This question refers to this YouTube video of John McAfee
Because videos can disappear, I've provided a screenshot and transcript (transcribed by me, so please forgive errors)
What John is saying sounds pretty serious, but to what degree is it just scaremongering? How seriously should we take this commentary? Is it real?
If it is serious, it sounds like we are heading for a digital doomsday, where all out money suddenly ends up in China. What do we do about it? Factory reset all our devices and change all our passwords?
Over half of all smartphones, both iOS and Android are infected with keystroke logging software. This is a known fact.
People pay these pornography sites for the ability to put their key logging software on your phones. How do you think they make their money? It costs millions of dollars to maintain these massive databases and have the bandwidth to disperse this pornography, and yet you don't pay. Yes, you're paying.
While you are watching your phone, your phone is watching you. This is just a fact of life. The operating system is designed specifically to watch you, listen to you, find out where you are, in order to help you. It needs to know who your friends are. It needs to know what you're saying in your text messages. It needs to listen to you sometimes.
And so you're looking at your phone and you have all of these facilities, but it is the world's greatest spy device; designed as a spy device.
Now, there's nothing wrong with that as long as the person spying on you is spying on you for benign reasons, meaning maybe they just want to sell you something. I can choose to say No.
But hackers use those same facilities. They are built into the operating system. So if a hacker gets access to those facilities, they may choose to empty my bank account without my permission or knowledge, or to steal my identity or to start charging things on my credit cards. Or if I have a Bitcoin wallet or an Ethereum wallet, they can empty my wallets.
This is the fact. This is not science fiction. This is not me being paranoid. The antivirus paradigm is no longer functional. It doesn't work. I said this ten years ago and I'm the person who invented it. So, people should listen. I mean, if I invented it and I .. I built the first antivirus company .. viruses are not the problem.
By the time hackers have planted malware in your system, it's way too late. The hackers spent weeks, months or sometimes years sniffing around in your system, taking what they want before they even plant malware.
But you can find the presence of a hacker in your system so easily. Every hacker has to go through certain steps in order to break into any system and do damage.
The first thing they have to do is get through the firewall and all firewalls have holes. It's impossible to build a firewall that can keep out all hackers. It just can't be done.
They have to get through the firewall and then they have to find out where they are. And so what's on this net? So they sniff every device on the network. You have people I mean, I've even heard people at Google say that if you have nothing to hide, you have nothing to fear. Well I've never heard anything crazier!
It's insane to say if you have nothing to hide, you have nothing to fear. We're all humans. We are living in an imperfect world.
Over half of all smartphones, both iOS and Android are infected with keystroke logging software. This is a known fact.
Every pornography site in the world, if you, if ever, I'm sure nobody here has ever looked at pornography. But if you have, then you have keystroke logging software.
How do you think they make their money? See, this is, this is the issue. It costs millions of dollars to maintain these massive databases and have the bandwidth to disperse this pornography, and yet you don't pay. Yes, you're paying. The instance you visit the site.
If you have an Android, for example, the site runs a Javascript which set the download unauthorized application flag. The very first video you watch, you now, because that's a click through. You clicked! You did something, said Yes. Oh, good, yes, I'll do that.
Downloads first and foremost a remote rooting (routing?) function. If it's an iPhone, a remote jailbreaking program. All can be remotely rooted (routed?) now. After it's rooted (routed?), they download a key logger. And all this take just a matter of seconds. And from that point on, somebody is watching every single one of your keystrokes.
Now people pay these pornography sites for the ability to put their key logging software on your phones. Why?
Well maybe they are a Bitcoin afficionado and they're going to see, Ah! Do you have a Bitcoin wallet like Mycelium or what ahave you? Yes. Well, this is going to hang around until you access it and input your keys or your passwords. And the next day your wallet it going to be empty.
Or maybe you do online banking. All right. You have a password. You have an application. The very first time you've logged into your bank to check the balance, to do anything, they go, "Thank you very much," and the next day your bank balance will disappear.
Now, why has this not happened to you already? Because hackers are not stupid. In order to take something, they have to download additional software. If they only take four or five hundred people's bank accounts in one day, then the next day the white hat hackers are going to say, Ah! This is how they did it. Everybody, you can protect yourself.
No. They're going to wait until one day this year or next year and one hundred million people in one day are going to have your bank accounts eradicated. Zero balance. Or your identity will be stolen or your Bitcoin wallet will be emptied out. Or maybe they've been watching your keystrokes to see if, you know, maybe you're saying something to a friend or a lover that maybe could compromise you. Maybe they can blackmail you. If they get lucky, you might be a United States congressman or senator. In which case, now not only do they have money, they have power.
And the Russian cyber mafia and the Chinese cyber mafia are so pwerful, they pay literally hundreds of millions of dollars to these pornography sites to allow them to access your smartphone so that at some point they can utilize that.
Now, you said how secure are they? They're not! They're not. Neither the alt currency wallets nor anything else in the cloud. Because what is the cloud? We haven't thought this through, people. The cloud is a place where I'm going to store data. I don't know what computer it's on or even what country it's in. I don't know who is managing it and monitoring it and controlling it. I don't know what type of security facilities you have. I know nothing! And I'm willing to put my valuable data there. No! Why would we do that?
Now, if it's something I don't care about that if you steal it, I don't care if it's a list of books I read, you know, I'll just recreate it from the web. But if it's something that matters, it's like saying we've all agreed, now we have secrets. Yes? Why don't you let me keep your secrets? Why should you be burdened with having to keep your secrets? I mean, you've got too many stories to tell. Why don't you give it to me and let me manage it for you? Isn't that crazy? And yet that's what we're doing with our (quote) secret data we don't want to have stolen from us or taken or accessed.
John McAfee