Landon
23-03-2017, 06:02 PM
In a new report by WikiLeaks, evidence shows that the CIA has been bugging factory-fresh iPhones as far back as 2008. The stunning thing about this is that the "bug" is still on the phone regardless of whether or not it is wiped.
I'm pretty excited to give the information a read. Or I'm not excited. It could work both ways. Here's a summary of the documents from the WikiLeaks website:
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
Have a look at the WikiLeaks releases here:
https://wikileaks.org/vault7/darkmatter/?cia
Do you think that the government should have the right to bug your phones for the purpose of protection against terrorism and national security?
Tell me what you think!
I'm pretty excited to give the information a read. Or I'm not excited. It could work both ways. Here's a summary of the documents from the WikiLeaks website:
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
Have a look at the WikiLeaks releases here:
https://wikileaks.org/vault7/darkmatter/?cia
Do you think that the government should have the right to bug your phones for the purpose of protection against terrorism and national security?
Tell me what you think!