locked down, and it will

230
00:09:28,585 --> 00:09:31,585
essentially be closed source because no

231
00:09:31,585 --> 00:09:33,565
one will be able to develop on top of it.

232
00:09:34,600 --> 00:09:36,790
Even though that technically might have

233
00:09:36,790 --> 00:09:38,470
some source code that's available for

234
00:09:38,470 --> 00:09:46,210
view viewing online, so I, I'm hopeful

235
00:09:46,210 --> 00:09:48,670
that the Freedom Loving development

236
00:09:48,670 --> 00:09:52,000
community, the people of Graphene os

237
00:09:52,000 --> 00:09:54,700
and these other versions of Android

238
00:09:54,730 --> 00:09:57,370
that are degod, I'm hoping that there

239
00:09:57,370 --> 00:09:58,900
are enough people out there in a high

240
00:09:58,900 --> 00:10:02,020
enough demand that should something.

241
00:10:02,905 --> 00:10:05,065
B uh, should Google take further

242
00:10:05,065 --> 00:10:06,595
action that prevents development

243
00:10:06,595 --> 00:10:07,795
of these other versions?

244
00:10:09,295 --> 00:10:11,795
Somebody will, I don't know if forking

245
00:10:11,795 --> 00:10:14,225
is the right word, but somebody will

246
00:10:14,225 --> 00:10:16,985
take either the base Android and

247
00:10:17,435 --> 00:10:19,085
just start developing on top of it

248
00:10:19,085 --> 00:10:21,365
without Google's involvement at all.

249
00:10:21,875 --> 00:10:24,850
Or maybe we'll see a

250
00:10:24,940 --> 00:10:27,185
completely from the ground up.

251
00:10:27,695 --> 00:10:29,525
Mobile operating system written,

252
00:10:29,555 --> 00:10:31,085
that's open source and free.

253
00:10:32,105 --> 00:10:34,985
That's a, that's a big task, and I

254
00:10:34,985 --> 00:10:37,445
don't see that happening anytime soon.

255
00:10:38,075 --> 00:10:40,265
But however, I mean, on the other hand,

256
00:10:40,265 --> 00:10:43,625
look at Ladybird, the browser that's being

257
00:10:43,625 --> 00:10:46,385
built from scratch by first one developer,

258
00:10:46,385 --> 00:10:49,475
now a small handful on that team, not

259
00:10:49,475 --> 00:10:51,125
using any of the pre-existing code.

260
00:10:51,125 --> 00:10:53,332
So it is possible, an an operating

261
00:10:53,332 --> 00:10:54,862
system, even a mobile operating

262
00:10:54,862 --> 00:10:58,237
system is a. It is a huge, huge

263
00:10:58,237 --> 00:11:01,024
project, but, it is possible that one

264
00:11:01,084 --> 00:11:02,434
could be built from the ground up.

265
00:11:03,364 --> 00:11:05,134
And the other option is that we

266
00:11:05,134 --> 00:11:07,954
see further development of the

267
00:11:07,954 --> 00:11:11,494
mobile Linux, uh, operating system.

268
00:11:12,514 --> 00:11:14,464
Right now, the state of mobile

269
00:11:14,464 --> 00:11:16,204
Linux is such that most people are

270
00:11:16,204 --> 00:11:17,734
not gonna be able to use it as a

271
00:11:17,734 --> 00:11:19,294
daily driver just because it's.

272
00:11:19,954 --> 00:11:21,964
It doesn't have a huge ecosystem

273
00:11:22,024 --> 00:11:25,384
of both hardware and software, so

274
00:11:25,384 --> 00:11:26,704
there's a long way to go on that.

275
00:11:27,364 --> 00:11:29,584
But reeling it all back in, I don't

276
00:11:29,584 --> 00:11:32,674
think Android is totally screwed today.

277
00:11:32,674 --> 00:11:34,204
We still have graphene os we

278
00:11:34,204 --> 00:11:36,710
still have, calx and lineage and.

279
00:11:37,715 --> 00:11:38,855
As it is right now.

280
00:11:39,065 --> 00:11:42,485
Graphing on the pixel is a very good

281
00:11:42,665 --> 00:11:45,905
mobile operating system with no spyware

282
00:11:45,905 --> 00:11:48,005
and completely free and open source.

283
00:11:48,065 --> 00:11:51,635
So all in all, I, I think this is,

284
00:11:51,695 --> 00:11:53,435
this is not the end of the world.

285
00:11:54,065 --> 00:11:56,765
I just wanted to sound the alarm bells a

286
00:11:56,765 --> 00:11:59,345
little bit and please keep an eye out for

287
00:11:59,345 --> 00:12:01,955
that in case, uh, Google takes any further

288
00:12:01,955 --> 00:12:03,635
measures to stop this in the future.

289
00:12:07,565 --> 00:12:09,065
That's the end of that topic.

290
00:12:09,065 --> 00:12:11,435
But before I move on to the next item,

291
00:12:11,915 --> 00:12:14,315
uh, I want to remind everybody that you

292
00:12:14,315 --> 00:12:17,675
can boost in on Fountain FM or other

293
00:12:17,675 --> 00:12:20,825
podcasting 2.0 apps to the Sovereign

294
00:12:20,825 --> 00:12:23,675
Computing Show, and you can email

295
00:12:23,675 --> 00:12:27,665
us as well sovereign@atlbitlab.com.

296
00:12:28,055 --> 00:12:30,695
We will read your feedback and we will,

297
00:12:31,025 --> 00:12:32,615
uh, respond to it here on the show.

298
00:12:34,085 --> 00:12:36,005
The next item I have for you is.

299
00:12:37,460 --> 00:12:40,250
Something that is from 2014, and you

300
00:12:40,250 --> 00:12:43,460
might wonder how is this relevant?

301
00:12:43,520 --> 00:12:46,670
Well, we talk a lot on the show

302
00:12:46,670 --> 00:12:49,700
about metadata and how we want

303
00:12:49,700 --> 00:12:52,280
to use apps, especially messaging

304
00:12:52,280 --> 00:12:53,015
and, and things that are.

305
00:12:53,840 --> 00:12:56,690
Use for communication that minimize the

306
00:12:56,720 --> 00:12:58,790
possibility of collection of metadata.

307
00:12:59,540 --> 00:13:02,300
We talked about how signal the, uh,

308
00:13:02,330 --> 00:13:05,990
private messenger, for example, has a

309
00:13:06,080 --> 00:13:08,300
very good metadata footprint because

310
00:13:08,300 --> 00:13:10,820
it's so small, they really can't see

311
00:13:10,820 --> 00:13:12,560
the, the signal servers cannot see

312
00:13:12,560 --> 00:13:14,715
anything about their users except

313
00:13:14,720 --> 00:13:17,630
for when the account was created.

314
00:13:18,290 --> 00:13:20,510
The, and the, the phone number with

315
00:13:20,510 --> 00:13:23,000
which it was created in the last.

316
00:13:23,510 --> 00:13:25,820
Time that the user was online.

317
00:13:26,390 --> 00:13:27,710
So those are three pieces of

318
00:13:27,710 --> 00:13:30,710
metadata and compared to most

319
00:13:30,710 --> 00:13:31,910
other apps, that's really good.

320
00:13:31,910 --> 00:13:34,460
That's virtually nothing, uh, that you can

321
00:13:34,460 --> 00:13:36,650
tell about the user from that metadata.

322
00:13:37,024 --> 00:13:38,974
Uh, contrast that with WhatsApp.

323
00:13:39,004 --> 00:13:40,294
WhatsApp is a really good

324
00:13:40,324 --> 00:13:43,444
comparison because it uses the same.

325
00:13:43,864 --> 00:13:45,904
Encryption protocol under the hood.

326
00:13:45,904 --> 00:13:48,544
It uses the signal protocol so that

327
00:13:48,544 --> 00:13:50,644
the contents of your messages on

328
00:13:50,644 --> 00:13:52,954
WhatsApp are end-to-end encrypted.

329
00:13:53,614 --> 00:13:55,834
So meta the owners of WhatsApp,

330
00:13:56,237 --> 00:13:59,117
they can't actually see your

331
00:13:59,627 --> 00:14:02,027
content in theory if it's not

332
00:14:02,027 --> 00:14:03,707
leaked in other ways like backups.

333
00:14:04,097 --> 00:14:05,897
But let's just say in theory they

334
00:14:05,897 --> 00:14:07,757
can't see the content of your messages.

335
00:14:08,072 --> 00:14:11,702
However, they sure can see the metadata.

336
00:14:12,272 --> 00:14:13,952
They, in fact, they rely on that

337
00:14:13,952 --> 00:14:15,602
metadata in order to be able to

338
00:14:15,602 --> 00:14:18,092
monetize WhatsApp and be able to,

339
00:14:18,362 --> 00:14:21,185
uh, collect user data and ads and

340
00:14:21,215 --> 00:14:23,255
generate ads for that targeted ads.

341
00:14:23,855 --> 00:14:25,655
So what is that metadata

342
00:14:25,655 --> 00:14:26,495
they're collecting?

343
00:14:27,605 --> 00:14:30,185
Well, it's, we, we don't

344
00:14:30,185 --> 00:14:31,325
know exactly because they.

345
00:14:31,910 --> 00:14:33,860
Don't publish that information, but

346
00:14:33,860 --> 00:14:35,990
we can know based on other messaging

347
00:14:35,990 --> 00:14:38,240
apps and the kind of things that

348
00:14:38,240 --> 00:14:39,830
Facebook in general can collect.

349
00:14:40,220 --> 00:14:44,630
So you could think, um, your identity,

350
00:14:44,630 --> 00:14:48,170
the, the identity of your Facebook login,

351
00:14:48,170 --> 00:14:49,940
your real name, which you're probably

352
00:14:49,940 --> 00:14:52,697
using on Facebook, all of your photos.

353
00:14:53,402 --> 00:14:56,222
Your contact list, your contacts,

354
00:14:56,222 --> 00:14:58,832
names, email addresses, phone numbers,

355
00:14:59,222 --> 00:15:01,682
the time that you talked, the length

356
00:15:01,712 --> 00:15:04,022
of your messages, the duration, the

357
00:15:04,022 --> 00:15:08,042
size, so they can really build up a

358
00:15:08,042 --> 00:15:11,282
great picture of who you're talking to.

359
00:15:11,732 --> 00:15:13,682
They can see, um, any websites

360
00:15:13,682 --> 00:15:15,669
that you link in there, they can.

361
00:15:16,059 --> 00:15:17,799
Get your IP address so they know where

362
00:15:17,799 --> 00:15:20,349
you are roughly speaking, they can

363
00:15:20,349 --> 00:15:23,379
tell what, what, um, network you're

364
00:15:23,379 --> 00:15:26,019
on, if you're using your Verizon or

365
00:15:26,289 --> 00:15:28,599
at and t. So there's a lot of metadata

366
00:15:28,599 --> 00:15:29,859
that they can collect about you.

367
00:15:30,309 --> 00:15:34,509
And I want to share this clip from 2014.

368
00:15:34,899 --> 00:15:37,899
This is a video clip of former

369
00:15:37,899 --> 00:15:41,019
director of NSA of the NSA and the CIA.

370
00:15:41,709 --> 00:15:43,659
And he's got this famous quote here.

371
00:15:45,114 --> 00:15:47,034
We kill people based on metadata.

372
00:15:47,424 --> 00:15:49,119
So I'm gonna let this clip play right now.

373
00:15:49,389 --> 00:15:50,799
It's a, it's 45 seconds.

374
00:15:52,251 --> 00:15:54,801
General Hayden, you can find out all these

375
00:15:54,801 --> 00:15:56,691
things David just said about me, about

376
00:15:56,691 --> 00:15:59,991
David, about anyone in this audience that

377
00:15:59,991 --> 00:16:02,841
is a function of operational capability.

378
00:16:03,231 --> 00:16:04,671
I'd like you to talk about

379
00:16:04,761 --> 00:16:05,991
whether you're comfortable with

380
00:16:05,991 --> 00:16:07,281
that operational capability.

381
00:16:07,281 --> 00:16:09,981
If so, why and how often is it used

382
00:16:09,981 --> 00:16:11,421
in the ways that David described?

383
00:16:11,481 --> 00:16:11,931
Yeah.

384
00:16:11,936 --> 00:16:13,551
First, first of all, David's

385
00:16:13,551 --> 00:16:15,681
description of what you can do with

386
00:16:15,681 --> 00:16:17,841
metadata and quoting a mutual friend,

387
00:16:17,841 --> 00:16:20,031
Stuart Baker is absolutely correct.

388
00:16:20,616 --> 00:16:20,826
Okay.

389
00:16:21,096 --> 00:16:23,076
We kill people based on metadata,

390
00:16:25,536 --> 00:16:26,436
but that's not what we

391
00:16:26,436 --> 00:16:27,666
do with this metadata.

392
00:16:29,316 --> 00:16:29,466
Okay.

393
00:16:30,216 --> 00:16:30,936
Thankfully.

394
00:16:33,036 --> 00:16:33,306
Wow.

395
00:16:33,306 --> 00:16:34,356
I was working up a sweat

396
00:16:34,356 --> 00:16:34,931
there for a second.

397
00:16:36,174 --> 00:16:37,314
So in case you didn't catch

398
00:16:37,314 --> 00:16:39,894
that, you have Michael Hayden.

399
00:16:39,894 --> 00:16:41,904
That's the guy who says we

400
00:16:41,904 --> 00:16:43,434
kill people based on metadata.

401
00:16:43,434 --> 00:16:44,514
And who is the former

402
00:16:44,514 --> 00:16:46,254
director of the NSA and CIA.

403
00:16:46,824 --> 00:16:50,064
He's, he's saying, metadata tells

404
00:16:50,064 --> 00:16:51,804
us everything we need to do, we need

405
00:16:51,804 --> 00:16:53,874
to know in order to take action.

406
00:16:53,967 --> 00:16:54,222
he was.

407
00:16:55,337 --> 00:16:57,207
Referring to, somebody else had

408
00:16:57,207 --> 00:17:00,327
quoted the former NSA general

409
00:17:00,327 --> 00:17:02,727
counsel, Stuart Baker, saying that

410
00:17:02,727 --> 00:17:05,067
quote, metadata absolutely tells you

411
00:17:05,067 --> 00:17:06,537
everything about somebody's life.

412
00:17:06,867 --> 00:17:08,847
If you have enough metadata, you

413
00:17:08,847 --> 00:17:10,797
don't really need content, end quote.

414
00:17:11,367 --> 00:17:14,067
And so he's, he's referring to that and

415
00:17:14,067 --> 00:17:16,317
saying, we can, we don't need the content.

416
00:17:16,347 --> 00:17:17,637
We have enough with metadata.

417
00:17:18,147 --> 00:17:19,557
And then he makes a little cheeky joke.

418
00:17:20,262 --> 00:17:21,912
About how, oh, we're not ac we're

419
00:17:21,912 --> 00:17:23,442
not gonna do that with this metadata.

420
00:17:23,442 --> 00:17:25,902
And everybody laughs because it's so

421
00:17:25,902 --> 00:17:27,702
funny that we're all being surveilled.

422
00:17:27,702 --> 00:17:28,542
Ha ha ha.

423
00:17:29,262 --> 00:17:32,082
But the reason I bring this up, I

424
00:17:32,082 --> 00:17:34,302
wanted to emphasize the importance

425
00:17:34,302 --> 00:17:36,852
of not leaking your data in

426
00:17:36,852 --> 00:17:38,832
general and metadata in particular.

427
00:17:39,252 --> 00:17:41,382
And so everything that we talk

428
00:17:41,382 --> 00:17:43,976
about on this show is it is.

429
00:17:44,251 --> 00:17:45,271
pulling in that direction.

430
00:17:45,271 --> 00:17:49,814
So, I'm proud to be helping everybody else

431
00:17:49,814 --> 00:17:52,154
out, and I'm proud to be going on this

432
00:17:52,154 --> 00:17:54,974
journey myself of minimizing my leakage

433
00:17:55,004 --> 00:17:57,884
of metadata and other data in general.

434
00:17:58,304 --> 00:18:00,371
And, it feels good to be giving the

435
00:18:00,371 --> 00:18:02,891
finger to people like this who think that.

436
00:18:03,491 --> 00:18:05,951
It's, um, not only do they kill

437
00:18:05,951 --> 00:18:07,841
people based on the metadata, but

438
00:18:07,841 --> 00:18:09,821
they just do blanket surveillance on

439
00:18:09,821 --> 00:18:12,401
all of us, guilty and innocent alike.

440
00:18:12,851 --> 00:18:15,761
And then on top of that, they laugh about

441
00:18:15,761 --> 00:18:17,321
it and think it's a, it is a big joke.

442
00:18:17,501 --> 00:18:20,231
So with that, I'm gonna

443
00:18:20,231 --> 00:18:21,221
leave you for today.

444
00:18:21,821 --> 00:18:23,921
We will see you pretty soon.

445
00:18:24,071 --> 00:18:25,181
We're gonna have another episode

446
00:18:25,181 --> 00:18:27,041
coming out here in just a few days.

447
00:18:27,431 --> 00:18:29,051
And it'll be back to our

448
00:18:29,051 --> 00:18:30,881
regularly scheduled program.

449
00:18:31,481 --> 00:18:33,221
We'd love to hear from you if you boost

450
00:18:33,221 --> 00:18:35,531
in to the Sovereign Computing Show

451
00:18:35,531 --> 00:18:38,681
or email us sovereign@atlbitlab.com.

452
00:18:39,041 --> 00:18:41,884
We will read it and respond and, can't

453
00:18:41,884 --> 00:18:43,444
wait to hear some more of your feedback.

454
00:18:43,714 --> 00:18:45,019
So thanks everybody, and

455
00:18:45,019 --> 00:18:45,634
we'll see you next time.

456
00:18:47,433 --> 00:18:48,573
Hey, thanks for listening.

457
00:18:48,713 --> 00:18:50,083
I hope you enjoyed this episode.

458
00:18:50,353 --> 00:18:51,483
If you want to learn more about

459
00:18:51,483 --> 00:18:53,183
anything that we discussed, you can

460
00:18:53,183 --> 00:18:54,943
look for links in the show notes

461
00:18:55,143 --> 00:18:56,443
that should be in your podcast

462
00:18:56,453 --> 00:18:59,223
player, or you can go to atlbitlab.

463
00:18:59,223 --> 00:19:00,963
com slash podcast.

464
00:19:01,563 --> 00:19:02,883
On a final note, if you found

465
00:19:02,883 --> 00:19:04,673
this information useful and you

466
00:19:04,673 --> 00:19:06,403
want to help support us, you can

467
00:19:06,403 --> 00:19:08,393
always send us a tip in Bitcoin.

468
00:19:08,773 --> 00:19:10,603
Your support really helps us so that we

469
00:19:10,603 --> 00:19:12,733
can keep bringing you content like this.

470
00:19:13,063 --> 00:19:13,623
All right.

471
00:19:13,703 --> 00:19:14,353
Catch you later.

