Pages:
Author

Topic: WikiLeaks publishes "biggest ever leak of secret CIA documents" - page 2. (Read 1185 times)

full member
Activity: 120
Merit: 100
I've been saying for some time that end-to-end encryption and various other security procedures are probably mostly giving a false sense of security and the real Achilles' heal these days is device security.

I find it pretty amazing the speed all of these companies are heading towards connecting everything conceivable to the internet, yet they really don't appear to give much of a shit about leaving the doors wide open for hackers to have some fun.

It would be far more reassuring had they provably solved device security before running down this road. I don't really fancy some Russian midget calling me up and threatening to drive me into the nearest brick wall if I don't pay up.

I have to seriously question how much of this is a bug and how much a feature.  And also how much is a mandate.

---

Another practical way for us outsiders to try to deal with the problem would be sort of a crowd-learning system for internal networks.  I'm thinking along the lines of a reasonably easy-to-use network analysis tool which could spot suspicious device behavior and combine efforts on notation and analysis.  At least it might help spot and reverse engineer abuse and shame/warn of vendors who allow it of their wares.

I've looked around casually for such efforts from time to time and have not seen any.  Nor have I tried to roll-my-own since I'm burnt out on software engineering and have been for the last few years.


Guys, do not you think that the world relies heavily on the Internet and wireless communications? But this is dangerous, especially in the face of imminent threats in the world.
legendary
Activity: 4690
Merit: 1276
I've been saying for some time that end-to-end encryption and various other security procedures are probably mostly giving a false sense of security and the real Achilles' heal these days is device security.

I find it pretty amazing the speed all of these companies are heading towards connecting everything conceivable to the internet, yet they really don't appear to give much of a shit about leaving the doors wide open for hackers to have some fun.

It would be far more reassuring had they provably solved device security before running down this road. I don't really fancy some Russian midget calling me up and threatening to drive me into the nearest brick wall if I don't pay up.

I have to seriously question how much of this is a bug and how much a feature.  And also how much is a mandate.

---

Another practical way for us outsiders to try to deal with the problem would be sort of a crowd-learning system for internal networks.  I'm thinking along the lines of a reasonably easy-to-use network analysis tool which could spot suspicious device behavior and combine efforts on notation and analysis.  At least it might help spot and reverse engineer abuse and shame/warn of vendors who allow it of their wares.

I've looked around casually for such efforts from time to time and have not seen any.  Nor have I tried to roll-my-own since I'm burnt out on software engineering and have been for the last few years.

legendary
Activity: 3906
Merit: 1373
Ye ye, they recorded all of our actions. We already know that.

Those iphone's and samsung galaxie's (or any other smart phones) are the best way to track people's activities. If you think that secret services weren't taking advantage of this then you must be stupid.

Have you tried to get visa from USA? They first check your Facebook account Smiley If you don't have one, they won't like you because you are an unknown person to them Smiley

Linux/GNU based systems are the solution to this madness. Fuck microsoft, fuck apple, fuck google.

if i have to believe snowden, linux may still not be useful in such case. i don't understand how they get into some cameras actually but then when snowden says its what it is, i guess i'm just too naive not to listen Smiley  governments likes to control, its what they do. internet was once military technology, they made it available casually for us, they must have found better one.

One of the "better one"s is the power grid. If your computer plugs into a wall outlet, they can see everything on it. They do it through complex, self-interacting, force combinations that they send down the wires of the power grid.

It's like having a computer completely made out of electromagnetic forces, that they send down the wires, and into your computer, where it reads everything that goes on in your computer. It wouldn't surprise me if they could read you hard drive while your computer was not running. But solid state drives are easier. That's why they are promoting solid state in all the computers.

Cool
legendary
Activity: 2590
Merit: 3015
Welt Am Draht
I've been saying for some time that end-to-end encryption and various other security procedures are probably mostly giving a false sense of security and the real Achilles' heal these days is device security.

I find it pretty amazing the speed all of these companies are heading towards connecting everything conceivable to the internet, yet they really don't appear to give much of a shit about leaving the doors wide open for hackers to have some fun.

It would be far more reassuring had they provably solved device security before running down this road. I don't really fancy some Russian midget calling me up and threatening to drive me into the nearest brick wall if I don't pay up.
legendary
Activity: 4690
Merit: 1276

I've been saying for some time that end-to-end encryption and various other security procedures are probably mostly giving a false sense of security and the real Achilles' heal these days is device security.

The solution, as I see it, would be for consumers to demand the ability to ensure device security.  Every part of every device from a gaming server to a USB stick to a 'smart' light-bulb should have an OS and firmware that the user can (optionally) build from source and install.  Also, hardware manufacture should be available for audit.

We are a long way from this as best I can see, but it is also the case that the IoT (Internet of Things) is in a relatively early stage.  That means that if there is consumer demand for provably secure implementation a market could develop.  Or at least it would smoke out corp/gov efforts to force us into a spy grid through legislative means.

For my part I can and have paid top dollar for items which I could have somewhat more confidence in.  Rarely is complete confidence possible but if it were, I'd pay even more for it.

full member
Activity: 124
Merit: 100
This should expose Trump from what he was lying about all this time. Cheesy
legendary
Activity: 3178
Merit: 1054
Ye ye, they recorded all of our actions. We already know that.

Those iphone's and samsung galaxie's (or any other smart phones) are the best way to track people's activities. If you think that secret services weren't taking advantage of this then you must be stupid.

Have you tried to get visa from USA? They first check your Facebook account Smiley If you don't have one, they won't like you because you are an unknown person to them Smiley

Linux/GNU based systems are the solution to this madness. Fuck microsoft, fuck apple, fuck google.

if i have to believe snowden, linux may still not be useful in such case. i don't understand how they get into some cameras actually but then when snowden says its what it is, i guess i'm just too naive not to listen Smiley  governments likes to control, its what they do. internet was once military technology, they made it available casually for us, they must have found better one.
legendary
Activity: 1946
Merit: 1427
Anyone who doesn't expect Them to have the capability to help themselves your smartphone, tv, computer etc is a bleedin' moron.

Of course they'll be able to do that. If you don't like it then junk it all and go retro. Even if the CIA isn't listening to you, the manufacturers themselves clearly state that they'll monitor all the things you get up to.


It even goes further, google is required by law to give data about specific IP's search info's and more to the CIA.

Everything you do is tracked and probably saved somewhere. All your only purchases. All your locations. All your webvisits.

I strongly believe windows 10 has integrated backdoors in their operating system aswell.

Online privacy is something that is starting to disappear more and more, its sad to see, but i believe there's not much that we can do to stop it. We have no tools nor power.
legendary
Activity: 3276
Merit: 2442
Ye ye, they recorded all of our actions. We already know that.

Those iphone's and samsung galaxie's (or any other smart phones) are the best way to track people's activities. If you think that secret services weren't taking advantage of this then you must be stupid.

Have you tried to get visa from USA? They first check your Facebook account Smiley If you don't have one, they won't like you because you are an unknown person to them Smiley

Linux/GNU based systems are the solution to this madness. Fuck microsoft, fuck apple, fuck google.
legendary
Activity: 2590
Merit: 3015
Welt Am Draht
Anyone who doesn't expect Them to have the capability to help themselves your smartphone, tv, computer etc is a bleedin' moron.

Of course they'll be able to do that. If you don't like it then junk it all and go retro. Even if the CIA isn't listening to you, the manufacturers themselves clearly state that they'll monitor all the things you get up to.
member
Activity: 82
Merit: 10
In our digital age it is impossible to protect yourself from spying. Well, now publish documents and then what? This is news to you? I think it's the reason for the attack on CIA which organizes and hosts Russia.
legendary
Activity: 1049
Merit: 1006


WikiLeaks publishes "biggest ever leak of secret CIA documents"

https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance

The 8,761 documents published by WikiLeaks focus mainly on techniques for hacking and surveillance

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices. Thousands of documents focus mainly on techniques for hacking, including how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices.

The leak, dubbed "Vault 7" by WikiLeaks, will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age. It follows disclosures about Afghanistan and Iraq by army intelligence specialist Chelsea Manning in 2010 and about the National Security Agency and Britain's GCHQ by Edward Snowden in 2013.

The documents appear to be from the CIA's 200-strong Center for Cyber Intelligence and show in detail how the agency's digital specialists engage in hacking. According to the documents:

- CIA hackers targeted smartphones and computers.
- The Center for Cyber Intelligence is based at the CIA headquarters in Virginia but it has a second covert base in the US consulate in Frankfurt which covers Europe, the Middle East and Africa.
- A programme called Weeping Angel describes how to attack a Samsung F8000 TV set so that it appears to be off but can still be used for monitoring.

The CIA declined to comment on the leaks beyond the agency’s now-stock refusal to verify their contents. "We do not comment on the authenticity or content of purported intelligence documents", wrote CIA spokesperson Heather Fritz Horniak. But it is understood the documents are genuine and a hunt is under way for the leakers or hackers responsible for the leak.

Source: The Guardian
Pages:
Jump to: