Key Moments
Samy Kamkar Interview (Full Episode) | The Tim Ferriss Show (Podcast)
Key Moments
Samy Kamkar discusses his journey from notorious hacker to security researcher, revealing exploits and advising on online dating strategies.
Key Insights
Samy Kamkar, a renowned computer hacker, is known for creating the MySpace 'Samy' worm and other exploits like SkyJack and Evercookie, demonstrating critical security vulnerabilities.
His hacking journey started at age nine after a computer crash, leading to an interest in understanding system vulnerabilities and reverse engineering.
Kamkar shares techniques for hacking car keys and understanding wireless frequencies, highlighting the often-overlooked insecurities in everyday devices, even luxury vehicles.
He advocates for public disclosure of vulnerabilities (like Evercookie), arguing that transparency drives necessary security improvements from companies and browser vendors.
Kamkar applies a systematic, data-driven approach (A/B testing, competitive analysis) to online dating, optimizing profile pictures and communication strategies for better results.
Despite his run-in with the Secret Service after the MySpace worm, his three-year ban from computers surprisingly broadened his life experiences beyond technology, fostering social skills.
INTRODUCTION TO SAMY KAMKAR: HACKER, WHISTLEBLOWER, AND ENTREPRENEUR
Samy Kamkar is introduced as one of the most innovative and notorious computer hackers in the United States, alongside being a well-known whistleblower and entrepreneur. Tim Ferriss highlights Kamkar's diverse exploits, including the infamous MySpace worm dubbed 'Samy,' which led to a Secret Service raid and a three-year ban from computers. Beyond this, Kamkar developed SkyJack, a custom drone capable of hacking other nearby drones, and Evercookie, a tenacious tracking cookie that featured in NSA documents. His research also exposed illicit mobile phone tracking by major tech companies like Apple and Google, prompting class-action lawsuits and Congressional privacy hearings. Ferriss emphasizes Kamkar's controversial yet thought-provoking work, setting the stage for a deep dive into his methodologies and insights.
REAL-WORLD HACKING DEMONSTRATIONS AND IMPLICATIONS
Kamkar showcases one of his custom devices, a microcontroller necklace he calls 'USB Driveby.' When plugged into a computer, this discreet device can take full control within two seconds, capable of rerouting all internet traffic through Kamkar's server and bypassing firewalls by simulating user acceptance. He explains that his intention in releasing such tools open-source is not malicious but to highlight critical, long-standing vulnerabilities in everyday systems like USB. This concept is reinforced by a former intelligence officer's anecdote about malicious USB drives branded with company logos being readily picked up and used by employees, illustrating a widespread lack of security awareness despite apparent threats. Kamkar also discusses his work with modifying a discontinued Mattel 'I AM Me' toy, transforming it into a powerful radio frequency device capable of intercepting and replaying signals from luxury car remotes. This exploit allows him to unlock and start cars without a key, exposing the surprising fragility of high-end vehicle security systems, often more vulnerable than older, simpler models. He details the process of identifying frequency bands through FCC IDs, using devices to 'listen in' on car key signals, and recognizing rolling codes that change with each use. A key vulnerability he identifies involves jamming a car’s signal while the owner attempts to lock it, capturing a valid rolling code for later use.
THE GENESIS OF A HACKER: FROM X-FILES TO COUNTER-STRIKE
Kamkar's fascination with computers began at age nine when, after receiving his first computer and internet access, he was 'nuked' offline by a hacker in an X-Files chat room. This experience, though terrifying at the time, ignited his curiosity: 'That was the coolest thing ever. How do I do that?' This led him to explore denial-of-service (DoS) attacks and reverse engineer programs like 'WinNuke,' eventually learning to write his own software. His gaming experience also played a crucial role. While playing Counter-Strike at 14, Kamkar realized that positional audio cues from enemy footsteps indicated underlying data traffic. He then developed cheat software that enabled him to see enemies through walls and gain an unfair advantage. This cat-and-mouse game against 'PunkBuster' (anti-cheat software) taught him invaluable lessons in reverse engineering and problem-solving, pushing him to develop advanced skills in overcoming adversarial systems.
THE PHILOSOPHY OF HACKING: INPUTS AND OUTPUTS
Kamkar shares his universal problem-solving approach: analyzing inputs and outputs. He applies this framework to everything from software to physical systems like car locks. For instance, when trying to start a car without a key, he examines how a car normally starts—by pressing a button that communicates wirelessly with the key. By understanding the standard inputs (wireless signals) and desired outputs (car starting), he then looks for alternative, non-obvious inputs that could yield the same result. This method extends to unconventional approaches, such as physically freezing computer memory with nitrogen to extract data, demonstrating a willingness to explore all possible environmental and physical inputs. He emphasizes the importance of going beyond readily available inputs to consider esoteric conditions, reflecting a comprehensive and often unorthodox mindset essential for discovering vulnerabilities.
THE DUALITY OF EXPLOIT DISCLOSURE: PUBLIC AWARENESS VERSUS MALICIOUS USE
Addressing concerns about making exploits public, Kamkar recounts his experience with 'Evercookie,' a super-persistent tracking cookie he developed. Initially, attempts to disclose vulnerabilities to companies privately, or through academic blogs, yielded little change. It was only when he released Evercookie publicly and open-source, demonstrating its pervasive tracking capabilities across browsers, that major browser vendors were compelled to act. This led to a significant shift: previously segregated privacy settings became centralized into a single 'privacy' control panel, allowing users to delete all tracking data with one click. Kamkar argues that this public exposure, while potentially misused for a short period, ultimately forced widespread improvement in user privacy that years of quiet discussion never achieved. He believes that change often requires a more impactful approach than official channels alone, creating public pressure that ultimately benefits everyone by driving manufacturers to address security flaws.
SCIENTIFIC AB TESTING IN ONLINE DATING
Kamkar views online dating as an engineering problem, applying scientific methods like A/B and multivariate testing to optimize his success. Frustrated by a lack of responses on dating sites like OkCupid, he developed a script to automatically cycle through different profile pictures and track interaction rates. He discovered that his 'best' photos performed poorly, while a picture of him with a cat yielded significantly more clicks—highlighting the disparity between self-perception and actual appeal. To gain further insight, he created a fake female profile, observing the influx of nearly 100 messages daily. This experiment revealed critical flaws in typical male messaging strategies: repetitive, generic, or offesive subject lines often led to no engagement. Kamkar learned to prioritize unique and engaging subject lines. For non-technical users, he recommends using services like 'My Best Face' on OkCupid to A/B test photos. He also suggests creating a fake profile in another state to observe successful messaging patterns without having to engage. For communication, he advises quickly transitioning from messaging to chat, sharing interesting true stories (like his Urban Escape and Evasion class), and avoiding common questions. He stresses the importance of making the leap to an in-person, low-commitment coffee date quickly, citing George Costanza’s 'leave at the height' strategy to maintain interest.
AUTOMATING ONLINE DATING: TOOLS AND STRATEGIES FOR THE NON-TECHNICAL
For those seeking to automate their online dating efforts without technical expertise, Kamkar suggests two main avenues. First, he recommends utilizing the premium analytical services offered by dating platforms like OkCupid or Match.com, which provide data on read rates, open rates, and other engagement metrics to refine profiles and messages. Consistently recording this data in a spreadsheet is crucial for learning what works. Second, if a user wants to hire someone to write scripts (e.g., for automated swiping or messaging on platforms like Tinder), Kamkar advises seeking freelancers skilled in 'web crawlers' and 'backend web software' development. He suggests a vetting process: asking candidates to write a non-valuable script (e.g., extracting random data from a news website) as a demonstration of their skills without providing free labor with an ROI. Kamkar notes that while automating initial engagement (like Tinder swipes) can cast a wide net, the real value comes from human interaction in later stages. He envisions a bot that could handle initial communication, texting him for human intervention when a genuine connection is made. He also touches on using computer vision algorithms for platforms like Tinder to automate desirability assessments, though practical application remains complex due to limited profile descriptions.
THE MYSPACE WORM: A PRANK GONE VIRAL
At 19, while co-founding a VoIP company, Kamkar experimented with MySpace, then the internet's most popular site. Frustrated by photo limits and unable to change his relationship status to 'in a hot relationship,' he discovered a JavaScript vulnerability. This exploit allowed him to inject code that would make anyone visiting his profile add him as a friend and append 'Samy is my hero' to their hero section. Crucially, the code would also copy itself to the visitor's profile, turning it into a self-replicating worm. What he intended as a small prank for a few friends quickly spiraled out of control, growing exponentially. Within hours, thousands, then hundreds of thousands, and eventually over a million profiles were infected, slowing MySpace to a crawl and eventually taking the entire site offline. Kamkar's attempts to stop it were futile; deleting his profile only locked it in a 24-hour pending status, perpetuating the spread. The incident caught the attention of federal authorities. Six months later, he was confronted by the Secret Service, LAPD, and the District Attorney's office. His apartment was raided, and all his personal devices were confiscated. Simultaneously, agents descended upon his company, threatening to take down critical servers. Thanks to his CEO, only Kamkar's personal work devices were seized, narrowly avoiding the collapse of his business. The legal battle resulted in a plea agreement: three years of probation, 720 hours of community service (which became 800), and a ban from touching computers for three years.
RE-ENTRY AND NEW PERSPECTIVES AFTER THE BAN
Kamkar's three-year ban from computers, a severe penalty for a hacker, coincided with a pivotal moment in technology: the rise of Web 2.0 (Ajax, exemplified by Google Maps) and the advent of the iPhone. While initially a devastating disruption, the forced hiatus ironically broadened his horizons. Deprived of his primary passion, he was compelled to engage with the physical world, developing social skills, making friends, discovering fitness, and experiencing activities outside the digital realm. Upon his return at age 22-23, he found that he had missed surprisingly few major technological shifts, with the iPhone's introduction being the most significant development. His earlier worm had even leveraged Ajax, demonstrating an intuitive grasp of the very technologies that would define the next era. This period, though accidental, transformed him from an introverted nerd into a more well-rounded individual, enhancing his ability to communicate and connect with people—a skill he cherishes alongside his technical prowess.
INFLUENCES, ETHICS, AND THE FUTURE OF SECURITY
Kamkar reflects on key influences, crediting the internet itself for much of his self-taught knowledge. Beyond technology, Stan, a mentor he met through his early cheating software, profoundly impacted his understanding of business, negotiation, and risk-taking. In terms of ethics, Kamkar's primary rule is 'do no intentional harm.' While acknowledging that his exploits have had unintended consequences, his goal is always to expose vulnerabilities for the sake of improving security, not causing malicious damage. He differentiates between 'white hats' (ethical hackers), 'black hats' (malicious hackers, often driven by financial gain), and 'script kiddies' (those using pre-made tools without deep understanding). He critiques the 'ignorance is bliss' mindset that allows black hats to rationalize their actions, particularly when operating in regions with lax cybercrime laws. He cautions against widespread use of password managers like LastPass, seeing them as high-value targets for attackers. Instead, he advocates for long, easy-to-remember passphrases (e.g., song lyrics) over short, complex ones. He also recommends using physical covers for laptop cameras and discusses 'TrueCrypt,' an open-source encryption software known for its plausible deniability feature, allowing users to have multiple passwords that unlock the same encrypted drive, making it impossible to prove if a 'decoy' password was given up. He concludes by emphasizing continuous learning and having fun. Kamkar maintains his website samy.pl and Twitter (@SamyKamkar), and YouTube (s4myk) channels, where he shares open-source tools, detailed write-ups, and videos to educate the public on hacking, coding, and self-protection.
Mentioned in This Episode
●Products
●Software & Apps
●Companies
●Organizations
●Books
●Concepts
●People Referenced
Samy Kamkar's Digital Security & Online Dating Advice
Practical takeaways from this episode
Do This
Avoid This
Common Questions
Samy's USB Drive-By is a microcontroller worn as a necklace. When plugged into a computer, it can take it over within two seconds by simulating keyboard inputs to open terminals, modify network settings, and redirect internet traffic through Samy's computer, all while evading firewalls. He released it open source to demonstrate USB security flaws.
Topics
Mentioned in this video
The city where Defcon, one of the biggest hacker conferences, is held annually.
A city in California where Samy Kamkar performed his community service by driving a dump truck and picking up trash.
The birthplace of Samy Kamkar's father.
The site of a privacy hearing where Samy Kamkar's research on illicit mobile phone tracking was discussed.
The country of origin for Samy Kamkar's mother and father.
The city where Samy Kamkar first created Evercookie.
The city where Samy Kamkar's company and mentor, Stan, were located.
A country where CEOs bring blank netbooks due to assumptions of data downloading in hotels, and whose certificate agency recently issued a fake google.com certificate.
The city in the US where Samy Kamkar's parents studied and where Samy was born.
A shopping and entertainment complex in Los Angeles where Samy Kamkar waited in line for the iPhone.
A country identified as a hotbed for black hat hacking activity, with many Western Unions facilitating financial transactions.
A club where Infected Mushroom plays every year, known for their technologically advanced DJ performances.
A notorious computer hacker, whistleblower, and entrepreneur known for creating the MySpace worm 'Samy,' Skyjack, and Evercookie. He was prevented from touching computers for three years after legal action.
An actor whose photo was jokingly mentioned as being Samy's most attractive photo when testing dating profile pictures.
The CEO and co-founder of Samy Kamkar's Voice-over-IP company Finality, who mentored Samy and managed to prevent Secret Service agents from seizing the company's server room during the raid.
An entrepreneur admired by Samy Kamkar for his approach to life, having fun, and not conforming to expectations of success.
A former NSA contractor who leaked classified information, revealing documents that included mention of Evercookie.
Author of 'The Game,' who was involved in the online dating experiments on 'The Tim Ferriss Experiment.'
A boxer whose strategic approach of retiring at the peak of his career was likened to leaving a conversation at its height.
A hacker who discovered that the Mattel I'm Me's wireless chip is powerful, and built a spectrum analyzer for working with radio frequencies.
Jokingly credited by Samy Kamkar as the creator of the internet due to a common misconception.
An actor whose photo, depicting him in a 'Scrooge McDuck backstroke in a pool of money surrounded by penguins,' was humorously mentioned as a successful dating profile picture.
The head of Fox, jokingly referred to as 'Mr. Murdoch,' who Samy wondered if he was happy about the MySpace worm incident.
A well-known hacker, author of 'The Art of Deception,' whom Samy Kamkar has always followed.
Author of 'Influence,' a book that provided a systematic and analytical approach to human influence and persuasion, impactful for Samy Kamkar.
A hacker and member of the Shmoo Group, known for inventing devices that can wirelessly capture credit card information from wallets, admired by Samy for his social skills.
A very smart security researcher who found huge vulnerabilities in the internet, including the 'Kaminsky bug,' which could control any domain name.
A custom drone created by Samy Kamkar that can hack into other nearby Parrot drones to create a controllable swarm.
A microcontroller that Samy Kamkar wears around his neck, programmed to take over any computer it's plugged into within two seconds by simulating keyboard inputs and redirecting network traffic. It's released as open source to demonstrate security flaws.
An operating system mentioned in the context of keyboard input and system menus.
A two-factor authentication app used as an analogy for rolling codes in car key security.
A platform where 'The Tim Ferriss Experiment' was the number one TV season.
An operating system mentioned in the context of keyboard input and kernel vulnerabilities.
A persistent tracking cookie created by Samy Kamkar that appeared in top-secret NSA documents revealed by Edward Snowden. It installs unique identifiers in multiple places on a computer, making it nearly impossible to delete, to demonstrate privacy flaws.
Google's mobile operating system, whose phones were found to be illicitly transmitting GPS and Wi-Fi information.
An online classifieds site mentioned as a place to find freelance programmers for web crawler development.
A how-to website where Samy looked up instructions on how to drive a stick shift.
A feature on OKCupid that allows users to upload photos and have them rated by others, helping users identify their most attractive profile pictures.
A significant vulnerability found by Dan Kaminsky that allowed control of any domain name on the internet.
Another password manager, similar to LastPass and 1Password, mentioned in the context of improving password security.
Apple's video calling software, mentioned in the context of needing to temporarily remove a camera cover for use.
An online dating site Samy Kamkar used to apply AB testing and other scientific methods to improve his dating prospects.
A device used to produce credit cards by writing magnetic stripe data, mentioned as a tool for monetizing stolen credit card information.
A video calling software mentioned in the context of needing to temporarily remove a camera cover for use.
An open-source disk encryption software, developed anonymously, that allows users to encrypt hard drives or folders and features plausible deniability with two passwords. Its website recently claimed it was insecure, leading to much speculation.
A device or software used by Infected Mushroom, allowing them to interact with massive projected screens for DJing.
A mapping software that pioneered smooth scrolling without page refreshes, which inspired Samy's use of Ajax in his MySpace worm.
An early online mapping service characterized by page refreshes for every navigation action, contrasted with the seamless experience of Google Maps.
A payment gateway, mentioned as an example of a credit card processor hackers might penetrate.
A password manager service, which Samy views as a high-value target for hackers due to it storing all passwords in one place.
An EDM (electronic dance music) blog where Samy Kamkar finds the latest, high-quality electronic music for his coding zone.
The tech company whose Android phones were found to be illicitly transmitting GPS and Wi-Fi information. Also mentioned in the context of Google Maps functionality.
An online dating service mentioned as an alternative to OKCupid, where users can pay for premium services to access analytics.
A social networking website that was the number one site on the internet in 2005, which Samy Kamkar accidentally brought down with his self-replicating worm.
An online marketplace where the discontinued Mattel I'm Me toy can be purchased cheaply for hacking purposes.
An online platform for freelancers mentioned as a place to find programmers to develop web crawlers for dating projects.
A company that produces drones, some of which were vulnerable to Samy Kamkar's Skyjack drone.
The tech company behind the iPhone, which was found to be illicitly transmitting GPS and Wi-Fi information to parent companies.
A content distribution site mentioned as a place to find bonus footage from the episode with Samy.
A social media company mentioned hypothetically as a target for malicious USB drive drops.
A video sharing platform where Samy found an instructional video on how to exit his Lotus car gracefully.
A supermarket chain where Samy Kamkar unsuccessfully tried to apply for a job.
A payment processing company mentioned as a modern example of a 'Gateway' through which credit card transactions flow.
A password manager service, which Samy views as a high-value target for hackers due to it storing all passwords in one place, but still better than using the same password everywhere.
A coffee company where Samy Kamkar unsuccessfully tried to apply for a job when his mom lost hers.
A dating app mentioned as a platform where users could potentially automate swiping and initial communication using bots and computer vision algorithms.
A car brand whose keys were used as an example of a powerful transmitter that can remotely jam other car lock signals.
A money transfer service mentioned as being prevalent in Romania, facilitating financial transactions for black hat hackers.
A payment processing company mentioned as a modern example of a 'Gateway' through which credit card transactions flow.
The company that purchased MySpace for over half a billion dollars shortly before Samy Kamkar's worm incident.
The university where Samy Kamkar's parents studied.
The National Security Agency, whose top-secret documents revealed Evercookie, demonstrating its efficacy as a tracking mechanism.
The agency that raided Samy Kamkar for creating the MySpace worm, preventing him from touching computers for three years. They also protect money and investigate online theft.
Another prestigious university in Pittsburgh, mentioned by Tim Ferriss as a potential alternative to the University of Pittsburgh for Samy's parents' studies.
A passenger rail service Samy took to San Diego for a job interview.
A group of hackers that Pablos Holman is a part of, known for showcasing interesting hacking demonstrations at conferences like Defcon.
The US federal agency that Samy Kamkar subcontracted for years ago to track down credit card thieves who had penetrated a credit card processor.
A religion/philosophy mentioned by Tim Ferriss, humorously comparing Google Maps' ability to detect user frustration to Scientology's E-meter.
One of the agencies involved in the raid on Samy Kamkar's apartment, along with the Secret Service and District Attorney.
A term for the second generation of web development, characterized by user-generated content, usability, and interoperability, which heavily leveraged technologies like Ajax.
A feature of TrueCrypt where a single encrypted drive can be accessed with two different passwords, one a decoy, making it impossible to prove that a secondary, hidden volume exists.
Different types of radio modulation (Amplitude Modulation and Frequency Modulation) explained in the context of car key communication.
Web coding languages, with JavaScript being the one Samy found a vulnerability to execute on MySpace, allowing him to modify pages.
Asynchronous JavaScript and XML, a web development technique that allows web pages to be updated asynchronously without full page reloads. It was the technology Samy's MySpace worm abused, and he came back into tech just as iPhone and Web 2.0 (which heavily uses Ajax) emerged.
A brand of sports car, specifically Samy's car, which he found difficult to get out of and used Google/YouTube to learn how.
Microsoft's mobile operating system and phones, found to be illicitly transmitting GPS and Wi-Fi information.
Apple's laptops, whose cameras have been found to be hackable to enable recording without the indicator light turning on.
A discontinued Mattel toy designed for teens to text, which hackers like Samy Kamkar have modified to listen and transmit on wide number of radio frequencies for car hacking.
Apple's flagship smartphone, which Samy Kamkar stood in line to get after his three-year computer ban, signifying a major technological shift he was able to re-enter tech with.
Microsoft's gaming console, where Samy used to play Halo.
A luxury sports car seen by Samy Kamkar in a Romanian hacker's garage, bought with cash from credit card theft.
An adhesive note pad, humorously suggested by Samy Kamkar as an 'advanced technology' to cover laptop cameras for privacy.
A book containing instructions for explosive devices and other controversial topics, which Samy Kamkar put on his website as a kid.
A book by Robert Cialdini about how humans can be influenced and persuaded, which profoundly shaped Samy Kamkar's understanding of social interaction and persuasion.
A TV show mentioned, specifically an episode where George Costanza found it best to leave interaction at its height, related to the advice of ending a chat conversation effectively.
A TV season where Tim Ferriss relied on Samy Kamkar's expertise to hack online dating.
A proactive Israeli electronic music duo known for incorporating the latest technology into their live performances, using massive plexiglass screens with projections.
Referred to as 'revelations of Snowden', it alludes to the intelligence leaks by Edward Snowden that exposed government surveillance practices, impacting discussions around tools like TrueCrypt.
An electronic music group admired by Samy Kamkar, whose album he had listened to.
A magazine for hackers that Tim Ferriss picked up years ago but found too technical to appreciate.
A film mentioned for its futuristic interface, compared to the plexiglass screens used by Infected Mushroom during their DJ sets.
A video game series Samy used to play on Xbox, mentioned when discussing his YouTube username and another pro gamer 'Fatality.'
More from Tim Ferriss
View all 634 summaries
76 minHow to Quiet the Ruminative Mind and Avoid The Traps of Self-Help — Tim Ferriss
86 minNYT Bestselling Author on Writing 200+ Children's Books — Tish Rabe
134 minChampion of "Alone" on The Art of Survival — Jordan Jonas
105 minTim McGraw — Selling 100M+ Records and 30+ Years of Creative Longevity
Found this useful? Build your knowledge library
Get AI-powered summaries of any YouTube video, podcast, or article in seconds. Save them to your personal pods and access them anytime.
Try Summify free