logoalt Hacker News

johndoylecapetoday at 1:35 AM5 repliesview on HN

Doyle here :) I'm very proud of my military service!

Prior to Cape, I led the national security business at Palantir. That experience was actually the catalyst for Cape. It’s where I first learned about the massive array of vulnerabilities that exist in our current cellular networks. I saw how those gaps impacted not just government organizations, but everyday people, and I realized that the mobile phones we carry every day are perhaps the single largest risk to our privacy.

I needed that experience to understand the depth of the problem, but once I left to start Cape, that connection ended. Cape has no ties to Palantir. We aren't a subsidiary, we aren't a "front," and we don't share data with them. The only thing we took from Palantir was the desire to fix a broken system. If you want to see me and some of the rest of our founding team talk more about this topic, you can watch this video on our Instagram page here.

Another related theory I’ve seen online is that Cape is a honeypot for law enforcement. Cape is not a honeypot. It’s so hard to prove a negative, but at least I can say it clearly and out loud: Cape is not a honeypot.

We are a group of individuals who deeply value privacy. That mission carries across everything we do, from our work with the US government and allies, to everyday people, and everything in between.

We are incredibly proud to work with people who protect our country by ensuring they have secure, trusted communications wherever they are. https://www.bloomberg.com/news/articles/2024-04-18/us-navy-t...

We also work with the EFF to provide investigative journalists and activists with free Cape service so they can do their work safely. https://www.cape.co/journalists-and-activists

We partner with non-profits to support victims of domestic abuse who are facing cyber-stalking and digital harassment. https://www.cape.co/break-free

We are a young company growing exponentially, and we don't plan on slowing down. We know we have to earn your trust every day. The truth is, no one else is building a high-quality, first-class solution to these specific cellular problems. We are committed to being the ones who do it right.


Replies

Ms-Jtoday at 1:47 AM

Someone doesn't need to work for Palantir or the military to understand that cellular security is fundamentally broken and completely insecure.

That is a lot of highly polished for the camera media you dropped into that post. The way that you word things, such as "Cape is not a honeypot." but don't delve any deeper, to start, gives someone less than zero confidence or trust in your words.

I have seen enough in the industry to say that your words are meaningless.

show 2 replies
birdsongstoday at 8:13 AM

> That mission carries across everything we do, from our work with the US government

Can you expand on this? Because currently, the US government is not someone I want the companies I use to work with.

> The only thing we took from Palantir was the desire to fix a broken system.

What broken system does Palantir fix?

J57E6H2hxMtoday at 12:45 PM

Hey John, how did being a GB shape your later career? Were you an Echo?

Currently in cyber as a Guard O/civ and also considering SFAS. Thank you!

show 1 reply
pjc50today at 11:08 AM

> I led the national security business at Palantir

> group of individuals who deeply value privacy

.. do you see the problem here?

wiredpancaketoday at 2:36 AM

[dead]