Episode Overview
Podcast: The Tucker Carlson Show
Episode Title: How to Stop the Government From Spying on You, Explained by a Digital Privacy Expert
Date: February 13, 2026
Guest: Yannick Schraed, digital privacy expert and founder of Arkhium
Host: Tucker Carlson
This episode centers on the fundamental importance of privacy in the digital age, the mechanics behind cryptographic privacy, how current systems undermine (and occasionally support) privacy, and actionable insights for individuals wishing to protect their digital lives. Yannick Schraed provides a deep dive into the philosophical, technical, legal, and geopolitical aspects of privacy, cryptography, surveillance capitalism, and the battle for personal freedom.
Main Discussion Themes
The Essence and Value of Privacy
- Defining Privacy:
Yannick Schraed frames privacy as synonymous with freedom, shielding one's individuality from coercive forces (00:15).“Privacy is core to freedom... It is protecting you, protecting your inner core, protecting your identity as a human being from forces that don't want you to be an individual...” — Schraed (00:15)
- Privacy as a Tool of Defense:
Schraed aligns privacy with protections like the Second Amendment, viewing it as a necessary tool against coercive power.“Privacy is… similar to what was originally intended, also with the Second Amendment in the United States… to protect yourself against coercive force, against your very soul, your inner core.” — Schraed (00:47)
The Scientific and Philosophical Foundations of Cryptography
- Encryption as Fundamental Right:
The universe’s laws permit computational asymmetry via encryption, which allows people to keep secrets even against wildly disproportionate opposing power (01:28).“You can create a secret that not even the strongest imaginable superpower on Earth… are able to recover.” — Schraed (01:28)
- Mathematical Magic:
The fundamental property of encryption lies in computational asymmetry: certain secrets can be made unbreakable by anyone lacking the key, no matter their resources.
The Realities of Modern Digital Surveillance
- Surveillance Capitalism:
Schraed frames most digital platforms as “rent extraction mechanisms,” with the user as “the subject of those platforms” (11:06).“…all of those systems are basically built as rent extraction mechanisms where… you're not really a user, you’re sort of a subject of those platforms. You are being used to extract value from you without you noticing.” — Schraed (11:06)
- Strategic vs Tactical Surveillance:
There’s a shift from individual (tactical) to mass (strategic) surveillance, with corporations and governments now participating on a global scale (17:55).
Key Insights and Technical Explanations
The Limits of Device Security
- End-to-End Encryption: Myth and Reality
End-to-end encryption remains robust in theory (Signal is a positive example), but devices themselves (phones, hardware) present the weak point (14:28–17:13). - Device Vulnerabilities:
Even secure messaging apps can be undermined by device-level exploits—malware, OS vulnerabilities, backdoors—making device trust paramount.“The messenger… might be secure. But now if I cannot undermine and apply force to this message… I’m just going to apply force to your phone. And that's sort of what's happening…” — Schraed (15:41)
- Complexity Breeds Vulnerability:
The more complex devices and their software become, the more opportunities there are for malicious actors or accidental flaws (19:39–22:16).
Open Source and Trust
- Open vs Closed Systems:
Schraed highlights the value of open-source hardware and software, noting that Android devices (with custom ROMs like GrapheneOS) can be more secure if used knowledgeably (26:59–28:44). - Trusted Hardware Is Not Trustworthy:
Hardware-based “trusted execution environments” (like those from Intel) make exaggerated claims of security, but, as Schraed emphasizes, “I think it would be very naive to assume that there is no backdoor.” (85:51)
Privacy and the Law
State of Legal Protections
- Surveillance Legality and Oversight:
Schraed is skeptical about laws truly prohibiting secret surveillance. Power in centralized architectures inevitably corrupts and evades oversight (24:43–26:49). - Device and App-Specific Security:
Schraed recommends for operational security to use a dedicated device for private communication, with limited, self-installed, open-source apps (32:23).
Real-World Attacks on Privacy Tech
- Crypto Wars, Backdoors, and Cryptographic Sabotage:
Schraed explains historic attempts by the US government (e.g., the “Dual Elliptic Curve Deterministic Random Bit Generator” backdoor) to undermine cryptography, inadvertently weakening national and economic security (37:47–47:22).“...it's so striking that you're willing to undermine the entire security of your nation. And that, at the end of the day, puts you in a worse strategic position. I think many people don't realize that.” — Schraed (47:22)
- The Snowden Revelations:
Recognized by Schraed and Carlson as an act of true patriotism, Snowden’s leaks revealed deliberate sabotage in cryptographic standards (46:19–47:55).
Cryptocurrency & Financial Privacy
The Promise and Pitfalls of Crypto
- Transparency vs Privacy in Blockchain:
Bitcoin and related technologies are not anonymous; blockchains are public ledgers with all transactions visible and linkable, often to real-world IDs (57:48).“In actuality, they're not anonymous. What you have in Bitcoin specifically is pseudonymity... for every single transaction you've performed in history... you will see all those transactions.” — Schraed (59:10)
- Case Study – Tornado Cash:
Privacy tool developers like Tornado Cash founders have faced severe legal consequences for the illicit use of their open-source technology, even without direct involvement in criminal acts (63:43–70:25).“So if I rob a bank and then jump into my Chevrolet and speed away, does the president of General Motors get arrested?” — Carlson (66:01)
- Government Pressure and the Future of Private Transactions:
Laws and executive orders regarding cryptocurrencies and central bank digital currencies (CBDCs) pivot on the issue of privacy versus surveillance, with the U.S. currently more privacy-respecting than many peers (72:44–79:08).
The Next Generation of Privacy Technology
Distributed, Verifiable, and Private Computation
- Zero-Knowledge, Distributed Solutions:
Schraed’s company, Arkhium, claims to eliminate single points of failure by allowing encrypted computations spread across decentralized networks. Benefits include verifiable, privacy-preserving operations, even at global scale for things like healthcare data or economic systems (50:20–57:12). - Neutrality and Scale:
The technology is neutral—usable for both positive and negative ends—but Schraed believes its emancipatory potential vastly outweighs risks, especially for global commerce and personal autonomy (79:22–82:13).
Systemic and Societal Issues
Surveillance Infrastructure and Abuse
- Surveillance Justifications:
Government and corporate actors cyclically cite “child exploitation,” “terrorism,” “money laundering,” and the “war on drugs” as reasons to justify new surveillance powers (92:37–92:55).“They basically have… four reasons to implement surveillance. So there's child exploitation, there's terrorism, there's money laundering, and there's war on drugs… and they always rotate.” — Schraed (92:49)
- Surveillance in Everyday Life:
Schraed details the omnipresence and interconnectedness of surveillance tools: WiFi routers tracking movement, city-wide surveillance cameras, real-time facial recognition, and license plate readers—all too easily abused and poorly secured (97:49–105:21). - Censorship as a Byproduct of Surveillance:
Instances like UK censorship measures and EU “chat control” proposals highlight how surveillance infrastructure often enables or demands censorship (93:48–96:46).“Censorship... is a byproduct of surveillance. Generally speaking, yes. And so you need to take a look at all messages in order to be censored.” — Schraed (95:53)
- Abuse Inevitable:
Without transparency and accountability, such surveillance tools are inevitably used for personal, political, or other non-public-good ends (105:21).
Actionable Advice & Prognosis
Protecting Yourself
- Best Practices for Digital Privacy:
- Use open-source, audited tools (e.g., Signal, as recommended by Schraed, with caveats about trusted hardware).
- For true operational security, use a separate, dedicated device.
- Whenever possible, minimize your attack surface by using as few apps and services as possible.
- Be aware that even “secure” devices and apps have unavoidable points of failure, especially in hardware.
- Limitations of Current Consumer Devices:
There’s no such thing as a consumer device that is 100% secure if manufactured and sold at scale; only through decentralization and distributed trust models can one approach adequate security (89:41–91:21).
The Path Forward
- Adoption Will Follow Value:
Schraed is optimistic: privacy-preserving technology will only become ubiquitous when it is both strictly superior and easier to use than the alternatives. That's Arkhium's goal (110:32).“Privacy is only going to get adopted if it enables strictly superior technology.” — Schraed (111:18)
- Two Futures:
Society stands at a fork between a fully surveilled dystopia and a privacy-empowering utopia; the outcome will be determined by law, technological design choices, and user demand (75:59–79:08).
Notable Quotes & Memorable Moments
- “It is impossible to understand how that thing [iPhone] works. It is impossible to understand how the operating system on that thing works.” — Schraed (15:41)
- “There is no future where, from a legal standpoint, it is possible to implement procedures that guarantee that there is no secret surveillance in place.” — Schraed (24:52)
- “The incentives shift towards the setup. And these kinds of applications are the ones that receive investment… so unethical behavior gets rewarded in the system.” — Schraed (95:34)
- “Surveillance does not bring us safety or security. It is in most cases doing the opposite.” — Schraed (103:12)
- “As soon as you have a surveillance infrastructure, it will get abused because…the abuse itself happens within secrecy.” — Schraed (94:37)
- “All of those systems are basically built as rent extraction mechanisms…you are being used to extract value from you without you noticing.” — Schraed (11:06)
- “I strongly believe that we will be able to move into the utopian direction instead of the dystopian direction.” — Schraed (110:32)
Timestamps of Important Segments
- Philosophy and Fundamentals of Privacy: (00:15–04:44)
- How Encryption Protects Human Freedom: (01:28–04:12)
- Surveillance Capitalism & Data Abuse: (11:06–14:16)
- Limits of End-to-End Encryption & Device Security: (14:28–19:25)
- Tactical vs Strategic Surveillance: (17:55–19:25)
- Apple vs Android Security: (26:49–29:01)
- Best Practices for Secure Messaging: (32:23–35:53)
- Historical Sabotage of Cryptography—The Dual EC Backdoor: (37:47–47:55)
- Bitcoin, Crypto, and Privacy Myths: (57:12–60:10)
- Tornado Cash Case Study: (63:43–70:08)
- The Moral and Legal Fork in Digital Currency: (72:44–79:08)
- Abuse and Limitations of Surveillance Infrastructure: (92:49–105:21)
- Prognosis for the Future of Privacy: (110:15–112:26)
Final Thoughts
The episode serves as a powerful warning about the scale and depth of modern surveillance and the existential importance of cryptographic privacy. Schraed remains optimistic that strictly superior privacy-preserving technology will ultimately prevail—provided society keeps pushing for it. The conversation is laced with both philosophical gravity and technical specificity, making it engaging and actionable for general audiences and experts alike.
