
Techlore Talks "How Secure is Big Tech?" & Other Digital Rights Dilemmas w/ John Ozbay (Part 1)
6 snips
Apr 23, 2024 Expert in digital rights and open source development, John Ozbay discusses challenges of open source software, security of big tech companies, new EU tech developments, privacy tools, Apple vs. Google security approaches, Cloudflare for internet security, and the impact of global events on digital rights.
AI Snips
Chapters
Transcript
Episode notes
Complexity Of MFA In Client‑Side Encryption
- Implementing MFA in a privacy-first app is complex due to encryption keys, interoperability with Google login, and platform support gaps.
- Cryptee delayed MFA to avoid introducing new attack surfaces and to coordinate fixes with Google and Apple.
Reporting A Google Login Vulnerability
- During MFA work Cryptee discovered a Google login vulnerability and responsibly reported it to Google.
- Google responded quickly and patched the issue, allowing Cryptee to ship MFA.
Contrast In Big‑Tech Vulnerability Response
- Apple and Google respond very differently to vulnerability reports: Google is fast and cooperative, Apple is slow and restrictive.
- Apple's bug process can force NDAs and long delays, which may push researchers to go public.
