1 00:00:11,680 --> 00:00:14,280 Speaker 1: There is now an Apple learning people when ICE agents 2 00:00:14,320 --> 00:00:15,720 Speaker 1: are operating in their area. 3 00:00:16,000 --> 00:00:19,159 Speaker 2: It's called ice Block, which allowed users to track and 4 00:00:19,239 --> 00:00:23,400 Speaker 2: report any public sightings that immigration agents deployed or detaining people. 5 00:00:23,560 --> 00:00:25,960 Speaker 3: Apple says they have pulled an app that allows users 6 00:00:26,000 --> 00:00:28,520 Speaker 3: to track ICE agents after getting pressure from the Department 7 00:00:28,560 --> 00:00:29,080 Speaker 3: of Justice. 8 00:00:29,360 --> 00:00:33,960 Speaker 4: So ice Block was an iPhone app that helps people 9 00:00:34,080 --> 00:00:38,440 Speaker 4: anonymously report ice sightings that are in their neighborhood, that 10 00:00:38,440 --> 00:00:41,680 Speaker 4: are nearby within a five miler adias, and you've got 11 00:00:41,720 --> 00:00:45,160 Speaker 4: notifications when other people are report ice sightings near you. 12 00:00:46,040 --> 00:00:49,639 Speaker 1: Michael Lee is an independent security researcher and journalist. He's 13 00:00:49,680 --> 00:00:52,600 Speaker 1: talking about an ice reporting app called ice Block. The 14 00:00:52,720 --> 00:00:56,440 Speaker 1: tagline was quote see something, tap something. A lot of 15 00:00:56,440 --> 00:00:58,200 Speaker 1: people were looking for ways to deal with the Trump 16 00:00:58,240 --> 00:01:02,560 Speaker 1: administration's immigration policies, and in June, ice block went viral. 17 00:01:03,040 --> 00:01:04,640 Speaker 4: And I think the thing that makes it different than 18 00:01:04,720 --> 00:01:08,800 Speaker 4: other various products is that it went viral. CNN did 19 00:01:09,040 --> 00:01:12,679 Speaker 4: some reporting on ice block, like early on, they had 20 00:01:12,840 --> 00:01:16,119 Speaker 4: like on TV all day one day, and then the 21 00:01:16,240 --> 00:01:19,840 Speaker 4: right wing Twitter or x blew up and started attacking it, 22 00:01:20,240 --> 00:01:22,880 Speaker 4: and so then it ended up getting like a million users. 23 00:01:23,520 --> 00:01:27,160 Speaker 1: Despite the popularity Micah was skeptical of ice block, so 24 00:01:27,480 --> 00:01:28,279 Speaker 1: he did some digging. 25 00:01:29,480 --> 00:01:32,000 Speaker 4: I called it active as in theater because it seemed 26 00:01:32,000 --> 00:01:35,920 Speaker 4: like it wasn't actually like aimed at helping people. It 27 00:01:35,959 --> 00:01:38,600 Speaker 4: was just aimed at, like, you know, making his app 28 00:01:38,680 --> 00:01:42,200 Speaker 4: that was going viral, get more users and stuff like that. 29 00:01:48,800 --> 00:01:57,840 Speaker 1: I'm afraid with a kaleidoscope and iHeart podcasts. This is 30 00:01:57,920 --> 00:02:02,360 Speaker 1: kill switch. I'm dextrats, I'm sing. 31 00:02:27,080 --> 00:02:38,760 Speaker 2: I'm goodbye. 32 00:02:43,360 --> 00:02:45,760 Speaker 1: When did you first hear about ice block? 33 00:02:47,160 --> 00:02:49,720 Speaker 4: I heard ice black after I was on the and 34 00:02:49,720 --> 00:02:51,840 Speaker 4: then I heard about the right wing backlash. 35 00:02:51,880 --> 00:02:54,799 Speaker 1: The backlash that MICA's referring to is the White House 36 00:02:54,840 --> 00:02:56,320 Speaker 1: Press Secretary saying. 37 00:02:56,480 --> 00:02:59,359 Speaker 2: Sounds like this would be an incitement of further violence 38 00:02:59,400 --> 00:03:00,799 Speaker 2: against our ice The. 39 00:03:00,760 --> 00:03:03,840 Speaker 1: White House boarders are saying THEO Jane's look at this 40 00:03:04,360 --> 00:03:07,160 Speaker 1: and see if they're crossing that line. And United States 41 00:03:07,240 --> 00:03:08,959 Speaker 1: Attorney General Pam Bondi. 42 00:03:08,720 --> 00:03:11,120 Speaker 2: Saying we are looking at it, we are looking at him, 43 00:03:11,160 --> 00:03:15,040 Speaker 2: and he better watch out because that's not a protected speech. 44 00:03:15,760 --> 00:03:18,840 Speaker 1: And the United States Secretary of Homeland Security Christy Nome 45 00:03:19,040 --> 00:03:22,400 Speaker 1: posted on Twitter or x calling it an obstruction of 46 00:03:22,600 --> 00:03:26,160 Speaker 1: justice and said quote, if you obstruct or assault or 47 00:03:26,240 --> 00:03:28,919 Speaker 1: law enforcement. We will hunt you down and you will 48 00:03:28,919 --> 00:03:32,400 Speaker 1: be prosecuted to the fullest extent of the law end quote. 49 00:03:33,320 --> 00:03:36,480 Speaker 4: I thought it was very interesting, but at the same time, 50 00:03:36,760 --> 00:03:41,000 Speaker 4: I have been doing some local work in my own 51 00:03:41,000 --> 00:03:45,400 Speaker 4: community in northern California, and I was very skeptical about 52 00:03:45,400 --> 00:03:47,760 Speaker 4: how useful it was just from my own experiences. 53 00:03:48,000 --> 00:03:52,440 Speaker 1: If you were to describe how ice block works in 54 00:03:52,520 --> 00:03:56,680 Speaker 1: terms of the reporting function, is there anything you would 55 00:03:56,920 --> 00:03:57,760 Speaker 1: use to compare it to. 56 00:03:58,440 --> 00:04:01,040 Speaker 4: I mean, it's super similar to just on typical map 57 00:04:01,080 --> 00:04:03,960 Speaker 4: apps where warns you have a speed trap right like 58 00:04:04,000 --> 00:04:06,880 Speaker 4: you're driving, and then it says cops have been reported 59 00:04:07,040 --> 00:04:10,080 Speaker 4: up ahead, and then you know, people all get that 60 00:04:10,200 --> 00:04:13,000 Speaker 4: on their phones and they start slowing down. That's basically 61 00:04:13,000 --> 00:04:15,880 Speaker 4: what it is. It's just like a location based app 62 00:04:16,160 --> 00:04:18,960 Speaker 4: where people can report here's an ice sighting, and then 63 00:04:19,040 --> 00:04:22,240 Speaker 4: other people who are nearby get the notification and then 64 00:04:22,240 --> 00:04:24,559 Speaker 4: they're like, oh, there's an ice sighting there. It's actually 65 00:04:24,600 --> 00:04:25,520 Speaker 4: overall pretty simple. 66 00:04:26,920 --> 00:04:29,719 Speaker 1: Ice Block was created by a solo developer named Joshua 67 00:04:29,760 --> 00:04:32,320 Speaker 1: Aaron back in April, just a few months into President 68 00:04:32,320 --> 00:04:35,040 Speaker 1: Trump's second term. He told CNN that he made the 69 00:04:35,080 --> 00:04:37,159 Speaker 1: app because he wanted to do something to fight back 70 00:04:37,200 --> 00:04:40,040 Speaker 1: against what was happening in the US. He made ice 71 00:04:40,080 --> 00:04:42,920 Speaker 1: Block only available on iPhone because he said that making 72 00:04:42,920 --> 00:04:46,280 Speaker 1: it available on Android could require collecting information that could 73 00:04:46,320 --> 00:04:49,960 Speaker 1: put users at risk. Maybe that's annoyed Android users, but 74 00:04:50,120 --> 00:04:52,080 Speaker 1: there is some merit to this, at least in the 75 00:04:52,120 --> 00:04:53,719 Speaker 1: way that the app was doing things. 76 00:04:54,560 --> 00:04:57,600 Speaker 4: From my understanding is it uses the Apple Cloud cat. 77 00:04:57,800 --> 00:05:00,120 Speaker 4: So normally what you'd have as an app running on 78 00:05:00,200 --> 00:05:02,520 Speaker 4: phones and then you'd have a server, and so when 79 00:05:02,560 --> 00:05:05,200 Speaker 4: you report something, it would communicate with the server and 80 00:05:05,279 --> 00:05:08,000 Speaker 4: save stuff in the database. So he's saying he's not 81 00:05:08,000 --> 00:05:12,520 Speaker 4: collecting any data, but instead he's essentially outsourcing this to Apples. 82 00:05:12,520 --> 00:05:15,360 Speaker 4: He doesn't need to like collect the location of users 83 00:05:15,400 --> 00:05:19,360 Speaker 4: who have this app installed. Instead, Apple's already collecting everyone's 84 00:05:19,360 --> 00:05:21,680 Speaker 4: location who has location services on and so it's just 85 00:05:21,680 --> 00:05:25,120 Speaker 4: relying on that. So that's that's like roughly the technical 86 00:05:25,160 --> 00:05:28,200 Speaker 4: way that he's keeping it completely anonymous, although it's really 87 00:05:28,240 --> 00:05:31,920 Speaker 4: not completely anonymous because you know, Apple can see everything. 88 00:05:32,240 --> 00:05:33,120 Speaker 5: If ice Block. 89 00:05:32,920 --> 00:05:36,520 Speaker 4: Gets data requests from you know, the FBI or DHS 90 00:05:36,640 --> 00:05:39,200 Speaker 4: or something, maybe they won't be able to comply because 91 00:05:39,200 --> 00:05:41,960 Speaker 4: they don't have data. But if Apple gets data requests 92 00:05:42,000 --> 00:05:45,240 Speaker 4: from the FBI or DHS, Apple actually has a lot 93 00:05:45,279 --> 00:05:47,160 Speaker 4: of data that they can turn over, including you know, 94 00:05:47,279 --> 00:05:48,359 Speaker 4: everyone who's installed the. 95 00:05:48,400 --> 00:05:53,919 Speaker 1: App, right because relatively speaking, Apple does have a fairly 96 00:05:54,080 --> 00:05:58,000 Speaker 1: good reputation or good record in not just turning stuff 97 00:05:58,000 --> 00:06:01,479 Speaker 1: over willingly to the authorities. Like somebody comes and asks 98 00:06:01,480 --> 00:06:03,919 Speaker 1: for it, and they generally say no, right. 99 00:06:04,120 --> 00:06:07,080 Speaker 4: When it's a valid law enforcement request. They like don't 100 00:06:07,080 --> 00:06:08,640 Speaker 4: really have much of the option to say no. They 101 00:06:08,720 --> 00:06:12,120 Speaker 4: can fight it with lawyers, but if they lose, then 102 00:06:12,120 --> 00:06:14,359 Speaker 4: they have to turn it over. And so what Apple 103 00:06:14,360 --> 00:06:19,240 Speaker 4: has a good reputation for is building in extra security 104 00:06:19,279 --> 00:06:21,039 Speaker 4: to make it so that it's harder for them to 105 00:06:21,040 --> 00:06:23,359 Speaker 4: turn stuff over. They have something called the Advanced Data 106 00:06:23,400 --> 00:06:26,039 Speaker 4: Production and anyone that wants to can turn it on 107 00:06:26,279 --> 00:06:29,640 Speaker 4: in their iCloud account, and it means that all that 108 00:06:29,760 --> 00:06:32,679 Speaker 4: data in your iCloud account is encrypted. So if Apple's 109 00:06:32,720 --> 00:06:34,640 Speaker 4: forced to turn it over, they can still turn it over. 110 00:06:34,720 --> 00:06:36,960 Speaker 4: It's just that it'll be encrypted data they're turning over, 111 00:06:37,480 --> 00:06:39,680 Speaker 4: and you, the user, will have a key that can 112 00:06:39,680 --> 00:06:43,920 Speaker 4: decrypt it. So they're doing work to make it harder 113 00:06:43,960 --> 00:06:46,719 Speaker 4: to turnover data, but they still are you know they're 114 00:06:46,720 --> 00:06:47,440 Speaker 4: a US company. 115 00:06:47,560 --> 00:06:48,960 Speaker 5: They give data to the BLISS. 116 00:06:50,120 --> 00:06:53,040 Speaker 1: There were some researchers who initially were a little skeptical 117 00:06:53,080 --> 00:06:55,680 Speaker 1: of how ice block worked. A colleague of MICA has 118 00:06:55,680 --> 00:06:57,960 Speaker 1: looked into it and confirmed that it did seem to 119 00:06:58,040 --> 00:06:59,960 Speaker 1: legitimately be working how it promised. 120 00:07:00,480 --> 00:07:04,400 Speaker 4: I didn't spend much time digging and stuff until a 121 00:07:04,560 --> 00:07:07,600 Speaker 4: Hope conference Hackers on Planet Earth that now happens every year. 122 00:07:07,640 --> 00:07:10,720 Speaker 4: It's in New York, and Joshua Aaron, the developer of 123 00:07:10,720 --> 00:07:13,560 Speaker 4: ice block, was giving a talk about ice block at Hope. 124 00:07:13,800 --> 00:07:17,720 Speaker 4: And as he was talking and then especially throughout the 125 00:07:17,760 --> 00:07:20,680 Speaker 4: Q and A, the audience was getting more and more 126 00:07:20,760 --> 00:07:24,520 Speaker 4: visibly frustrated because it was very clear that this guy 127 00:07:24,640 --> 00:07:27,200 Speaker 4: just doesn't know what he's talking about, and he kept 128 00:07:27,240 --> 00:07:30,920 Speaker 4: like making these big promises. He kept talking about how 129 00:07:31,520 --> 00:07:33,640 Speaker 4: he runs a server and he's like, believe me, my 130 00:07:33,760 --> 00:07:36,840 Speaker 4: server is highly secure, no one could hack it. I 131 00:07:36,880 --> 00:07:39,720 Speaker 4: built it myself, and I think of everything, and like 132 00:07:39,800 --> 00:07:41,920 Speaker 4: this is like an audience full of hackers and people 133 00:07:41,960 --> 00:07:45,480 Speaker 4: are like scanning his server and being like there's various 134 00:07:45,520 --> 00:07:46,480 Speaker 4: problems already. 135 00:07:46,600 --> 00:07:47,120 Speaker 5: Just starting the. 136 00:07:47,160 --> 00:07:50,480 Speaker 1: Talk, maybe a little late here, but it's probably worth 137 00:07:50,520 --> 00:07:53,920 Speaker 1: mentioning here that Micah isn't just some hobbyist programmer. In 138 00:07:53,960 --> 00:07:57,720 Speaker 1: twenty thirteen, he helped Edward Snowden league government spying documents. 139 00:07:57,880 --> 00:08:01,200 Speaker 1: So if Micah says that he's concerned about security, that's 140 00:08:01,240 --> 00:08:03,760 Speaker 1: going to hold some weight for people. And one big 141 00:08:03,800 --> 00:08:06,040 Speaker 1: issue that he and some other researchers had at this 142 00:08:06,120 --> 00:08:09,080 Speaker 1: conference was the fact that the developer didn't want to 143 00:08:09,120 --> 00:08:12,720 Speaker 1: make the apps code open source, which raised a big 144 00:08:12,760 --> 00:08:14,080 Speaker 1: red flag from Mica. 145 00:08:14,320 --> 00:08:18,520 Speaker 4: In computer security, if you're making security products or privacy 146 00:08:18,560 --> 00:08:20,760 Speaker 4: products and you want people to trust you, the way 147 00:08:20,760 --> 00:08:23,000 Speaker 4: of doing this is to show your work to like 148 00:08:23,080 --> 00:08:27,520 Speaker 4: make your software open source, to invite outside researchers to 149 00:08:27,640 --> 00:08:31,000 Speaker 4: like look into it to try and find flaws. Anyone 150 00:08:31,000 --> 00:08:32,680 Speaker 4: can look at the code, anyone can use the code. 151 00:08:32,720 --> 00:08:35,839 Speaker 4: Anyone can, you know, take a copy of the code 152 00:08:35,840 --> 00:08:38,600 Speaker 4: and change it and release their own version. The big 153 00:08:38,640 --> 00:08:42,440 Speaker 4: benefit from a privacy and security perspective of open source 154 00:08:42,800 --> 00:08:46,360 Speaker 4: is it means that you're not like hiding how you 155 00:08:46,400 --> 00:08:47,000 Speaker 4: do stuff. 156 00:08:47,160 --> 00:08:48,600 Speaker 5: You're being transparent about it. 157 00:08:48,800 --> 00:08:52,240 Speaker 4: And for something like this where people are very concerned 158 00:08:52,280 --> 00:08:56,040 Speaker 4: that it's collecting their data, the basic stuff that a 159 00:08:56,120 --> 00:08:58,520 Speaker 4: developer can do is make it open source, and then 160 00:08:58,600 --> 00:09:00,800 Speaker 4: this way they can just like be like, look, you 161 00:09:00,840 --> 00:09:03,240 Speaker 4: don't have to trust us as much because maybe you 162 00:09:03,240 --> 00:09:05,760 Speaker 4: don't read code, but like someone else who does readcode 163 00:09:05,800 --> 00:09:08,480 Speaker 4: can like look through the code and confirm that it's 164 00:09:08,559 --> 00:09:12,160 Speaker 4: done what I say it's done. It has other benefits too, 165 00:09:12,200 --> 00:09:14,760 Speaker 4: like other people can actually help you fix bugs. Other 166 00:09:14,800 --> 00:09:18,040 Speaker 4: people can help you find vulnerabilities. Other people can add 167 00:09:18,080 --> 00:09:21,199 Speaker 4: features to it, and this is like common for security 168 00:09:21,280 --> 00:09:22,880 Speaker 4: software and privacy software. 169 00:09:23,200 --> 00:09:24,800 Speaker 1: When he was asked in the Q and A if 170 00:09:24,800 --> 00:09:28,440 Speaker 1: you would accept help programming the app, Joshua Aaron said, no. 171 00:09:28,800 --> 00:09:30,800 Speaker 2: Believe me when I say I would love help. Okay, 172 00:09:30,800 --> 00:09:33,880 Speaker 2: I'm supporting over a million users myself. There's not some 173 00:09:34,000 --> 00:09:37,920 Speaker 2: giant company behind this, but it's really really hard for 174 00:09:37,960 --> 00:09:40,400 Speaker 2: me to put my trust in somebody and share the 175 00:09:40,440 --> 00:09:43,840 Speaker 2: source code and share the access to this. So I 176 00:09:43,880 --> 00:09:46,720 Speaker 2: got to just say, so far, the answer is I'm 177 00:09:46,760 --> 00:09:50,880 Speaker 2: just not the trusting person. So no, I haven't entertained 178 00:09:50,920 --> 00:09:52,400 Speaker 2: having anybody else involved with it. 179 00:09:52,720 --> 00:09:56,080 Speaker 1: Joshua Aaron was adamant that his ice block app is secure, 180 00:09:56,480 --> 00:09:59,679 Speaker 1: but he wouldn't budge on this open source issue. So 181 00:10:00,040 --> 00:10:01,720 Speaker 1: I could decided to ask a different question. 182 00:10:02,240 --> 00:10:05,520 Speaker 4: I actually went and said another question, which was basically, 183 00:10:05,640 --> 00:10:08,440 Speaker 4: would you be open to publishing like a white paper 184 00:10:08,440 --> 00:10:11,480 Speaker 4: that explains how it works, so that you know, researchers 185 00:10:11,520 --> 00:10:14,880 Speaker 4: could like look at this and give feedback and make 186 00:10:14,920 --> 00:10:17,480 Speaker 4: it better, and also like security audits, Like you don't 187 00:10:17,480 --> 00:10:19,760 Speaker 4: need to open the source code to everyone, but there 188 00:10:19,760 --> 00:10:22,679 Speaker 4: are all of these security firms that will do a 189 00:10:22,800 --> 00:10:25,439 Speaker 4: like a penetration test of your code. They try to 190 00:10:25,480 --> 00:10:28,680 Speaker 4: hack it, and then if they find any problems, they 191 00:10:28,720 --> 00:10:30,199 Speaker 4: give you a report and then you fix them all. 192 00:10:30,440 --> 00:10:32,600 Speaker 4: And we were even like we could raise money for 193 00:10:32,760 --> 00:10:34,720 Speaker 4: a security audit. These are things that you can do 194 00:10:34,720 --> 00:10:37,680 Speaker 4: without making an open source it'll still make people trust 195 00:10:37,679 --> 00:10:40,480 Speaker 4: it more. But he was just like, Nope, I'm not 196 00:10:40,520 --> 00:10:41,559 Speaker 4: doing any of this stuff. 197 00:10:42,080 --> 00:10:44,679 Speaker 1: All right, let's just leave aside the cybersecurity talk for 198 00:10:44,720 --> 00:10:49,040 Speaker 1: a second. Micah had another concern what would happen if 199 00:10:49,080 --> 00:10:52,120 Speaker 1: someone falsely reported in ice sighting or if they just 200 00:10:52,160 --> 00:10:55,400 Speaker 1: made a mistake. Mike has been volunteering with an organization 201 00:10:55,440 --> 00:10:58,280 Speaker 1: in his area called Norkel Resist. This group does a 202 00:10:58,320 --> 00:11:00,800 Speaker 1: lot of things, from fixing your car's break lights were free, 203 00:11:00,840 --> 00:11:03,880 Speaker 1: to distributing food to families who need it. But recently 204 00:11:03,880 --> 00:11:06,720 Speaker 1: they've been doing a lot of work supporting immigrants and 205 00:11:06,800 --> 00:11:09,920 Speaker 1: because of this, Micah has seen firsthand how a false 206 00:11:09,960 --> 00:11:12,120 Speaker 1: eye sighting can really cause panic. 207 00:11:12,440 --> 00:11:14,880 Speaker 4: And a big thing is that lots of people are like, 208 00:11:15,000 --> 00:11:17,400 Speaker 4: oh my god, there's ice in this neighborhood, and they 209 00:11:17,480 --> 00:11:19,680 Speaker 4: like post that online and then a lot of people 210 00:11:19,880 --> 00:11:21,880 Speaker 4: like boost it, and most of the time that's not 211 00:11:21,920 --> 00:11:24,559 Speaker 4: actually true. One that I checked out there was this 212 00:11:24,720 --> 00:11:26,920 Speaker 4: overpass bridge looked like there was like a bunch of 213 00:11:26,920 --> 00:11:29,480 Speaker 4: people in uniforms on the bridge what looked kind of 214 00:11:29,520 --> 00:11:32,920 Speaker 4: like police vehicles, and like multiple people reported this bridge 215 00:11:33,400 --> 00:11:36,280 Speaker 4: and I went and confirmed that it was like a 216 00:11:36,400 --> 00:11:39,400 Speaker 4: fireman funeral service then, so. 217 00:11:39,400 --> 00:11:40,319 Speaker 5: It wasn't ice at all. 218 00:11:40,720 --> 00:11:43,160 Speaker 4: Sometimes it's actually just like a local police action, and 219 00:11:43,200 --> 00:11:45,400 Speaker 4: it just causes people to panic because the problem is 220 00:11:45,440 --> 00:11:50,600 Speaker 4: that there's like millions of people who are undocumented, and 221 00:11:50,640 --> 00:11:52,559 Speaker 4: then there's even more millions of people who are friends 222 00:11:52,559 --> 00:11:55,080 Speaker 4: and loves ones with people who are undocumented. There's all 223 00:11:55,120 --> 00:11:58,480 Speaker 4: of these teenagers whose parents are undocumented in their citizens 224 00:11:58,480 --> 00:12:00,640 Speaker 4: and stuff, and they're like scared out of their minds, 225 00:12:00,640 --> 00:12:03,000 Speaker 4: like constantly, and so if you're sitting there scrolling on 226 00:12:03,040 --> 00:12:04,959 Speaker 4: social media, and you're just seeing like, oh my god, 227 00:12:04,960 --> 00:12:07,640 Speaker 4: there's ice everywhere. It's really scary. And so it's like 228 00:12:07,800 --> 00:12:11,520 Speaker 4: very important to not cause panic and instead to just 229 00:12:11,679 --> 00:12:14,240 Speaker 4: spread the news about real things that are happening and 230 00:12:14,280 --> 00:12:16,360 Speaker 4: not just a bunch of big things that aren't happening. 231 00:12:17,840 --> 00:12:21,280 Speaker 1: So at this Hacker's Conference talk, Micah asked Joshua Aaron 232 00:12:21,280 --> 00:12:22,920 Speaker 1: about this directly, and I. 233 00:12:22,880 --> 00:12:25,720 Speaker 4: Guess my question is, how do you know that ice 234 00:12:25,880 --> 00:12:29,280 Speaker 4: block isn't just full of false positives? And have you 235 00:12:30,040 --> 00:12:33,560 Speaker 4: done any like user research or work with local immigration 236 00:12:33,600 --> 00:12:37,520 Speaker 4: groups to like figure out, you know, how reliable this is, 237 00:12:38,000 --> 00:12:41,040 Speaker 4: how much it's actually helping people versus causing panic. 238 00:12:41,600 --> 00:12:43,320 Speaker 2: I'm not going to tell you there's no false sightings 239 00:12:43,320 --> 00:12:43,920 Speaker 2: in ice Block. 240 00:12:44,120 --> 00:12:47,160 Speaker 5: Of course there are. That's what nefarious users do. 241 00:12:47,559 --> 00:12:50,400 Speaker 2: They think it's really funny to scare people and hurt people. 242 00:12:51,480 --> 00:12:54,000 Speaker 2: But there are safeguards in the app. 243 00:12:54,240 --> 00:12:57,040 Speaker 4: He eventually said that, like in the off chance that 244 00:12:57,120 --> 00:12:59,719 Speaker 4: someone posts something that's not real, then people will just 245 00:12:59,720 --> 00:13:01,760 Speaker 4: stay away from that area for a little. 246 00:13:01,480 --> 00:13:02,600 Speaker 5: Bit, and that's not that bad. 247 00:13:03,160 --> 00:13:07,920 Speaker 2: So, in an effort for user anonymity, the decision was 248 00:13:07,960 --> 00:13:12,320 Speaker 2: made that if there are false sightings, the worst case 249 00:13:12,360 --> 00:13:15,720 Speaker 2: scenario is that those people simply stay away from that 250 00:13:15,840 --> 00:13:20,560 Speaker 2: location for a few hours, much better than having user 251 00:13:20,640 --> 00:13:24,120 Speaker 2: identifiable data that could come under government subpoena. So I 252 00:13:24,160 --> 00:13:28,040 Speaker 2: hope that answers your question and kind of alleviates those concerns. 253 00:13:28,280 --> 00:13:29,800 Speaker 1: That does sound kind of bad, though. 254 00:13:31,600 --> 00:13:34,200 Speaker 4: I do think it's kind of bad because it's causing 255 00:13:34,240 --> 00:13:36,600 Speaker 4: people to like panic and to worry that there's way 256 00:13:36,640 --> 00:13:39,480 Speaker 4: more ice activity than there actually is. There was this 257 00:13:39,520 --> 00:13:42,600 Speaker 4: one other person who who also asked about you know, 258 00:13:42,720 --> 00:13:47,160 Speaker 4: there's all of these immigrant communities across the country that 259 00:13:47,280 --> 00:13:51,080 Speaker 4: have these pretty strong support networks and they're already doing 260 00:13:51,120 --> 00:13:54,280 Speaker 4: stuff in their own ways. As she asked, have you 261 00:13:54,320 --> 00:13:57,000 Speaker 4: planned on working with any of these groups? And basically 262 00:13:57,080 --> 00:14:00,720 Speaker 4: his answer was, I've talked to some community organizers and 263 00:14:01,000 --> 00:14:03,200 Speaker 4: they all do things their own way, and I wouldn't 264 00:14:03,200 --> 00:14:05,240 Speaker 4: be able to like make ice block work for this 265 00:14:05,280 --> 00:14:06,920 Speaker 4: group and then for this group and then for this group, 266 00:14:06,960 --> 00:14:08,280 Speaker 4: so he's just going to ignore their advice. 267 00:14:10,280 --> 00:14:13,160 Speaker 1: After the conference, Micah did some more digging around and 268 00:14:13,360 --> 00:14:16,280 Speaker 1: he tried to ask the developers some questions via DMS. 269 00:14:16,960 --> 00:14:19,640 Speaker 1: That's when things started to get weird. More on that 270 00:14:20,040 --> 00:14:20,480 Speaker 1: after the. 271 00:14:20,400 --> 00:14:35,160 Speaker 4: Break, After this Hope Talk. A group of us started 272 00:14:35,160 --> 00:14:37,560 Speaker 4: a signal group and we were basically like, Okay, this 273 00:14:37,720 --> 00:14:40,880 Speaker 4: app has promise. We think that the developer is like 274 00:14:41,520 --> 00:14:43,680 Speaker 4: not malicious, we think his heart is in the right place. 275 00:14:44,000 --> 00:14:46,080 Speaker 4: Maybe we can affect us to make it so that 276 00:14:46,080 --> 00:14:48,760 Speaker 4: it's actually a useful app for people, and then especially 277 00:14:48,840 --> 00:14:50,960 Speaker 4: like that will be so much better because there's already 278 00:14:51,000 --> 00:14:53,760 Speaker 4: like a million users. So we spent a bunch of 279 00:14:53,920 --> 00:14:55,600 Speaker 4: energy trying to figure out how to improve the app. 280 00:14:55,840 --> 00:14:57,760 Speaker 4: We wrote him a letter and then he just like 281 00:14:57,880 --> 00:15:03,040 Speaker 4: immediately rejected the letter and rejected our offer of various support. 282 00:15:03,360 --> 00:15:06,560 Speaker 4: Then I was like, okay, I'm going to write basically 283 00:15:06,560 --> 00:15:08,080 Speaker 4: about the Hope Talk. So I just started a blog 284 00:15:08,080 --> 00:15:11,680 Speaker 4: post about the Hope Talk and with like little clips 285 00:15:11,720 --> 00:15:14,360 Speaker 4: from the most frustrating parts. And then at the end 286 00:15:14,440 --> 00:15:15,840 Speaker 4: of my blog post. 287 00:15:15,800 --> 00:15:18,160 Speaker 1: Michael wrote about all this in a post on his blog. 288 00:15:18,640 --> 00:15:23,160 Speaker 1: The title was Unfortunately the ice Block app is activism Theater. 289 00:15:23,760 --> 00:15:26,560 Speaker 1: But before we published it, he gave Joshua Aaron heads 290 00:15:26,640 --> 00:15:29,760 Speaker 1: up and he also flagged a potential security problem that 291 00:15:29,760 --> 00:15:30,280 Speaker 1: he'd found. 292 00:15:31,560 --> 00:15:36,840 Speaker 4: So I messaged him on Blue Sky being like, I'm 293 00:15:36,920 --> 00:15:39,320 Speaker 4: that published this blog post about the hope talk. It's 294 00:15:39,360 --> 00:15:42,920 Speaker 4: not very flattering, but I also wanted to like privately 295 00:15:43,360 --> 00:15:46,200 Speaker 4: tell you that I discovered a problem with your server. 296 00:15:46,560 --> 00:15:49,320 Speaker 5: I basically did a n MAP scan real quick. 297 00:15:49,320 --> 00:15:52,400 Speaker 1: Aside here in map or a network mapper is basically 298 00:15:52,440 --> 00:15:54,680 Speaker 1: a tool that lets you find devices on a network 299 00:15:54,960 --> 00:15:57,520 Speaker 1: and also potentially detect vulnerabilities. 300 00:15:58,120 --> 00:15:59,760 Speaker 4: So I didn't en map scan to see what ports 301 00:15:59,760 --> 00:16:03,160 Speaker 4: were a and then I also use this one feature 302 00:16:03,200 --> 00:16:05,560 Speaker 4: that just does version detection, so like, if it sees 303 00:16:05,600 --> 00:16:08,840 Speaker 4: that this server runs a web server, it tells you 304 00:16:08,880 --> 00:16:11,560 Speaker 4: what software is running on that web server. And this 305 00:16:11,600 --> 00:16:15,200 Speaker 4: was like the step zero before you start like trying 306 00:16:15,240 --> 00:16:18,320 Speaker 4: to hack something, you do basic reconnaissance. So this was 307 00:16:18,360 --> 00:16:20,400 Speaker 4: a very basic reconnaissance. 308 00:16:20,000 --> 00:16:22,160 Speaker 1: Right, just see what software they running? 309 00:16:22,600 --> 00:16:23,440 Speaker 5: Yeah, exactly. 310 00:16:23,640 --> 00:16:26,280 Speaker 4: And I saw that he was running Apache, which is 311 00:16:26,280 --> 00:16:29,160 Speaker 4: a common web server software. But the version of Apache 312 00:16:29,160 --> 00:16:31,560 Speaker 4: that was running was like eight months old or something. 313 00:16:31,640 --> 00:16:33,960 Speaker 4: And the thing about this is it's always important to 314 00:16:34,000 --> 00:16:38,320 Speaker 4: install updates, and the reason is because updates fixed security problems. 315 00:16:38,320 --> 00:16:40,480 Speaker 4: And so I like looked up that version and there 316 00:16:40,480 --> 00:16:42,480 Speaker 4: were all of these known vulnerabilities in that version of 317 00:16:42,480 --> 00:16:45,520 Speaker 4: apatching I just told him, hey, your version of Apache 318 00:16:45,600 --> 00:16:48,080 Speaker 4: has all these known vulnerabilities and some of them are 319 00:16:48,120 --> 00:16:51,800 Speaker 4: marked critical. You should probably update and he blocked me. 320 00:16:52,520 --> 00:16:56,560 Speaker 4: So that was the response, and then he uh sent 321 00:16:56,680 --> 00:16:59,200 Speaker 4: me a message on his other blue Sky account and 322 00:16:59,240 --> 00:17:02,320 Speaker 4: his personal account and was like, stop telling lies about 323 00:17:02,320 --> 00:17:05,400 Speaker 4: me and ice block. This is my last communication. And 324 00:17:05,480 --> 00:17:07,359 Speaker 4: I was like, hey, let me know if I got 325 00:17:07,400 --> 00:17:09,320 Speaker 4: anything wrong in the blog post, I'm happy to post 326 00:17:09,320 --> 00:17:13,200 Speaker 4: a correction. But then a few days later I checked 327 00:17:13,280 --> 00:17:16,680 Speaker 4: and his server was still running the vulnerable version of Apache. 328 00:17:16,800 --> 00:17:18,840 Speaker 4: So I sent him another message and I was like, hey, 329 00:17:19,000 --> 00:17:21,640 Speaker 4: you should really update this. I'll give you a deadline. 330 00:17:21,640 --> 00:17:23,479 Speaker 4: I'll give you a week to fix it. And it's 331 00:17:23,480 --> 00:17:26,000 Speaker 4: like really really really easy to fix. It's just running 332 00:17:26,040 --> 00:17:28,680 Speaker 4: the update command. That's it. That will fix the problem. 333 00:17:29,040 --> 00:17:32,280 Speaker 4: And so then he blocked me there too, And this 334 00:17:32,359 --> 00:17:36,119 Speaker 4: is just basically like really bad way to handle a 335 00:17:36,200 --> 00:17:39,000 Speaker 4: vulnerability report. I would imagine that at the very least 336 00:17:39,000 --> 00:17:41,800 Speaker 4: he will walk his server to not get hacked. I 337 00:17:41,880 --> 00:17:45,040 Speaker 4: waited until the week was up, and then I just 338 00:17:45,080 --> 00:17:48,040 Speaker 4: like wrote a short blog post being like here's what 339 00:17:48,119 --> 00:17:51,520 Speaker 4: I found. I hope this encourages them to actually install updates, 340 00:17:51,840 --> 00:17:55,760 Speaker 4: and then like within two hours he installed updates after 341 00:17:55,800 --> 00:17:57,240 Speaker 4: I published the blog post, so it worked. 342 00:18:00,560 --> 00:18:03,119 Speaker 1: I mean, you publicly bullied my man into updating the 343 00:18:03,160 --> 00:18:07,440 Speaker 1: Apache server. Yeah, we'll talk. You can come off is 344 00:18:07,760 --> 00:18:09,840 Speaker 1: kind of being just like a hater, Like, what's this 345 00:18:09,960 --> 00:18:12,879 Speaker 1: dude doing? Why is this guy being being on the 346 00:18:12,920 --> 00:18:17,600 Speaker 1: internet about this really well intentioned software, right? 347 00:18:18,440 --> 00:18:21,199 Speaker 4: I mean, so I don't want to come off as 348 00:18:21,200 --> 00:18:24,040 Speaker 4: a hater. And the entire time I've tried to help 349 00:18:24,240 --> 00:18:28,080 Speaker 4: make his app useful, but it was just so frustrating. 350 00:18:28,280 --> 00:18:30,639 Speaker 4: He's just saying all these things with such confidence that 351 00:18:30,680 --> 00:18:34,400 Speaker 4: aren't true. And honestly, like, I think that the problems 352 00:18:34,400 --> 00:18:37,600 Speaker 4: that we're facing with mass deportation, they're not solved by 353 00:18:37,600 --> 00:18:40,359 Speaker 4: an app. They're much bigger than an app, And so 354 00:18:40,400 --> 00:18:42,840 Speaker 4: I think the apps can be maybe a helpful component, 355 00:18:42,880 --> 00:18:46,040 Speaker 4: but there's a much bigger situation. And I think that 356 00:18:46,080 --> 00:18:48,960 Speaker 4: maybe if ice block was like working directly with a 357 00:18:49,119 --> 00:18:53,280 Speaker 4: network of local groups around the country and had betting 358 00:18:53,359 --> 00:18:56,679 Speaker 4: built in, that would actually make it really usefulat for 359 00:18:56,720 --> 00:19:00,199 Speaker 4: people to get like verified information. But like you know, 360 00:19:00,200 --> 00:19:01,639 Speaker 4: and if he's not doing any of that, then like 361 00:19:01,680 --> 00:19:02,680 Speaker 4: what's the point? 362 00:19:03,080 --> 00:19:05,760 Speaker 1: To some people, it might sound weird that computer programmers 363 00:19:05,800 --> 00:19:09,399 Speaker 1: would publicly have an argument over an app, but trust me, 364 00:19:09,480 --> 00:19:12,919 Speaker 1: this stuff is very normal. Entire operating systems have been 365 00:19:12,920 --> 00:19:15,960 Speaker 1: written because someone couldn't agree on something as minor as 366 00:19:16,119 --> 00:19:19,000 Speaker 1: how the computer should boot up. The stakes just feel 367 00:19:19,040 --> 00:19:22,040 Speaker 1: a lot higher here because both of these people really 368 00:19:22,040 --> 00:19:25,639 Speaker 1: care about the cause of helping immigrants, and applying technology 369 00:19:25,640 --> 00:19:29,760 Speaker 1: to civil rights issues is way harder than most people think. 370 00:19:30,119 --> 00:19:32,520 Speaker 1: Just as an example, I have a friend who is 371 00:19:32,560 --> 00:19:36,440 Speaker 1: working on a totally different national campaign to help undocumented immigrants. 372 00:19:36,880 --> 00:19:39,840 Speaker 1: The project wasn't an app, but they created basically this 373 00:19:40,000 --> 00:19:43,399 Speaker 1: downloadable infocard. The idea was that if you get stopped 374 00:19:43,400 --> 00:19:45,280 Speaker 1: by ice, you could pull out your phone and you 375 00:19:45,280 --> 00:19:47,480 Speaker 1: could pull up this card from a digital wallet and 376 00:19:47,520 --> 00:19:49,840 Speaker 1: would have all this information on it, like your rights 377 00:19:49,920 --> 00:19:53,240 Speaker 1: stay silent, your right to a lawyer, people to contact, 378 00:19:53,280 --> 00:19:55,760 Speaker 1: things like that. And it looked really slick, and they 379 00:19:55,800 --> 00:19:58,760 Speaker 1: had all these social media influencers who are excited about it, 380 00:19:58,760 --> 00:20:00,720 Speaker 1: and they wanted to help them promote it, and things 381 00:20:00,720 --> 00:20:04,000 Speaker 1: were looking great. But then they showed their project to 382 00:20:04,080 --> 00:20:07,680 Speaker 1: some local groups who actually work with assisting undocumented immigrants, 383 00:20:08,000 --> 00:20:11,240 Speaker 1: and the group said, no, this is not a good idea. 384 00:20:11,320 --> 00:20:14,399 Speaker 1: You do not want people opening up their phone around 385 00:20:14,440 --> 00:20:16,439 Speaker 1: ice because they might take it or they might coerce 386 00:20:16,480 --> 00:20:20,399 Speaker 1: them into showing personal information. They said, look, here's what 387 00:20:20,480 --> 00:20:23,960 Speaker 1: actually works in this community. Paper cards with your rights 388 00:20:24,000 --> 00:20:26,160 Speaker 1: printed on it. If you want to help us, help 389 00:20:26,240 --> 00:20:28,160 Speaker 1: us print those up and distribute them in a bunch 390 00:20:28,160 --> 00:20:33,040 Speaker 1: of different languages. No digital nonsense, just paper. Now. The 391 00:20:33,080 --> 00:20:36,360 Speaker 1: activists who worked on this other digital wallet thing were 392 00:20:36,359 --> 00:20:39,600 Speaker 1: pretty humiliated, but they ended up taking the local group's 393 00:20:39,600 --> 00:20:42,399 Speaker 1: advice and said, you know what, this is what's called 394 00:20:42,440 --> 00:20:45,879 Speaker 1: being a good ally, and you know, maybe so. In 395 00:20:45,920 --> 00:20:48,240 Speaker 1: software development, though there's a simpler term for it, we 396 00:20:48,320 --> 00:20:51,480 Speaker 1: just call it user research, putting aside all the cool 397 00:20:51,520 --> 00:20:53,040 Speaker 1: things that you want the user to do with your 398 00:20:53,040 --> 00:20:56,480 Speaker 1: software and figuring out what the people who would actually 399 00:20:56,600 --> 00:20:59,000 Speaker 1: use your software actually need. 400 00:21:00,240 --> 00:21:03,679 Speaker 4: I think that if you're actually like doing user research, 401 00:21:03,760 --> 00:21:05,760 Speaker 4: trying to figure out what do we need, there's a 402 00:21:05,760 --> 00:21:08,199 Speaker 4: lot of undocumented people who work in like the service 403 00:21:08,240 --> 00:21:11,119 Speaker 4: industry or who work in farming, and actually talking to 404 00:21:11,119 --> 00:21:13,240 Speaker 4: those people, I think that what will be really helpful 405 00:21:13,400 --> 00:21:16,160 Speaker 4: is to make it so that a bunch of people 406 00:21:16,200 --> 00:21:19,560 Speaker 4: who like work in the kitchen at restaurants they know 407 00:21:19,680 --> 00:21:21,920 Speaker 4: how to report an ICE sighting, because what happens when 408 00:21:22,000 --> 00:21:26,359 Speaker 4: like ice comes into the restaurant, like someone should report it? Like, 409 00:21:27,119 --> 00:21:28,960 Speaker 4: I don't know if you're going to get like the 410 00:21:28,960 --> 00:21:32,280 Speaker 4: people who really need this, most of them don't have 411 00:21:32,320 --> 00:21:35,960 Speaker 4: iPhones right to begin with. What you really need is 412 00:21:36,040 --> 00:21:38,040 Speaker 4: like how do you get this person working in the 413 00:21:38,080 --> 00:21:41,160 Speaker 4: kitchen to be able to report, oh, God, ice is here. 414 00:21:41,400 --> 00:21:43,400 Speaker 4: And then at that point, what do you actually want? 415 00:21:43,480 --> 00:21:46,120 Speaker 4: Do you just want to like tell people that ice 416 00:21:46,200 --> 00:21:49,119 Speaker 4: is at this restaurant and then that's it, or do 417 00:21:49,160 --> 00:21:51,320 Speaker 4: you want to actually like have community come out and 418 00:21:51,359 --> 00:21:54,879 Speaker 4: support of the people there, start documenting stuff, start providing 419 00:21:54,920 --> 00:21:57,240 Speaker 4: legal support. I think it's kind of shortsighted, Like none 420 00:21:57,320 --> 00:21:59,320 Speaker 4: of this has been really like thought through. It's more 421 00:21:59,400 --> 00:22:03,240 Speaker 4: just like, ooh, location based apps are cool. It's a 422 00:22:03,280 --> 00:22:06,879 Speaker 4: really hard problem. We can't use technology to solve this problem. 423 00:22:07,119 --> 00:22:10,199 Speaker 4: It's a political problem. We need your restore democracy, and 424 00:22:10,240 --> 00:22:12,400 Speaker 4: an app is not gonna help us restore democracy. 425 00:22:12,800 --> 00:22:16,520 Speaker 1: So after all this, you've written about this, you've kind 426 00:22:16,520 --> 00:22:20,600 Speaker 1: of gone back and forth, but then just recently the 427 00:22:20,640 --> 00:22:23,119 Speaker 1: app gets taken out of the app store m H. 428 00:22:23,760 --> 00:22:27,000 Speaker 1: And then the day after that there's a similar app 429 00:22:27,000 --> 00:22:28,720 Speaker 1: that gets pulled off the Google Play Store. 430 00:22:29,000 --> 00:22:31,760 Speaker 3: Apple says it took it down due to safety risks, 431 00:22:31,760 --> 00:22:33,880 Speaker 3: and they're not the only ones. Google says they removed 432 00:22:33,920 --> 00:22:37,000 Speaker 3: similar apps from the app store for Android devices, and 433 00:22:37,080 --> 00:22:40,200 Speaker 3: all of it coming as Ice is ramping upraids across 434 00:22:40,240 --> 00:22:41,760 Speaker 3: the country. 435 00:22:43,320 --> 00:22:46,240 Speaker 1: Apple removed ice Block from their app store and Google 436 00:22:46,280 --> 00:22:49,520 Speaker 1: removed a similar app called red Dot. Considering that Micah 437 00:22:49,560 --> 00:22:52,120 Speaker 1: had been criticizing ice Block, you might think that he'd 438 00:22:52,119 --> 00:22:55,879 Speaker 1: be happy about this. Well, no, he's not, and he 439 00:22:55,880 --> 00:22:58,520 Speaker 1: says that this is a sign of a bigger problem. 440 00:22:58,640 --> 00:23:15,760 Speaker 1: That's after the break in early October, Apple removed ice 441 00:23:15,760 --> 00:23:18,960 Speaker 1: Block from the app store, no warning, just gone. But 442 00:23:19,160 --> 00:23:22,280 Speaker 1: it wasn't just ice Block. Other apps also disappeared, like, 443 00:23:22,320 --> 00:23:25,240 Speaker 1: for example, an app called eyes Up. This app was 444 00:23:25,280 --> 00:23:28,800 Speaker 1: different from ice Block. It wasn't about real time location reporting. 445 00:23:29,040 --> 00:23:31,720 Speaker 1: It was just about preserving evidence of encounters with Ice 446 00:23:31,840 --> 00:23:35,280 Speaker 1: and maintaining a public record that couldn't be hidden or censored. 447 00:23:35,960 --> 00:23:40,680 Speaker 4: And so it's like people keep posting videos to like TikTok, 448 00:23:40,760 --> 00:23:44,600 Speaker 4: to Instagram, to cts of Ice arresting people and being 449 00:23:44,680 --> 00:23:46,800 Speaker 4: violent with people, and this is just an app that 450 00:23:46,920 --> 00:23:47,480 Speaker 4: archives them. 451 00:23:47,520 --> 00:23:49,280 Speaker 5: That's it. It's a map, and. 452 00:23:49,280 --> 00:23:51,080 Speaker 4: You can browse the map, and you can click on 453 00:23:51,359 --> 00:23:53,240 Speaker 4: an area, and you click on a video and watch 454 00:23:53,280 --> 00:23:56,920 Speaker 4: the video. It's just archiving ice abuse with the goal 455 00:23:57,119 --> 00:24:00,240 Speaker 4: of preserving evidence in case the materials ever needed in court. 456 00:24:00,320 --> 00:24:03,680 Speaker 4: On the Fitch and Apple just took this down as well. 457 00:24:03,960 --> 00:24:06,160 Speaker 4: And I think that both Apple and Google they got 458 00:24:06,160 --> 00:24:09,600 Speaker 4: a bunch of pressure from Paanbandi from the Department of Justice, 459 00:24:10,080 --> 00:24:15,040 Speaker 4: and they both basically did this like absolutely mind boggling 460 00:24:15,119 --> 00:24:18,359 Speaker 4: thing where they're basically saying that, like masked ice stones 461 00:24:18,400 --> 00:24:19,520 Speaker 4: are a protected class. 462 00:24:19,560 --> 00:24:22,840 Speaker 1: Now that phrasing might sound weird, but it's not something 463 00:24:22,880 --> 00:24:25,520 Speaker 1: that Mike had just made up. Google told four or 464 00:24:25,520 --> 00:24:27,960 Speaker 1: four Media that they had, and I'm reading four or 465 00:24:27,960 --> 00:24:31,240 Speaker 1: Four's article on this, removed apps because they shared the 466 00:24:31,280 --> 00:24:34,919 Speaker 1: location of what it describes as a vulnerable group that 467 00:24:35,000 --> 00:24:37,639 Speaker 1: recently faced a violent act connected to those sorts of 468 00:24:37,680 --> 00:24:41,280 Speaker 1: ice spotting apps. I won't editorialize here, but I'll just 469 00:24:41,359 --> 00:24:44,080 Speaker 1: point out that Google calling ICE, which again is a 470 00:24:44,119 --> 00:24:49,520 Speaker 1: government agency, a vulnerable group, is unusual for a tech company. 471 00:24:49,800 --> 00:24:52,080 Speaker 1: Before this, the only people using this sort of language 472 00:24:52,320 --> 00:24:53,359 Speaker 1: was the Trump administration. 473 00:24:54,080 --> 00:24:56,960 Speaker 4: I think that the bigger picture for me is that 474 00:24:57,760 --> 00:25:01,719 Speaker 4: we have like a duopoly smartphones. We have iPhones and 475 00:25:01,720 --> 00:25:04,960 Speaker 4: we have Android phones. That's it, and both of them 476 00:25:05,160 --> 00:25:08,720 Speaker 4: are now just like arms of the US government. I 477 00:25:08,720 --> 00:25:12,119 Speaker 4: think that they've both had like various histories of removing 478 00:25:12,160 --> 00:25:14,439 Speaker 4: apps from the app stores. But I feel like this 479 00:25:14,520 --> 00:25:19,159 Speaker 4: is actually really dangerous, not just for apps that like 480 00:25:19,240 --> 00:25:21,480 Speaker 4: activists might rely on in the United States, but like 481 00:25:21,880 --> 00:25:24,320 Speaker 4: around the world, all of the phones that everyone in 482 00:25:24,320 --> 00:25:25,640 Speaker 4: the world uses. 483 00:25:25,520 --> 00:25:28,000 Speaker 5: Are essentially like what software they're allowed to run. 484 00:25:27,880 --> 00:25:30,320 Speaker 4: On those are controlled by the Trump administration, And that's 485 00:25:30,440 --> 00:25:35,000 Speaker 4: like a really bad situation to be in for the world. 486 00:25:35,640 --> 00:25:38,240 Speaker 4: This experience is showing that, like in the United States, 487 00:25:38,280 --> 00:25:41,600 Speaker 4: if you're trying to like fight ice abuses, or if 488 00:25:41,600 --> 00:25:43,600 Speaker 4: you're trying to do anything that like the trauma administration 489 00:25:43,640 --> 00:25:44,080 Speaker 4: doesn't like. 490 00:25:44,359 --> 00:25:45,240 Speaker 5: I think that we need to. 491 00:25:45,160 --> 00:25:48,600 Speaker 4: Stop relying on apps, start relying on websites, stop relying 492 00:25:48,680 --> 00:25:52,080 Speaker 4: on US companies because we can't trust them, right. 493 00:25:52,320 --> 00:25:54,639 Speaker 5: I think that this is not a good sign for 494 00:25:54,760 --> 00:25:55,320 Speaker 5: things to come. 495 00:25:57,600 --> 00:26:00,600 Speaker 1: When you say something like the what we're allowed to 496 00:26:00,640 --> 00:26:03,040 Speaker 1: put on our phones is basically controlled by the Trump 497 00:26:03,040 --> 00:26:07,680 Speaker 1: and administration sounds kind of nuts, But you know, maybe 498 00:26:07,720 --> 00:26:11,320 Speaker 1: it's not an overstatement, given that ice Block was repeatedly 499 00:26:11,440 --> 00:26:14,040 Speaker 1: called out by the Trump administration as being something that 500 00:26:14,080 --> 00:26:17,480 Speaker 1: they did not want available, and then it becomes not available, 501 00:26:17,600 --> 00:26:21,200 Speaker 1: and then a similar app becomes not available anymore on 502 00:26:21,280 --> 00:26:24,040 Speaker 1: both the Apple App Store and the Google Play Store. 503 00:26:24,240 --> 00:26:26,959 Speaker 4: Tam Bondi has given interviews being like, oh, yeah, we 504 00:26:27,000 --> 00:26:29,320 Speaker 4: went to Apple and Google. We told them to like, 505 00:26:29,680 --> 00:26:32,200 Speaker 4: you know, they need to do more to protect ice Yeah. 506 00:26:32,440 --> 00:26:35,160 Speaker 4: And in fact, actually, just like last week, tam Bondi 507 00:26:35,280 --> 00:26:38,479 Speaker 4: testified in front of Congress where she said that, like 508 00:26:38,640 --> 00:26:42,160 Speaker 4: they asked them to remove ice Block, and she said 509 00:26:42,160 --> 00:26:44,800 Speaker 4: that ice block was posting the home addresses of ice 510 00:26:44,840 --> 00:26:47,679 Speaker 4: officers and it was dosing them and that's not what 511 00:26:47,800 --> 00:26:50,119 Speaker 4: ice block was doing. But that was just just like 512 00:26:50,320 --> 00:26:53,640 Speaker 4: a little example of lying under oath that Lottie's just dead. 513 00:26:53,720 --> 00:26:54,120 Speaker 5: Last week. 514 00:26:54,680 --> 00:26:57,840 Speaker 1: Let me ask you this, the ice Block got removed 515 00:26:57,840 --> 00:26:59,600 Speaker 1: from the Apple App Store. Do you think it should 516 00:26:59,600 --> 00:27:02,040 Speaker 1: be rein stated? Do you think it should be back up? Oh? 517 00:27:02,119 --> 00:27:05,320 Speaker 4: Yeah, absolutely. I don't think it's that useful. But I 518 00:27:05,359 --> 00:27:07,600 Speaker 4: feel like this is like a bigger issue regardless of 519 00:27:07,600 --> 00:27:10,080 Speaker 4: what the problems are with this one app, Like anyone 520 00:27:10,080 --> 00:27:13,280 Speaker 4: that wants to make an app that whatever their idea is, 521 00:27:13,640 --> 00:27:15,320 Speaker 4: that they should be able to make those apps. It's 522 00:27:15,320 --> 00:27:18,320 Speaker 4: fundamentally it's like a free speech essuo. It's not very 523 00:27:18,800 --> 00:27:23,080 Speaker 4: good for democracy that these two major corporations that are 524 00:27:23,080 --> 00:27:28,640 Speaker 4: basically like just like bending the knee to authoritarianism control 525 00:27:29,320 --> 00:27:30,119 Speaker 4: the gates. 526 00:27:31,720 --> 00:27:33,879 Speaker 1: Free speech might not be something you would think applies 527 00:27:33,920 --> 00:27:37,880 Speaker 1: to computer code, but actually it does. In nineteen ninety nine, 528 00:27:38,000 --> 00:27:40,399 Speaker 1: the Ninth Circuit Court of Appeals ruled the code was 529 00:27:40,440 --> 00:27:44,120 Speaker 1: considered speech. A grad student had written an encryption program 530 00:27:44,160 --> 00:27:47,720 Speaker 1: and wanted to publish the code online, but under US law, 531 00:27:47,920 --> 00:27:51,080 Speaker 1: encryption was basically treated like a weapon. If this student 532 00:27:51,119 --> 00:27:53,119 Speaker 1: wanted to share his code, he would have had to 533 00:27:53,160 --> 00:27:57,560 Speaker 1: register as an arms dealer and get government approval. The 534 00:27:57,600 --> 00:28:01,000 Speaker 1: student sued, and the court eventually ruled that those restrictions 535 00:28:01,000 --> 00:28:04,520 Speaker 1: had violated his First Amendment rights. He could publish his code, 536 00:28:04,760 --> 00:28:06,800 Speaker 1: and now if you got code, you want to publish, 537 00:28:07,160 --> 00:28:07,639 Speaker 1: so can you. 538 00:28:08,640 --> 00:28:12,040 Speaker 4: The Core ruled that, hey, this is this person's speech. 539 00:28:12,280 --> 00:28:14,399 Speaker 4: This code that they wrote is their speech. We can't 540 00:28:14,440 --> 00:28:18,080 Speaker 4: restrict their speech because of the First Amendment. That's what 541 00:28:18,119 --> 00:28:20,679 Speaker 4: made encryption legal in the United SAIDs. 542 00:28:21,240 --> 00:28:23,919 Speaker 1: But true free speech in this context becomes kind of 543 00:28:23,920 --> 00:28:26,680 Speaker 1: irrelevant when Apple has made it so that basically nothing 544 00:28:26,680 --> 00:28:28,840 Speaker 1: can be installed on their iPhone without going through the 545 00:28:28,880 --> 00:28:33,400 Speaker 1: official app store first. So what about Google. Well, Android, 546 00:28:33,480 --> 00:28:36,000 Speaker 1: historically you've basically been able to treat it like any 547 00:28:36,040 --> 00:28:39,160 Speaker 1: other computer. Most people just use the Google Play Store, 548 00:28:39,320 --> 00:28:41,840 Speaker 1: but if you wanted to, you could do something called 549 00:28:41,880 --> 00:28:45,120 Speaker 1: sideloading and pretty easily install whatever you want on your phone. 550 00:28:45,760 --> 00:28:48,800 Speaker 1: But starting next year, Google's going to require that all apps, 551 00:28:48,840 --> 00:28:51,680 Speaker 1: whether downloaded from the Google Play Store or not, be 552 00:28:51,840 --> 00:28:53,280 Speaker 1: verified by them. 553 00:28:53,480 --> 00:28:57,840 Speaker 4: The change that Google is making is basically preventing any 554 00:28:57,920 --> 00:29:01,800 Speaker 4: app that's not digitally signed by Google Key from getting 555 00:29:01,800 --> 00:29:04,720 Speaker 4: installed on your phone. It basically is like essentially getting 556 00:29:04,800 --> 00:29:07,320 Speaker 4: rid of sideloading and making it so that you can't 557 00:29:07,360 --> 00:29:10,120 Speaker 4: run anything on your phone if it's not approved by Google. 558 00:29:10,160 --> 00:29:12,800 Speaker 1: Which is kind of nuts, right because I mean, if 559 00:29:12,840 --> 00:29:15,600 Speaker 1: you told somebody you know, you're not allowed to have 560 00:29:16,200 --> 00:29:18,640 Speaker 1: certain programs on your Windows machine. I mean, first off, 561 00:29:18,720 --> 00:29:23,600 Speaker 1: Napster never would have happened. Ever, that that entire saga 562 00:29:23,640 --> 00:29:25,480 Speaker 1: never would have happened, which maybe you think it shouldn't. 563 00:29:25,920 --> 00:29:29,960 Speaker 1: But the idea that if there's an app that the 564 00:29:30,400 --> 00:29:33,400 Speaker 1: app store doesn't want you to have, or that a 565 00:29:33,400 --> 00:29:35,040 Speaker 1: certain company doesn't want you to have, and they don't 566 00:29:35,040 --> 00:29:36,880 Speaker 1: want you to have it because a government doesn't want 567 00:29:36,920 --> 00:29:38,280 Speaker 1: you to have it. I mean, these are the things 568 00:29:38,320 --> 00:29:41,120 Speaker 1: that freak people out about other countries, and this is 569 00:29:41,160 --> 00:29:43,240 Speaker 1: now something that we deal with the United States. 570 00:29:43,560 --> 00:29:45,960 Speaker 5: We in the United States have been very privileged. 571 00:29:46,080 --> 00:29:50,760 Speaker 4: It's like we're not used to getting everything like spied 572 00:29:50,840 --> 00:29:53,160 Speaker 4: on as much as we as other countries are. We're 573 00:29:53,320 --> 00:29:56,719 Speaker 4: used to being in this privileged situation where all of 574 00:29:56,720 --> 00:30:01,640 Speaker 4: this technological dystopia stuff happens to other people. I think 575 00:30:01,680 --> 00:30:03,840 Speaker 4: that's over. I think it's gonna start happening to us 576 00:30:03,960 --> 00:30:04,800 Speaker 4: now too. 577 00:30:05,480 --> 00:30:09,320 Speaker 1: For you looking at ice Block and looking that everything's 578 00:30:09,360 --> 00:30:13,000 Speaker 1: happened since it was banned and all that, what are 579 00:30:13,040 --> 00:30:14,880 Speaker 1: you thinking about now and what do you think other 580 00:30:14,880 --> 00:30:16,040 Speaker 1: people should be thinking about. 581 00:30:18,200 --> 00:30:23,280 Speaker 4: I'm thinking that we can't rely on apps anymore. Like 582 00:30:23,560 --> 00:30:26,080 Speaker 4: I rely so much on the Signal app. That's the 583 00:30:26,200 --> 00:30:29,080 Speaker 4: number one app that I use a whole lot. And 584 00:30:29,400 --> 00:30:31,680 Speaker 4: I think that for the moment, signal safe, especially because 585 00:30:31,880 --> 00:30:34,920 Speaker 4: if Trump people all use it. But I could totally 586 00:30:34,960 --> 00:30:38,920 Speaker 4: foresee a future soon where basically the Trump administration is like, no, 587 00:30:39,040 --> 00:30:40,760 Speaker 4: we want a back to around a signal because Antifa 588 00:30:40,880 --> 00:30:43,640 Speaker 4: uses it. And then I think that there might be 589 00:30:43,680 --> 00:30:46,240 Speaker 4: some sort of signal might not be allowed to be 590 00:30:46,280 --> 00:30:47,880 Speaker 4: installed on iPhones or Android phones. 591 00:30:48,200 --> 00:30:50,960 Speaker 1: So this really isn't about ice block or any app 592 00:30:51,000 --> 00:30:54,400 Speaker 1: in particular for Micah, the solution might not be in 593 00:30:54,440 --> 00:30:54,920 Speaker 1: an app. 594 00:30:55,640 --> 00:30:57,400 Speaker 4: I think that what you need to do is find 595 00:30:57,680 --> 00:31:02,280 Speaker 4: like trusted local grips. So there are people all over 596 00:31:02,280 --> 00:31:04,960 Speaker 4: the country locally that are organizing. And if you live 597 00:31:05,000 --> 00:31:07,840 Speaker 4: in a town where there are a bunch of immigrants 598 00:31:07,840 --> 00:31:10,680 Speaker 4: and there isn't like a support network that already exists, 599 00:31:10,680 --> 00:31:12,640 Speaker 4: then maybe you should start like talking to people there 600 00:31:12,640 --> 00:31:14,800 Speaker 4: and start one. If you care about this stuff and 601 00:31:14,840 --> 00:31:17,040 Speaker 4: you want to get involved, you should actually talk to 602 00:31:17,080 --> 00:31:19,080 Speaker 4: people and not just play on your phone. 603 00:31:20,880 --> 00:31:23,920 Speaker 1: As complicated as this might be, ice Block did serve 604 00:31:23,960 --> 00:31:27,080 Speaker 1: a purpose for people. It's gone now and it's only 605 00:31:27,080 --> 00:31:29,800 Speaker 1: getting harder to find out what Ice is doing. But 606 00:31:29,960 --> 00:31:33,240 Speaker 1: Ice is expanding their ability to find out what we're doing. 607 00:31:33,880 --> 00:31:36,560 Speaker 1: Ice recently signed a deal with a facial recognition company, 608 00:31:36,560 --> 00:31:39,840 Speaker 1: Clearview AI. They've bought spyware that's supposed to be able 609 00:31:39,840 --> 00:31:43,000 Speaker 1: to hack into lock smartphones and extract data. And they've 610 00:31:43,000 --> 00:31:45,680 Speaker 1: also announced that they're planning to launch a social media 611 00:31:45,800 --> 00:31:49,120 Speaker 1: monitoring team that's aimed at tracking people based on the 612 00:31:49,160 --> 00:31:53,320 Speaker 1: posts that they make online. The Department of Homeland Security 613 00:31:53,320 --> 00:31:56,080 Speaker 1: has claimed that their officials are now facing a quote 614 00:31:56,400 --> 00:31:59,840 Speaker 1: more than one thousand percent increase and assault against them, 615 00:32:00,120 --> 00:32:02,760 Speaker 1: and their families are being doxed and threatened online. 616 00:32:03,560 --> 00:32:03,840 Speaker 5: Quote. 617 00:32:04,520 --> 00:32:07,920 Speaker 1: They haven't explained where they're getting that thousand percent figure from. 618 00:32:08,120 --> 00:32:10,160 Speaker 1: And I don't think you can call an app that 619 00:32:10,240 --> 00:32:14,880 Speaker 1: reports sightings as dosing. But after those apps were taken down, 620 00:32:15,360 --> 00:32:17,600 Speaker 1: a group of hackers have posted the names and some 621 00:32:17,640 --> 00:32:21,720 Speaker 1: personal information of hundreds of government officials, including people working 622 00:32:21,760 --> 00:32:25,160 Speaker 1: for DHS and ICE. But bringing it back to ice 623 00:32:25,160 --> 00:32:28,640 Speaker 1: block for just a minute, for real computer programmers arguing 624 00:32:28,680 --> 00:32:31,360 Speaker 1: in public is very normal. I mean, there could be 625 00:32:31,400 --> 00:32:33,760 Speaker 1: a whole Netflix series of just computer beef. I mean, 626 00:32:34,200 --> 00:32:39,360 Speaker 1: episode one, WordPress versus WP Engine, Episode two, GPL versus BSD, 627 00:32:39,840 --> 00:32:42,360 Speaker 1: Episode three, whatever the hell they're doing over at Ruby 628 00:32:42,400 --> 00:32:45,040 Speaker 1: Central right now. Maybe this stuff sounds weird to you, 629 00:32:45,600 --> 00:32:48,400 Speaker 1: but just going back to how computer code was defined 630 00:32:48,480 --> 00:32:52,080 Speaker 1: legally as free speech and follow me here. If we 631 00:32:52,160 --> 00:32:56,360 Speaker 1: think of speech as expression and as art. I think 632 00:32:56,360 --> 00:32:58,520 Speaker 1: it makes sense. I mean, you pour hours of your 633 00:32:58,560 --> 00:33:02,120 Speaker 1: life into creating things, gonna care about the craft and 634 00:33:02,160 --> 00:33:06,080 Speaker 1: the product, and add on top of that the stakes. 635 00:33:07,000 --> 00:33:10,280 Speaker 1: If people can disagree over a bootloader, of course they're 636 00:33:10,280 --> 00:33:12,920 Speaker 1: going to disagree on the best way to help people 637 00:33:12,920 --> 00:33:15,840 Speaker 1: that they care about. A lot of times activist groups 638 00:33:15,880 --> 00:33:18,440 Speaker 1: agree with each other on like ninety nine percent of things. 639 00:33:18,800 --> 00:33:21,720 Speaker 1: They just disagree with each other on how something should 640 00:33:21,720 --> 00:33:33,040 Speaker 1: be done. Software is no different from that, and that 641 00:33:33,200 --> 00:33:35,200 Speaker 1: is gonna be it for this one. Thank you so 642 00:33:35,320 --> 00:33:37,719 Speaker 1: much for listening to this episode of kill Switch. If 643 00:33:37,760 --> 00:33:39,800 Speaker 1: you want to email us, we're at kill Switch at 644 00:33:39,920 --> 00:33:44,760 Speaker 1: Kaleidoscope dot NYC or on Instagram we're at kill switchpods. 645 00:33:45,120 --> 00:33:47,800 Speaker 1: And also we got some good news. Kill Switch just 646 00:33:47,840 --> 00:33:50,720 Speaker 1: won gold in the Technology category with the Signal Awards. 647 00:33:51,040 --> 00:33:53,480 Speaker 1: So shout out and thank you to everyone who's been 648 00:33:53,520 --> 00:33:55,680 Speaker 1: with us. As you know, we keep trying to figure 649 00:33:55,680 --> 00:33:58,880 Speaker 1: out how to navigate living in the future. And if 650 00:33:58,920 --> 00:34:01,120 Speaker 1: you like our show and help us win some more awards, 651 00:34:01,200 --> 00:34:03,600 Speaker 1: you know, why not leave us a review. It helps 652 00:34:03,640 --> 00:34:06,080 Speaker 1: other people find the show, which in turn helps us 653 00:34:06,200 --> 00:34:08,759 Speaker 1: keep doing our thing. And in case you didn't know, 654 00:34:09,000 --> 00:34:11,319 Speaker 1: kill Switch is on YouTube, so if you've ever been 655 00:34:11,360 --> 00:34:14,799 Speaker 1: wondering what the Fisker cars or the anime VTuber avatars 656 00:34:14,800 --> 00:34:17,360 Speaker 1: look like, there you go. The link for that and 657 00:34:17,440 --> 00:34:21,240 Speaker 1: everything else is in the show notes. Killswitch is hosted 658 00:34:21,280 --> 00:34:25,400 Speaker 1: by Me Dexter Thomas. It's produced by Sena Ozaki, Darluk Potts, 659 00:34:25,480 --> 00:34:28,360 Speaker 1: and Julia Nutter. Our theme song is by me and 660 00:34:28,440 --> 00:34:32,120 Speaker 1: Kyle Murdoch, and Kyle also mixes the show. From Kaleidoscope. 661 00:34:32,160 --> 00:34:35,480 Speaker 1: Our executive producers are Ozma lashin On, Gesh Hadi Kadur, 662 00:34:35,800 --> 00:34:39,840 Speaker 1: and Kate Osborne. From iHeart, our executive producers are Katrina 663 00:34:39,880 --> 00:34:41,399 Speaker 1: Norvil and Nikki E. Tor