Also in this playlist...
This transcript is automatically generated
Now gonna go to our next guest who's in New York Mike yankees CEO.
Of silent circle which is actually company I I came across the bout maybe three months ago now.
As you may or may not know some Fox News correspondents and a few others have been.
Or were targeted -- -- by the NSA and some other folks.
And there's the suggestion that potentially we all could be a listen to and followed right now even -- for not being as they say.
Quotes a recorded this play on words as other ways and of course our information and are communications can be -- right.
That's absolutely correct and -- it's not just here you know in in the US it's worldwide.
The minute you turn on your your cell phone literally in 99% of the country's.
-- your geo location your voice and -- you send it you can assume it's collected correlated recorded ten times over.
It's -- that ubiquitous.
Yemen -- a quick background you might take you with your with -- circle which is a global communications company really -- because encrypted communications.
And you provide various ways people can use that I know that we've I've seen it through the iPhone there's -- that that can be used.
I have people that -- that have contacted means that you know -- no matter what you do to try to protect yourself.
Com you can still be followed basically listen to there's really no perfect the way.
No absolute way to encrypt your communications.
Well that's part of that's correct that it's not in its entirety you're only as strong as the -- -- -- off.
-- the mobile.
Windows Mac OS.
For the desktop and laptop.
But it's also about your your personal digital hygiene.
You know 4989%.
Of the world.
Simply just happen itself on everything you do every taxed every voice call -- -- -- you send.
He is being collected -- elated from every -- are.
-- that you most amazing thing is we -- a week.
We -- literally the world's first global encrypted secure communication platform really mobile first mobile video phones text file transfer.
And desktop video but.
That the the ability of human beings around the world not just here -- US to have the right.
To whisper in somebody's -- -- passes secret note -- has been around for -- thoughts on today that's not true.
It's being collected -- elated so we strongly believe it's silent circle with.
Having the tools for private citizens right now we have private citizens from 126 countries is customers.
We have -- corporations from around the world fortune fifty.
And and governments governments are one of our largest customers as well so we believe that everybody has that right.
If you live in Europe Europe's surrounded by twelve and assays that are actively acting within those countries.
It's in that everybody is watching listening and I'm gonna expand at a moment but first of -- for for the -- at home.
How how does working mean.
We're talking about the -- Mean listening we're talking about as you mentioned in Europe while a lot of other folks do it you have a situation like serious silent army we just talked about it and bad people put it lightly.
We're trying to -- as much information out as they can whether it be hacking into phones or computers two to extract information whatever that might be depending who you work for.
So how how can your company how -- what you guys do it others like you guys -- how does -- have the technology work.
Well it's -- it's very unique in that a lot of the architecture of the Internet in the phone systems 203040 years old.
Along with myself fills their -- -- creator of PGP and John -- The inventor of Apple's -- disk encryption.
We created a literally a new technology.
I -- around a long time the type of encryption.
But basically it's called peer to peer utilizing what's called ephemeral keys which means out of it if I call you on silent phone.
And we have a nice long chat I could be on three G and you could be on Wi-Fi and -- we can do mobile video it's all encrypted what happens is.
I share a key with you and encryption key.
Just for that call after our call is Don.
These are deleted so there ephemeral so that means there's no keys on a server which means we can't be coerced to wiretap the government.
Can't listen into it.
They can't record anything other than encrypted -- -- So when you take that technology and you include such as are a texting with a hundred megabyte file.
I was sent you a 65 megabyte file completely encrypted you were the only one.
That can read that open it now it's only as good as if.
You know some of -- steal your phone or your tablet but these here.
Technologies that people around the world and businesses and government can use.
In this age of the mobile I mean I think that I read somewhere by 2016.
It's going to be eleven billion mobile devices.
If it is unbelievable -- and a -- declare all they -- several people home something.
You know we keep hearing the administration or the NSA or whomever it -- they -- -- report according people we're not listen to people.
But my my guys -- in in in Washington tell me otherwise they say that yet that's true but record is kind of antiquated word.
You know you are still being -- -- by using metadata you're still being watched and listened to followed.
Maybe not right this second but they can go back and get it so.
In layman's terms -- -- -- with the show to break it down for news -- how does that work very simply for somebody homeless said well -- tell us and recording us but are -- Right that's that's a great question.
Just the fact that your your cell phone hits a cell tower and communicates with somebody in Los Angeles.
They have two IP address it's and they can.
Note that might get out and spoke for fourteen minutes and Mike was in new York and Adam was here.
Email email think of it as a letter that and I send -- you -- in the mail.
If it's encrypted -- work they can't read what's in it but.
It has on the envelope who was sent to who was sent from the date the time the post office the location.
So that's meta data netted -- product is on some levels much more important than -- I can track where you Wear -- -- connected with what time.
Who you connected with the subject.
All of that so the -- got it is the in celery information.
They can all be correlated by governments right and it's not just yet you don't people read about prison and they say oh my gosh Vienna set while.
You know there are sixteen different agencies within the US but there are 72.
NSA light organizations.
That are looking outside their borders so you can just assume as we now noted at.
Every call every text every email every time you go on line.
Is being recorded tracked meta data collected and -- and not just.
By governments right you have how activists you have criminal gangs and you have big data companies you wanna talk about who knows more about you -- NSA.
Go to the big data companies go to Google go to American Express.
The -- on -- credit companies that collect and.
Box up your information ten times a day that's the new -- coming out of the ground your data.
-- actually my taking effect I had someone tell me who went through some significant training recently that.
A basically my cell phone tells him everything he can tell you when you get up when you go to bed where you go to eat when you go to work committee can literally is and that information potentially can be used against you.
Or used -- it can be sold so there's a lot of information out there we appreciate your time clarifying -- -- have you back on talking about this is a lot of people are just starting to.
Maybe understand more about this type of security and how you are being followed in those information and is being gathered.
-- -- -- CEO -- circle you can find out more silent circle dot com that's their website very interesting stuff apps for the phones out there that will.
-- -- how it all works and you ask questions if you it could happen to be interest -- -- much we appreciate you coming -- today from new York and we'll we'll definitely stay in -- thanks -- pleasure.
Filter by section