{"id":31603,"date":"2017-03-08T12:43:41","date_gmt":"2017-03-08T17:43:41","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/edward-snowdens-take-on-vault7-benzinga.php"},"modified":"2017-03-08T12:43:41","modified_gmt":"2017-03-08T17:43:41","slug":"edward-snowdens-take-on-vault7-benzinga","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/edward-snowdens-take-on-vault7-benzinga.php","title":{"rendered":"Edward Snowden&#8217;s Take On Vault7 &#8211; Benzinga"},"content":{"rendered":"<p><p>    On Tuesday, WikiLeaks     exposed the government surveillance of American citizens    through standard household products, and Edward Snowden wasnt    surprised.  <\/p>\n<p>    In a spurt of Twitter Inc (NASDAQ: TWTR) activity, Snowden    verified the authenticity of the WikiLeaks documents    referencing government programs and office names known only to    cleared insiders.  <\/p>\n<p>    He outlined a brief thesis noting that most alarming feature in    the 8,000-page package is the enduring security hole    intentionally left by the Central Intelligence Agency for    continued access.  <\/p>\n<p>      The CIA reports show the USG developing vulnerabilities in US      products, then intentionally keeping the holes open. Reckless      beyond words.    <\/p>\n<p>       Edward Snowden (@Snowden) March      7, 2017    <\/p>\n<p>    The     breach in both Apple Inc (NASDAQ:    AAPL)s iOS and    Alphabet Inc (NASDAQ: GOOG) (NASDAQ: GOOGL)s Android operating system    renders smartphone users exposed to non-government attacks.  <\/p>\n<p>      Why is this dangerous? Because until closed, any hacker can      use the security hole the CIA left open to break into any      iPhone in the world. <a href=\"https:\/\/t.co\/xK0aILAdFI\" rel=\"nofollow\">https:\/\/t.co\/xK0aILAdFI<\/a>    <\/p>\n<p>       Edward Snowden (@Snowden) March      7, 2017    <\/p>\n<p>    In a tone generally vindicating conspiracy theorists, Snowden    said the documents verify the U.S. governments hushed efforts    to keep U.S. software unsafe.  <\/p>\n<p>    Related Link:     Here's All Of Wikileaks' Bombshells Since It Was Founded 10    Years Ago  <\/p>\n<p>    Related Link:     Tech, Political Figures Draw Battle Lines Over Apple    ______    Image Credit: Edward Snowden [CC BY 3.0 (<a href=\"http:\/\/creativecommons.org\/licenses\/by\/3.0\" rel=\"nofollow\">http:\/\/creativecommons.org\/licenses\/by\/3.0<\/a>)],    via     Wikimedia Commons  <\/p>\n<p>    Posted-In: News Politics Topics Legal    Events Tech    Media General    Best of Benzinga  <\/p>\n<p>     2017 Benzinga.com. Benzinga does not provide investment    advice. All rights reserved.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.benzinga.com\/news\/17\/03\/9141491\/edward-snowdens-take-on-vault7\" title=\"Edward Snowden's Take On Vault7 - Benzinga\">Edward Snowden's Take On Vault7 - Benzinga<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> On Tuesday, WikiLeaks exposed the government surveillance of American citizens through standard household products, and Edward Snowden wasnt surprised. In a spurt of Twitter Inc (NASDAQ: TWTR) activity, Snowden verified the authenticity of the WikiLeaks documents referencing government programs and office names known only to cleared insiders. He outlined a brief thesis noting that most alarming feature in the 8,000-page package is the enduring security hole intentionally left by the Central Intelligence Agency for continued access<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-31603","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31603"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31603"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31603\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}