The times is published an article on the truth about the WikiLeaks C.I.A. cache.
Additionally, “the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps.” While a member of the intelligence community might be able to access your WhatsApp by taking control of your phone, the app itself isn’t vulnerable, at least not according to the documents.
As the Times surmises, reporters seem to fundamentally misunderstand what these documents actually reveal. End-to-end encryption means that no one can aside from the two participants can access the conversation, including the company that developed the app. The tools that the leaked documents describe focus on “techniques for hacking into individual phones,” which would subsequently give the CIA (or anyone else who hacked your phone) the ability to see anything they want to see.
WHILE THIS IS ALSO TROUBLESOME, ITS A DIFFERENT STORY
While this is also troublesome, it’s a different story than if the CIA had developed a tool to “bypass” encryption altogether. Instead, it seems to reinforce the idea that encrypted communication is working. Otherwise, why would the CIA be hacking into individual devices rather than massive network of app users?
“If anything in the WikiLeaks revelations is a bombshell, it is just how strong these encrypted apps appear to be. Since it doesn’t have a means of easy mass surveillance of such apps, the C.I.A. seems to have had to turn its attention to the harder and often high-risk task of breaking into individual devices one by one.”
Had WikiLeaks not willfully deceived the public with tweets about “hacking malware” that could “infest” mobile devices and “bypass” encryption of apps like Signal and Confide, this clarification might not be necessary. But once again, there appears to be a story behind the story being pushed by WikiLeaks.