Digital News

The truth about the WikiLeaks C.I.A. Cache

mm
Written by Kamil Arli

The times is published an article on the truth about the WikiLeaks C.I.A. cache.

The Times reports that following the dump, security researchers used automated tools to search the entire database and couldn’t find a single mention of any popular encrypted messaging apps. That means top messaging apps like WhatsApp, Signal, Wickr and Apple’s own iMessage platform are all safe from the CIA’s prying eyes.
THE HACKING METHODS DESCRIBED IN THE DOCUMENTS DO NOT

Additionally, “the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps.” While a member of the intelligence community might be able to access your WhatsApp by taking control of your phone, the app itself isn’t vulnerable, at least not according to the documents.

SEE ALSO:   Apple does not negotiate with Wikileaks... For CIA hack info

As the Times surmises, reporters seem to fundamentally misunderstand what these documents actually reveal. End-to-end encryption means that no one can aside from the two participants can access the conversation, including the company that developed the app. The tools that the leaked documents describe focus on “techniques for hacking into individual phones,” which would subsequently give the CIA (or anyone else who hacked your phone) the ability to see anything they want to see.

WHILE THIS IS ALSO TROUBLESOME, ITS A DIFFERENT STORY

SEE ALSO:   T-Mobile’s new unlimited offer is the best thing it’s done in years

While this is also troublesome, it’s a different story than if the CIA had developed a tool to “bypass” encryption altogether. Instead, it seems to reinforce the idea that encrypted communication is working. Otherwise, why would the CIA be hacking into individual devices rather than massive network of app users?

“If anything in the WikiLeaks revelations is a bombshell, it is just how strong these encrypted apps appear to be. Since it doesn’t have a means of easy mass surveillance of such apps, the C.I.A. seems to have had to turn its attention to the harder and often high-risk task of breaking into individual devices one by one.”

Had WikiLeaks not willfully deceived the public with tweets about “hacking malware” that could “infest” mobile devices and “bypass” encryption of apps like Signal and Confide, this clarification might not be necessary. But once again, there appears to be a story behind the story being pushed by WikiLeaks.

SEE ALSO:   Mozilla pockets Pocket in first acquisition

About the author

mm

Kamil Arli

Editor of DigitalReview.co. Digital Media Consultant

Leave a Comment