The Tucker Carlson Show
The Tucker Carlson Show
February 13, 2026

Is Your Phone Listening? Expert Reveals Every Secret to Protect Your Online Privacy

Quick Read

Yanik Schrade, founder of Archium, explains how privacy is fundamental to freedom, detailing the mathematical basis of encryption, the pervasive nature of surveillance capitalism, and the critical need for decentralized, verifiable, and private computing to safeguard humanity's future.
Encryption leverages a fundamental universal asymmetry, making truly private communication mathematically possible.
Surveillance capitalism and strategic surveillance by companies and states pose a greater threat than tactical targeting.
Decentralized, verifiable computing on encrypted data is the next frontier for true privacy, enabling secure interactions without exposing personal information.

Summary

Yanik Schrade, a 25-year-old German cryptographer and founder of Archium, argues that privacy is synonymous with freedom and essential for protecting individual identity against coercive forces. He explains that strong encryption is a fundamental property of the universe, allowing secrets to be created that even the most powerful entities cannot break without explicit access. Schrade criticizes "surveillance capitalism" where companies extract value by monitoring user behavior, turning individuals into subjects rather than users. While end-to-end encryption (like Signal) is robust for message transmission, the vulnerability lies in the end devices (closed hardware, operating system flaws, zero-day exploits) and the potential for tactical surveillance targeting individuals. Schrade highlights the dangers of strategic surveillance (mass data collection) and the attempted subversion of cryptography by state actors, such as the NSA's 'Project Bullrun' and the 'Dual EC DRBG' backdoor. He introduces Archium's technology, which enables computations on encrypted data without decryption, offering verifiable and private processing for applications like healthcare data analysis and financial transactions. Schrade also discusses the dystopian potential of Central Bank Digital Currencies (CBDCs) as surveillance tools and critiques Signal's reliance on Intel's 'trusted execution environments' for contact discovery, identifying it as a single point of failure. He advocates for decentralized systems as the only true path to security and privacy.
This discussion is critical because it exposes the fundamental threats to individual freedom and national security posed by pervasive digital surveillance and compromised encryption. It highlights how current technological and economic models incentivize the erosion of privacy, leading to a future where personal data is constantly exploited and behavior can be controlled. Understanding the inherent power of cryptography and the potential of decentralized, private computing offers a path to reclaim digital autonomy, protect sensitive information (from healthcare to finances), and build more secure, verifiable systems that resist both corporate and governmental overreach.

Takeaways

  • Privacy is core to freedom, protecting individual identity from coercive forces.
  • Strong encryption is mathematically inherent in the universe, making it incredibly difficult to break.
  • Surveillance capitalism extracts value by monitoring all digital behavior, enabling prediction and control.
  • End-to-end encryption is secure for messages, but end devices (phones, OS) are vulnerable to tactical surveillance.
  • State actors have historically attempted to undermine encryption (e.g., NSA's 'Project Bullrun', 'Dual EC DRBG').
  • Archium's technology allows computation on encrypted data, ensuring privacy and verifiability without ever decrypting inputs.
  • Bitcoin offers pseudononymity, not true anonymity, with all transactions publicly recorded.
  • Central Bank Digital Currencies (CBDCs) are framed as potential surveillance machines, threatening economic freedom.
  • Cash transactions can also be surveilled through serial number tracking.
  • Signal's 'private contact discovery' relies on vulnerable 'trusted execution environments' (Intel TEEs), a single point of failure.
  • Ubiquitous surveillance includes Wi-Fi routers tracking movement, ultrasound in ads, and unencrypted city cameras with facial recognition.
  • Decentralization is crucial for security, mirroring the concept of distributed power in political systems.

Insights

1Encryption as a Fundamental Universal Asymmetry

The universe inherently allows for a computational asymmetry where a minuscule amount of energy can create a secret (encryption) that even the strongest imaginable superpower cannot recover without explicit access. This property forms the bedrock of modern cryptography and privacy.

With a very little amount of energy, a laptop, a battery and a few milliseconds of computation, you can create a secret that not even the strongest imaginable superpower on earth is able to without your explicit granting of access are able to recover.

2Surveillance Capitalism and Behavioral Control

Modern digital systems, especially 'free' applications and social media, operate on a model of 'surveillance capitalism' where user behavior is constantly recorded and analyzed. This mass surveillance allows companies to predict and ultimately steer user behavior, effectively turning individuals into controllable 'puppets'.

All of those systems are basically built as rent extraction mechanisms where from you as a user, you're not really a user, you're sort of a subject of those platforms you are being used to extract value from you... they record everything they can because every single bit of information that I can take from your behavior allows me to predict your behavior... I can steer your behavior. I can literally control you. I can turn you into a puppet that does whatever I want.

3The Vulnerability of End Devices and Strategic Surveillance

While end-to-end encryption is robust for message transmission, the end devices (smartphones) themselves are critical points of failure. Their closed hardware and complex operating systems contain flaws (zero-day exploits) that can be exploited by state actors or malicious entities, allowing full access to decrypted information on the device. This enables 'tactical surveillance' (targeting individuals) and facilitates 'strategic surveillance' (mass data collection on everyone).

The underlying issue really is that you have this device in your hand that is sort of closed hardware. You don't know how that that thing works... there's flaws in those systems... tactical surveillance... in contrast to strategic surveillance which is this idea of everyone is being surveiled.

4Archium's Private and Verifiable Computation

Archium developed a protocol that allows computations to be executed directly on encrypted data without ever decrypting it. This enables multiple parties to contribute encrypted information, perform complex mathematical functions, and receive a result without any individual's input ever being exposed. The technology also provides 'verifiability,' mathematically proving that a computation was executed correctly, addressing trust issues in cloud computing.

What if we can take this asymmetry that is a fact of reality and move that to computation itself to enable that all of those computations can be executed in private as well... Tucker has a secret, Yanik has a secret. And with this technology, we can produce some value, some information. While you don't have to share your secret, I don't have to share my secret.

5Signal's Single Point of Failure: Trusted Hardware for Contact Discovery

Despite its strong end-to-end encryption, Signal relies on 'trusted execution environments' (TEEs) like Intel's SGX for its 'private contact discovery' feature. This hardware-based approach, which aims to securely match contacts without revealing them, is identified as a critical flaw due to its proprietary nature, history of exploits, and potential for backdoors during manufacturing, creating a central point of failure.

There exists one single point of failure within Signal's technological stack... what they call private contact discovery... they use trusted hardware for that and that is a critical flaw within their infrastructure... I think it would be very naive to assume that there's no back door similar to what we talked earlier about with dual EC.

Bottom Line

The 'code is law' principle, originally utopian for decentralized networks, is being co-opted by architects of Central Bank Digital Currencies (CBDCs) to create dystopian systems where automated software can freeze funds based on digital activity, effectively locking individuals out of the financial system.

So What?

This signifies a critical crossroads for the future of money, where the choice is between monetary systems that enable freedom of economic interaction or those that enforce surveillance and control, with no middle ground.

Impact

Developing and promoting truly private, censorship-resistant digital currencies and payment systems that leverage advanced cryptography to ensure user autonomy and prevent automated financial control.

The UK's implementation of 'chat control' (Online Safety Act) and the EU's proposed 'voluntary' client-side scanning for messaging applications represent a shift towards mandatory surveillance infrastructure, disguised under pretexts like combating child exploitation.

So What?

This establishes a dangerous precedent where governments can compel companies to build surveillance backdoors into private communications, eroding fundamental privacy rights and creating systems ripe for abuse, even with 'best intentions'.

Impact

Advocacy for open-source, auditable communication platforms that resist client-side scanning, and the development of technologies that make such scanning technically impossible or easily detectable, forcing transparency on surveillance efforts.

Opportunities

Develop and market secure, open-source mobile operating systems (like GrapheneOS) and minimalist hardware for enhanced privacy, allowing users to build and verify their own secure devices.

This addresses the vulnerability of closed hardware and operating systems by providing transparent, auditable alternatives, appealing to technically versatile users and those with high privacy concerns.

Source: Guest's discussion on Android's open-source advantage and his personal ideal setup.

Create a competitive market for 'most secure phones' by focusing on decentralized manufacturing and supply chain oversight, reducing single points of failure and backdoor risks.

Inspired by efforts like Solana's secure phones, this would involve a network of manufacturers and auditors to ensure hardware integrity, appealing to high-security sectors and privacy-conscious consumers.

Source: Discussion on Solana's phone initiative and the need for decentralized manufacturing processes.

Build and integrate privacy-preserving computation platforms (like Archium) into critical sectors such as healthcare, finance, and national security.

This enables organizations to utilize sensitive data for research, analysis, or collective computation (e.g., disease research, market analysis) without ever compromising individual privacy or data ownership, offering a 'strictly superior technology' for innovation.

Source: Archium's core technology and its potential applications in healthcare data and national security.

Lessons

  • Use end-to-end encrypted messaging applications like Signal for communications, but be aware of device-level vulnerabilities.
  • Consider using a dedicated, minimalistic phone with no other interactions for highly sensitive private communications to minimize attack surface.
  • Be skeptical of 'free' digital services, as they often operate on a surveillance capitalism model where your data is the product and your behavior is monetized.

Notable Moments

The guest's personal background, having studied law, mathematics, and computer science, leading him to found Archium at 25 years old, highlights a unique interdisciplinary approach to privacy technology.

This background provides a holistic understanding of privacy, encompassing its legal, ethical, and technical dimensions, which informs his advocacy for robust, mathematically-backed solutions.

The detailed explanation of the NSA's 'Project Bullrun' and the 'Dual EC DRBG' backdoor, where the US government attempted to undermine global encryption standards, is a stark example of state-sponsored subversion of privacy.

This historical event, exposed by Edward Snowden, demonstrates that even governments tasked with national security can compromise it for surveillance, highlighting the inherent distrust in centralized systems and the importance of open-source cryptography.

The legal persecution of Tornado Cash founders, particularly Roman Storm, for creating privacy-enhancing software, despite not directly participating in illicit activities, underscores the legal risks faced by developers of neutral privacy tools.

This case sets a dangerous precedent, equating the creation of open-source privacy software with criminal conspiracy, potentially chilling innovation in privacy technology and restricting fundamental rights like freedom of speech and economic interaction.

The revelation that Wi-Fi routers and city surveillance cameras (including 'license plate readers') are being used for pervasive, often unencrypted, mass surveillance, tracking movement and faces 24/7, with examples of personal abuse.

Quotes

"

"Privacy is core to freedom at the end of the day. I would even go as far as saying that is it is synonymous with freedom."

Yanik Schrade
"

"There are forces and this has always been true at every time in history that seek to make people less human to turn human beings into slaves or animals or objects and privacy is the thing that prevents that."

Tucker Carlson
"

"What those tools and applications, those social media networks, basically everything that we do in our digital lives... has been built on top of what the former Harvard professor Shoshana Zuboff has called surveillance capitalism."

Yanik Schrade
"

"Where I can predict your behavior, I can utilize that to in the most simple case do something like serving you ads, right? But in more complex cases, I can do things like I can steer your behavior. I can literally control you. I can turn you into a puppet that does whatever I want."

Yanik Schrade
"

"It is impossible to understand how that thing works. It is impossible to understand how the operating system on that thing works. And there's flaws in those systems."

Yanik Schrade
"

"You're not just undermining privacy, right? You're undermining the entire security of your your economy, your country, right? And banking codes, everything."

Yanik Schrade
"

"It is a dystopian scenario where we could end up if this is adopted as the technology where all of your money now sits and and you're sending transactions where you have this big upside of having cash-like properties which is amazing but you have this tremendous downside of literally everything being recorded for the conceivable future of humanity."

Yanik Schrade
"

"What those computations inherently have as a property is so-called verifiability. So you can mathematically verify that a computation has been correctly executed."

Yanik Schrade
"

"Privacy is only going to get adopted if it enables strictly superior technology."

Yanik Schrade

Q&A

Recent Questions

Related Episodes

EXPERT Warns of SURVEILLANCE STATE
The Intersection with Michael PopokFeb 23, 2026

EXPERT Warns of SURVEILLANCE STATE

"An expert details how the breakdown between private data collection and government surveillance is accelerating a slide towards authoritarianism, enabled by weak laws and the tech industry's unchecked power."

PrivacySurveillanceAuthoritarianism+2
Renowned DNA expert: Investigators should return to Nancy Guthrie’s house, new tech could solve case
BRIAN ENTIN INVESTIGATESApr 9, 2026

Renowned DNA expert: Investigators should return to Nancy Guthrie’s house, new tech could solve case

"A renowned DNA expert reveals how cutting-edge forensic technology and a re-examination of the crime scene could still solve the high-profile disappearance of Nancy Guthrie, despite complex DNA evidence."

DNA ForensicsGenetic GenealogyCold Cases+2
Whitney Webb SOUNDS ALARM! Tech Billionaires Have Completely Taken Over Government!
The Jimmy Dore Show PODCASTMar 26, 2026

Whitney Webb SOUNDS ALARM! Tech Billionaires Have Completely Taken Over Government!

"Investigative journalist Whitney Webb details how Leslie Wexner and Jeffrey Epstein allegedly pioneered a model for privatizing local and state governments in Ohio, transforming it into a 'techno-state' through public-private partnerships and massive data center expansion."

Public-Private PartnershipsData CentersJeffrey Epstein+2
Jon Stewart KNEW US Was Overthrowing Syria & Kept Mum! Iran Now Holds ALL the Cards! w/ Whitney Webb
The Jimmy Dore Show PODCASTMar 26, 2026

Jon Stewart KNEW US Was Overthrowing Syria & Kept Mum! Iran Now Holds ALL the Cards! w/ Whitney Webb

"Investigative journalist Whitney Webb exposes how Leslie Wexner and Jeffrey Epstein allegedly engineered Ohio into a 'Silicon Heartland' prototype for a technocratic, privatized state, leveraging public funds for corporate welfare and mass surveillance, while powerful figures actively suppress scrutiny of Epstein's intelligence connections."

Leslie WexnerJeffrey EpsteinOhio+2