Weirstone
Junior Member
WikiLeaks have recently come forward, releasing a:
"massive trove of CIA spying files in 'Vault 7' release"
WikiLeaks publishes huge trove of 'CIA spying secrets'
https://wikileaks.org/ciav7p1/cms/index.html
There's been quite a lot of info released, including:
> Obama told the American people that the government would no longer hide zero day exploits from manufacturers and claimed to have set up a Vulnerabilities Equities Process to review them. We now know that either the CIA misled Obama, or Obama misled the American people.
> US tech companies lobbied extensively to prevent this, as it hurts their ability to sell their products.
> The CIA has hundreds of zero day exploits and can hack any smart tv, android phone, iphone, or router, and possibly self driving cars as well.
> The CIA has been using the State Department consulate in Frankfurt Germany as a headquarters for hackers in Europe, the Middle East, and Africa.
> The CIA has been collecting a library of attack techniques from malware produced in other states, including Russia. The CIA has the ability to use this library to misdirect attribution of hacks by leaving behind the "fingerprints" of stolen malware.
"massive trove of CIA spying files in 'Vault 7' release"
WikiLeaks publishes huge trove of 'CIA spying secrets'
https://wikileaks.org/ciav7p1/cms/index.html
There's been quite a lot of info released, including:
> Obama told the American people that the government would no longer hide zero day exploits from manufacturers and claimed to have set up a Vulnerabilities Equities Process to review them. We now know that either the CIA misled Obama, or Obama misled the American people.
> US tech companies lobbied extensively to prevent this, as it hurts their ability to sell their products.
> The CIA has hundreds of zero day exploits and can hack any smart tv, android phone, iphone, or router, and possibly self driving cars as well.
> The CIA has been using the State Department consulate in Frankfurt Germany as a headquarters for hackers in Europe, the Middle East, and Africa.
> The CIA has been collecting a library of attack techniques from malware produced in other states, including Russia. The CIA has the ability to use this library to misdirect attribution of hacks by leaving behind the "fingerprints" of stolen malware.