meta_pixel
Tapesearch Logo
Log in
Malicious Life

ToTok, Part 2: The Masterminds of Mobile Malware

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 10 March 2020

⏱️ 26 minutes

🧾️ Download transcript

Summary

ToTok, Part 2: The Masterminds of Mobile Malware



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi, my name is Ran Levy. Welcome back to Malicious Life in collaboration with Cybrees. cyber example.

0:17.0

The New York Times published an expose on the Tartak mobile messenger application on December 22nd, 2019.

0:25.9

The article suggested in so many words that Toutok was a covered spyware application. The developers behind Tutak did not take kindly to that

0:36.8

accusation. Giacomo Zianni was one of those developers. Born in the master borough of Venice, he has a degree in economics and international management.

0:49.4

Following his years as a student, Giacomo, more commonly referred to as Jack, worked largely in project management and marketing.

0:58.0

In 2019, he became the face of Tutak, and he is a good face to have. He is a handsome young man,

1:06.9

thin, nice hair and a perfectly shaved 5 o'clock shadow. Let's just say if he were trying to sell me covered spyware, I'd probably

1:16.8

get too lost in his pretty brown eyes to figure it out. In response to the time investigation, Jacques gave a written interview to

1:26.2

Kalije Times, the English language news branch of the United Arab Emirates government.

1:32.1

In it he denied that his app was of the United Arab Emirates government.

1:32.6

In it, he denied that his app was anything other

1:36.3

than a private politically neutral startup venture.

1:40.4

He suggested that any suspicion of wrongdoing might be motivated by just how popular his app was.

1:48.0

Then, at a certain point in the interview, he was asked the following question

1:53.0

quote are there any independent evaluations that can verify the app is secure

1:59.9

end quote he responded confidently.

2:03.0

The irony is that our accusers requested a technical analysis by a former NSA employee who concluded that TOTOC simply does what it claims to do and really nothing more.

2:18.0

No spyware, no backdoors and no malware."

2:21.0

End quote.

2:22.0

Okay, let's take a step back.

2:25.0

Let's face it, if you've listened to our previous episode, you've probably concluded

2:30.1

that Tautak is in fact spyware. But according to Jack, a former NSA employee had verified that it

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.