Key Moments

Leah Culver of Breaker and Tom Sparks of YC Answer Your Questions About Security and Podcasting

Y CombinatorY Combinator
Science & Technology7 min read58 min video
Jan 5, 2018|2,619 views|15|5
Save to Pod
TL;DR

Experts discuss device security, authentication evolution, startup security, and the future of podcasting.

Key Insights

1

Device security is a balance between user convenience and government access, with Apple generally offering more consumer-friendly options than Android.

2

Authentication methods are evolving towards convenience, but multi-factor authentication (combining something you know, have, and are) remains crucial.

3

Startups should leverage existing security standards and "outsource" authentication rather than reinventing the wheel.

4

Podcast discovery is shifting towards episode-based recommendations rather than show-based, focusing on engaging content.

5

User error is identified as the most significant security concern across various technologies, including cryptocurrency.

6

The podcasting industry has significant growth potential, with opportunities for better discovery, storytelling, and engaging content.

NAVIGATING GOVERNMENT ACCESS AND DEVICE SECURITY

The discussion begins by addressing the increasing pressure from governments to access device data. Tom Sparks highlights that this is partly legislative, but also vendor-driven. Apple is noted for its consumer-friendly security with features like passcodes and biometrics, making it harder for governments to access data without explicit user action. In contrast, Android devices are considered less secure in this regard. While strong device protection is important, the bigger challenge lies in government subpoenas, invoking constitutional rights like the Fourth and Fifth Amendments. Historical precedents show a long-standing government interest in surveillance, escalating with the prevalence of digital communication.

PERSONAL SECURITY PRECAUTIONS AND STRATEGIES

For individual users, the consensus is that using passcodes and biometric authentication (fingerprints, facial recognition) provides a good baseline security. However, experts suggest that government surveillance capabilities are deep. If users lack strong device protection, their data is more accessible. Leah Culver shares personal security habits, such as knowing how to quickly power down her iPhone, especially with newer facial recognition systems. She also strategically uses only one thumb for Touch ID to allow for plausible deniability if coerced. The trade-off between convenience and robust security is a recurring theme, emphasizing that easy-to-use features often come with potential security vulnerabilities if not managed carefully.

COMPANY-LEVEL SECURITY PRACTICES AND TRANSPARENCY

On the company side, Breaker, as a podcast app, follows standard web service security practices. Key principles include storing private data securely in the iOS Keychain, avoiding less secure methods like `NSUserDefaults` or `info.plist` which can be easily accessed. Developers have a responsibility to protect sensitive user data like passwords and PII. Transparency is also highlighted as important; companies like Dropbox publish annual legal request reports. This practice informs users about how their data might be handled under legal conditions, fostering trust and accountability in data handling procedures.

THE EVOLUTION OF AUTHENTICATION: SPEED VS. SECURITY

The conversation delves into the rapid evolution of authentication methods, questioning whether the focus is on speed, reliability, or security. It's established that many new technologies are driven by convenience. However, the underlying principles of authentication, like one-time passwords, are quite old. The increased adoption is attributed to growing user awareness of data privacy and the prevalence of weak user passwords. While new implementations offer convenience, the core security benefit comes from user engagement with these technologies. Speed and reliability are crucial for user adoption, but the fundamental goal is to protect personal data from unauthorized access.

MULTI-FACTOR AUTHENTICATION AND ITS COMPONENTS

Multi-factor authentication (MFA) is explained as combining different types of factors: something you know (password), something you have (device like a YubiKey or authenticator app), and something you are (biometrics like fingerprints or facial recognition). Having at least two distinct factors significantly enhances security. The key advantage of 'something you know' or 'something you have' factors is their replaceability if compromised, unlike biometrics which are permanent. However, managing 'something you have' tokens across devices can be cumbersome. The discussion also touches upon the fallibility of biometrics, acknowledging that while generally effective, hardware limitations mean they are not foolproof.

YC'S SECURITY APPROACH AND THE FUTURE FOR STARTUPS

Y Combinator (YC) employs standard best practices for its data security, including strong passwords, encryption, and VPNs. They don't handle secrets requiring extreme measures, focusing on robust but conventional security. For startups, a crucial piece of advice is to avoid reinventing the wheel for security. This includes outsourcing authentication through services like Facebook or Google login, and leveraging existing standards like OAuth and SAML. Continuous integration (CI) tools can automate code checks for security vulnerabilities. Frameworks and open standards are highlighted as significant resources for developers, reducing the burden of implementing complex security measures from scratch.

INNOVATION IN USER EXPERIENCE AND PODCAST DISCOVERY

GROWTH POTENTIAL AND CHALLENGES IN PODCASTING

The podcasting industry, despite its buzz, is still relatively small in terms of revenue, indicating substantial room for growth. The goal for platforms like Breaker is to build a large audience and then attract high-quality, serialized content comparable to major TV dramas. This presents a chicken-and-egg problem: a large audience is needed to attract big shows, but big shows can draw a larger audience. Producing compelling, Game of Thrones-level podcast content is challenging and expensive, even compared to television production. The industry is still evolving towards becoming a more significant business opportunity.

THE ROLE OF STORYTELLING AND AUDIO AS AN ART FORM

The importance of storytelling in podcasting is emphasized, with a desire for more diverse narratives from voices not typically heard. While interview-style podcasts are common, there's a call for more creative use of audio, incorporating music and sound design to enhance the storytelling experience. Transcribing podcast content is also recommended for better searchability and accessibility, as search engines primarily index text. This offers opportunities for innovation in how audio content is produced, distributed, and consumed, moving beyond simple spoken-word formats.

CRYPTOSECURITY AND THE TRIUMPH OF USER ERROR

Cryptocurrencies are discussed in terms of their security, with the consensus being that they are not inherently more or less secure than other financial systems; the primary vulnerability lies in user error. Newcomers often fall prey to scams due to lack of understanding or basic security practices. While decentralization offers protection against centralized malicious actors, it also makes data recovery difficult. The ease with which users can lose funds through phishing, fake ICOs, or poor wallet management underscores that educating users and promoting careful digital hygiene are paramount in the crypto space.

ADDRESSING SECRET MANAGEMENT AND FUTURE TECHNOLOGIES

Secret management for developers, especially in team environments, remains a significant challenge. Sharing sensitive information like API keys and tokens securely is difficult, with common practices like storing them in spreadsheets being highly insecure. Companies like CryptoSeal and NFK are working on solutions for this. Looking ahead, advancements in biometrics, such as DNA sensing or more sophisticated bio-aware sensors, are anticipated to become more prevalent, integrating personal health metrics and potentially offering new dimensions of security and personalized technology.

STARTUP IDEAS AND THE UNIVERSE OF SECURITY

Potential startup ideas discussed include further innovation in security, particularly in areas like Distributed Denial of Service (DDoS) mitigation, which remains a persistent problem. The concept of 'life blogging'—more ubiquitous digital interaction beyond simple social media updates—is also seen as a potential area for future platforms. Passive sharing, where user behavior is shared without explicit action (like activity on Spotify or health metrics), is another intriguing area, though privacy concerns need careful consideration, leading to discussions about incognito modes in applications like Breaker.

LEARNING AND GROWING IN SECURITY AND PODCASTING

For those interested in entering the security field, practical advice includes engaging with capture-the-flag (CTF) events, studying security blogs, and exploring resources like Hacker News and ShowDan. Experimenting with inexpensive IoT devices offers hands-on learning. For podcasters, controlling interview energy, diligent editing, and utilizing platforms like YouTube for distribution are key. Breaker stands out for its effective search functionality and focus on episode discovery. Aspiring developers are encouraged to master their chosen tools rather than chasing every new framework, emphasizing practical skills and deep understanding.

Common Questions

Use strong passcodes and biometric authentication on your devices. Vendors like Apple offer robust security features. If you don't use these protections, your data is more vulnerable to subpoenas and surveillance.

Topics

Mentioned in this video

Software & Apps
HSMs

Hardware Security Modules, mentioned as an example of advanced security technology not typically needed by most startups.

Hacker News

A recommended resource for finding security-related content and discussions.

Breaker

A podcast app discussed as a platform for social podcast listening and discovery, aiming to be the 'Netflix of podcasting'.

Swift

A programming language discussed in the context of mobile and web development separation and potential for server-side applications.

Internet

Discussed as a large distributed system that has seen increasing centralization by big tech companies.

CryptoSeal

A previous venture by Tom that addressed the pain points of managing secrets for developers.

Python

Cited as an example of a programming language that developers should master rather than constantly chasing new tools.

MicroPython

A programming language for microcontrollers, mentioned in the context of learning about IoT security by experimenting with affordable hardware.

Showdan

A search engine for internet-connected devices, suggested for exploring curious technology and learning about security.

Google Authenticator

Recommended as a secure alternative to SMS for multi-factor authentication.

House of Cards

Mentioned alongside Game of Thrones as a benchmark for high-quality serialized content.

Authenticator App

Examples of apps used for two-factor authentication, providing a device-based security factor.

Invest Like the Best

A podcast series with a three-part series called 'Hash Power' recommended for understanding blockchain, Bitcoin, and cryptocurrency.

OnePassword

A password manager that Leah uses, praised for its convenience and speed in logging into websites.

Hardcore History

Cited as an example of a high-quality podcast that is difficult to produce, releasing only a few episodes per year.

Signal

Mentioned as an example of an encrypted messaging app that could be a target for government surveillance.

OAuth

Auth technology that simplifies authentication for startups by outsourcing the process, removing the need to reinvent the wheel.

Mint.com

Mentioned as a collaborator on the OAuth protocol.

Authy

Mentioned as another good option for multi-factor authentication.

Path

A social networking app from the past that explored interesting concepts in passive sharing.

Git

Source code control system whose security model is questioned by one of the speakers, though acknowledged for its usability.

More from Y Combinator

View all 362 summaries

Found this useful? Build your knowledge library

Get AI-powered summaries of any YouTube video, podcast, or article in seconds. Save them to your personal pods and access them anytime.

Try Summify free